ICTCYS612 Student Assessment Tasks 1- Aman Gautam
.docx
keyboard_arrow_up
School
Western Sydney University *
*We aren’t endorsed by this school
Course
602
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
13
Uploaded by ChiefKookabura3277
Assessment Details
Qualification Code/Title
ICT60220 Advanced Diploma of Information Technology
Assessment Type
Assessment 1
Time allowed
5 weeks
Due Date
Sunday,17 September 2023
Location
Parramatta
Term / Year
3 term
Unit of Competency
National Code/Title
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
Student Details
Student Name
Aman Gautam
Student ID
Mcs2000792
Student Declaration:
I declare that the work submitted is
my own and has not been copied or plagiarised from any person or source.
Signature: Date: 21-08-2023 Assessor Details
Assessor’s Name
ZAMAN SAHIDUZ
RESULTS (Please Circle)
☐
SATISFACTORY
☐
NOT SATISFACTORY
Feedback to student:
*If Student is Not Satisfactory
Reassessment Required ☐
Yes ☐
No
Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student, and I have provided appropriate feedback.
Signature:
________________________
Date: ______/_______/___________
Comment: © Sydney City College of Management Pty Ltd
RTO: 45203
CRICOS: 03620C
Date
Revision date
Version
Page 1 of 13
File Name: ICTCYS612 Student Assessment
October 2022
October 2023
2
Instructions to the Candidates
This assessment is to be completed according to the instructions given below in this document.
Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmit in showing your competence with this unit.
If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
Please refer to the College re-submission and re-sit policy for more information.
If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately.
Please read the Tasks carefully then complete all Tasks.
To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment.
This is an Open book assessment which you will do in your own time but complete in the time designated by your assessor. Remember, that it must be your own work and if you use other sources then you must reference these appropriately
Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be 12, line spacing has to be Single line and Footer of submitted document must include Student ID, Student Name and Page Number. Document must be printed double sided.
This is Individual Assessments. Once you have completed the assessment, please provide the Hard copy of the Assessments to your Trainer/ Assessor.
Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a mark of Not Satisfactory. SCCM uses Safe Assign Plagiarism Checker to check the originality of the student assessment. Student must be aware of and understand the SCCM’s policy on plagiarism and certify that this assignment is their own work
, except where indicated by referencing, and that student have followed the good academic practices noted above.
Introduction
The assessment tasks for ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course. Please ensure that you read the instructions provided with these tasks carefully. You should
also follow the advice provided in the IT Works Student User Guide
. The Student User Guide provides important information for you relating to completing assessment successfully.
Assessment for this unit
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
describes the skills and knowledge required to research, design, implement and test virtualised cyber security infrastructure in a small to medium sized organisation. For you to be assessed as competent, you must successfully complete two assessment tasks:
Assessment Task 1: Knowledge questions – You must answer all questions correctly.
© Sydney City College of Management Pty Ltd
RTO: 45203
CRICOS: 03620C
Date
Revision date
Version
Page 2 of 13
File Name: ICTCYS612 Student Assessment
October 2022
October 2023
2
Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio.
© Sydney City College of Management Pty Ltd
RTO: 45203
CRICOS: 03620C
Date
Revision date
Version
Page 3 of 13
File Name: ICTCYS612 Student Assessment
October 2022
October 2023
2
Assessment Task 1: Knowledge Questions
Information for students
Knowledge questions are designed to help you demonstrate the knowledge which you have
acquired during the learning phase of this unit. Ensure that you:
review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
comply with the due date for assessment which your assessor will provide
adhere with your RTO’s submission guidelines
answer all questions completely and correctly
submit work which is original and, where necessary, properly referenced
submit a completed cover sheet with your work
avoid sharing your answers with other students.
Assessment information
Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide
.Refer to the appendix for information on:
where this task should be completed
the maximum time allowed for completing this assessment task
whether or not this task is open-book. Note
: You must complete and submit an assessment cover sheet with your work.
A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.
© Sydney City College of Management Pty Ltd
RTO: 45203
CRICOS: 03620C
Date
Revision date
Version
Page 4 of 13
File Name: ICTCYS612 Student Assessment
October 2022
October 2023
2
i
Questions
Provide answers to all of the questions below:
1. List three features associated with implementation methodologies for cyber security
Govern: Identifying and managing security risks.
Protect: Putting in place measures to lower security threats.
Detect: Finding cyber security incidents by spotting and comprehending cyber security occurrences.
Outcome ☐
Satisfactory
☐
Not Satisfactory
Comment
© Sydney City College of Management Pty Ltd
RTO: 45203
CRICOS: 03620C
Date
Revision date
Version
Page 5 of 13
File Name: ICTCYS612 Student Assessment
October 2022
October 2023
2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help