Assessor Resource

ICTSAS304
Provide basic system administration

Assessment tool

Version 1.0
Issue Date: May 2024


This unit describes the skills and knowledge required to implement components of systems backup, restore, security and licensing in a stand-alone or client server environment.

It applies to individuals who, while working under limited supervision, have responsibility in a frontline technical support capacity to exercise discretion and judgement, using appropriate knowledge to provide assistance.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)



Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Record security access

1.1 Obtain client access requirements and clearance levels according to organisational requirements

1.2 Issue computer or network user account and password details to client

1.3 Provide security documentation and access to client

1.4 Record user account and security access details to maintain system integrity and assist later auditing

2. Record software licences

2.1 Determine what licensed software is used within the organisation

2.2 Maintain records of licence number and location

2.3 Check personal computers and network for illegal software

2.4 Report illegal software to appropriate person

3. Carry out system backup

3.1 Create or review organisational backup schedule

3.2 Complete file backups according to schedule

3.3 Label and store backups according to organisational requirements

3.4 Maintain record of backups

4. Restore system backup

4.1 Determine and test restore procedures according to organisational guidelines

4.2 Complete a restore under supervision of an appropriate person

4.3 Record completed restore according to organisational guidelines

5. Apply security access controls

5.1 Document security access as per clearance guidelines set by management

5.2 Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources

5.3 Identify the security controls on the file system provided by the operating system

5.4 Apply effective access control on files and directories

Evidence of the ability to:

perform a systems backup, restore and maintain correct usage according to licensing agreements in a stand-alone or client server environment

maintain software licence records and check for copyright compliance within the system

maintain security access records and apply access controls on network resources.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

describe common backup procedures

identify and outline operating systems used by the organisation

describe the organisational security procedures

identify organisational standards to:

carry out backup and restore operations

label and store backups

record security and software details

describe the selection, functions and features of appropriate diagnostic tools

identify software copyright responsibilities

identify the system's current functionality.

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:

operating systems

software licence records

technical records and documentation

organisational backup and restore procedures

organisational security guidelines.

Assessors must satisfy NVR/AQTF assessor requirements.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Record security access

1.1 Obtain client access requirements and clearance levels according to organisational requirements

1.2 Issue computer or network user account and password details to client

1.3 Provide security documentation and access to client

1.4 Record user account and security access details to maintain system integrity and assist later auditing

2. Record software licences

2.1 Determine what licensed software is used within the organisation

2.2 Maintain records of licence number and location

2.3 Check personal computers and network for illegal software

2.4 Report illegal software to appropriate person

3. Carry out system backup

3.1 Create or review organisational backup schedule

3.2 Complete file backups according to schedule

3.3 Label and store backups according to organisational requirements

3.4 Maintain record of backups

4. Restore system backup

4.1 Determine and test restore procedures according to organisational guidelines

4.2 Complete a restore under supervision of an appropriate person

4.3 Record completed restore according to organisational guidelines

5. Apply security access controls

5.1 Document security access as per clearance guidelines set by management

5.2 Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources

5.3 Identify the security controls on the file system provided by the operating system

5.4 Apply effective access control on files and directories

Evidence of the ability to:

perform a systems backup, restore and maintain correct usage according to licensing agreements in a stand-alone or client server environment

maintain software licence records and check for copyright compliance within the system

maintain security access records and apply access controls on network resources.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

describe common backup procedures

identify and outline operating systems used by the organisation

describe the organisational security procedures

identify organisational standards to:

carry out backup and restore operations

label and store backups

record security and software details

describe the selection, functions and features of appropriate diagnostic tools

identify software copyright responsibilities

identify the system's current functionality.

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:

operating systems

software licence records

technical records and documentation

organisational backup and restore procedures

organisational security guidelines.

Assessors must satisfy NVR/AQTF assessor requirements.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Obtain client access requirements and clearance levels according to organisational requirements 
Issue computer or network user account and password details to client 
Provide security documentation and access to client 
Record user account and security access details to maintain system integrity and assist later auditing 
Determine what licensed software is used within the organisation 
Maintain records of licence number and location 
Check personal computers and network for illegal software 
Report illegal software to appropriate person 
Create or review organisational backup schedule 
Complete file backups according to schedule 
Label and store backups according to organisational requirements 
Maintain record of backups 
Determine and test restore procedures according to organisational guidelines 
Complete a restore under supervision of an appropriate person 
Record completed restore according to organisational guidelines 
Document security access as per clearance guidelines set by management 
Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources 
Identify the security controls on the file system provided by the operating system 
Apply effective access control on files and directories 

Forms

Assessment Cover Sheet

ICTSAS304 - Provide basic system administration
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICTSAS304 - Provide basic system administration

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: