9-Performance Test

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Performance Test

Specific Instruction for the Trainee

Qualification Computer Systems Servicing NC II


Title of Module Setting-up Computer Server

Unit of Competency Set-up Computer Server


Covered

PLEASE READ CAREFULLY:

1. Given the necessary tools, materials and equipment, you are required to
perform the following in accordance with accepted institutional/industry
standard:
1. Create user folder.
2. Configure user access level based on NOS features and established
network access policies/end-user requirements.
3. Perform security check in accordance with established network
access policies/end-user requirements and safety.
4. Check normal function of server.
5. Installs/Update required modules/add-ons based on NOS
installation procedures.
6. Confirm network services to be configured based on user/system
requirement.
7. Check operation of network services
8. Respond to unplanned events or conditions.
9. Undertake pre-deployment procedures.
10. Undertakes operation and security check.
11. Prepare/Complete reports according to enterprise policies and
procedures.

2. The Assessment shall be based on the units of competency in the Training


Regulations and the Evidence Plan and shall focus on the evidence gathering
methods below:
 Observation / Demonstration with oral questioning.
 Written Test

3. The Final assessment shall be the responsibility of your Trainer.


List of Supplies, Tools, Equipment and Materials (per trainee)
Materials/Equipment
Quantity Description
Computer with complete accessories (Win 7 OS, monitor,
1 set
keyboard, mouse, AVR…) pre-network
Computer with complete accessories (Win Server 2008 OS,
1 set
monitor, keyboard, mouse, AVR…)pre-network
1 unit Network printer

Task to Perform
1. Occupational Health and Safety Procedures and Policies (10 minutes)
Before you begin to the activity for setting up computer server, you are
required to identify at least (5) occupational health and safety
procedures to ensure the safety and quality of your output. Write the
OHS Procedures on the space provided below.
1. ___________________________________________________________________
2. ___________________________________________________________________
3. ___________________________________________________________________
4. ___________________________________________________________________
5. ___________________________________________________________________
2. Peer to Peer Networking (10 minutes)
 Connect two system unit using a peer to peer networking and test the
connectivity
 Shared folder from drive C of the server with a name “mysharedfolder”.
Access the shared folder to another pc connected.
3. Configure Server Computer (45 minutes)
 Add Active Directory Domain Services and Domain Name Services
role
o Use your name as domain name
o Use CSS_2016 as password
o Configure IP address
o Add an organizational unit to the directory name it as “cssusers”
o Add user to cssusers with a username “myuser1”
o Use CSS_2016 as password of myuser1 and tick “password never
expires”
 Add DHCP role
o Create IP Scope and allow 10 devices to connect in the server
 Add File and printer services
o Install printer and share it.
 Create group policy and apply it to cssusers.
o Using folder redirection, redirect my documents.
4. Configure Client Computer (15 minutes)
 Connect the computer to the domain you have created
 Access myuser1 account
 Save any file to documents
 Check save documents in the “folder redirection” folder.
 Print a file in the shared printer.

5. Remote Desktop (10 minutes)


 Remote server to client computer.

6. Check activity log of the server and save a copy to the shared folder.

Ask your trainer to check your work


Rating Sheet for Demonstration

Satisfactory
Did the trainee… Response

Questions Yes No
1. Created user folder in accordance with network
operating system (NOS) features?
2. Configures user access level based on NOS features
and established network access?

3. Performs security check in accordance with established


network access policies/end-user requirements?

4. Checks normal functions of server in accordance with


manufacturer’s instructions?
5. Install/Updates required modules/add-ons based on
NOS installation procedures?

6. Confirms network services to be configured based on


user/system requirements?

7. Checks operation of network services based on


user/system requirements?

8. Respond to unplanned events or conditions in


accordance with established procedures?

9. Undertake pre-deployment procedures based on


enterprise policies and procedures?
10. Undertake operation and security check based on
end-user requirements?

11. Prepare/Complete reports according to enterprise


policies and procedures?

The Trainee was


 Satisfactory  Not Satisfactory
Questioning Tool

Satisfactory
Question to prove the candidate’s underpinning knowledge Response

Extension / Reflection Question Yes No


1. What is the function of a server?
2. What is it important to configure user access level?
3. Why do we need to perform security check on the network
and end-user requirements?
4. How important the Group Policy is?
5. What is the function of Folder Redirection?
6. Remote Desktop Connection allows user to?
Safety Question
7. Explain why is it necessary to check the functionality of all
equipment that will be used?
Job and Environment Question
8. Did the trainee perform necessary implement of system
check before computer server set-up?
Contingency/ Infrequent Events Question
9. What will you do if the computer server and the network
aren’t functioning?
Rules and Regulation
Did the trainee . . .
10. Respond to unplanned events and conditions and do
necessary documentation?

The trainee’s underpinning knowledge


 Satisfactory  Unsatisfactory
was

Feedback to Trainee

General Comments(strength/ Improvement needed)

Trainee’s Signature: Date

Trainer’s Signature: Date


Model Answer:

Extension/ Reflection Question

1. What is the function of the server?


Answer: The function of the server is to provide functionality for other
programs and devices called clients.

2. Why is it important to configure user access level?


Answer: It is necessary to configure the user access level for some
security purposes and user rights.

3. Why do we need to perform security check on the network and end-user


requirements?
Answer: It is necessary to perform security check because this protects
your computer from unnecessary actions from the group.

4. How important the Group Policy is?

Answer: A set of policies that govern security, configuration, and a wide


range of other settings for objects within containers in Active Directory.

5. What is the function of Folder redirection?


Answer: It ensures that users do not store data locally, when a network
device is preferred storage location. Also, it separates data from profile
data decreasing the time required to log on.

6. Remote desktop connection allows user to?


Answer: Remotely log into a networked computer running the terminal
services server.

Safety Question

1. Explain why is it necessary to check the functionality of all equipment


that will be used?
Answer: It necessary to check the functionality of all equipment that will
be used for some safety reasons. This will also prepare you to avoid
errors and hazards during tasks.
Job and Environment Question

1. Did the trainee perform necessary implement of system check before the
computer server set-up?
Answer: The trainee will perform system check before setting-up a
computer server to make sure that he/she will able to install the NOS
correctly.

Contingency/ Infrequent Events Question

1. What will you do if the server and the network aren’t functioning?
Answer: Make sure that you have all the backups of files, different
software and drivers needed for your system to work. Also, the network
plan and configuration must always be checked and tested according to
an implemented schedule.

Rules and Regulation

1. Respond to unplanned events and conditions and do necessary


documentation?
Answer: Unplanned events and conditions must be addressed readily by
identifying and assessing the potential impact of these to occur. These
could be prevented through good planning, design, practice and
emergency response. Troubleshooting and documentation is the
necessary action.

Prepared by:

Rose Cecille M. Falcon


CSS-Instructor

You might also like