0% found this document useful (0 votes)
4 views9 pages

Assign1-SNA-Sibte

The document outlines an assignment for a System and Network Administration course, detailing questions on subnetting and skills required for a successful career in the field. It includes specific tasks related to network management, automation, and security enhancements for a mid-sized software company. Key skills highlighted include operating systems knowledge, networking fundamentals, and security practices.

Uploaded by

sibte638
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views9 pages

Assign1-SNA-Sibte

The document outlines an assignment for a System and Network Administration course, detailing questions on subnetting and skills required for a successful career in the field. It includes specific tasks related to network management, automation, and security enhancements for a mid-sized software company. Key skills highlighted include operating systems knowledge, networking fundamentals, and security practices.

Uploaded by

sibte638
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

System s Network Administration-BSIT-V

Assignment#1

Submission Date:2nd March 1G00hrs


NAME: M SIBTEHASSAN
CLASS: SYS & NETWORK ADMINISTRATION
ROLL no: ITS-11163
SIR: SIR AQIB ADEEL
a. First 4 questions should be hand-written.
b. One PDF file to be submitted on LMS

Q#1. You are working with a Class B network with the private IP address of 172.16.0.0
/16. You need to maximize the number of broadcast domains, where each broadcast domain can
accommodate 1000 hosts. What subnet mask should you use?
ANSWER:
Q#2. How many subnets and hosts per subnet can you get from the network
192.168.200.0/29?
Q#3. How many subnets and host per subnet can you get from the network
172.21.0.0/23?
Q#4. What is the Network Address, broadcast address, first and last valid host address on the
following subnets?
a. 212.168.48.224/25
b. 222.168.48.214/26
c. 200.168.48.198/27
d. 192.168.48.178/29
e. 200.201.203.12/19
f. 172.16.255.47/22
g. 10.17.255.255/13
h. 10.19.255.255/14
Q#5: What key skills and relevant certifications are required to build a successful career as System
and Network Administrator?

Key Skills for System and Network Administrators:

1. Operating Systems Knowledge


o Proficiency in administering Windows, Linux/Unix, and MacOS environments.
o Experience with virtualization (e.g., VMware, Hyper-V).
2. Networking Fundamentals
o Understanding of TCP/IP, DNS, DHCP, VPN, and subnetting.
o Configuring and maintaining routers, switches, and firewalls.
3. System Maintenance and Troubleshooting
o Performing system installation, updates, and patch management.
o Diagnosing and resolving hardware and software issues.
4. Security Practices
o Implementing firewall policies, intrusion detection, and data encryption.
o Managing access controls and ensuring network security compliance.
5. Cloud Computing
o Familiarity with cloud platforms: AWS, Microsoft Azure, Google Cloud.
o Managing hybrid environments (on-premises and cloud).
6. Scripting and Automation
o Automating tasks using PowerShell, Bash, or Python.
o Experience with Infrastructure as Code (IaC) (e.g., Ansible, Terraform).
7. Backup and Disaster Recovery
o Implementing backup solutions and disaster recovery strategies.
o Ensuring business continuity through redundancy planning.
8. Communication and Documentation
o Clear communication with technical and non-technical teams.
o Documenting processes, network topology, and system configurations.

Q#6:
A mid-sized software company with 500 employees face workstation management challenges
like inconsistent configurations, security vulnerabilities and lack of automation. How the IT
team can implement a solution involving

1. Standardization of hardware, OS, and image deployment


2. Automation for configuration management, patch management, backups
3. Security enhancements
ANS: Standardization of Hardware, OS, and Image Deployment
 Ensure consistent workstation configurations.
 Reduce manual errors and deployment time.
 Simplify maintenance and troubleshooting.

1. Hardware Standardization:
o Define a set of approved hardware models (e.g., laptops, desktops).
o Create hardware profiles based on user roles (e.g., developers, designers, admin
staff).
o Establish vendor relationships for bulk purchasing and warranty management.
2. OS and Image Standardization:
o Develop a golden image (master image) with a baseline OS and core applications.
o Maintain separate images for Windows, Linux, or macOS if required.
o Use Microsoft Deployment Toolkit (MDT) or Windows Autopilot for Windows
systems.
o Implement PXE boot for network-based OS deployment.
3. Image Deployment Automation:
o Use tools like:
 Microsoft Endpoint Configuration Manager (MECM/SCCM) – Windows
imaging.
 FOG Project – Open-source imaging for multi-OS support.
 VMware Workspace ONE – Cross-platform endpoint management.
o Schedule regular image updates and version control to ensure consistency.

 Automation for Configuration Management, Patch Management,


and Backups
 Reduce manual intervention through automation.
 Ensure workstations remain updated and consistent.
 Automate backups to prevent data loss.

1. Configuration Management Automation:


o Use Infrastructure as Code (IaC) tools:
 Ansible – For multi-platform automation.
 Puppet or Chef – For complex environment management.
 Group Policy Objects (GPO) – For Windows domain-based
configurations.
o Automate settings like user permissions, firewall rules, and software installation.
2. Patch Management Automation:
o Implement automated patching solutions:
 Microsoft WSUS or MECM – For Windows environments.
 Automox – For multi-platform cloud patching.
 OS-specific repositories – For Linux (e.g., apt, yum).
o Establish a patch-testing environment before deployment.
o Schedule weekly or monthly patch cycles with automated reporting.
3. Backup Automation:
o Implement endpoint backup solutions:
 Veeam – For endpoint and cloud-based backups.
 Acronis Cyber Protect – For system images and file-level backups.
 OneDrive/Google Drive – For automated user document backups.
o Automate incremental and full backups with regular integrity checks.

 Security Enhancements

 Reduce vulnerabilities through proactive monitoring.


 Implement robust endpoint protection and compliance.
 Enhance access controls and data protection.
Endpoint Security Measures:

 Deploy Endpoint Detection and Response (EDR) solutions:


o Microsoft Defender for Endpoint – Advanced Windows protection.
o CrowdStrike Falcon – For real-time threat detection.
 Enable Disk Encryption (e.g., BitLocker for Windows, FileVault for macOS).
 Implement Zero Trust policies for user authentication.

Access Control and Identity Management:

 Enforce Multi-Factor Authentication (MFA) via tools like Okta or Azure AD.
 Implement Role-Based Access Control (RBAC) for user permissions.
 Use Privileged Access Management (PAM) for administrative accounts.

Network and Device Monitoring:

 Deploy Security Information and Event Management (SIEM) systems (e.g., Splunk,
Microsoft Sentinel).
 Set up automated alerts for suspicious activities.
 Implement Network Access Control (NAC) to restrict unmanaged devices.

Security Policy and Compliance:

 Create Endpoint Security Policies for data handling and user responsibilities.
 Conduct regular security audits and vulnerability scans.
 Train employees on cyber hygiene (e.g., phishing awareness).

You might also like