Assessment Task 1: Knowledge Questions: Student Version

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

CRS180

Revision 101
May 2018
Page 1

Assessment Task 1: Knowledge Questions


Student Version

Section A – Program/Course details


Qualification code: 22334VIC Qualification title: Certificate IV in Cyber Security
Unit code: VU21993 Unit title: Secure a networked personal
computer

Department name: CRN


BDIT, Computer and Information Technology number: Enter CRN number

Section B – Assessment task details


Assessment number: 1 of 2 Semester/Year: 2/2020
Due date: Session 5 Duration of 5 weeks
assessment:
Assessment method Knowledge Assessment task ☒Ungraded result
results
☐Other: Click here to enter text.

Section C – Instructions to students


Task instructions:
Knowledge Questions:
In this assessment you are required to answer a range of knowledge questions related to this subject. Some of
these questions are more technical and ask learners to discuss or explain particular technologies or terminologies
while other questions are more holistic or bigger picture focused.
• You are required to attempt ALL questions and tasks individually
• Your answers are to be written in your own words. Copy and paste from a research link will not be
accepted.
• You are required to list all references consulted in the reference box at the end of the assessment.

Section D – Conditions for assessment


Conditions:
Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
Conditions:
- This assessment is to be completed individually.
- You must meet all criteria listed in the marking guide to be satisfactory in this task.
- You may resubmit this task if not successful within the enrolment period as per Holmesglen conducting
assessment procedure.
- It is expected all documents will be completed and submitted electronically but if this is not possible, make
alternative arrangements for submitting the documents with your assessor.
- You will have the opportunity to resubmit if any part of the assessment is deemed unsatisfactory (one resubmit
allowed per task).
- You can appeal an assessment decision according to the Holmesglen Assessment Complaints and Appeals
Procedure.
- If you feel you require special allowance or adjustment to this task, please decide with your assessor within one
week of commencing this assessment,
- The learner may use the internet research answers for this assessment.

Equipment/resources students must supply: Equipment/resources to be provided by the RTO:


Laptop Computer or Desktop computer or Tablet Desktop Computer
Writing Materials Internet Access
Active Email Netacad Account
External HDD storage / Flash Drive
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 2

Assessment Task 1: Knowledge Questions


Section D – Conditions for assessment
Internet Access Access to Brightspace

FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx


CRS180
Revision 101
May 2018
Page 3

Assessment Task 1: Knowledge Questions


Section E – Marking Sheet - Student Answer Sheet
Student ID: Student name:
Unit code: VU21993 Unit title: Secure a networked personal computer
Date:

Knowledge Questions

Questions: Provide your responses in the boxes below each question.


Question 1: List two factors that must be considered when choosing a computer case? Satisfactory response
Yes ☐ No ☐

Answer: Comment:

Question 2: Below is a basic image of how components of a motherboard are Satisfactory response
interconnected to each other. There are eight (8) components in total
displayed. Yes ☐ No ☐
Give a brief description of all 8 components and their importance to each
other.

Answer: Comment:
1. CPU

2. Northbridge/Southbridge

3. BIOS/UEFI

4. HDD

5. PCI Express Graphics Adapter Slot

FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx


CRS180
Revision 101
May 2018
Page 4

Assessment Task 1: Knowledge Questions

6. RAM

7. PCI Adapter Slots

8. Keyboard/Mouse/USB

Question 3: List three (3) common computer ‘input output’ devices with a brief Satisfactory response
description of each device chosen.
Yes ☐ No ☐
Answer: Comment:

Question 4: You are required to provide a screenshot of the following computer Satisfactory response
components, with a brief description of each and how each component
works with each other. Yes ☐ No ☐
- Optical
- Graphics card
- HDD
- DDR RAM
- CPU
- Motherboard
Answer: Comment:

Question 5: You are required to configure a specialised computer system that will Satisfactory response
allow virtualisation.
Yes ☐ No ☐
Document each step you take to configure this feature with a brief
description and screenshot.
Answer: Comment:

Question 6: Describe the following network protocols, explaining two (2) Satisfactory response
characteristics of each.
Yes ☐ No ☐
 TCP
 UDP
In your response you should use a diagram to help discuss which layer the
protocols operate at and features of each protocol.
Answer: Comment:

Question 7: Describe and demonstrate two (2) common preventive maintenance Satisfactory response
techniques that should be taken periodically to enhance operating system
security? Yes ☐ No ☐

Answer: Comment:

Question 8: The role of security is paramount, define two (2) security techniques that Satisfactory response
enhance security of a device.
Yes ☐ No ☐
- one (1) at a software level,
- one (1) at a hardware level.
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 5

Assessment Task 1: Knowledge Questions


Provide a short description of how it enhances security.
Answer: Comment:

Question 9: Describe two (2) connection technologies that are provided by a typical Satisfactory response
ISP. Your response should include typical characteristics of each
technology. Yes ☐ No ☐

Answer: Comment:

Question Define the typical characteristics and structure of the following operating Satisfactory response
10: systems:
Yes ☐ No ☐
1. Windows
2. Linux

Answer: Comment:

Question Identify three (3) key components of a computer network. Your response Satisfactory response
11: requires a screenshot of each device with a description of how that device
functions on the network and whether it is a host/end device or Yes ☐ No ☐
intermediary device.
Answer: Comment:
1.

2.

3.

Question List an example of an IoT device, with a short description of the device & Satisfactory response
12: relevant screenshots of the chosen IoT Device.
Yes ☐ No ☐
Answer: Comment:

Question Identify three (3) Internet of Things (IoT) common security Satisfactory response
13: vulnerabilities.
Yes ☐ No ☐
Answer: Comment:
1.

2.

3.

Question Research one (1) Communication protocol that IoT devices use to Satisfactory response
14: communicate.
Yes ☐ No ☐
Answer: Comment:
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 6

Assessment Task 1: Knowledge Questions

Question There are four (4) types of Cloud deployment models. Research and then Satisfactory response
15: list key features of each model:
Yes ☐ No ☐
1. Public
2. Private
3. Hybrid
4. Community

Answer: Comment:

Question Outline the purpose and characteristics of one (1) networking standard. Satisfactory response
16: Your response should indicate organisation that govern the standard you
have chosen. (For example: IEEE; ISO) Yes ☐ No ☐

Answer: Comment:

Question This question involves connecting a computer to a wired and wireless Satisfactory response
17: network. To complete this task, you will use Cisco Packet Tracer.
Yes ☐ No ☐
Using PT you will create a simple network topology that includes a:
- Home Wireless Router
- x1 Laptop
- x1 Desktop
Each device MUST have your name attached to it. Once you have created
your topology, you must demonstrate connectivity of both devices and
supply the following screenshots:
- Topology
- Connectivity

To finalise the task, answer the following questions.


a) Describe how you configured your wireless router.

b) Describe the process you took to connect your wireless device. Did you
have to connect a WNIC?

c) Describe the process you used to connect your wired device?

Answer: Comment:
Screenshot – Topology

Screenshot - Connectivity

a) Describe how you configured your wireless router.

b) Describe the process you took to connect your wireless device. Did you have to connect a
FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx
CRS180
Revision 101
May 2018
Page 7

Assessment Task 1: Knowledge Questions


WNIC?

c) Describe the process you used to connect your wired device?

Reference URL links:

Section F – Feedback to Student


Has the student successfully completed this assessment task? Yes No
☐ ☐
Additional Assessor comments (as appropriate):

Resubmission allowed: Yes ☐ No ☐ Resubmission due date:


Assessor name:

Assessor signature:

Student signature:
Date Assessed:

FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx


CRS180
Revision 101
May 2018
Page 1

Assessment Task 1: Knowledge Questions


Supporting document
Assessment Submission Cover Sheet (VET)
Student to complete relevant sections and attach this cover sheet to each assessment task for submission.

Student information To be completed by Student

Student name: Student ID:

Program/Course details
Qualification code: 22334VIC Qualification title: Certificate IV in Cyber Security
Unit code: VU21993 Unit title: Secure a networked personal
computer

Department name: CRN number:


BDIT, Computer and Information Technology Enter CRN number

Assessment information To be completed by Student

Teacher name:
Due date: Session 5 Date submitted: Re-submission: ☐

Student declaration
By submitting this assessment task and signing the below, I acknowledge and agree that:
1. This completed assessment task is my own work.
2. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this.
3. I have kept a copy of this assessment task.
4. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or
benchmarking purposes.

Student signature
For electronic submissions: By typing your name in the
student signature field, you are accepting the above
declaration.

Note:
Assessor to attach a photocopy of the completed Marking Guide (Section E) from the Student version of the Assessment Task.
Final result of the subject/unit will be entered on Banner by the teacher/assessor once all assessment tasks have been assessed.

FOR OFFICIAL USE ONLY Holmesglen: JA_CAIT 21-Jan-2020 L:\CAIT\Teaching\T&L\202010\22334VIC\Secure a PC\CRS180_VU21993_AT1of2_Learner.docx

You might also like