Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
65 views26 pages

Latest Assessment-Task1

This document outlines instructions and information for a student completing an assessment for a networking qualification. It includes sections for student details, a privacy release, assessment outcomes, general assessment instructions, and information on reassessment and appeals procedures. The key points are: 1) The document provides instructions and paperwork for a student to complete an assessment for a networking qualification. 2) It includes sections for the student to fill out their personal details and sign a privacy release. 3) There are also sections outlining the assessment process, opportunities for reassessment, and procedures for appeals.

Uploaded by

Subash Upadhyay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views26 pages

Latest Assessment-Task1

This document outlines instructions and information for a student completing an assessment for a networking qualification. It includes sections for student details, a privacy release, assessment outcomes, general assessment instructions, and information on reassessment and appeals procedures. The key points are: 1) The document provides instructions and paperwork for a student to complete an assessment for a networking qualification. 2) It includes sections for the student to fill out their personal details and sign a privacy release. 3) There are also sections outlining the assessment process, opportunities for reassessment, and procedures for appeals.

Uploaded by

Subash Upadhyay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Assessment-1

ICTNWK531 CONFIGURE AN INTERNET GATEWAY


Student Must Fill this Section
Qualification ICT50220 Diploma of Information Technology

Student
Name:

Student ID: Term: Year:

Privacy
“I give my permission for my assessment material to be used in
Release
the auditing, assessment validation & moderation Process”.
Clause:
“I declare that:
 The material I have submitted is my own work;
Authenticity
 I have given references for all sources of information that
Declaration:
are not my own, including the words, ideas and images of
others”.

Student Signature: Date:

Assessment Outcome

Assessor Name:

Not Yet Assessor


Attempt Satisfactory Date
Satisfactory Signature

Initial attempt  

2nd attempt/Re-
assessment  

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Information for Student:
 All work is to be entirely of the student.

General Information for this assessment:

 Read the instructions for each question very carefully.


 Be sure to PRINT your FIRST name & LAST name in every place that is
provided.
 Short questions must be answered in the spaces provided.
 For those activities requesting extra evidence such as: research reports,
essay reports, etc. The student must attach its own work formatted in
double space, Arial 12 pts.
 All activities must be addressed correctly in order to obtain a competence
for the unit of competency.
 If the student doesn’t understand the assessment, they can request help
from the assessor to interpret the assessment.
 Re-submission of assessment after the term will incur additional fees.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Re-assessment of Result & Academic Appeal procedures:

If a student is not happy with his/ her results, that student may appeal against their
grade via a written letter, clearly stating the grounds of appeal to the Chief
Executive Officer. This should be submitted after completion of the subject and
within fourteen days of commencement of the new term.

Re-assessment Process:
 An appeal in writing is made to the Academic Manager providing reasons
for re-assessment /appeal.
 Academic Manager will delegate another faculty member to review the
assessment.
 The student will be advised of the review result done by another assessor.
 If the student is still not satisfied and further challenges the decision, then a
review panel is formed comprising the lecturer/trainer in charge and the
Academic Manager OR if need be an external assessor.
 The Institute will advise the student within 14 days from the submission date
of the appeal. The decision of the panel will be deemed to be final.
 If the student is still not satisfied with the result, the he / she has the right to
seek independent advice or follow external mediation option with nominated
mediation agency.
 Any student who fails a compulsory subject or appeals unsuccessfully will
be required to re-enrol in that subject.
The cost of reassessment will be borne by the Institute. The external assessor will
base his/her judgement based on principles of assessment. These principles
require assessment to be reliable, fair, practical and valid.
Academic Appeals:
 If you are dissatisfied with the outcome of the re-evaluation process, you
have a right to appeal through academic appeals handling protocol.
 To appeal a decision, the person is required to complete the WSC- Request
for Appeal of a Decision form with all other supporting documents, if any.
This form is available via our website. The completed Request for Appeal
form is to be submitted to the Student Support Officer either in hard copy or
electronically via the following contact details:
Student Support Officer, Western Sydney College (WSC), 55 High St,
Parramatta NSW 2150, Email: [email protected]
 The notice of appeal should be in writing addressed to the Chief Executive
Officer and submitted within seven days of notification of the outcome of the
re-evaluation process.
 If the appeal is not lodged in the specified time, the result will stand and you
must re-enrol in the unit.
 In emergency circumstances, such as in cases of serious illness or injury,
you must forward a medical certificate in support of a deferred appeal. The
notice of appeal must be made within three working days of the concluding
date shown on the medical certificate.
 The decision of Chief Executive Officer will be final.
 Student would then have the right to pursue the claim through an
independent external body as detailed in the students’ complaint / grievance
policy.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Comments/Feedback to Students

Reasonable adjustments

• Students with carer responsibilities, cultural or religious obligations, English as an


additional language, disability etc. can request for reasonable adjustments.
• Please note, academic standards of the unit/course will not be lowered to
accommodate the needs of any student, but there is a requirement to be flexible
about the way in which it is delivered or assessed.
• The Disability Standards for Education requires institutions to take reasonable steps
to enable the student with a disability to participate in education on the same basis
as a student without a disability.
• Trainer/Assessor must complete the section below "Reasonable Adjustment
Strategies Matrix" to ensure the explanation and correct strategy have been
recorded and implemented if applicable.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
• Trainer/Assessor must notify the administration/compliance and quality assurance
department for any reasonable adjustments made.
• All evidence and supplementary documentation must be submitted with the
assessment pack to the administration/compliance and quality assurance
department.

Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)


Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
 LLN  Speaking  Verbal assessment
 Reading  Presentations
 Writing  Demonstration of a skill
 Confidence  Use of diagrams
 Use of supporting documents such as wordlists
 Non-  Speaking  Discuss with the student and supervisor (if applicable)
English-  Reading whether language, literacy and numeracy are likely to impact
Speaking  Writing on the assessment process
Background
 Cultural  Use methods that do not require a higher level of language
background or literacy than is required to perform the job role
 Confidence  Use short sentences that do not contain large amounts of
information
 Clarify information by rephrasing, confirm understanding
 Read any printed information to the student
 Use graphics, pictures and colour coding instead of, or to
support, text
 Offer to write down, or have someone else write, oral
responses given by the student
 Ensure that the time available to complete the assessment,
while meeting enterprise requirements, takes account of the
student's needs
  Knowledge and  Culturally appropriate training
Indigenous understanding  Explore understanding of concepts and practical application
 Flexibility through oral assessment
 Services  Flexible delivery
 Inappropriate  Using group rather than individual assessments
training and  Assessment through completion of practical tasks in the field
assessment after demonstration of skills and knowledge.
 Age  Educational  Make sure font size is not too small
background  Trainer/Assessor should refer to the student's experience
 Limited study  Ensure that the time available to complete the assessment
skills takes account of the student's needs
 Provision of information or course materials in accessible
format.
 Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note-

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an assessment
task
 Modifications to physical environment, e.g. installing lever
taps, building ramps, installing a lift
  Reading  Discuss with the Student previous learning experience
Educational  Writing  Ensure learning and assessment methods meet the student's
background  Numeracy individual need
 Limited study
skills and/or learning
strategies
 Disability  Speaking  Identify the issues
 Reading  Create a climate of support
 Writing  Ensure Access to support that the student has agreed to
 Numeracy  Appropriately structure the assessment
 Limited study  Provide information or course materials in accessible format,
skills and/or learning e.g. a textbook in braille
strategies  Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note-
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an assessment
task
 Modifications to physical environment, e.g. installing lever
taps, building ramps, installing a lift

Explanation of reasonable adjustments strategy used (If required)

