ICTNWK420 Assessment Task 1: Knowledge Questions Recognising and Responding to Cybersecurity Threats
- Subject Code :
ICTNWK420
- University :
TAFE NSW Exam Question Bank is not sponsored or endorsed by this college or university.
- Country :
Australia
Assessment Task 1 Cover Sheet
Student Declaration
To be filled out and submitted with assessment responses
I declare that this task is all my own work and I have not cheated or plagiarised the work or colluded with any other student(s).
I understand that if I am found to have plagiarised, cheated or colluded, action will be taken against me according to the process explained to me.
I have correctly referenced all resources and reference texts throughout these assessment tasks.
Student name |
|
Student ID number |
|
Student signature |
|
Date |
Assessor declaration
I hereby certify that this student has been assessed by me and that the assessment has been carried out according to the required assessment procedures.
Assessor name |
||||
Assessor signature |
||||
Date |
||||
Assessment outcome |
S |
NS |
DNS |
Resubmission Y N |
Feedback
Student result response
My performance in this assessment task has been discussed and explained to me.
I would like to appeal this assessment decision.
Student signature |
|
Date |
A copy of this page must be supplied to the office and kept in the students file with the evidence
Assessment Task 1: Knowledge Questions
Information for students
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
- review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
- comply with the due date for assessment which your assessor will provide
- adhere with your RTOs submission guidelines
- answer all questions completely and correctly
- submit work which is original and, where necessary, properly referenced
- submit a completed cover sheet with your work
- avoid sharing your answers with other students.
|
Assessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide. Refer to the appendix for information on: where this task should be completed the maximum time allowed for completing this assessment task whether or not this task is open-book. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. |
Questions
Provide answers to all of the questions below:
- List an example of software that can be used to recognise threats to a network.
- For each of the following data sources, give an example of the type of data that can be collected.
Data source |
Type of data |
- Outline a basic troubleshooting process that can be used to identify and assess cyber security threats.
- Describe the four key principles of network and cyber security.
- For each of the following types of cyber security attacks, list the objective of the attack and its potential impact on a business.
Type of attack |
Description |
Impact on business |
Denial-of-service attack (DDOS) |
||
SQL injection (SQLi) |
||
Cross-site scripting (XSS) attacks |
||
Scripted attacks |
||
Hardware attacks |
||
Attacks against Wi Fi |
- Answer all of the following questions in relation to workplace policies and procedures for gathering, analysing and interpreting threat data.
Workplace policy and procedure question |
Answer |
Give an example of how findings and recommendations from threat data gathering and analysis might be reported at work. |
|
Give an example of security equipment that could be referred to in a workplace policy and procedure. |
|
Give an example of a data source for threats that could be referred to in a workplace policy and procedure. |
|
List a method that can be in included in an workplace policy and procedure for gathering threat data. |
|
Describe a step by step process for obtaining threat data and analysing the results |
Assessment Task 1: Checklist
Students name: |
||||
Did the student provide a sufficient and clear answer that addresses the suggested answer for the following? |
Completed successfully? |
Comments |
||
Yes |
No |
|||
Question 1 |
||||
Question 2 |
||||
Question 3 |
||||
Question 4 |
||||
Question 5 |
||||
Question 6 |
||||
Task outcome: |
Satisfactory |
Not satisfactory |
||
Assessor signature: |
||||
Assessor name: |
||||
Date: |
||||