NTISthis.com

Evidence Guide: ICTSAS304 - Provide basic system administration

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTSAS304 - Provide basic system administration

What evidence can you provide to prove your understanding of each of the following citeria?

Record security access

  1. Obtain client access requirements and clearance levels according to organisational requirements
  2. Issue computer or network user account and password details to client
  3. Provide security documentation and access to client
  4. Record user account and security access details to maintain system integrity and assist later auditing
Obtain client access requirements and clearance levels according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Issue computer or network user account and password details to client

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Provide security documentation and access to client

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record user account and security access details to maintain system integrity and assist later auditing

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record software licences

  1. Determine what licensed software is used within the organisation
  2. Maintain records of licence number and location
  3. Check personal computers and network for illegal software
  4. Report illegal software to appropriate person
Determine what licensed software is used within the organisation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain records of licence number and location

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Check personal computers and network for illegal software

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report illegal software to appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Carry out system backup

  1. Create or review organisational backup schedule
  2. Complete file backups according to schedule
  3. Label and store backups according to organisational requirements
  4. Maintain record of backups
Create or review organisational backup schedule

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Complete file backups according to schedule

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Label and store backups according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain record of backups

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Restore system backup

  1. Determine and test restore procedures according to organisational guidelines
  2. Complete a restore under supervision of an appropriate person
  3. Record completed restore according to organisational guidelines
Determine and test restore procedures according to organisational guidelines

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Complete a restore under supervision of an appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record completed restore according to organisational guidelines

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply security access controls

  1. Document security access as per clearance guidelines set by management
  2. Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources
  3. Identify the security controls on the file system provided by the operating system
  4. Apply effective access control on files and directories
Document security access as per clearance guidelines set by management

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify the security controls on the file system provided by the operating system

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply effective access control on files and directories

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Record security access

1.1 Obtain client access requirements and clearance levels according to organisational requirements

1.2 Issue computer or network user account and password details to client

1.3 Provide security documentation and access to client

1.4 Record user account and security access details to maintain system integrity and assist later auditing

2. Record software licences

2.1 Determine what licensed software is used within the organisation

2.2 Maintain records of licence number and location

2.3 Check personal computers and network for illegal software

2.4 Report illegal software to appropriate person

3. Carry out system backup

3.1 Create or review organisational backup schedule

3.2 Complete file backups according to schedule

3.3 Label and store backups according to organisational requirements

3.4 Maintain record of backups

4. Restore system backup

4.1 Determine and test restore procedures according to organisational guidelines

4.2 Complete a restore under supervision of an appropriate person

4.3 Record completed restore according to organisational guidelines

5. Apply security access controls

5.1 Document security access as per clearance guidelines set by management

5.2 Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources

5.3 Identify the security controls on the file system provided by the operating system

5.4 Apply effective access control on files and directories

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Record security access

1.1 Obtain client access requirements and clearance levels according to organisational requirements

1.2 Issue computer or network user account and password details to client

1.3 Provide security documentation and access to client

1.4 Record user account and security access details to maintain system integrity and assist later auditing

2. Record software licences

2.1 Determine what licensed software is used within the organisation

2.2 Maintain records of licence number and location

2.3 Check personal computers and network for illegal software

2.4 Report illegal software to appropriate person

3. Carry out system backup

3.1 Create or review organisational backup schedule

3.2 Complete file backups according to schedule

3.3 Label and store backups according to organisational requirements

3.4 Maintain record of backups

4. Restore system backup

4.1 Determine and test restore procedures according to organisational guidelines

4.2 Complete a restore under supervision of an appropriate person

4.3 Record completed restore according to organisational guidelines

5. Apply security access controls

5.1 Document security access as per clearance guidelines set by management

5.2 Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources

5.3 Identify the security controls on the file system provided by the operating system

5.4 Apply effective access control on files and directories

Evidence of the ability to:

perform a systems backup, restore and maintain correct usage according to licensing agreements in a stand-alone or client server environment

maintain software licence records and check for copyright compliance within the system

maintain security access records and apply access controls on network resources.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

describe common backup procedures

identify and outline operating systems used by the organisation

describe the organisational security procedures

identify organisational standards to:

carry out backup and restore operations

label and store backups

record security and software details

describe the selection, functions and features of appropriate diagnostic tools

identify software copyright responsibilities

identify the system's current functionality.