ICTSAS517_Assessment 1_Written Activity_V2

.docx

School

TAFE NSW - Sydney Institute *

*We aren’t endorsed by this school

Course

ICTSAS517

Subject

Information Systems

Date

May 13, 2024

Type

docx

Pages

5

Uploaded by UltraCloverDragonfly36 on coursehero.com

ASSESSMENT COVER SHEET Assessment Details Qualification Code and Title ICT50220 Diploma of Information Technology Block/ Term/ Year Unit Code and Title ICTSAS517 Use of network tools Assessment Type A1 – Written Activity Re-assessment YES NO Due Date Student Details Student Name Student ID Instructions to Students: Please read the following instructions carefully. The purpose of this assessment is to assess your knowledge and skills. This assessment is to be completed according to the instructions given by your assessor. To be deemed satisfactory in this assessment, you must write the answers to all written questions correctly or meet all the performance criteria for activity based assessments by the due date. Submission after the due date will result in a penalty fee. Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmission in showing your competence with this unit. If you feel the decision made by your assessor was incorrect please refer to your Student Handbook for information on assessment appeal for the required steps to appeal the decision. If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. Please refer to the College re-submission and re-sit policy for more information. If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately. Please read the tasks carefully then complete all tasks. To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment. Remember, that it must be your own work and if you use other sources then you must reference these appropriately. Submitted document should follow the given criteria. Font should be Times New Roman, Font size need to be 12, line spacing has to be Single line and Footer of submitted document must include Student ID, Student Name and Page Number. Document should be printed double sided. This is individual Assessment. Once you have completed the assessment, please provide the hard copy of the Assessments to your Trainer/ Assessor. Plagiarism is copying someone else’s work and submitting it as your own. Any plagiarism will result in NYC. For Assessor Use Only Assessor’s Name Assessment Decision : To be accessed as satisfactory in this assessment task, the student must address ALL assessment items/questions satisfactorily. All individual assessment tasks of this unit must be completed satisfactorily for a student to achieve an overall grade of competent for this unit. The Student’s Performance is SATISFACTORY NOT SATISFACTORY Student Declaration : I declare that I have read and agreed to the instructions mentioned above and declare that the work submitted is my own and has not been copied or plagiarized from any person or source. I have been assessed in this unit and advised of my result. I am aware of my appeal rights. Signature: Date: / / Assessor Declaration: I declare that I have conducted a fair, valid and flexible assessment with this student and I provided appropriate feedback. Signature: Date: / /
WRITTEN ACTIVITY Your task is to write the answers to each of the following questions. Answers should exceed 50 words but no more than 100 words for each questions: 1. List the available network tools and describe at least three of them. Following are the available network tools: a. Intrusion detection software: Software that can monitor network traffic for suspicious activity, violations of security policies, and generate alerts if it detects malicious activity. b. Intrusion prevention software: It is a network security tool that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur. c. Protocol analyser: A network protocol analyser is a tool used to monitor data traffic and analyse captured signals as they travel across communication channels. d. Port Scanner: A port scanner refers to a software application program that scan a server for open ports. It helps to confirm and access security policy requirements. 2. When using network tools, what types of processes and techniques can be used? Following processes and techniques can be used when using network tools: i. Cable Testing: Testing the cables will help to know the existing problem in the current cables. Tools used for testing cables are: Multimeter, Tone probe etc. ii. Making required connection: Making secured connection in the cables is the most. Some of the tools that can be used for this process are Snips, Screwdriver etc. iii. Assess other anomalies in the network: Different tools can be used to access other different anomalies like voltage event tester, multimedia. 3. List three attacks that can affect network security and describe each one. Following attacks can affect network security: a. Denial of service and bypass: It is a cyber-attack on devices, the system and network resources that affect the devices. b. Penetration: Gaining unauthorized access to a system, data or data by bypassing the system is called penetration. ICTSAS517 USE OF NETWORK TOOLS - A1 2
c. Impersonation: It is a type of cyber-crime where a person tries to pretend to be someone else to gain unauthorized access to other’s system. 4. What are the key problems and challenges that relate to network security? Following are the problem and challenges: a. Determining the types of attacks that could occur b. Identifying where these attacks may come from c. Training personnel to work within the network in a safe manner d. Balancing type of security plans with resource availability e. Ensuring that system is suitably monitored at all times for security f. Ensuring that suitable security policy has been prepared and is complied with ICTSAS517 USE OF NETWORK TOOLS - A1 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help