Cl_ProfessionalSkills_AE_Kn1of2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Knowledge assessment

Criteria
Unit code and name
Cl_ProfessionalSkills

T - Manage IP, ethics and privacy in ICT environments


ICTSAD609 - Plan and monitor business analysis activities in an ICT environment
BSBXCS402 - Promote workplace cyber security awareness and best practices
BSBCRT611 - Apply critical thinking for complex problem solving

Qualification/Course code and name


Code | Course name
ICT60220 | Advanced Diploma of Information Technology

Student details
Student number

Student name

Assessment declaration
Note: If you are an online student, you will be required to complete this declaration on the
TAFE NSW online learning platform when you upload your assessment.

This assessment is my original work and has not been:

 plagiarised or copied from any source without providing due acknowledgement.

 written for me by any other person except where such collaboration has been
authorised by the Teacher/Assessor concerned.

Student signature and date

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 1 of 31


Version: 20220412
Date created: 12/04/2022

For queries, please contact:


SkillsPoint Name: Technology and Business Services - Ultimo

© 2022 TAFE NSW


RTO Provider Number 90003 | CRICOS Provider Code: 00591E
This assessment can be found in the: Learning Bank
The contents in this document is copyright © TAFE NSW 2022 and should not be reproduced without the
permission of TAFE NSW. Information contained in this document is correct at the time of printing: 11 July
2024. For current information please refer to our website or your Teacher/Assessor as appropriate.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 2 of 31


Assessment instructions
Table 1 Assessment instructions

Assessment details Instructions

Assessment overview The aim of this assessment is to assess your knowledge and
performance in the following:

 managing the issues of intellectual property (IP), copyright


and professional and ethical conduct in a team ensuring
that personal information of stakeholders is handled in a
confidential and professional manner

 establishing and managing Information and


Communications Technology (ICT) business analysis
activities

 promoting cyber security in a work area

 applying critical thinking in order to develop solutions to


complex issues arising in the workplace

Assessment event 1 of 2
number

Instructions for this This is a written assessment that assesses your knowledge of the
assessment unit.

This assessment is in 5 parts:

1. IP, ethics, privacy and cyber security

2. Business analysis and critical thinking

3. Identifying and scoping complex problems

4. Leading development process

5. Building proposed solutions and enabling change

And is supported by:

 Assessment feedback

Note: This assessment may contain links to external resources. If


a link does not work, copy and paste the URL directly into your

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 3 of 31


Assessment details Instructions

browser.

Submission On completion of this assessment, you are required to submit it


instructions to your Teacher/Assessor for marking. If you are completing this
as an online quiz, ensure you click the submit button when
complete. You can save as you progress to avoid losing your
work.

It is important that you keep a copy of all electronic and hardcopy


assessments submitted to TAFE and complete the assessment
declaration when submitting the assessment.

What do I need to do To achieve a satisfactory result for this assessment all questions
to achieve a must be answered correctly.
satisfactory result? If a resit is required to achieve a satisfactory result it will be
conducted at an agreed time after a suitable revision period.

What do I need to • TAFE NSW student account username and password. If you
provide? do not know your username and password, contact your
campus or service centre on 131601.

• Computer or other device with word processing software


and internet access

• Writing materials, if required

What the Access to this assessment and learning resources, including the
Teacher/Assessor will student workbook and any supporting documents or links.
provide Computers, data sheets, reference text, organisational policy etc
that is referenced in the assessment. These may be hard copy or
made available online.

Due date Refer to the Unit Assessment Guide for due date.

Time allowed 2 hours (indicative only)

Assessment In accordance with the TAFE NSW policy Manage Assessment


feedback, review or Appeals, all students have the right to appeal an assessment
appeals decision in relation to how the assessment was conducted and
the outcome of the assessment. Appeals must be lodged within

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 4 of 31


Assessment details Instructions

14 working days of the formal notification of the result of the


assessment.

If you would like to request a review of your results or if you have


any concerns about your results, contact your Teacher/Assessor
or Head Teacher. If they are unavailable, contact the Student
Administration Officer.

Contact your Head Teacher for the assessment appeals


procedures at your college/campus.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 5 of 31


Part 1: IP, ethics, privacy and cyber security
Read each question carefully and answer by selecting the appropriate response.

1. Match the policies/procedures in the table with the identified area of governance of
either, Copyright, Intellectual Property, or Privacy.

Table 2 Matching Question 1.1

Intellectual
Policies/procedures Copyright Privacy
property

Statutory laws governing data X

The Trade Marks Act 1995 X

Maintain confidentiality X

The Australian Berne convention for the


X
protection of literacy

Protection extended to the creator of an


X
original work

A standard patent is protected for 20 years


X
(pharmaceutical patents are protected for 25)

The access of information on computers when


X
necessary

The administration and regulation of


X
Australian network domains

Original work is protected for the duration of


an author’s lifespan in addition to an added 70 X
years

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 6 of 31


2. Which of the following are ways that a business could choose to communicate new
IP, privacy or ethics processes and procedures to staff?

Table 3 Multiple Choice Question1.2

Select the
Communication Methods correct
answer/s

Confidentiality agreements

Text messages X

ExpertConnect

Email X

Collaboration checklist

Term sheets

IP NOVA

3. Match the customer service standard or procedure to the area that it best relates to
(copyright, ethics or privacy).

Table 4 Matching Question 1.3

Customer service standard/procedures Copyright Ethics Privacy

Provide people access to their own records or


provide sufficient reasoning if access must be X
denied

Equal treatment of all customers regardless of


X
diversity

Respectful management of original materials X

Dignified handling of sensitive or personal


X
information

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 7 of 31


4. Match each of the below security standards and procedures to one of the following:

a. Managing system changes (IP)


b. Systems that monitor and protect all info (Ethics)
c. In house protection of personal information (Privacy)

Table 5 Matching Question 1.4

Security standards and procedures Answer

Network monitoring, analysis, and management B

Regular system backups A

Multi-factor authentication B

Access to modify production systems is restricted A

Monitoring key interfaces B

A management repository where all changes are logged A

An encrypted database C

Restricted administrative privileges A

Rigorous system testing procedures B

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 8 of 31


5. Match these scenarios to the correct legislation.

Table 6 Matching Question 1.5

Legislative
Scenario Answer
requirement

A customer of an electrical company is contacted to


inform them that their name, address and contact
details were downloaded when the electrical
B A. Privacy Act
company system was hacked. If found by someone
malicious, they could use these details to commit a
crime. This is known as identity theft.

A person makes a loan application and sees a screen B. Notifiable


stating that the lender will make a search for them on data breach
the credit bureau register before they are approved. A?
The lender is bound by this legislation to only use
personal details to assess applications.

An Australian citizen hacks the Pentagon and C. Budapest


downloads information. They have not broken Convention
Australian laws as these relate only to data held by C
systems based in Australia. They have, though,
broken US laws.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 9 of 31


6. Match the policy requirements with the correct policy or procedure.

Table 7 Matching Question 1.6

Scenario Answer Policy/procedure

Discussing individuals in unsecure locations or via A. Storing, sharing


digital platforms and managing
A
information
effectively

The secure management of personal details B. Encryption policy


D
within the workplace

The handling of sensitive or legal information that C. Data


is categorised into sub-groups classification
C
management
policy

Management of the processes, policies, storage D. Media/document


E
and availability of data and information labelling

Categorising documents into subgroups, also to E. Data governance


D
make it easier to store and retrieve. policy

Use of personal equipment for work purposes F. Acceptable use


F
policy

Company policy that stipulates how a user can G. Use of own


G
access the company network. devices policy

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 10 of 31


Part 2: Business analysis and critical thinking

7. For each of the following descriptions, match whether they relate to legislation, a
standard or a policy/procedure applicable to business analysis activities.

Table 8 Matching Question 2.1

Description Answer Options

A source of best practice information that should be A. Policies


considered and applied to working methods A and
procedures

To be considered when defining process B. Standards


B
requirements for the business analysis initiative.

Regulates the conduct of a specific area throughout C. Legislation


C
a jurisdiction, country or internationally

8. Correctly order the list of steps involved in a business analysis process, by numbering
each step from 1 to 5.

Table 9 Ordering Question 2.2

Steps/process Order

The team sit down to identify and plan business analysis requirements
2
related to the initiative

The business analysis activities are managed 3

The business analysis initiative is orientated 1

The business initiative is supported 4

The business analysis efforts are reviewed 5

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 11 of 31


9. Match the following scenarios relating to identifying complex issues in the workplace
to the correct critical thinking method/technique that would be used to rectify it.

Table 10 Matching Question 2.3

Scenarios Answer Options

A team has many ideas for a project but are


A. Lateral
dysfunctional when it comes to communicating A
thinking
them

The timeline of a project has been B. Brainstorming


underestimated and there are issues with costing
B
and deadlines. A team must apply critical thinking
techniques to come up with a solution

An organisation has taken on a project to produce C. Mind


the digital marketing for an organisation that sells mapping
products that they are unfamiliar with. The client C
wants an original and diverse marketing strategy
to be applied

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 12 of 31


10. Match the following descriptions of business analysis techniques to the correct term.

Table 10 Matching Question 2.4

Descriptions Answer Options

Consists of leading questions that allow business


analysts to single out the root cause of an issue E A. PESTLE
by asking why such a situation arises

Helps you to consider alternate perspectives B. SWOT


F
and ideas

Helps business analysts to evaluate all the C. MoSCoW


external factors which can possibly impression
A
their organization and determine how to
address them

Helps you to find areas of both strength and D. CATWOE


weakness. It also allows for the proper B
allocation of resources

Helps you to recognize processes that may be E. The 5 Whys


D
affected by any action the business undertakes

Allows prioritization of requirements by F. Six Thinking Hats


presenting a framework in which every
C
individual requirement should be evaluated
relative to the others

Allows business analysts to perform thorough G. MOST


internal analysis of what is the aim of an
G
organization to achieve and how to tackles such
issues

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 13 of 31


Part 3: Identifying and scoping complex problems

11. Which of the following are considered Australian government sources of information
relating to data breaches or current threats?

Table 11 Multiple Choice Question 3.1

Select the
Answer choices correct
answer/s

Office of the Australian Information Commissioner X

DATA protection legislation

Privacy Act 1988 X

Australian Cyber Security Centre X

12. Match each of the following scenarios relating to workplace problems to the correct
legislative framework it relates to.

Table 12 Matching question 3.2

Scenarios Answer Options

A company must have a minimum of three A. Copyright


C
directors legislation

A law covering sole traders and corporations with a B. Privacy acts


B
turnover of above $3 million dollars

Legislation that prevents an organisation from C. Corporations


reusing original material and claiming it as your A act
own

Legislation that gives the right to request D. Freedom of


government information D information
legislation

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 14 of 31


13 Match the following scenarios relating to workplace problems to the correct policy or
procedure it relates to.

Table 13 Matching Question 3.3

Scenarios Answer Options

An employee is repeated late for work A. Data


C protection
policy

An employee has been caught taking another B. Own devices


employee’s personal information from company A policy
records

During feedback sessions, an employee is C. Code of


dismissive of others’ opinions and C conduct
confrontational

An employee has been sending organisational D. Effective


documents to their personal laptop D communication
policy

14 Which of the following are sources of information for identified issues?

Table 14 Multiple choice Question 3.4

Select the
Answer choices correct
answer/s

Training manuals X

The internet X

Stakeholders

Organisational policies and procedures X

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 15 of 31


15 Correctly order the list of steps involved in undertaking the project management
process, by numbering each step from 1 to 5

Table 15 Ordering Question 3.5

Steps/process Order

The planning is executed 3

The planning of the project begins 2

The project is initiated 1

The project is closed 5

The project is monitored and controlled in line with the planning 4

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 16 of 31


16 Match the following project management techniques to the correct term.

Table 16 Matching Question 3.6

Management Techniques Answer Options

This method is a value-centred approach based on


a set of principles. It is used in software
development projects that involve frequent B A. Classic
iterations. The team involved is usually small and
highly collaborative

This is technique ideal for small teams and simple B. Agile project
projects that includes preparing a plan of management
upcoming work, estimating the tasks, allocating A
resources, providing and receiving feedback from
the team and monitoring quality and deadlines.

This method is a framework designed for software C. Critical path/


development teams where end-user satisfaction is chain
the key requirement. It focuses on an iterative D technique
development process where feedback forms an
integral part of the project.

An algorithm used together with PERT for D. Rationalised


scheduling and planning projects where deadlines C unified
are crucial. process

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 17 of 31


17 Match the following strategies for reducing or managing the risk to the correct risk
type it relates to.

Table 17 Matching Question 3.7

Strategy Answer Risk/s

Ensure that attachments are only opened


D A. Organised criminals
from trusted senders.

