ICTSAS517_Assessment 1_Written Activity_V2
.docx
keyboard_arrow_up
School
TAFE NSW - Sydney Institute *
*We aren’t endorsed by this school
Course
ICTSAS517
Subject
Information Systems
Date
May 13, 2024
Type
docx
Pages
5
Uploaded by UltraCloverDragonfly36
ASSESSMENT COVER SHEET
Assessment Details
Qualification Code and Title
ICT50220 Diploma of Information Technology
Block/ Term/ Year
Unit Code and Title
ICTSAS517 Use of network tools
Assessment Type
A1 – Written Activity
Re-assessment
YES
NO
Due Date
Student Details
Student Name
Student ID
Instructions to Students: Please read the following instructions carefully.
The purpose of this assessment is to assess your knowledge and skills.
This assessment is to be completed according to the instructions given by your assessor.
To be deemed satisfactory in this assessment, you must write the answers to all written questions correctly or meet all the
performance criteria for activity based assessments by the due date.
Submission after the due date will result in a penalty fee.
Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one
(1) resubmission in showing your competence with this unit.
If you feel the decision made by your assessor was incorrect please refer to your Student Handbook for information on assessment
appeal for the required steps to appeal the decision.
If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
Please refer to the College re-submission and re-sit policy for more information.
If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor
immediately.
Please read the tasks carefully then complete all tasks.
To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory
result for another Assessment.
Remember, that it must be your own work and if you use other sources then you must reference these appropriately.
Submitted document should follow the given criteria. Font should be Times New Roman, Font size need to be 12, line spacing has to
be Single line and Footer of submitted document must include Student ID, Student Name and Page Number. Document should be printed
double sided.
This is individual Assessment. Once you have completed the assessment, please provide the hard copy of the Assessments to your
Trainer/ Assessor.
Plagiarism is copying someone else’s work and submitting it as your own. Any plagiarism will result in NYC.
For Assessor Use Only
Assessor’s Name
Assessment Decision
: To be accessed as satisfactory in this assessment task, the student must address ALL assessment items/questions satisfactorily.
All individual assessment tasks of this unit must be completed satisfactorily for a student to achieve an overall grade of competent for this unit.
The Student’s Performance is
SATISFACTORY
NOT SATISFACTORY
Student Declaration
:
I declare that I have read and agreed to
the instructions mentioned above and declare that the work
submitted is my own and has not been copied or plagiarized from
any person or source. I have been assessed in this unit and advised
of my result. I am aware of my appeal rights. Signature:
Date:
/ /
Assessor Declaration: I declare that I have conducted a
fair, valid and flexible assessment with this student and I
provided appropriate feedback.
Signature: Date: / /
WRITTEN ACTIVITY Your task is to write the answers to each of the following questions. Answers should exceed 50 words but no more than 100 words for each questions:
1.
List the available network tools and describe at least three of them. Following are the available network tools:
a.
Intrusion detection software: Software that can monitor network traffic for suspicious activity, violations of security policies, and generate alerts if it detects malicious activity.
b.
Intrusion prevention software: It is a network security tool that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.
c.
Protocol analyser: A network protocol analyser is a tool used to monitor data traffic and analyse captured signals as they travel across communication channels.
d.
Port Scanner: A port scanner refers to a software application program that scan a server for open ports. It helps to confirm and access security policy requirements.
2.
When using network tools, what types of processes and techniques can be used?
Following processes and techniques can be used when using network tools:
i.
Cable Testing: Testing the cables will help to know the existing problem in the current cables. Tools used for testing cables are: Multimeter, Tone probe etc.
ii.
Making required connection: Making secured connection in the cables is the most. Some of the tools that can be used for this process are Snips, Screwdriver etc.
iii.
Assess other anomalies in the network: Different tools can be used to access other different anomalies like voltage event tester, multimedia.
3.
List three attacks that can affect network security and describe each one. Following attacks can affect network security:
a.
Denial of service and bypass: It is a cyber-attack on devices, the system and network resources that affect the devices.
b.
Penetration: Gaining unauthorized access to a system, data or data by bypassing the system is called penetration.
ICTSAS517 USE OF NETWORK TOOLS - A1 2
c.
Impersonation: It is a type of cyber-crime where a person tries to pretend to be someone else to gain unauthorized access to other’s system.
4.
What are the key problems and challenges that relate to network security?
Following are the problem and challenges:
a.
Determining the types of attacks that could occur b.
Identifying where these attacks may come from
c.
Training personnel to work within the network in a safe manner d.
Balancing type of security plans with resource availability e.
Ensuring that system is suitably monitored at all times for security f.
Ensuring that suitable security policy has been prepared and is complied with
ICTSAS517 USE OF NETWORK TOOLS - A1 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help