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
What if you disagree on the assessment outcome?
You can appeal against a decision made in regards to your assessment. An appeal
should only be made if you have been assessed as 'Not Yet Competent' against a
specific unit and you feel you have sufficient grounds to believe that you are entitled
to be assessed as competent. You must be able to adequately demonstrate that you
have the skills and experience to be able to meet the requirements of units you are
appealing the assessment of.
Your trainer will outline the appeals process, which is available to the student. You
can request a form to make an appeal and submit it to your trainer, the course
coordinator, or the administration officer. The WSC will examine the appeal and you
will be advised of the outcome within 14 days. Any additional information you wish
to provide may be attached to the appeal form.

Academic Integrity:
Academic Integrity is about the honest presentation of your academic work. It means
acknowledging the work of others while developing your own insights, knowledge and ideas.
As a student, you are required to:
• Undertake studies and research responsibly and with honesty and integrity
• Ensure that academic work is in no way falsified
• Seek permission to use the work of others, where required
• Acknowledge the work of others appropriately
• Take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism:
Plagiarism means to take and use another person's ideas and or manner of expressing them
and to pass them off as your own by failing to give appropriate acknowledgement. This
includes material sourced from the Internet, RTO staff, other students, and from published
and unpublished work.
Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being
used, which includes:
• Paraphrasing and presenting work or ideas without a reference
• Copying work either in whole or in part
• Presenting designs, codes or images as your own work
• Using phrases and passages verbatim without quotation marks or referencing
the author or web page
• Reproducing lecture notes without proper acknowledgement.

Collusion:
Collusion means unauthorised collaboration on assessable work (written, oral or practical)
with other people. This occurs when a student presents group work as their own or as the
work of someone else.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Collusion may be with another RTO student or with individuals or student's external to the
RTO. This applies to work assessed by any educational and training body in Australia or
overseas.
Collusion occurs when you work without the authorisation of the teaching staff to:
• Work with one or more people to prepare and produce work
• Allow others to copy your work or share your answer to an assessment task
• Allow someone else to write or edit your work (without rto approval)
• Write or edit work for another student
• Offer to complete work or seek payment for completing academic work for other
students.
Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion
and academic misconduct in group work please refer to the RTO's policy on Academic
integrity, plagiarism and collusion.
Plagiarism and collusion constitute cheating. Disciplinary action will be taken against
students who engage in plagiarism and collusion as outlined in RTO's policy.
Proven involvement in plagiarism or collusion may be recorded on students' academic file
and could lead to disciplinary action.

Special Required Software and Hardware to complete the Assessments:


 Computer With Internet Connection
 Microsoft Office suite

Assessment Formatting and Answer length Guidance:


Your Submitted document must follow the given criteria:
 Font must be Times New Roman, Font size need to be 12 and line spacing has
to be Single line.
 Your assessment needs to be submitted as an electronic copy unless requested
differently by your assessor.
 The Assessment file name for electronic copy should follow : Student
Id_Assessment_No ( Example WSC01234_Assessment 1

Referencing
Include a reference list at the end of your work on a separate page or as footnotes. You
should
reference the sources you have used in your assessments in the Harvard Style.
To access a web-based tool, see Harvard Style online generator
http://www.harvardgenerator.com

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Assessment Task 1- Written Assessment

Student must answer all of Questions

1. What are the types of general requirements that clients may have in regards to the
internet and gateway options?

- Can it check documents for certain internet protocols?

- In a network packet, interfaces are interconnected.

- For network framing, encapsulation and decapsulation are used.

- IP datagram connections are sent and received.

- Transporting network addresses at the correct level.

- Receiving and responding to network traffic and error messages.

- Important issues pertaining to Internet datagrams, such as ICMP errors, lost


datagrams, and datagram fragmentation.

- Information from the route database for future aspirational locations.

- Information on, among other things, system support, loading, debugging, and
status reporting.

2. What client requirements may you need to consider when you are determining the scope
of internet services required? List at least 5.

The typical network connection in a home or small business, such as Internet


and email access, must be taken into account when determining the level of
internet services required. Access control and LAN-compatible ports are
additional technological criteria that must be met to prevent infiltration.
Among these are Network Address Translation, Hypertext Transfer Protocol,
WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Domain Name Service, and Small Mail Transfer Protocol. Other vital services
that must be handled include File Transfer Protocol, Voice over Internet
Protocol, and Instant Messaging.

3. Identify and list at least 10 of the types of hardware and software components that you
may need to install.

- Photoshop pro is a graphic design and commercial bitmapping program.

- Adobe fireworks is a tool for creating vector drawings such as slices,


hotspots, etc.

- Gimp is a high-quality application with comparable functionality to


Photoshop.

- CD-ROM is a kind of magnetic disk for mass multimedia storage that permits
faster data transfer rates.

- Video capturing and conversion techniques need digital signaling and


processing computers.

- Professional installation of sound cards is performed to fulfill multimedia


needs.

- Monitors are output devices that deliver pixel-based outputs with defined
horizontal and vertical display elements.

- Apple QuickTime is a framework that can manage, among other things, digital
video formats, 3D model formats, sound, and text.

- Microsoft PowerPoint: This application is installed in order to arrange


graphics and other objects.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
- Google Sketchup is designed mainly for 3D modelling, architecture, and game
development.

4. What are the types of equipment specifications that you will need to verify before
conducting internet gateway configuration?

The option made by the project manager or engineers to enhance the


project's requirements determines the kind of equipment specified and
necessary for verification. The following are examples of acceptable
equipment specifications:

 Specification pertaining to the equipment.

 elaboration of terminology

 Specification of equipment dependent on size

 Specifying the installation requirements for equipment.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
5. What do you need to confirm about components required for the task?

Following are the phases of the method to be followed in order to certify the
essential components for the job:

 Self-monitoring involves reviewing the steps necessary to finish a task.

 Developing resolution tools for assessing the work's components and its
effects.

 Following the directions in order to generate the correct notion for the
assignment constitutes brainstorming.

 Observing and selecting the task-based balancing flow operation to


implement.

6. Briefly outline the levels of network architecture that you will need to assess the security
features of the internet gateways with.

The following network architecture levels are necessary to analyze the


security features of internet gateways:

 The packet filtering firewall examines data packets and creates


checkpoints for the functioning of traffic switches and routers.

 It instantly analyses traffic-based computer resources and verifies


transmission control at the circuit level.

 The stateful inspection firewall analyses the level of architectural


security.

 Application-level gateways: These facilitate the distribution of cloud


services to proxy devices.

 Next-generation firewalls inspect both deep packets and the contents of


actual data packets.

 It creates defense-based isolation for local devices and hardware via a

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
software firewall.

 A hardware firewall provides protection for application-based data


packets and network servers.

 The cloud firewall scales both the company's operations and the cloud
server to fit the workload.

7. How will the security plan help you to assess the security features of the internet
gateway?

The security planning technique enhances the security features of the internet
gateway by first securing the web-based gateway and then offering security services
for cloud-based on-premises networking services. Long-term, the internet gateway
security features help prevent data loss, protect networks from malware by detecting
infection and penetration, and filter URL issues, among other functions. Secure
internet-based gateways feature checkpoints that evaluate and deal with
unauthorized network problems that enter the system through traffic and
incoming/outgoing dataflow.

8. It is essential that all of the security measures that have been applied to the specific
network are assessed and reviewed in order to ensure that they are compliant with
what 5 requirements?

It is common knowledge that all network security measures are evaluated


and provided access to verify compliance. The last five conditions for
carrying out this procession are as follows:

 Utilized are Web-based apps and firewalls.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
 Encrypting sensitive data, conversations, and data packets.

 The utility of packet database systems is decreasing.

 The database's activities is being monitored.

 Auditing and security for databases.

9. List the types of users you will need to brief on the security plan, including how safe
internet use can be achieved.

Users who are vulnerable to harmful and effective processes such as cyberbullying,
identity theft, and invasion of privacy need a briefing on the security strategy,
including how to accomplish internet safety and other procedures. High priority is
given to children who use the Internet to look for improper images, videos, and text.
Those who make online transactions, download data, and often visit the website
must have sufficient knowledge of how to use and safeguard internet services.

10. What are the types of security issues and hazards that you will need to inform users of
in your briefing? Discuss at least 3.
WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
 Spyware: It is one of the most severe security dangers that businesses
must be aware of. It facilitates the acquisition and abuse of sensitive data.
It can track critical information and credentials.

 Computer viruses are a kind of software issue that may affect system and
networking operations. It is the origin of damaging attacks and is capable
of harming the general operations and data kinds of an organization.

 Attack on denial of service: It is a sort of attack that takes place on a


system or network and is often accessible to a single individual. It often
occurs when there is a great deal of network traffic.

11. What information might you access and interpret when you are selecting appropriate
gateway installation and configuration options?

The following information is necessary to get access to and choose the


appropriate gateway configuration and installation options:

 By default, monitoring records need up to 4 GB of storage space.

 .NET Framework 4.72 Gateway release

 Windows server 64-bit with TLS 1.2 and cipher suites.

 .NET Framework 4.6 Gateway release.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
12. What are the guidelines you will need to consider when you are installing and
configuring gateway products and equipment?

The following guidelines must be adhered to while installing and configuring


gateway products and equipment:

 The gateway product and equipment must be appropriately licensed.

 The gateway files must be stored in the correct directories.

 For gateway products, a port number must be specified.

 Each installed and configured gateway product and piece of equipment


must have a unique name.

 The gateway mechanism necessitates a 32-bit unique ID.

 They should have already selected log files and established directories.

 They must use the correct gateway resources.

13. What are the types of tests that you will need to plan and execute to assess if client
requirements have been suitably met by the installation and to assess the network
impact that the gateway is having?

When running the evaluate whether a customer request is received or


building the assess network gateway, the following tests must be scheduled:

 A unit test plan is a set method for testing the utilized test cases, unit
framework, etc. automatically.

 It helps the testing of procedural integrations and the validation of low-


level routines.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
 Plan for testing, among other things, the system's goals, risk management
measures, and delivery.

 Plan for acceptance testing that includes pass/fail criteria, a checklist-


based testing strategy, and roles and responsibilities.

14. What are 4 of the types of changes you may make after analysing the error report?

As a result of the examination into the report inaccuracy, there are four
different forms of enhancements:

 The financial statement has been revised to correct an earlier inaccuracy.

 The report's subject has changed.

 The financial prognosis has changed.

 The concept of accounting has evolved.

15. What types of nodes will you configure to specific gateways?

Nodes that must be configured for a particular gateway function are gateway nodes.
Thus, performance calculations and application processing are simplified. This kind
of node may further serve as a master gateway node and a domain entry point.
Domain and gateway services are its responsibility. In addition to local node, non-
repudiation node, and active node, other types of nodes may also be used to identify

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
gateway.

16. Outline 5 of the connection types you may determine and configure with reference to
network architecture and client requirements.

The following five kinds of connections must be set to identify the network
reference architecture and client specifications:

 Cable modem: It offers services analogous to coaxial cables, such as high-


speed Internet access.

 Asymmetric and symmetrical digital subscriber lines are two distinct


varieties of digital subscriber lines. It facilitates the transfer of data
through telephone lines at a faster rate.

 This facilitates the establishment of telephone-based linkages and service


connections, which are advantageous for providing broadband over
wireless.

 Broadband over powerlines: It provides a network distribution method


akin to low- and medium-voltage electrical power distribution.