Be alert for any changes in saved B. Staff, suppliers,


B
files/folders. contactors

Be aware of what is around you and who C. Trespassers


walks in and out of the office. C

Double-check any bank details sent by email, D. Hackers


preferably outside of emailing e.g., by A
telephoning.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 18 of 31


18 Match the following descriptions to the correct risk management strategy.

Table 18 Matching Question 3.8

Description Answer Options

This method identifies external factors that A. SWOT


D
influence business analysis

This method considers internal factors such as B. MOST


strengths and weaknesses as well as external A analysis
factors such as threats and opportunities.

This method helps analyse what a business C. Business


does and wants to achieve. It focuses on Process
B
strategic alignment by understanding an Modelling
organisation’s purpose and ability. (BPM)

This method focuses on process improvement D. PESTLE


initiatives. It helps understand the gaps analysis
between existing processes and future C
processes. These processes can be strategic,
operational or technical.

This method is a generic way to understand E. CATWOE


what a business is trying to achieve. It helps
E
identify problems and how the solution will
impact stakeholders.

This is a creative team technique and is used to F. Root cause


generate ideas. It may be used with other tools analysis
G
(such as SWOT analysis, root cause analysis
etc).

This method identifies the preliminary causes G. Brainstorming


of problems and outlines an appropriate
preventative response. It is based on the idea
F
that effective management requires more than
responding to problems that develop, but
finding a way to prevent them.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 19 of 31


19 Which of the following best describes technology solution patterns?

Table 19 Multiple Choice Question 3.9

Select the
Answer choices correct
answer/s

Patterns of data trends within the organisation

A method used that acquiring and storing the relevant data from various
X
sources inside or outside the enterprise

Technological patterns relating to cyber security and its threats

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 20 of 31


20 Correctly order the list of steps involved in a stakeholder management process, by
numbering each step from 1 to 5.

Table 20 Ordering Question 3.10

Steps/process Order

Develop stakeholder management strategy 3

Execute communication 5

Identify stakeholders 1

Plan communication 4

Classify stakeholders 2

21 Which of the following are considered communication constraints that may impact
stakeholders?

Table 21 Multiple Choice Question 3.11

Select the
Answer choices correct
answer/s

Not understanding how they operate X

Not knowing precisely what effect you are seeking when communicating

Aligning your needs with something that the stakeholder wants

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 21 of 31


22 Which of the following are considered best practices for stakeholder management?

Table 21 Multiple Choice Question 3.12

Select the
Answer choices correct
answer/s

Engaging through the right channel/s X

Encouraging communication only when required

Identifying key relationships X

Ensuring consistent messaging X

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 22 of 31


Part 4: Leading development process

23 Correctly order the list of steps involved in the decision-making process, by


numbering each step from 1 to 6.

Table 22 Ordering Question 4.1

Steps/process Order

Making a decision 4

Communicating the decision 5

Generating alternatives 3

Sourcing information 2

Identifying and defining a problem 1

Reviewing a decision 6

24 Which of the following are considered barriers to effective decision-making?

Table 23 Multiple Choice Question 4.2

Select the
Answer choices correct
answer/s

Bounded rationality X

Certainty

Personal biases X

Escalation of commitment X

Conflict management

Time constraints X

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 23 of 31


25 Correctly order the list of steps involved in a requirements management process, by
numbering each step from 1 to 5.

Table 24 Ordering Question 4.3

Steps/process Order

Investigate 2

Design 3

Constructing and testing 4

Release 5

Feasibility 1

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 24 of 31


26 Match the scenario to the risk type.

Table 25 Matching Question 4.4

Scenario Answer Risk type

A risk that occurs due to changing trends that affect


the organisation’s strategy and can be managed by
continuously evaluating the market and upcoming
cultural changes. A A. financial risk
Scenario: More and more people are opting for a
vegan lifestyle which reduces a company’s sales of
sweets made with gelatine

A risk that occurs due to the economy and can affect B. Strategic risk
the health of an organisation. This can be managed by
budgeting and maintaining timelines. B
Scenario: an organisation takes on a project with a
tight timeline and the deadlines become unrealistic

