ICTCYS612 Student Assessment Tasks 1- Aman Gautam

.docx

School

Western Sydney University *

*We aren’t endorsed by this school

Course

602

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

13

Uploaded by ChiefKookabura3277

Assessment Details Qualification Code/Title ICT60220 Advanced Diploma of Information Technology Assessment Type Assessment 1 Time allowed 5 weeks Due Date Sunday,17 September 2023 Location Parramatta Term / Year 3 term Unit of Competency National Code/Title ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Student Details Student Name Aman Gautam Student ID Mcs2000792 Student Declaration: I declare that the work submitted is my own and has not been copied or plagiarised from any person or source. Signature: Date: 21-08-2023 Assessor Details Assessor’s Name ZAMAN SAHIDUZ RESULTS (Please Circle) SATISFACTORY NOT SATISFACTORY Feedback to student: *If Student is Not Satisfactory Reassessment Required Yes No Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student, and I have provided appropriate feedback. Signature: ________________________ Date: ______/_______/___________ Comment: © Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version Page 1 of 13 File Name: ICTCYS612 Student Assessment October 2022 October 2023 2
Instructions to the Candidates This assessment is to be completed according to the instructions given below in this document. Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmit in showing your competence with this unit. If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. Please refer to the College re-submission and re-sit policy for more information. If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately. Please read the Tasks carefully then complete all Tasks. To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment. This is an Open book assessment which you will do in your own time but complete in the time designated by your assessor. Remember, that it must be your own work and if you use other sources then you must reference these appropriately Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be 12, line spacing has to be Single line and Footer of submitted document must include Student ID, Student Name and Page Number. Document must be printed double sided. This is Individual Assessments. Once you have completed the assessment, please provide the Hard copy of the Assessments to your Trainer/ Assessor. Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a mark of Not Satisfactory. SCCM uses Safe Assign Plagiarism Checker to check the originality of the student assessment. Student must be aware of and understand the SCCM’s policy on plagiarism and certify that this assignment is their own work , except where indicated by referencing, and that student have followed the good academic practices noted above. Introduction The assessment tasks for ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course. Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the IT Works Student User Guide . The Student User Guide provides important information for you relating to completing assessment successfully. Assessment for this unit ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations describes the skills and knowledge required to research, design, implement and test virtualised cyber security infrastructure in a small to medium sized organisation. For you to be assessed as competent, you must successfully complete two assessment tasks: Assessment Task 1: Knowledge questions – You must answer all questions correctly. © Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version Page 2 of 13 File Name: ICTCYS612 Student Assessment October 2022 October 2023 2
Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio. © Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version Page 3 of 13 File Name: ICTCYS612 Student Assessment October 2022 October 2023 2
Assessment Task 1: Knowledge Questions Information for students Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you: review the advice to students regarding answering knowledge questions in the IT Works Student User Guide comply with the due date for assessment which your assessor will provide adhere with your RTO’s submission guidelines answer all questions completely and correctly submit work which is original and, where necessary, properly referenced submit a completed cover sheet with your work avoid sharing your answers with other students. Assessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide .Refer to the appendix for information on: where this task should be completed the maximum time allowed for completing this assessment task whether or not this task is open-book. Note : You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. © Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version Page 4 of 13 File Name: ICTCYS612 Student Assessment October 2022 October 2023 2 i
Questions Provide answers to all of the questions below: 1. List three features associated with implementation methodologies for cyber security Govern: Identifying and managing security risks. Protect: Putting in place measures to lower security threats. Detect: Finding cyber security incidents by spotting and comprehending cyber security occurrences. Outcome Satisfactory Not Satisfactory Comment © Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version Page 5 of 13 File Name: ICTCYS612 Student Assessment October 2022 October 2023 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help