 Fiber is an optical technology that facilitates the transformation of data


into light carried by fibers.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
17. Briefly discuss the testing that you will need to prepare for and complete to ensure that
the node software and hardware are configured as required, according to the
specifications of the vendor and the requirements of the client.

The essential testing procedure for preparing to check the node software and
hardware needed for configuration according to vendor and customer
standards is as follows:

Tests for configuration: It facilitates in the monitoring of both hardware and


software platforms based on default configurations.

Compatibility testing contributes to the validation of software operations,


such as the loading of web pages.

18. Explain DNS resolution.

DNS resolution is the process of transforming IP addresses to domain names,


monitoring and adjusting IP addresses, establishing DNS and web-based network
trends, and resolving DNS entities by a Domain Name Server. If any disputes arise
during the DNS resolution process, the network connection should be verified first,
followed by the DNS server using an IP address or DNS suffix.

19. What is browser software?


WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
The major purpose of the browse program, which is a web-based software
application, is to access information on the World Wide Web. There is a free browser
that was developed with internet functionality in mind and allows the user to
interact with a variety of websites. Popular web browsers include Google Chrome,
Safari, Firefox, Microsoft Edge, Internet Explorer, and others.

20. Identify at least 4 of the current common browser software types.

- Internet Explorer

- Opera

- Google Chrome

- Tor Browser

21. Briefly outline the principle function of current gateway software.

- The capacity that enables the interchange of data between interconnected


communication systems.

- Automatic connections are made to a variety of technical apparatus.

- Simple to construct templates.

- Connections that are made locally.

- The capabilities of the smart automatic connection.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
- The collected data points are intended for the notion of smart auto connect.

- Automatic mapping of network variables

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Doc. Name : Title Assessor Checklist : Assessment 1

Qualification : ICT50220 Diploma of Information Technology

ICTNWK531 Configure an internet gateway


Unit Code & Title :

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
Assessment 1: Assessor Checklist

Tasks Satisfactory Not Comments


Satisfactory

1. What are the types of general requirements that clients


may have in regards to the internet and gateway
options?

2. What client requirements may you need to consider


when you are determining the scope of internet services
required? List at least 5.

3. Identify and list at least 10 of the types of hardware and


software components that you may need to install.

4. What are the types of equipment specifications that you


will need to verify before conducting internet gateway
configuration?

5. What do you need to confirm about components


required for the task?

6. Briefly outline the levels of network architecture that


you will need to assess the security features of the
internet gateways with.

7. How will the security plan help you to assess the security
features of the internet gateway?

8. It is essential that all of the security measures that have


been applied to the specific network are assessed and
reviewed in order to ensure that they are compliant with
what 5 requirements?

9. List the types of users you will need to brief on the


security plan, including how safe internet use can be
achieved.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
10. What are the types of security issues and hazards that
you will need to inform users of in your briefing? Discuss at
least 3.

11. What information might you access and interpret


when you are selecting appropriate gateway
installation and configuration options?

12. What are the guidelines you will need to consider


when you are installing and configuring gateway
products and equipment?

13. What are the types of tests that you will need to
plan and execute to assess if client requirements have
been suitably met by the installation and to assess the
network impact that the gateway is having?

14. What are 4 of the types of changes you may make after
analysing the error report?

15. What types of nodes will you configure to specific


gateways?

16. Outline 5 of the connection types you may determine


and configure with reference to network architecture
and client requirements.

17. Briefly discuss the testing that you will need to prepare
for and complete to ensure that the node software and
hardware are configured as required, according to the
specifications of the vendor and the requirements of the
client.

18. Explain DNS resolution.

19. What is browser software?

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M
20. Identify at least 4 of the current common browser
software types.

21. Briefly outline the principle function of current gateway


software.

WSC-ASSICTNWK531-V1.0-24032021
International College of Australia Pty Ltd T/A Western Sydney College
RTO: 45360 | CRICOS: 03690M

You might also like