VU21991 – Implement network security infrastructure for an organisation

Project assessment 1 of 3

Criteria

Unit code, name and release number

VU21991 – Implement network security infrastructure for an organisation (1)

Qualification/Course code, name and release number

22334VIC | Certificate IV in Cyber Security (1)

Student details

Student number

Student name

Assessment declaration

  • This assessment is my original work and no part of it has been copied from any other source except where due acknowledgement is made.
  • No part of this assessment has been written for me by any other person except where such collaboration has been authorised by the assessor concerned.
  • I understand that plagiarism is the presentation of the work, idea or creation of another person as though it is your own. Plagiarism occurs when the origin of the material used is not appropriately cited. No part of this assessment is plagiarised.

Student signature and Date

Version:                              15042020

Date created:                     01 April 2020

Date modified:                   26/07/2022

For queries, please contact:

Technology and Business Services SkillsPoint

Building B, Level G, Corner Harris Street and Mary Ann Street, Ultimo NSW 2007

© 2020 TAFE NSW, Sydney
RTO Provider Number 90003 | CRICOS Provider Code: 00591E

This assessment can be found in the: Learning Bank

The contents in this document is copyright © TAFE NSW 2020, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 26 July 2022. For current information please refer to our website or your teacher as appropriate.

Assessment instructions

Table 1 Assessment instructions

Assessment detailsInstructions
Assessment overviewThe objective of this assessment is to assess your knowledge and performance as would be required to; examine modern network security threats and attacksconfigure secure administrative access to network devicesdemonstrate the fundamental operation of Cryptographic systems.
Assessment Event number1 of 3
Instructions for this  assessmentThis is a project-based assessment and will be assessing you on your knowledge and performance of the unit. This assessment is in five parts and includes an Assessment Feedback form: Practical – secure administrative access to network devicesPractical – implement local AAA authentication for network device accessPractical – implement AAA authentication using RADIUS serverPractical – allocate user command privileges for network devicesPractical – implement secure management and network monitoring The assessment also contains: Assessment Checklist Assessment Feedback
Submission instructionsOn completion of this assessment, you are required to upload the following document to the TAFE Moodle site using the submission link provided for this assessment. Firstname_Lastname_VU21191_AE_Pro_1of3.docxFirstname_Lastname_VU21191_AE_Pro_1of3_SR_LabSim.pkt (Replace Firstname_Lastname with your name.) Ensure you have written your name at the bottom of each page of this assessment. You must keep a copy of all electronic (or hardcopy) assessments submitted to TAFE and complete the assessment declaration when submitting the assessment.
What do I need to do to achieve a satisfactory result?To achieve a satisfactory result for this assessment all questions must be answered correctly.
What do I need to provide?A personal computer with internet accessMicrosoft Office (or equivalent)Cisco Packet Tracer software
What the assessor will provide?Access to the Learning Management SystemAccess to supporting documents as listed in the assessmentAccess to Packet Tracer
Due date and time allowedRefer to the Unit Assessment Guide for the due dates. Assessment is to be completed out of class. The estimated time for a student to complete this assessment is approximately three and a half hours.
Assessment feedback, review or appealsIn accordance with the TAFE NSW policy Manage Assessment Appeals, all students have the right to appeal an assessment decision in relation to how the assessment was conducted and the outcome of the assessment. Appeals must be lodged within 14 working days of the formal notification of the result of the assessment. If you would like to request a review of your results or if you have any concerns about your results, contact your Teacher or Head Teacher.  If they are unavailable, contact the Student Administration Officer. Contact your Head Teacher for the assessment appeals procedures at your college/campus.

 

Specific task instructions

The instructions and the criteria in the tasks and activities below will be used by the assessor to determine if you have satisfactorily completed this assessment event. Use these instructions as a guide to ensure you demonstrate the required knowledge.

Resources

    • (PDF file) –Refer to this when required to obtain technical specifications for the tasks to be performed in this assessment.
    • (Packet Tracer Activity file) – This is the network simulation file to be used for demonstrating the practical tasks.

Scenario

You are working as a Junior Cyber Security Analyst for a company called DataTrust. You have been instructed by the Senior Cyber Security Analyst, Samantha Roser, to implement network security infrastructure on a new network segment at DataTrust. 

Your tasks include the following:

Submission Instructions

On completion of this assessment you must submit the following two files.

  • Submission item 1
  • Rename the file names of this assessment to include your details as follows:
    • Firstname_Lastname_VU21191_AE_Pro_1of3.docx
  • Include your full name, student number and date of submission on the header/footer of this assessment document.
  • Submit your answer booklet in either .docx or .pdf formats.
  • Submission item 2
  • Rename the Packet Tracer LabSim file with your saved configurations to include your details as follows:
    • Firstname_Lastname_VU21191_AE_Pro_1of3_SR_LabSim.pkt

Part 1: Practical – secure administrative access to network devices

Document your process of configuring secure administrative access to implement a network device using a command-line interface (CLI).

Use the VU21991_AE_Pro_1of3_SR_LabSim network simulation file to perform the practical tasks given below.

Refer to the VU21991_AE_Pro_1of3_SR_TechnicalSpecs for detailed technical specifications related to the tasks given below.

Demonstrate the process of implementing the following configurations with sufficient process descriptions and screenshots showing R1 and R2 device configurations.

Task 1: Secure basic console, auxiliary port and virtual access lines

Description of the process followed, relevant commands and screenshots

Include here your descriptions of the configuration process, the commands used to do the task along with appropriate screenshots.

Description of process followed, relevant commands and screenshots

Include here your descriptions of the configuration process, the commands used to do the task along with appropriate screenshots.

Description of process followed, relevant commands and screenshots

Include here your descriptions of the configuration process, the commands used to do the task along with appropriate screenshots.

Description of process followed, relevant commands and screenshots

Include here your descriptions of the configuration process, the commands used to do the task along with appropriate screenshots.

Task 2: Configure and encrypt secret passwords on R1 and R2

Description of process followed, relevant commands and screenshots

Include here your descriptions of the configuration process the commands used to do the task along with appropriate screenshots.

Answer:

Include your answer here.

Answer:

Include your answer here.

Task 3: Configure administrator user accounts in a local database for secure device access

Description of process followed, relevant commands and screenshots

Include here your descriptions of the configuration process the commands used to do the task along with appropriate screenshots.

Description of configuration and testing process with screenshots

Include your descriptions of the configuration process and appropriate screenshots here.

  • VU21991_AE_Pro_1of3_SR_LabSim_Part1. You will continue to work on this simulation file in Part 2 of this assessment.

Assessment Checklist for Part 1

The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted/presented project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission/presentation. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions while the submission/presentation is taking place or if appropriate directly after the task/activity has been submitted/completed.

TASK/STEP #InstructionsSU/SAssessor Comments
Task 1.1Configured minimum password length according to technical specifications.   
Task 1.2Secured console port access in R1 and R2 according to technical specifications.  
Task 1.3Secured auxiliary port access in R1 and R2 according to technical specifications.  
Task 1.4Secured virtual access lines (VTY) in R1 and R2 according to technical specifications.  
Task 1.5Encrypted all plain-text passwords in R1 and R2   
Task 2.1Configured the enable secret password in R1 and R2 according to technical specifications.   
Task 2.2Identified and discussed the hashing algorithms used when securing routers.  
Task 2.3Described how router security configurations can protect the device from potential attacks.   
Task 3.1Configured a local administrator username and password in R1 and R2 according to technical specifications.   
Task 3.2Configured a MOTD banner message according to specifications.   

Part 2: Practical – implement local AAA authentication for network device access

Note: Before doing the tasks below, test connectivity between RADIUS Server and PC-A by pinging. If the pings are not successful, troubleshoot the router and PC configurations before proceeding.

Use the VU21991_AE_Pro_1of3_SR_LabSim_Part1 network simulation file with the saved configurations from Part 1 to perform the practical tasks given below.

Refer to the VU21991_AE_Pro_1of3_SR_TechnicalSpecs for detailed technical specifications related to the tasks given below.

Task 1: Configure local AAA authentication for console access on R1

  1. Enable AAA services in R1 and configure AAA authentication for the console login to use the local (case-sensitive) database.
    1. Save your configuration in R1.
    1. Record the router commands used to perform this task.
    1. Provide screenshots of the running configuration of R1 as evidence of successfully performing this task. Ensure that you highlight/emphasise the specific line/s of command/s used to accomplish this task in your screenshots.

Description of process followed, relevant commands and screenshots

Include here your commands used to do the task along with appropriate screenshots.

  • Configure the line console to use the defined AAA authentication method.

Relevant commands and screenshots

     Include here your commands used to do the task along with appropriate screenshots.

  • Verify the AAA authentication method by doing the following:
    • Exit from the user EXEC mode in R1
    • Login using the administrator credentials in R1 local database.
    • Provide a screenshot of the login verification process in R1 as evidence of successfully performing this task.

Screenshots

Include here any appropriate screenshots.

Task 2: Configure local AAA authentication for vty lines on R1

  1. Configure domain name and crypto key for use with SSH (public key encryption method) in R1 according to the technical specifications provided.
    1. Save your configuration in R1.
  • Provide screenshots of the configuration of R1 as evidence of successfully performing this task. Ensure that you highlight/emphasise the specific line/s of command/s used to accomplish this task in your screenshots.

Relevant commands and screenshots

      Include here your commands used to do the task along with appropriate screenshots.

  • Configure SSH version 2 and other authentication parameters according to the technical specifications provided.
    • Save your configuration in R1.
    • Record the router commands used to perform this task and describe the purpose of using SSH version 2. (min 35 words to max. 55)
    • Provide screenshots of the configuration of R1 as evidence of successfully performing this task. Ensure that you highlight/emphasise the specific line/s of command/s used to accomplish this task in your screenshots.

Descriptions, relevant commands and screenshots

Include here your descriptions, commands used to do the task along with appropriate screenshots.

  • Configure a named list AAA authentication method for the vty lines on R1 according to the router specifications provided.
    • Save your configuration in R1.
    • Record the router commands used to perform this task.
    • Provide screenshots of the configuration of R1 as evidence of successfully performing this task. Ensure that you highlight/emphasise the specific line/s of command/s used to accomplish this task in your screenshots.

Relevant commands and screenshots

            Include here your commands used to do the task along with appropriate screenshots.

  • Configure the vty lines to use the named AAA method and only allow SSH for remote access.
    • Save your configuration in R1.
    • Record the router commands used to perform this task.
    • Provide screenshots of the configuration of R1 as evidence of successfully performing this task. Ensure that you highlight/emphasise the specific line/s of command/s used to accomplish this task in your screenshots.

Relevant commands and screenshots

            Include here your commands used to do the task along with appropriate screenshots.

  • Verify the AAA authentication method for vty line access.
  • Establish an SSH session from the command prompt of PC-A to R1 router.
  • Login using the administrator credentials in R1 local database.

Note: If you encounter any problems, you need to troubleshoot the network security infrastructure in order to achieve the desired results.

  • Provide screenshots of the login verification process in R1 as evidence of successfully performing this task.

Screenshots

Include here any appropriate screenshots.

  • Configure the default login authentication list.
  • Use the correct command in R1 to allow for local AAA authentication as the default authentication method. Ensure that the local authentication is configured as case-sensitive.
  • Explain what the result will be if you do not set up a default login authentication list. (min 30 words to max. 50)

Answer and screenshots

Include your answer and appropriate screenshots here.

  • Save the configuration of the Packet Tracer file as VU21991_AE_Pro_1of3_SR_LabSim_Part2. You will continue to work on this simulation file in Part 3 of this assessment.

Assessment Checklist for Part 2

The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted/presented project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission/presentation. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions while the submission/presentation is taking place or if appropriate directly after the task/activity has been submitted/completed.

TASK/STEP #InstructionsSU/SAssessor Comments
Task 1.1Enabled AAA services in R1 successfully   
Task 1.2Configured the console line to use the defined AAA authentication method   
Task 1.3Verified AAA authentication method on R1 console line.   
Task 2.1Configured the domain name and crypto key according to the technical specifications   
Task 2.2Configured SSH version 2 according to the technical specifications and explained its purpose.   
Task 2.3Configured a named list for AAA authentication for vty lines in R1 according to technical specifications.   
Task 2.4Configured the VTY lines to use the named AAA method and only allow for SSH remote access.   
Task 2.5Established a SSH session from PC-A to R1 to verify the AAA authentication method configured.   
Task 2.6Configured the default login authentication list for case-sensitive local database as the default method.   

Part 3: Practical – implement AAA authentication from RADIUS server

In this task, you will be configuring the RADIUS server with user account details, and then configure R2 to access the local RADIUS server for user authentication.

Use the VU21991_AE_Pro_1of3_SR_LabSim_Part2 network simulation file with the saved configurations from Part 1 to perform the practical tasks given below.

Refer to the VU21991_AE_Pro_1of3_SR_TechnicalSpecs for detailed technical specifications related to the tasks given below.

Task 1: Configure AAA authentication from a local RADIUS server

  1. Configure the RADIUS Server with the R2 local administrator credentials.

Hint: In RADIUS Server, go to the Services tab, click AAA and add the local administrator credentials for R2 along with R2’s IPv4 address. Ensure that you use all lower-case characters when adding the username and password.

Screenshots

Include your screenshots here.

  • Configure R2 for RADIUS server access according to the technical specifications provided. Ensure your configuration performs the following:
    • Specify the RADIUS Server Name
    • Specify the RADIUS server IP address
    • Specify a secret password between the RADIUS server and Router R1.

Relevant commands and screenshots

Include your commands and appropriate screenshots here.

Task 2: Configure AAA login authentication for console access on R2

Relevant commands and screenshots

Include your commands and appropriate screenshots here.

  • Configure AAA authentication for console login to use the default AAA authentication method.

Relevant commands and screenshots

Include your commands and appropriate screenshots here.

  • Test the AAA RADIUS configuration by doing the following.
  • Verify connectivity between R1 and RADIUS Server.
  • Test the configuration by logging in to the console of R1 using the username and password configured in the RADIUS Server.

Note: If you encounter any problems, you need to troubleshoot the network security infrastructure in order to achieve the desired results.

Relevant commands and screenshots

Include your commands and appropriate screenshots here.

  • Save the configuration of the Packet Tracer file as VU21991_AE_Pro_1of3_SR_LabSim_Part3. You will continue to work on this simulation file in Part 4 of this assessment.

Task 3: Describe the purpose of using AAA procedures for network device access

Describe the purpose of using AAA procedures referring to the configuration tasks performed previously. (min 100 words to max. 150)

Answer:

Include your answer here.

Assessment Checklist for Part 3

The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted/presented project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission/presentation. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions while the submission/presentation is taking place or if appropriate directly after the task/activity has been submitted/completed.

TASK/STEP #InstructionsSU/SAssessor Comments
Task 1.1Configure the RADIUS server with correct credentials for R2 authentication.   
Task 1.2Configured RADIUS server details in R2 according to the technical specifications provided   
Task 2.1Enabled AAA on R2 and default authentication list for RADIUS first and local database as a backup method.   
Task 2.2Configured AAA authentication for console login.   
Task 2.3Tested the RADIUS configuration by logging into R2 console.   
Task 3Described the purpose of AAA procedures   

Part 4: Practical – allocate user command privileges for network devices

In this practical, you will be creating multiple administrative roles, or views on routers R1 and R2. You are also required to grant each role/view varying privileges and verify the configured roles/views.

For each task and sub-tasks, you are required to describe the process, demonstate and implement the security solutions in the simulated routers using the Cisco Packet Tracer software.

Use the VU21991_AE_Pro_1of3_SR_LabSim_Part3 network simulation file with the saved configurations from Part 1 to perform the practical tasks given below.

Refer to the VU21991_AE_Pro_1of3_SR_TechnicalSpecs for detailed technical specifications related to the tasks given below.

Task 1: Enable Root View on R1 and R2

  1. Write answers for the following related to enabling root views in routers:
  2. Describe the function of the root view in a router. (min 75 words to max. 100)

Answer:

Include your answer here

  • Mention two pre-requisites for configuring and enabling root view.

Answer:

Include your answer here

  • What password needs to be used when entering the root view mode?

Answer:

Include your answer here

  • Enable root view in R1 and R2 using the correct command/s. Provide screenshots of performing this task in the router CLI. Highlight/emphasise the commands used for this task on your screenshots.

 Answer:

Include your screenshots here.

Task 2: Create and configure a new view for admin1 on R1 and R2

The admin1 user is the top-level user below root who can access the router having a high level of authority. The admin1 user can use all show, config and debug commands.

Do the following and write down the commands for each task and screenshots where relevant.

  1. Create a user role for admin1 from within the root view.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Associate the admin1 view with an encrypted password.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Add all config, show and debug commands to the admin1 view and then exit from the view configuration mode.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Verify the admin1 view and examine the EXEC and show commands available. Provide a screenshot as evidence of this verification. Do this in both routers R1 and R2.

Relevant commands and screenshots:

Include your verification commands and relevant screenshots here.

 

Task 3: Create and configure a new view for admin2 on R1 and R2

The admin2 user is a junior administrator in training who can view all configurations but is not allowed to configure the routers or use debug commands.

Do the following and write down the commands for each task and screenshots where relevant.

  1. Create a user role for admin2 from within the root view.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Associate the admin2 view with an encrypted password.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Add all show commands to the admin2 view and then exit from the view configuration mode.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Verify the admin2 view and examine show commands available. Provide a screenshot as evidence of this verification.

Relevant commands and screenshots:

Include your verification commands and relevant screenshots here.

Task 4: Create and configure a new tech view for R1

The tech user typically installs end-user devices and cabling. Tech users are only allowed to use selected show commands.

Do the following and write down the commands for each task and screenshots where relevant.

  1. Create a user role for tech from within the root view.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Associate the tech view with an encrypted password.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Add all show commands to the tech view and then exit from the view configuration mode.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Verify the tech view and examine show commands available. Provide a screenshot as evidence of this verification.

Relevant commands and screenshots:

Include your verification commands and relevant screenshots here.

Assessment Checklist for Part 4

The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted/presented project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission/presentation. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions while the submission/presentation is taking place or if appropriate directly after the task/activity has been submitted/completed.

TASK/STEP #InstructionsSU/SAssessor Comments
Task 1.1Provided answers for questions relevant to root view (user command privilege configuration)   
Task 1.2Enabled root view in R1 and R2   
Task 2.1Created a user role for admin1   
Task 2.2Associated admin1 with an encrypted password   
Task 2.3Added relevant privileges and commands to the admin1 view.   
Task 2.4Verified admin1 view for correct functionality.   
Task 3.1Created a user role for admin2   
Task 3.2Associated admin2 with an encrypted password   
Task 3.3Added relevant privileges and commands to the admin2 view.   
Task 3.4Verified admin2 view for correct functionality.   
Task 4.1Created a user role for tech   
Task 4.2Associated tech user view with an encrypted password   
Task 4.3Added relevant privileges and commands to the admin2 view.   
Task 4.4Verified admin2 view for correct functionality.   

Part 5: Practical – implement secure management and network monitoring

Document your process for the implementation of secure management and network monitoring.

Use the VU21991_AE_Pro_1of3_SR_LabSim_Part4 network simulation file with the saved configurations from Part 3 to perform the practical tasks given below.

Refer to the VU21991_AE_Pro_1of3_SR_TechnicalSpecs for detailed technical specifications related to the tasks given below.

Task 1: Secure the IOS image and configuration files on R1

Do the following and write down the commands for each task and screenshots where relevant.

  1. Display the files in the flash memory for R1 including the directory contents.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Use the correct command to secure the IOS image file, which hides these files from the commands used in the previous task.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Use the correct command to take a snapshot of the router running configuration and securely archive it in persistent storage (flash).

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Verify that the IOS image and configuration files are secured using the appropriate show commands.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Execute the show flash and dir commands to ensure the ISO and config files are hidden.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

Task 2: Configure R1 to log messages to the SYSLOG server for device monitoring

Do the following and write down the commands for each task and screenshots where relevant.

  1. Configure R1 to identify the local host (Syslog Server) that will receive logging messages by using the correct command.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Verify logging configuration in R1. Provide a screenshot of the R1 CLI as evidence of performing this task.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Examine the SYSLOG server for logs from R1. Provide a screenshot of the logs saved in the SYSLOG Server as evidence.

Note: In the SYSLOG Server, go to Services tab and select the SYSLOG services option.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

Task 3: Configure R2 to log messages to the remote SYSLOG server for device monitoring

Do the following and write down the commands for each task and screenshots where relevant.

  1. Configure R2 to identify the remote host (Syslog Server) that will receive logging messages by using the correct command.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Verify logging configuration in R2. Provide a screenshot of the R2 CLI as evidence of performing this task.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

  • Examine the SYSLOG server for logs from R2. Provide a screenshot of the logs saved in the SYSLOG Server as evidence.

Note: In the SYSLOG Server, go to Services tab and select the SYSLOG services option. You may need to click a different service and then click SYSLOG again to refresh the message display.

Relevant commands and screenshots:

Include your commands and relevant screenshots here.

Assessment Checklist for Part 5

The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted/presented project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission/presentation. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions while the submission/presentation is taking place or if appropriate directly after the task/activity has been submitted/completed.

TASK/STEP #InstructionsSU/SAssessor Comments
Task 1.1Displayed the files in the flash memory   
Task 1.2Secured the IOS image files in R1   
Task 1.3Used the correct command to secure and archive router running configuration.   
Task 1.4Verified the IOS image and configuration files for secure management.   
Task 1.5Verified if the IOS and configuration files are now hidden.   
Task 2.1Configured R1 to identify SYSLOG server.   
Task 2.2Verified logging configuration in R1   
Task 2.3Examined the SYSLOG server for saved logs from R1   
Task 3.1Configured R2 to identify SYSLOG server.   
Task 3.2Verified logging configuration in R2   
Task 3.3Examined the SYSLOG server for saved logs from R2.   

Assessment Feedback

NOTE: This section must have the assessor signature and student signature to complete the feedback.

Assessment outcome

☐ Satisfactory

☐ Unsatisfactory

Assessor Feedback

☐ Has the Assessment Declaration on page 1 of the assessment been signed and dated by the student?

☐ Are you assured that the evidence presented for assessment is the student’s own work?

☐ Was the assessment event successfully completed?

☐ If no, was the resubmission/re-assessment successfully completed?

☐ Was reasonable adjustment in place for this assessment event?
If yes, ensure it is detailed on the assessment document.

Comments:

Assessor name, signature and date:

Student acknowledgement of assessment outcome

Would you like to make any comments about this assessment?

Student name, signature and date

NOTE: Make sure you have written your name at the bottom of each page of your submission before attaching the cover sheet and submitting to your assessor for marking.

Order Now

Get expert help for VU21991 – Implement network security infrastructure for an organisation and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (December 21, 2024) VU21991 – Implement network security infrastructure for an organisation. Retrieved from https://universalassignment.com/vu21991-implement-network-security-infrastructure-for-an-organisation-2/.
"VU21991 – Implement network security infrastructure for an organisation." Universal Assignment - December 21, 2024, https://universalassignment.com/vu21991-implement-network-security-infrastructure-for-an-organisation-2/
Universal Assignment July 26, 2022 VU21991 – Implement network security infrastructure for an organisation., viewed December 21, 2024,<https://universalassignment.com/vu21991-implement-network-security-infrastructure-for-an-organisation-2/>
Universal Assignment - VU21991 – Implement network security infrastructure for an organisation. [Internet]. [Accessed December 21, 2024]. Available from: https://universalassignment.com/vu21991-implement-network-security-infrastructure-for-an-organisation-2/
"VU21991 – Implement network security infrastructure for an organisation." Universal Assignment - Accessed December 21, 2024. https://universalassignment.com/vu21991-implement-network-security-infrastructure-for-an-organisation-2/
"VU21991 – Implement network security infrastructure for an organisation." Universal Assignment [Online]. Available: https://universalassignment.com/vu21991-implement-network-security-infrastructure-for-an-organisation-2/. [Accessed: December 21, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

RES800 Assessment 1 – Research Question and Literature Review

Subject Title Business Research Subject Code RES800 Assessment Title Assessment 1 – Research Question and Literature Review Learning Outcome/s     Utilise critical thinking to analyse managerial problems and formulate relevant research questions and a research design   Apply research theories and methodologies to assist in developing a business research

Read More »

Assessment Task 2 Health advocacy and communication plan

Assessment Task 2 Health advocacy and communication plan Rationale and multimedia plan presentation Submission requirements Due date and time:         Rationale: 8pm AEST Monday 23 September 2024 (Week 11) Multimedia plan presentation: 8pm AEST Monday 30 September 2024 (Study Period) % of final grade:         50% of overall grade Word limit: Time

Read More »

MLI500 Leadership and innovation Assessment 1

Subject Title Leadership and innovation Subject Code MLI500 Assessment Assessment 1: Leadership development plan Individual/Group Individual Length 1500 words Learning Outcomes LO1 Examine the role of leaders in fostering creativity and innovation LO5 Reflect on and take responsibility for their own learning and leadership development processes Submission   Weighting 30%

Read More »

FPC006 Taxation for Financial Planning

Assignment 2 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,000 words Weighting: 40% Download and use the Assignment 2 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the wdue

Read More »

TCHR5001 Assessment Brief 1

TCHR5001 Assessment Brief 1 Assessment Details Item Assessment 1: Pitch your pedagogy Type Digital Presentation (Recorded) Due Monday, 16th September 2024, 11:59 pm AEST (start of Week 4) Group type Individual Length 10 minutes (equivalent to 1500 words) Weight 50% Gen AI use Permitted, restrictions apply Aligned ULOS ULO1, ULO2,

Read More »

HSH725 Assessment Task 2

turquoise By changing the Heading 3 above with the following teal, turquoise, orange or pink you can change the colour theme of your CloudFirst CloudDeakin template page. When this page is published the Heading 3 above will be removed, but it will still be here in edit mode if you wish to change the colour theme.

Read More »

Evidence in Health Assessment 2: Evidence Selection

Evidence in Health Assessment 2: Evidence Selection Student name:                                                                    Student ID: Section 1: PICO and search strategy Evidence Question: Insert evidence question from chosen scenario here including all key PICO terms.       PICO Search Terms                                                                                                                                                                                                          Complete the following table.   Subject headings Keywords Synonyms Population  

Read More »

Assessment 1 – Lesson Plan and annotation

ASSESSMENT TASK INFORMATION: XNB390 Assessment 1 – Lesson Plan and annotation This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference Assessment (CRA) Marking Matrix that XNB390 markers will use to grade the assessment task

Read More »

XNB390 Task 1 – Professional Lesson Plan

XNB390 Template for Task 1 – Professional Lesson Plan CONTEXT FOR LESSON: SOCIAL JUSTICE CONSIDERATIONS: Equity Diversity Supportive Environment UNIT TITLE:    TERM WEEK DAY TIME 1   5           YEAR/CLASS STUDENT NUMBERS/CONTEXT LOCATION LESSON DURATION         28 Children (chl): 16 boys; 12

Read More »

A2 Critical Review Assignment

YouthSolutions Summary The summary should summarise the key points of the critical review. It should state the aims/purpose of the program and give an overview of the program or strategy you have chosen. This should be 200 words – included in the word count. Critical analysis and evaluation Your critical

Read More »

PUN364 – Workplace activity Assignment

Assessment 1 – DetailsOverviewFor those of you attending the on-campus workshop, you will prepare a report on the simulated simulated inspection below. For those of you who are not attending, you will be required to carry out your own food business inspection under the supervision of a suitably qualified Environmental

Read More »

FPC006 Taxation for Financial Planning

Assignment 1 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,600 words Weighting: 40% Download and use the Assignment 1 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the due

Read More »

Mental health Nursing assignment

Due Aug 31 This is based on a Mental health Nursing assignment Used Microsoft word The family genogram is a useful tool for the assessment of individuals, couples, and families.  It can yield significant data and lead to important, new patient understandings and insights as multigenerational patterns take shape and

Read More »

Assessment 2: Research and Policy Review

Length: 2000 words +/- 10% (excluding references)For this assessment, you must choose eight sources (academic readings and policy documents) as the basis of your Research and Policy Review. You must choose your set of sources from the ‘REFERENCES MENU’ on the moodle site, noting the minimum number of sources required

Read More »

HSN702 – Lifespan Nutrition

Assessment Task: 2 Assignment title: Population Nutrition Report and Reflection Assignment task type: Written report, reflection, and short oral presentation Task details The primary focus of this assignment is on population nutrition. Nutritionists play an important role in promoting population health through optimal nutritional intake. You will be asked to

Read More »

Written Assessment 1: Case Study

Billy a 32-year-old male was admitted to the intensive care unit (ICU) with a suspected overdose of tricyclic antidepressants. He is obese (weight 160kg, height 172cm) and has a history of depression and chronic back pain for which he takes oxycodone. On admission to the emergency department, Paramedics were maintaining

Read More »

Assessment Task 8 – Plan and prepare to assess competence

Assessment Task 8 – Plan and prepare to assess competence Assessment Task 8 consists of the following sections: Section 1:      Short answer questions Section 2:      Analyse an assessment tool Section 3:      Determine reasonable adjustment and customisation of assessment process Section 4:      Develop an assessment plan Student Instructions To complete this

Read More »

Nutrition Reviews Assignment 2 – Part A and Part B

This assignment provides you with the opportunity to determine an important research question that is crucial to address based on your reading of one of the two systematic reviews below (Part A). You will then develop a research proposal outlining the study design and methodology needed to answer that question

Read More »

NUR332 – TASK 3 – WRITTEN ASSIGNMENT

NUR332 – TASK 3 – WRITTEN ASSIGNMENT for S2 2024. DESCRIPTION (For this Task 3, the word ‘Indigenous Australians’, refers to the Aboriginal and Torres Strait Islander Peoples of Australia) NUR332 Task 3 – Written Assignment – Due – WEEK 12 – via CANVAS on Wednesday, Midday (1200hrs) 16/10/2024. The

Read More »

NUR100 Task 3 – Case study

NUR100 Task 3 – Case study To identify a key child health issue and discuss this issue in the Australian context. You will demonstrate understanding of contemporary families in Australia. You will discuss the role of the family and reflect on how the family can influence the overall health outcomes

Read More »

NUR 100 Task 2 Health Promotion Poster

NUR 100 Task 2 Health Promotion Poster The weighting for this assessment is 40%. Task instructions You are not permitted to use generative AI tools in this task. Use of AI in this task constitutes student misconduct and is considered contract cheating. This assessment requires you to develop scholarship and

Read More »

BMS 291 Pathophysiology and Pharmacology CASE STUDY

BMS 291 Pathophysiology and Pharmacology CASE STUDY Assessment No: 1 Weighting: 40% Due date Part A: midnight Friday 2nd August 2024 Due date Part B: midnight Sunday 29th September 2024 General information In this assessment, you will develop your skills for analysing, integrating and presenting information for effective evidence-based communication.

Read More »

Assessment Task: Health service delivery

Assessment Task Health service delivery is inherently unpredictable. This unpredictability can arise from, for example, the assortment of patient presentations, environmental factors, changing technologies, shifts in health policy and changes in division leadership. It can also arise from changes in policy within an organisation and/or associated health services that impact

Read More »

LNDN08002 Business Cultures Resit Assessment

LNDN08002 Business Cultures Resit Assessment Briefing 2023–2024 (Resit for Term 1) Contents Before starting this resit, please: 1 Assessment Element 1: Individual Report 1 Case Report Marking Criteria. 3 Assessment Element 2: Continuing Personal Development (CPD) 4 Guidance for Assessment 2: Reflection and Reflective Practice. 5 Student Marking Criteria –

Read More »

Assessment Task 2 – NAPLAN Exercise

Assessment Task 2 (35%) – Evaluation and discussion of test items Assessment Task 2 (35%) – Evaluation and discussion of test items AITSL Standards: This assessmeAITSL Standards: This assessment provides the opportunity to develop evidence that demonstrates these Standards: 1.2        Understand how students learn 1.5        Differentiate teaching to meet with

Read More »

EBY014 Degree Tutor Group 2 Assignment

  Assignment Brief Module Degree Tutor Group 2 Module Code EBY014 Programme BA (Hons) Business and Management with   Foundation Year Academic Year 2024/2025 Issue Date 6th May 2024 Semester Component Magnitude Weighting Deadline Learning outcomes assessed 2 1 2000 words Capstone Assessment 100% 26th July, 2024 1/2/3/4 Module Curriculum

Read More »

NTW 600 Computer Network and Security

Assessment 2 Information and Rubric Subject Code  NTW 600 Subject Name Computer Network and Security Assessment Number and Title Assessment 2: Cyber Security Threats to IT Infrastructure of a real-world Organisation Assessment Type Group Assessment Length / Duration  1500 words Weighting %  30% Project Report: 20% Presentation :10% (Recorded) Total

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?