ICTNWK544 Design and implement a security perimeter for ICT networks :
Welcome to your Student Assessment Workbook for KII5056 System Security.
|Unit of Competency|
|ICTNWK544||Design and implement a security perimeter for ICT networks|
|ICTNWK547||Manage system security on operational systems|
Before you commence your Assessment, ensure that you have good knowledge of the subject, have thoroughly read your Learner workbook, and clearly understand the Assessment requirements and the expectations of the Assessor.
You may be required to demonstrate knowledge and skills which may be difficult for the Assessor to witness. If so, an Evidence Record is supplied which will allow the knowledge or skill to be verified by at least one third party, and preferably two or more. These witnesses would usually be current or recent supervisors or your Assessor.
Explanations are given for each Task. If you have any questions, consult with your Assessor.
The assessment tasks may be answered using your business, the simulated business or a mixture of both as instructed by your Assessor.
This assessment consists of a case study that requires you to answer three questions and fulfill all its requirements.
The instructions to complete this assessment are included on the following page. Follow the instructions with each question.
When you are confident that you have met all requirements for this assessment task, upload your file using your file using Learning Management System (LMS) for marking.
For the due date of the assessments follow the instructions of your facilitator.
Complete answers to all questions below, adhering to the recommended word limits or space specified below.
All assessment in this subject/units must be completed in the class under the supervision of your facilitator. Once completed the assessments are to be uploaded on LMS (www.KIIonline.edu.au) in individual student profile for marking.
- All assessments must be attempted
- All questions must be answered in an appropriate manner as per the requirements.
- Follow the Assessor’s instructions to complete the assessments
- Use appropriate referencing where applicable. You are required to use APA referencing style.
Individual assessments are to be marked as “Satisfactory” or “Not Yet satisfactory”. The final outcome of this subject/unit is to be recorded in “Unit outcome Record” as “competent” (C) or “Not Yet Competent” (NYC) and/or in LMS. In order to be competent in a given unit of competency the student must satisfactorily complete all assessment tasks and. If more than one unit of competency are clustered to form a subject, the students are still required to attempt all assessments,
|Assessment Tool:||Assessment 3|
|Student must fill this section:|
|Privacy Release Clause:||“I give my permission for my assessment material to be used in the auditing, assessment validation & moderation Process”|
|Authenticity Declaration:||“I declare that: The material I have submitted is my own work;I have kept a copy of all relevant notes and reference material that I used in the production of my work;I have given references for all sources of information that are not my own, including the words, ideas and images of others.”|
|Assessment Completion Status|
|Feedback to student:|
|Information for Student:|
|All work is to be entirely of the Student.|
|General Information for this assessment: Read the instructions for each question very carefully.Be sure to PRINT your FULL name & LAST name in every place that is provided.Short questions must be answered in the spaces provided or follow the word limits as instructed.For those activities requesting extra evidence such as: research reports, ESSAY reports, etc. The student must attach its own work formatted in double space, Arial 12 pts. All assessment tasks must be addressed correctly in order to obtain a competence for the unit of competency.If the Student doesn’t understand the assessment, they can request help from the assessor to interpret the assessment. All assessments must be submitted online. Login to www.kiionline.edu.au and follow the subject link to submit your assessments. Note that the hard copy of the assessments will not be accepted.|
|Re-assessment of Result& Academic Appeal procedures:|
|If a student is not happy with his/ her results, that student may appeal against their grade via a written letter, clearly stating the grounds of appeal to the Operations Manager. This should be submitted after completion of the subject and within fourteen days of commencement of the new term. Re-assessment Process: An appeal in writing is made to the Operations Manager providing reasons for re-assessment /appeal. Operations Manager will delegate another faculty member to review the assessment.The student will be advised of the review result done by another assessor.If the student is still not satisfied and further challenges the decision, then a review panel is formed comprising the lecturer/trainer in charge and the Operations Manager OR if need be an external assessor.The Institute will advise the student within 14 days from the submission date of the appeal. The decision of the panel will be deemed to be final.If the student is still not satisfied with the result, the he / she has the right to seek independent advice or follow external mediation option with nominated mediation agency.Any student who fails a compulsory subject or appeals unsuccessfully will be required to re-enrol in that subject. The cost of reassessment will be borne by the Institute. The external assessor will base his/her judgement based on principles of assessment. These principles require assessment to be reliable, fair, practical and valid.|
Academic Appeals · If you are dissatisfied with the outcome of the re-evaluation process, you have a right to appeal through academic appeals handling protocol.To appeal a decision, the person is required to complete the KII- Request for Appeal of a Decision form with all other supporting documents, if any. This form is available via our website. The completed Request for Appeal form is to be submitted to the Student Support Officer either in hard copy or electronically via the following contact details: Student Support Officer, Kingsford International Institute (KII), Level 6, 128-136 Chalmers St, Surry Hills, NSW 2010, Email: [email protected] The notice of appeal should be in writing addressed to the Operations Manager and submitted within seven days of notification of the outcome of the re-evaluation process. If the appeal is not lodged in the specified time, the result will stand and you must re-enrol in the unit. In emergency circumstances, such as in cases of serious illness or injury, you must forward a medical certificate in support of a deferred appeal. The notice of appeal must be made within three working days of the concluding date shown on the medical certificate. The decision of Operations Manager will be final.Student would then have the right to pursue the claim through an independent external body as detailed in the students’ complaint / grievance policy.
“I understand all the above rules and guidelines for the assessment”
|Full Name||Signature||Date (dd/mm/yyyy)|
Your assessor will go through the assessment for this unit. It is important that you understand this assessment before taking on the questions and tasks. To confirm that you have been given this overview, we ask you to complete the following Pre-Assessment Checklist.
You are required to carefully read each checklist item provided below and tick either ‘Y’ to confirm your understanding or ‘N’ if you disagree. In case you disagree with an item, please provide your reason under the ‘Comments’ column.
When you have done this, we ask you to sign this Pre-Assessment Checklist. This acknowledges that your Trainer/Assessor has discussed all of the information with you prior to undertaking this assessment.
|Pre – assessment Checklist||Comments|
|Y ¨||¨ N||I, the student, understand the purpose of the assessment.|
|Y ¨||¨ N||I understand when and where the assessment will occur, who will assess and in what format the assessment will be submitted.|
|Y ¨||¨ N||I understand the methods of assessment.|
|Y ¨||¨ N||I understand what resources are required to complete this assessment.|
|Y ¨||¨ N||I understand the performance level required for each assessment event.|
|Y ¨||¨ N||I understand that it must be my own work. I have been explained and understand the serious consequences in case this work is found plagiarised.|
|Y ¨||¨ N||I understand the process if I am deemed not yet competent.|
|Y ¨||¨ N||I understand the feedback process and the appeals process.|
|Y ¨||¨ N||The assessor has discussed with me if I have any special needs and if so what arrangements have been made.|
|Student Full Name||Student ID||Student Signature||Date|
ICTNWK544 Design and implement a security perimeter for ICT networks Assessment Task 3: Knowledge Questions
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
- review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
- follow the word limit for each question
- comply with the due date for assessment which your assessor will provide
- adhere with your KII’s submission guidelines
- answer all questions completely and correctly
- submit work which is original and, where necessary, properly referenced
- submit a completed cover sheet with your work
- avoid sharing your answers with other students.
|i||Assessment information This assessment consists of Part A and Part B, short questions all of which must be answered. The instructions to complete this assessment are included on the following page. Follow the instructions with each question. When you are confident that you have met all requirements for this assessment task, upload your file using your file using Learning Management System (LMS) for marking. Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide. Refer to the appendix for information on: where this task should be completedthe maximum time allowed for completing this assessment task Note: You must complete and submit an assessment cover sheet with your work. For the due date of the assessments follow the instructions of your facilitator|
|Resources required for Assessment 1:. Microsoft Office|
Design and implement a security perimeter Re-submission opportunities
You will be provided feedback on their performance by the Assessor. The feedback will indicate if you have satisfactorily addressed the requirements of each part of this task.
If any parts of the task are not satisfactorily completed, the assessor will explain why, and provide you written feedback along with guidance on what you must undertake to demonstrate satisfactory performance. Re-assessment attempt(s) will be arranged at a later time and date.
You have the right to appeal the outcome of assessment decisions if you feel that you have been dealt with unfairly or have other appropriate grounds for an appeal.
Note that each question has a word limit of approximately 50-75 words, otherwise mentioned.
- Describe briefly what is a network firewall?
- What are the two basic types of firewalls? Briefly describe each of them
- Identify 5 most common potential security threats to a typical network and briefly describe each of them.
- What can be the 5 most common potential network security risk in an enterprise environment?
- Give name of three perimeter topology?
- Briefly describe DHCP and its role?
- What is a security perimeter in a network enterprise environment?
- Explain the need for security policies in a given network.
- How can you minimize the impact of each security risk identified in the network?
- Define the term VPN.
- What are the major VPN connectivity issues of a typical network?
- What are the three most common testing techniques of security parameter as per industry standards?
- What are the four major areas firewall must consider?
- What are the major areas to consider while designing complex network security?
- Define and discuss on network log analysis?
- Write down the importance of backing up device configuration.
Note that each question has a word limit of approximately 50-75 words, otherwise mentioned.
- What is meant by an “independent” security audit? Give at least two reasons why an independent security benchmarks can be useful.
- What is “system hardening”?
- Give at least two reasons why using an independent security benchmark can be useful.
- List and describe three common network attacks used to undermine network security
- List five important considerations to address when defining a security policy.
- Describe why CIA (Confidentiality, Integrity and Availability) are important considerations while planning systems management and process control in relation to security (150 words max).
- Explain systems technologies such as cryptography and authentication, including a broad summary of their general features and capabilities.