Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
analytical skills to:
determine NOS types and compatibility issues
determine risks associated with administration of a network
communication skills to:
inform clients of technical procedures
liaise with clients and team members across different levels and in different contexts
undertake active listening with clients and team members
use open-ended questioning techniques
literacy skills to:
document created file system
document disaster-recovery procedures
interpret organisational policies
planning skills to plan upgrades and reconfigurations to new systems or applications
technical skills to:
administer and configure NOS
identify security gaps and secure with appropriate hardware and software
implement systems to provide backup and service restoration capability
monitor user accounts according to organisational policy
perform compatibility testing after upgrade or reconfiguration
scan and clean the network of viruses before backup
test successful access by users to authorised network data and resources
test the file system access.
Required knowledge
antivirus software, its operation, installation and update procedures
current industry standard NOS
facilities available in the operating environment
features and capabilities of networking technologies
implementation of network security in a local area network (LAN):
file and folder permissions
users and group settings
monitoring aspects of network performance or traffic:
system administration tools
third-party tools.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Organisational policies may include: | diagnostic how and what the organisation will operate maintenance OHS security user enrolment. |
Network may include: | data embedded systems LAN personal digital assistant (PDA) radio frequency identification (RFID) network smartphones internet virtual private network (VPN) voice network wide area network (WAN) wireless network. |
Network operating system may include: | embedded OS: digital media players PDAs robots routers smartphones: Android BlackBerry Symbion Windows CE Fabric or XPATH OS by Brocade JunOS by Juniper Networks Linux Mac Open Enterprise Server or Netware by Novell SAN-OS by Cisco Windows Server OS. |
System may include: | application servers billing system computers file servers financial system information system management system network printer server software storage system user management system. |
Users may include: | departments within an organisation persons within a department third parties. |
Applications may include: | database programs email programs internet browsers multimedia applications spreadsheets voice applications word-processing. |
Software may include: | commercial customised in-house programming: assembler compiler development tools system: computer security device drivers operating system. |
File system may include: | folder structures multiple or single logical disks and complex directory multiple or single servers. |
User settings may include: | log-in passwords security usernames. |
Backup may include: | more comprehensive and complex backup facilities across the network simple single tape-unit backup. |
Security risks may include: | file and folder sharing open or free networks operating system vulnerability: service packs security updates social engineering theft trojan horses unauthorised access: adware hackers identity fraud malware phishing spyware viruses web browser risks worms. |
Prevention methods may include: | anti-spam software anti-spyware antivirus software ensuring proper security certificate are used: secure socket layer (SSL) file encryption firewalls password best practice: change frequency complexity of password construction password confidentiality re-use use user awareness and education wireless encryption: wi-fi protected access (WPA and WPA2) wired equivalent privacy (WEP). |
Appropriate person may include: | network administrator network manager supervisor system administrator. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist