diff_months: 11

ICTNWK420 Assessment Task 1: Knowledge Questions Recognising and Responding to Cybersecurity Threats

Flat 50% Off Order New Solution
Added on: 2024-11-26 20:30:25
Order Code:
Question Task Id: 485377

Assessment Task 1 Cover Sheet

Student Declaration

To be filled out and submitted with assessment responses

I declare that this task is all my own work and I have not cheated or plagiarised the work or colluded with any other student(s).

I understand that if I am found to have plagiarised, cheated or colluded, action will be taken against me according to the process explained to me.

I have correctly referenced all resources and reference texts throughout these assessment tasks.


Student name



Student ID number



Student signature



Date


Assessor declaration

I hereby certify that this student has been assessed by me and that the assessment has been carried out according to the required assessment procedures.


Assessor name



Assessor signature



Date



Assessment outcome


S


NS


DNS


Resubmission Y N

Feedback

Student result response

My performance in this assessment task has been discussed and explained to me.

I would like to appeal this assessment decision.


Student signature



Date


A copy of this page must be supplied to the office and kept in the students file with the evidence

Assessment Task 1: Knowledge Questions

Information for students

Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:

  • review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTOs submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.








i


Assessment information


Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide. Refer to the appendix for information on:


where this task should be completed


the maximum time allowed for completing this assessment task


whether or not this task is open-book.


Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Questions

Provide answers to all of the questions below:

  1. List an example of software that can be used to recognise threats to a network.
  2. For each of the following data sources, give an example of the type of data that can be collected.

Data source


Type of data









  1. Outline a basic troubleshooting process that can be used to identify and assess cyber security threats.
  2. Describe the four key principles of network and cyber security.
  3. For each of the following types of cyber security attacks, list the objective of the attack and its potential impact on a business.


Type of attack


Description


Impact on business


Denial-of-service attack (DDOS)




SQL injection (SQLi)




Cross-site scripting (XSS) attacks




Scripted attacks




Hardware attacks




Attacks against Wi Fi





  1. Answer all of the following questions in relation to workplace policies and procedures for gathering, analysing and interpreting threat data.


Workplace policy and procedure question


Answer


Give an example of how findings and recommendations from threat data gathering and analysis might be reported at work.



Give an example of security equipment that could be referred to in a workplace policy and procedure.



Give an example of a data source for threats that could be referred to in a workplace policy and procedure.



List a method that can be in included in an workplace policy and procedure for gathering threat data.



Describe a step by step process for obtaining threat data and analysing the results


Assessment Task 1: Checklist


Students name:


Did the student provide a sufficient and clear answer that addresses the suggested answer for the following?


Completed successfully?


Comments


Yes


No



Question 1





Question 2





Question 3





Question 4





Question 5





Question 6





Task outcome:


Satisfactory


Not satisfactory


Assessor signature:



Assessor name:



Date:


  • Uploaded By : Akshita
  • Posted on : November 26th, 2024
  • Downloads : 0
  • Views : 65

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more