Assessor Resource

ICASAS304A
Provide basic system administration

Assessment tool

Version 1.0
Issue Date: April 2024


Frontline technical support personnel apply the skills and knowledge in this unit, and generally work under limited supervision with experienced IT support staff.

Support personnel at this level use known routines and procedures where some discretion and judgement are required, and provide technical advice and some leadership in resolution of specified problems. More complex or non-routine activities involving individual responsibility may be performed as part of a group or team and the role may involve some responsibility for others.

This unit describes the performance outcomes, skills and knowledge required to implement components of systems backup, restore, security and licensing in a stand-alone or client server environment.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)

Prerequisites

Not applicable.


Employability Skills

This unit contains employability skills.




Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

perform systems backup, restore and maintain correct usage according to licensing agreements in a stand-alone or client server environment

maintain software licence records and check for copyright compliance within the system

maintain security access details in a register and apply access controls on (network) resources.

Context of and specific resources for assessment

Assessment must ensure access to:

sites with a representative range of stand-alone and networked client-server environments and operating systems

software licence records

technical records and documentation

organisational backup and restore procedures

organisational security guidelines

appropriate learning and assessment support when required

modified equipment for people with special needs.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

direct observation of candidate undertaking file backup and restoration

review of records on backup results and backup schedules

review of software licence records

review of the event viewer

verbal or written questioning to assess candidate’s knowledge of software copyright compliance.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate.

Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed.

Indigenous people and other people from a non-English speaking background may need additional support.

In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Required skills

literacy skills to:

interpret user manuals, technical documentation and help functions

maintain inventory records

record software licence records

communication skills to:

communicate with peers and supervisors

present and explain information

seek assistance and expert advice

planning and organisational skills to plan and develop a backup and restore strategy

technical skills to:

configure user account and security access details

identify unlicensed software

record user account and security access details.

Required knowledge

backup procedures

operating systems used by the organisation

organisational security procedures

organisational standards to:

carry out backup and restore operations

label and store backups

selection, functions and features of appropriate diagnostic tools

software copyright responsibilities

system's current functionality.

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Client may include:

employee

external organisation

individual

internal department.

Organisational requirements may include:

availability of system to be optimised

client-support documentation

complexity of technical manuals

information and communications technology (ICT) policy and procedures relating to service levels and installation

in-house or vendor ICT purchasing arrangements

register of licences

security procedures

storage of ICT documentation

system administration and backup procedures

type of product licences.

Documentation may follow:

audit trails

client training

International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and Australian Standards (AS) standards

maintaining equipment inventory

naming standards

project-management templates and report writing

satisfaction reports

version control.

Software may include:

application:

database

internet browser

spreadsheet

word-processing

commercial applications

customised

in-house

programming:

assembler

Java, VB, C++, Visual Fox Pro

compiler

development tools

system:

computer security

operating system.

Records may include:

databases

spreadsheets

vendor tools to create, modify and document user accounts

access to computer or network resources.

Appropriate person may include:

authorised business representative

client

supervisor

system administrator.

Organisational guidelines may include:

communication methods

content of emails

dispute resolution

document procedures and templates

downloading information and accessing particular websites

financial control mechanisms

opening mail with attachments

personal use of emails and internet access

virus risk.

Operating systems may include:

GNU and Linux

Mac OS X

Microsoft Windows

Unix-like operating systems:

HP-UX

IBM AIX

Silicon Graphics IRIX

Sun Solaris.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Obtain client access requirements and clearance levels according to organisational requirements 
Issue computer or network user account and password details to client 
Provide security documentation and access to client 
Record user account and security access details to maintain system integrity and assist later auditing 
Determine what licensed software is used within the organisation 
Maintain records of licence number and location 
Check personal computers and network for illegal software 
Report illegal software to appropriate person 
Create or review organisational backup schedule 
Complete file backups according to schedule 
Label and store backups according to organisational requirements 
Maintain record of backups 
Determine and test restore procedures according to organisational guidelines 
Complete a restore under supervision of an appropriate person 
Record completed restore according to organisational guidelines 
Document security access as per clearance guidelines set by management 
Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources 
Identify the security controls on the file system provided by the operating system 
Apply effective access control on files and directories 

Forms

Assessment Cover Sheet

ICASAS304A - Provide basic system administration
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICASAS304A - Provide basic system administration

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: