ASSESSMENT COVER SHEET Assessment Details Qualification Code and Title ICT50118 Diploma of Information Technology Block/ Term/ Year Unit Code and Title ICTNWK511 Manage Network Security Assessment...





























































































ASSESSMENT COVER SHEET




Assessment Details




Qualification Code and Title




ICT50118 Diploma of Information Technology




Block/ Term/ Year








Unit Code and Title




ICTNWK511 Manage Network Security




Assessment Type




A1. Written Activity




Re-assessment





YES




NO




Due Date












Student Details




Student Name








Student ID








Instructions to Students:

Please read the following instructions carefully.



vThe purpose of this assessment is to assess your knowledge and skills.


vThis assessment is to be completed according to the instructions given by your assessor.


vTo be deemed satisfactory in this assessment, you must write the answers to all written questions correctly or meet all the performance criteria for activity based assessments by the due date.


vSubmission after the due date will result in a penalty fee.


vShould you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmission in showing your competence with this unit.


vIf you feel the decision made by your assessor was incorrect please refer to your Student Handbook for information on assessment appeal for the required steps to appeal the decision.


vIf you are not sure about any aspect of this assessment, please ask for clarification from your assessor.


vPlease refer to the College re-submission and re-sit policy for more information.


vIf you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately.


vPlease read the tasks carefully then complete all tasks.


vTo be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment.


vRemember, that it must be your own work and if you use other sources then you must reference these appropriately.


vSubmitted document should follow the given criteria. Font should be Times New Roman, Font size need to be 12, line spacing has to be Single line and Footer of submitted document must include Student ID, Student Name and Page Number. Document should be printed double sided.


vThis is individual Assessment. Once you have completed the assessment, please provide the hard copy of the Assessments to your Trainer/ Assessor.


vPlagiarism is copying someone else’s work and submitting it as your own. Any plagiarism will result in NYC.






For Assessor Use Only




Assessor’s Name






Assessment Decision:
To be accessed as satisfactory in this assessment task, the student must address ALL assessment items/questions satisfactorily.




All individual assessment tasks of this unit must be completed satisfactorily for a student to achieve an overall grade of competent for this unit.




The Student’s Performance is




SATISFACTORY




NOT SATISFACTORY






Student Declaration
:
I declare that I have read and agreed to the instructions mentioned above and declare that the work submitted is my own and has not been copied or plagiarized from any person or source. I have been assessed in this unit and advised of my result. I am aware of my appeal rights.






Signature:




Date:
/ /




Assessor Declaration:
I declare that I have conducted a fair, valid and flexible assessment with this student and I provided appropriate feedback.









Signature:






Date: / /





written activity




Your task is to research the following topics the provide a brief outline of your findings. Use the following questions as a guide to your research:


1. Research and discuss, in your own words, each of the following phases and how they relate to managing network security design:


a) Planning phase


b) Building phase


c) Managing phase


2. Briefly describe, in your own words, the following common ICT networks and their configurations. For this you might like to draw the configurations.


a) Local Area Network (LAN)


b) Wireless Local Area Network (WLAN)


c) Wide Area Network (WAN)


d) Bluetooth (Personal Area Network (PAN)


3. Identify and describe each of the following network security measures, in your own words:


a) Auditing and penetration testing techniques


b) Logging analysis techniques


c) Organizational network infrastructure


d) Capabilities of software and hardware solutions


e) General features of emerging security policies, with depth in security procedures


f) Network management and security process controls


4. Explain network security implementation risk management plans and procedures. List each of the steps involved and briefly describe each, in your own words.


5. Identify and describe network attacks, vulnerabilities and related weaknesses of installed infrastructure








TASK OUTCOME Sheet































































Task Outcome Sheet



For this assessment, the student must complete the written activity. The written activity is a stand-alone activity that will allow the student to display the required knowledge and skills that are essential when deciding overall competency.




Did the Student provide evidence of their ability to:




Yes




No



Research and discuss, in your own words, each of the following phases and how they relate to managing network security design:


a) Planning phase


b) Building phase


c) Managing phase



£



£



Briefly describe, in your own words, the following common ICT networks and their configurations. For this you might like to draw the configurations.


a) Local Area Network (LAN)


b) Wireless Local Area Network (WLAN)


c) Wide Area Network (WAN)


d) Bluetooth (Personal Area Network (PAN)



£



£



Identify and describe each of the following network security measures, in your own words:


a) Auditing and penetration testing techniques


b) Logging analysis techniques


c) Organisational network infrastructure


d) Capabilities of software and hardware solutions


e) General features of emerging security policies, with depth in security procedures


f) Network management and security process controls



£



£



Explain network security implementation risk management plans and procedures. List each of the steps involved and briefly describe each, in your own words.



£



£



Identify and describe network attacks, vulnerabilities and related weaknesses of installed infrastructure



£



£




Feedback to Student:




















Assessment Outcome

o

Satisfactory

o

Not Yet Satisfactory




Assessor’s Signature:








Date:










Feb 17, 2021ICTNWK511Training.Gov.Au
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here