Risks that occur due to breaches of the law, often C. Compliance


managed by monitoring changes to legislation and risk
thorough training
C
Scenario: a change in legislation means that certain
online video games can only be sold to persons aged
16 and over.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 25 of 31


27 Which of the following is a best practice technique for requirements management?

Table 26 Multiple Choice Question 4.5

Select the
Answer choices correct
answer/s

Follow competitors’ models

Organise and prioritise work requirements X

Implement current project management support software

28 Which of the following are advantages in the development of solutions for identified
workplace problems?

Table 27 Multiple Choice Question 4.6

Select the
Answer choices correct
answer/s

Clarified perspective of roles X

Realising business vision X

Relinquishing legal responsibility

Improved financial performance X

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 26 of 31


29 Which of the following are organisational requirements when developing and
presenting solutions brief?

Table 28 Multiple Choice Question 4.7

Select the
Answer choices correct
answer/s

To track profit margins

To outline the issues and constraints X

To monitor productivity

To identify and mitigate risks X

30 Which of the following are organisational requirements when developing a feedback


register?

Table 29 Multiple Choice Question 4.8

Select the
Answer choices correct
answer/s

Timeline of project X

Person receiving feedback X

Actions required X

Date of feedback X

Person’s supervisor/manager details X

Person providing feedback X

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 27 of 31


Part 5: Building proposed solutions and enabling change

Scenario:

A project has over-run, and the project manager wishes to extend a deadline by five working
days.

31 Correctly order the list of steps involved in approving workplace solutions, by


numbering each step from 1 to 7.

Table 24 Ordering Question 5.1

Steps/process Order

Set approvers, permissions and due dates 5

Approver receives work 3

Work is submitted for final approval 6

Define the work task 1

Assign the work task 2

Approver approves or rejects work 4

Publish or accept work 7

32 Which of the following are best practices for facilitating training that promotes cyber
security awareness?

Table 31 Multiple Choice Question 5.2

Select the
Answer choices correct
answer/s

Providing training only during Induction

Providing interactive content during training X

Providing training after work hours

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 28 of 31


Select the
Answer choices correct
answer/s

Encouraging group discussion X

33 Which of the following are the techniques for implementing and promoting cyber
security awareness.

Table 32 Multiple Choice Question 5.3

Select the
Answer choices correct
answer/s

Including gamification training with simulated activities helping to combat


X
security breaches

Making the training ongoing process X

Making the training mandatory for everyone X

Training all employees on basic topics like password security, anti-phishing X


techniques, spear phishing and social engineering

34 Which of the following are best practices for promoting workplace cyber security?

Table 33 Multiple Choice Question 5.4

Select the
Answer choices correct
answer/s

Apply regular updates on cyber threats using interactive methods X

Phishing scam emails

Train individuals upon induction

Obtain buy-in from management X

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 29 of 31


35 Match the following scenarios relating to business analysis performance to the
corresponding metrics used to measure it.

Table 34 Matching Question 5.5

Scenarios Answer Metrics

A new employee has started at an organisation


and their supervisor wishes to monitor their A A. Benchmarking
performance.

The sales of a business has significantly decreased B. SWOT


lately. The directors of the company would like to B competitor
know more about customers’ needs. analysis

A company needs to closely monitor the sale of a C. Financial


product introduced to the market recently to C ratios
assess business cash flow.

The directors of a company would like to learn D. Customer


about the performances of other businesses D feedbacks,
offering similar products. sales data

The directors of a company would like to compare E. Sales per


their profit margins to businesses in the same E employee
sector.

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 30 of 31


Assessment feedback
NOTE: This section must have the Teacher/Assessor and student signature to complete the
feedback. If you are submitting through the TAFE NSW online learning platform, your
Teacher/Assessor will give you feedback via the platform.

Assessment outcome
Satisfactory

Unsatisfactory

Assessor feedback
Has the assessment declaration for this assessment event been signed and dated by the
student?

Are you assured that the evidence presented for assessment is the student’s own work?

Was reasonable adjustment in place for this assessment event?

If yes, ensure it is detailed on the assessment document.

Comments:

Assessor name, signature and date

Student acknowledgement of assessment outcome


Would you like to make any comments about this assessment?

Student name, signature and date

Document title: Cl_ProfessionalSkills_AE_Kn1of2 Page 31 of 31

You might also like