Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to:
convey and clarify information
liaise with clients
initiative and enterprise skills to apply precautions and required action to minimise, control or eliminate hazards that may exist during work activities
literacy skills to:
develop and document network and data integrity processes
interpret and prepare technical documentation
record asset audit information
planning skills to develop methods for maintaining network and data integrity
problem-solving skills to:
apply solutions in networks, including systems management processes
deploy rapid solutions to problems involving management of network assets
technical skills to apply current best practice to methodologies and technologies.
Required knowledge
broad knowledge related to:
auditing and control of user access
asset tracking and auditing
backup, restore and rollback procedures
current antivirus solutions and techniques
system and network monitoring tools and related functions
detailed knowledge of:
client organisation structure and business functionality
tools and applications required to manage network and data integrity
network management and disaster recovery processes.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Security policies should include: | data security physical security remote access user logon. |
Tools should include: | hardware and software audit tools: MSINFO32 DXdiag Microsoft Software Inventory Analyzer (MSIA) E-Z Audit hardware and software logs. |
Assets may include: | company information and branding computers data personal information servers. |
Antivirus may include: | AVG EICAR (test virus string) McAfee Microsoft Security Essentials Norton Antivirus or Endpoint Trendmicro. |
Environmental threats may include: | earthquake fire flood power failure, spike or surge theft. |
Backup type must include: | copy differential folder and drive synchronisation full and normal incremental RAID. |
Sync solution may include: | Folder Sync Shadowprotect Yadis. |
Network may include: | internet LAN WAN WLANs. |
Monitoring tools may include: | Microsoft server performance monitor Windows network monitor Windows performance monitor Windows resource monitor Windows task manager Wireshark. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist