NTISthis.com

Evidence Guide: ICANWK408A - Configure a desktop environment

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICANWK408A - Configure a desktop environment

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to install a desktop operating system

  1. Prepare for work according to site-specific safety requirements and enterprise OHS processes and procedures
  2. Obtain desktop applications and features from appropriate person
  3. Review required installation options and file systems
  4. Determine and apply knowledge of licensing, hardware and system requirements
  5. Analyse data migration requirements
  6. Back up local data in preparation for installation
  7. Arrange access to site and advise client of deployment and potential down times
Prepare for work according to site-specific safety requirements and enterprise OHS processes and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain desktop applications and features from appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review required installation options and file systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine and apply knowledge of licensing, hardware and system requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse data migration requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Back up local data in preparation for installation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Arrange access to site and advise client of deployment and potential down times

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install desktop operating system

  1. Install or upgrade desktop operating system using appropriate installation or update method
  2. Install desktop applications according to identified requirements
  3. Configure network settings to connect workstation to network
  4. Patch the operating system and applications to ensure maximum security and reliability
  5. Restore local data to new workstation
Install or upgrade desktop operating system using appropriate installation or update method

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install desktop applications according to identified requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure network settings to connect workstation to network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Patch the operating system and applications to ensure maximum security and reliability

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Restore local data to new workstation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure desktop environment

  1. Configure hardware devices
  2. Administer user environment
  3. Create file and directory structure using appropriate administration and system tools
  4. Configure access to external data
  5. Configure desktop applications according to business requirements
Configure hardware devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Administer user environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Create file and directory structure using appropriate administration and system tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure access to external data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure desktop applications according to business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Operate command line interface

  1. Open a command line interface
  2. Run commands and scripts from the command line interface
  3. Manipulate files using the command line
Open a command line interface

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Run commands and scripts from the command line interface

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manipulate files using the command line

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure desktop security

  1. Modify default user settings to ensure that they match the organisational security policies
  2. Modify file and directory ownership and permissions to ensure data security requirements are met
  3. Ensure password security
  4. Check that the appropriate legal notices are displayed at logon
  5. Implement security options for network protocols
  6. Configure security settings for desktop applications according to business requirements
Modify default user settings to ensure that they match the organisational security policies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Modify file and directory ownership and permissions to ensure data security requirements are met

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure password security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Check that the appropriate legal notices are displayed at logon

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement security options for network protocols

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure security settings for desktop applications according to business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and test the desktop

  1. Test desktop environment to ensure that client, functionality and performance requirements have been met
  2. Analyse and respond to diagnostic information
  3. Use troubleshooting tools and techniques to diagnose and correct desktop problems
  4. Document the desktop environment, according to organisational policy
Test desktop environment to ensure that client, functionality and performance requirements have been met

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and respond to diagnostic information

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Use troubleshooting tools and techniques to diagnose and correct desktop problems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document the desktop environment, according to organisational policy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

install and configure a desktop operating system

attach the desktop to the network

configure the desktop operating system, including user accounts, file and print services and security

perform backup and recovery

update operating system and software

monitor and troubleshoot the desktop environment.

Candidates should demonstrate competency in at least two different desktop operating systems.

Context of and specific resources for assessment

Assessment must ensure access to:

site where server installation may be conducted

relevant server specifications:

cabling

local area network (LAN)

diagnostic software

switch

client requirements

WAN service point of presence

desktop workstations

relevant regulatory documentation that affects installation activities

appropriate learning and assessment support when required.

Where applicable, physical resources should include equipment modified for people with special needs.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

direct observation of the candidate installing or updating a desktop operating system

direct observation of the candidate configuring a desktop operating system

verbal or written questioning of the required skills and knowledge.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate.

Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed.

Indigenous people and other people from a non-English speaking background may need additional support.

In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge.

Required Skills and Knowledge

Required skills

communication skills to liaise with internal and external personnel regarding desktop requirements and issues

literacy skills to interpret technical documentation

numeracy skills to:

take test measurements

interpret results

evaluate performance of the desktop workstation

problem-solving skills to address desktop problems reported by the client

research skills to interrogate vendor databases and websites to resolve desktop problems

technical skills to select and use desktop operating system and network diagnostics to test desktop functionality and performance.

Required knowledge

features of:

current desktop applications, compatibility issues and resolution procedures

current desktop operating systems

broad knowledge of:

command line interface and scripts

controlling the boot process

error logging and reporting

file naming conventions related to selected operating system

guidelines for selecting a secure password

network protocols and transmission control protocol or internet protocol (TCP/IP) network connectivity

operating systems and their functions, including file system, memory management and process scheduling

printer driver and queue management

process or task management, including process termination

tools available for remote assistance and administration

troubleshooting tools and techniques, including network diagnostic utilities

user account, group and password administration

detailed knowledge of:

file system navigation and manipulation utilities, including edit, copy, move and search

operating system help and support utilities.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Desktop applications may include:

CAD software

database

email client

internet browser

line-of-business applications

printer sharing

publishing and presentation software

remote-access clients

spreadsheet

technical software

word processor.

Appropriate person may include:

authorised business representative

client

IT support manager

network administrator

network manager

small office home office (SOHO) customer

small or medium enterprise (SME) customer

supervisor.

File systems may include:

EXT

FAT

HFS+

NFS

new technology file system (NTFS).

Back up may be performed using:

operating system backup utilities

third-party software

network copy

zip utilities.

Local data may include:

files and directories

user home directories

user profiles.

Client may include:

external organisations

individuals

internal departments

internal employees.

Desktop operating system may include:

Linux

Mac

Windows.

Installation or update method may include:

CD, DVD

installation as a virtual machine

Pup

Red Hat Network

universal serial bus (USB) boot disk

Windows Server Update Services

Yum.

Network settings may include:

default gateway

DNS server

firewall

IP address and subnet mask (static or dynamic).

Hardware devices may include:

device drivers

disk drives

keyboard

modem

monitor

mouse

network interfaces

printer

scanner

USB drive.

User environment may include:

users and groups

login defaults and options

login scripts

graphical environment

environmental variables and prompts

authentication and authorisation

user profiles

unmask

prompt.

External data may include:

applications

databases

file transfer protocol (FTP) sites

network file systems or shares

SharePoint sites

USB drives

websites.

Security options and security settings may include:

anti-spam software

antivirus software

internet-browser privacy security settings

operating system firewall utilities

proxy settings

SE Linux

Windows Group Policy.

Network protocols may include:

dynamic host configuration protocol (DHCP)

dynamic name system (DNS)

file transfer protocol (FTP)

hypertext transfer protocol (HTTP and HTTPS)

internet message access protocol (IMAP)

network file system (NFS)

network time protocol (NTP)

post office protocol (POP)

server messages block (SMB)

simple mail transfer protocol (SMTP)

simple network management protocol (SNMP)

TCP/IP.

Performance may be affected by:

desktop environment

driver versions

hard drive cache

mobile computing performance issues

network

page files, swap files and virtual memory

power options

processor scheduling

services.

Desktop problems may include:

disk and storage problems, such as file system full, file system fragmentation, and disk failure

hardware device problems, such as printer configuration and display settings

network connectivity problems, such as cable unplugged or dynamic IP address not received

workstation boot problems.