Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication and literacy skills to present reports
problem-solving skills to anticipate and respond to a range of known virus and spam types
technical skills to:
install and configure system filtering and security settings
install software updates
install virus protection
operate a computer and software application
select virus protection to suit operating system in a limited range of options.
Required knowledge
spam and virus intrusions and appropriate remedial action
types of protective applications used against viruses and spam
operating systems supported by the organisation
computer hardware
Spam Act 2003 and associated guidelines.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Destructive software may include: | file viruses keystroke loggers logic bombs macro viruses remote access tools (RATs) spyware system sector viruses trojans viruses worms. |
Virus protection may include: | CA Vet Antivirus freeware online open source proprietary software: BitDefender Kaspersky Antivirus McAfee VirusScan Panda Antivirus Symantec Norton Antivirus. |
Operating system may include: | GNUs Not Unix (GNU) Linux HP-UX Mac OS X Microsoft Windows Unix-like operating systems: IBM AIX Silicon Graphics IRIX Sun Solaris. |
Advanced systems may include: | hardware firewall software firewall. |
Software updates may include: | automatic online updates security patches service packs and service releases virus definition updates virus scanning engine updates. |
Security settings may include: | firewall internet browser operating system virus protection. |
Appropriate person may include: | authorised business representative client supervisor system administrator. |
Spam may include: | messages covered by the Spam Act 2003 unsolicited commercial electronic messaging: email instant messaging mobile phone messaging social networking wiki. |
Appropriate action may include: | deleting the spam blocking the sender by configuring spam filter unsubscribing from mailing list if company is not reputable. |
Spam filter may include: | email client filters or rules email server filters third-party filter programs: CA Anti-Spam MailWasher Pro Norton Internet Security SpamAssassin. |
Appropriate organisation may include: | relevant government and private media screening organisations, such as: Australian Communications and Media Authority Scamwatch company that originated the spam message. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist