List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Detect and remove destructive software | 1.1 Identify common types of destructive software 1.2 Select and install virus protection compatible with the operating system in use 1.3 Investigate other advanced systems of protection for further options 1.4 Install software updates on a regular basis 1.5 Configure software security settings to prevent destructive software from infecting computer 1.6 Run or schedule to run virus protection software on a regular basis 1.7 Report detected destructive software to appropriate person and remove the destructive software |
2. Identify and take action to stop spam | 2.1 Identify common types of spam 2.2 Take appropriate action in regard to spam 2.3 Configure and use a spam filter 2.4 Report spam to appropriate person |
Evidence of the ability to:
install virus protection software and updates
schedule virus protection software to run on a regular basis
remove common destructive software
identify common spam types and take appropriate action.
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
To complete the unit requirements safely and effectively, the individual must:
describe spam and virus intrusions and identify appropriate remedial actions
identify the types of protective applications used against viruses and spam
identify the operating systems supported by the organisation
identify the common components of computer hardware that may be affected by spam.
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:
sites with a representative range of computer hardware, application software and operating systems
current antivirus and anti-spam software
technical records, vendor documentation, enterprise procedures and guidelines.
Assessors must satisfy NVR/AQTF assessor requirements.