List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Record security access | 1.1 Obtain client access requirements and clearance levels according to organisational requirements 1.2 Issue computer or network user account and password details to client 1.3 Provide security documentation and access to client 1.4 Record user account and security access details to maintain system integrity and assist later auditing |
2. Record software licences | 2.1 Determine what licensed software is used within the organisation 2.2 Maintain records of licence number and location 2.3 Check personal computers and network for illegal software 2.4 Report illegal software to appropriate person |
3. Carry out system backup | 3.1 Create or review organisational backup schedule 3.2 Complete file backups according to schedule 3.3 Label and store backups according to organisational requirements 3.4 Maintain record of backups |
4. Restore system backup | 4.1 Determine and test restore procedures according to organisational guidelines 4.2 Complete a restore under supervision of an appropriate person 4.3 Record completed restore according to organisational guidelines |
5. Apply security access controls | 5.1 Document security access as per clearance guidelines set by management 5.2 Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources 5.3 Identify the security controls on the file system provided by the operating system 5.4 Apply effective access control on files and directories |
Evidence of the ability to:
perform a systems backup, restore and maintain correct usage according to licensing agreements in a stand-alone or client server environment
maintain software licence records and check for copyright compliance within the system
maintain security access records and apply access controls on network resources.
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
To complete the unit requirements safely and effectively, the individual must:
describe common backup procedures
identify and outline operating systems used by the organisation
describe the organisational security procedures
identify organisational standards to:
carry out backup and restore operations
label and store backups
record security and software details
describe the selection, functions and features of appropriate diagnostic tools
identify software copyright responsibilities
identify the system's current functionality.
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:
operating systems
software licence records
technical records and documentation
organisational backup and restore procedures
organisational security guidelines.
Assessors must satisfy NVR/AQTF assessor requirements.