ICTNWK546 Assessment 1 (PDF Version)ICTNWK546 -STUDENT ASSESSMENT 1
pdf
keyboard_arrow_up
School
Albright Institute of Business and Language *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
7
Uploaded by ElderMaskSkunk36
Assessment Task 1 –
Coversheet Students: Please fill out this cover sheet clearly and accurately. Make sure you have kept a copy of your work.
Student and Submission Details Student Name Student ID Unit Code and Name ICTNWK546 - Manage network security Date of submission Student Declaration I declare that •
These tasks are my own work. •
None of this work has been completed by any other person. •
I have not cheated or plagiarised the work or colluded with any other student/s. •
I have correctly referenced all resources and reference texts throughout these assessment tasks. •
I understand that if I am found to be in breach of policy, disciplinary action may be taken against me. Student Signature Assessor To Complete Assessment Task Task Result Type of Submission Knowledge Test ☐
C (Competent) ☐
First submission
☐
NYC (Not Yet Competent) ☐
First re-submission ☐
NA (Not Assessed) ☐
Second re-submission Assessor feedback Assessor Name Date Assessor Signature
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.1 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 Task 1 –
Knowledge Test Assessment Task 1 –
Knowledge Questions Please answer the following questions. A word limit of 150 words applies to each response, unless otherwise specified. You must read thoroughly the “Student Workbook/Learner Guide” before attempting this Task. 1. List two types of ICT networks. Include a description of their configuration in your answer. 2. Complete the following table about network attacks, vulnerabilities and security technologies. Network attack 1 Network attack 2 List two types of network attack. Briefly describe the type of attack. Outline the vulnerabilities of the ICT system that may have led to each of the attacks. List a security technology that can
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 prevent such an attack 3. With the expansion of cloud services and new technologies, the use of mobile devices and the Internet of Things (IoT), there have also emerged a number of security issues. List two examples of emerging security issues. 4. Outline the terms auditing and penetration testing that can be used to measure a network’s security. 5. Outline two logging analysis techniques that can be used to measure the security of a network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.3 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 6. Outline two types of security measures that can be put in place in a network. 7. List a type of software that can be used for network security and summarise its capabilities.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.4 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 8. List a type of hardware that can be used for network security and summarise its capabilities. 9. Given the importance of network security, describe the key features that a network security policy should include, as well as procedures that should be included.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.5 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 10. Outline two network management and security process controls that can be put in place to ensure network security. 11. Explain the importance of a risk management plan and procedures in network security implementation. 12. Outline the process of developing risk management plans and procedures as part of network security planning.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.6 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 13. Explain how risk management should be built into cost analysis and budgeting of network security. Give an example to illustrate your answer.