Professional Documents
Culture Documents
Assessment Task 1: Knowledge Questions: Student Version
Assessment Task 1: Knowledge Questions: Student Version
Assessment Task 1: Knowledge Questions: Student Version
Revision 101
May 2018
Page 1
Knowledge Questions
Answer: Comment:
Question 2: Below is a basic image of how components of a motherboard are Satisfactory response
interconnected to each other. There are eight (8) components in total
displayed. Yes ☐ No ☐
Give a brief description of all 8 components and their importance to each
other.
Answer: Comment:
1. CPU
2. Northbridge/Southbridge
3. BIOS/UEFI
4. HDD
6. RAM
8. Keyboard/Mouse/USB
Question 3: List three (3) common computer ‘input output’ devices with a brief Satisfactory response
description of each device chosen.
Yes ☐ No ☐
Answer: Comment:
Question 4: You are required to provide a screenshot of the following computer Satisfactory response
components, with a brief description of each and how each component
works with each other. Yes ☐ No ☐
- Optical
- Graphics card
- HDD
- DDR RAM
- CPU
- Motherboard
Answer: Comment:
Question 5: You are required to configure a specialised computer system that will Satisfactory response
allow virtualisation.
Yes ☐ No ☐
Document each step you take to configure this feature with a brief
description and screenshot.
Answer: Comment:
Question 6: Describe the following network protocols, explaining two (2) Satisfactory response
characteristics of each.
Yes ☐ No ☐
TCP
UDP
In your response you should use a diagram to help discuss which layer the
protocols operate at and features of each protocol.
Answer: Comment:
Question 7: Describe and demonstrate two (2) common preventive maintenance Satisfactory response
techniques that should be taken periodically to enhance operating system
security? Yes ☐ No ☐
Answer: Comment:
Question 8: The role of security is paramount, define two (2) security techniques that Satisfactory response
enhance security of a device.
Yes ☐ No ☐
- one (1) at a software level,
- one (1) at a hardware level.
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 5
Question 9: Describe two (2) connection technologies that are provided by a typical Satisfactory response
ISP. Your response should include typical characteristics of each
technology. Yes ☐ No ☐
Answer: Comment:
Question Define the typical characteristics and structure of the following operating Satisfactory response
10: systems:
Yes ☐ No ☐
1. Windows
2. Linux
Answer: Comment:
Question Identify three (3) key components of a computer network. Your response Satisfactory response
11: requires a screenshot of each device with a description of how that device
functions on the network and whether it is a host/end device or Yes ☐ No ☐
intermediary device.
Answer: Comment:
1.
2.
3.
Question List an example of an IoT device, with a short description of the device & Satisfactory response
12: relevant screenshots of the chosen IoT Device.
Yes ☐ No ☐
Answer: Comment:
Question Identify three (3) Internet of Things (IoT) common security Satisfactory response
13: vulnerabilities.
Yes ☐ No ☐
Answer: Comment:
1.
2.
3.
Question Research one (1) Communication protocol that IoT devices use to Satisfactory response
14: communicate.
Yes ☐ No ☐
Answer: Comment:
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 6
Question There are four (4) types of Cloud deployment models. Research and then Satisfactory response
15: list key features of each model:
Yes ☐ No ☐
1. Public
2. Private
3. Hybrid
4. Community
Answer: Comment:
Question Outline the purpose and characteristics of one (1) networking standard. Satisfactory response
16: Your response should indicate organisation that govern the standard you
have chosen. (For example: IEEE; ISO) Yes ☐ No ☐
Answer: Comment:
Question This question involves connecting a computer to a wired and wireless Satisfactory response
17: network. To complete this task, you will use Cisco Packet Tracer.
Yes ☐ No ☐
Using PT you will create a simple network topology that includes a:
- Home Wireless Router
- x1 Laptop
- x1 Desktop
Each device MUST have your name attached to it. Once you have created
your topology, you must demonstrate connectivity of both devices and
supply the following screenshots:
- Topology
- Connectivity
b) Describe the process you took to connect your wireless device. Did you
have to connect a WNIC?
Answer: Comment:
Screenshot – Topology
Screenshot - Connectivity
b) Describe the process you took to connect your wireless device. Did you have to connect a
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 7
Assessor signature:
Student signature:
Date Assessed:
Program/Course details
Qualification code: 22334VIC Qualification title: Certificate IV in Cyber Security
Unit code: VU21993 Unit title: Secure a networked personal
computer
Teacher name:
Due date: Session 5 Date submitted: Re-submission: ☐
Student declaration
By submitting this assessment task and signing the below, I acknowledge and agree that:
1. This completed assessment task is my own work.
2. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this.
3. I have kept a copy of this assessment task.
4. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or
benchmarking purposes.
Student signature
For electronic submissions: By typing your name in the
student signature field, you are accepting the above
declaration.
Note:
Assessor to attach a photocopy of the completed Marking Guide (Section E) from the Student version of the Assessment Task.
Final result of the subject/unit will be entered on Banner by the teacher/assessor once all assessment tasks have been assessed.