Professional Documents
Culture Documents
ABN: 97 619 537 692 RTO Code: 45509 CRICOS Provider Code: 03770M
Suite 707, Level 7 159-175 Church Street, Westfield Shopping Centre, Parramatta, NSW 2150 P 02 8677 3602
Email: Info@tkl.edu.au www.tkl.edu.au
Q1: Explain each of the following symmetric key algorithms in 50-100 and list at
least two (2) usages for each of symmetric key algorithms.
3) Triple DES- Triple DES (3DES or TDES), officially the Triple Data
Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block
cipher, which applies the DES cipher algorithm three times to each data
block. The Data Encryption Standard's (DES) 56-bit key is no longer
considered adequate in the face of modern cryptanalytic techniques and
supercomputing power.
Q2: Explain each of the below mention encryption types in 80-150 words:
3) Hash key-The hashing key is the raw data in which to be hashed. The
hashing algorithm is the algorithm which performs a function to convert
the hash key to the hash value. the hash value is what is produced as a
result of the hash key being passed into the hashing algorithm.
Digital signatures work by proving that a digital message or document was not modified—intentionally or
unintentionally—from the time it was signed. Digital signatures do this by generating a unique hash of the
message or document and encrypting it using the sender's private key.
Q4: Explain two (2) features of digital signatures. Write 100-150 for each function.
Signer authentication. Proof of who actually signed the document i.e. digital signatures linking the user's
signature to an actual identifiable entity.
Data integrity. Proof that the document has not been changed since signing. ...
Non-repudiation.
5A) Explain two (2) functions of timestamp. Explain each in 50-100 words.
5A)Timestamps are used for a wide variety of synchronization purposes, such as marking the exact date and time
at which a particular event occurred. A timestamp containing a date as a calendar date and a time as a time of day.
5 B)
Timestamps are used for keeping records of information online or on a computer. A timestamp displays when
certain information was created, exchanged, modified or deleted. The following are examples of how timestamps
are used: Computer files may contain a timestamp that shows when the file was last changed.
Q6: What do you understand by the term “Encryption strength”? Satisfactory response
Yes ☐ No ☐
Encryption strength is often described in terms of the size of the keys used to perform the encryption: in general,
longer keys provide stronger encryption. Key length is measured in bits.
1.MD5 (message-digest algorithm) is a cryptographic protocol used for authenticating messages as well as content
verification and digital signatures. MD5 is based on a hash function that verifies that a file you sent matches the file
received by the person you sent it to. Previously, MD5 was used for data encryption, but now it’s used primarily for
authentication.
2. SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and used for hashing data and
certificates. A hashing algorithm shortens the input data into a smaller form that cannot be understood by using
bitwise operations, modular additions, and compression functions.
3. Public Key Infrastructure (PKI) is a system of processes, technologies, and policies that allows you to encrypt
and/or sign data. With PKI, you can issue digital certificates that authenticate the identity of users, devices, or
services.
4. pretty Good Privacy is an encryption program that provides cryptographic privacy and authentication for data
communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole
disk partitions and to increase the security of e-mail communications
5. GNU Privacy Guard is a free-software replacement for Symantec's PGP cryptographic software suite. The
software is compliant with RFC 4880, the IETF standards-track specification of OpenPGP. Modern versions of PGP
are interoperable with GnuPG and other OpenPGP-compliant systems
Q8: Explain the importance of reviewing helpdesk records to troubleshoot encryption Satisfactory response
issues. Explain in 40-80 words.
Yes ☐ No ☐
Major security breaches at some organizations have remained undiscovered for many months, during
which time the attackers have been able to make off with vast amounts of highly confidential data. Early
detection is crucial.
The help desk or service desk is the main interface between the IT organization and the people who use y IT
services. This means people who work on the service desk are uniquely placed to understand what is happening
within user community. If they are appropriately trained, they can be a first line of defence against many
potential security breaches.
Q9: What important information will you collect by reviewing system logs for Satisfactory response
encryption issues and compromises. Write your response in 50-100 words.
Yes ☐ No ☐
From a security point of view, the purpose of a log is to act as a red flag when something bad is happening.
Reviewing logs regularly could help identify malicious attacks on your system.
Q10: Explain each the following security threat in 50-100 words. Satisfactory response
Q11: Explain the term “Transmission Control Protocol” and its application in 150-200 Satisfactory response
words.
Yes ☐ No ☐
The Transmission Control Protocol is one of the main protocols of the Internet protocol suite. It originated in the
initial network implementation in which it complemented the Internet Protocol. Therefore, the entire suite is
commonly referred to as TCP/IP.
Q12: Explain the following terms. (Each in 50-150 words). Satisfactory response
1.The wired equivalent privacy, or WEP, is part of the IEEE 802.11 standard designed to keep traffic sent
through wireless networks more secure. It was created to help prevent cyberattacks, such as man-in-the-
middle (MiiM) attacks, from being successful.
WEP uses a static key of 10 or 26 hexadecimal digits to encrypt data. In the late 1990s and early 2000s, it was
widely used and often the primary security choice router configuration tool offered to users.
Wired equivalent privacy has since been superseded by WPA (Wi-Fi protected access) and then WPA2, which was
designed to address the security vulnerabilities that WEP presented. WPA uses a dynamic key and message
integrity checks to ensure a higher level of cybersecurity.
2. Wi-Fi Protected Access, Wi-Fi Protected Access II, and Wi-Fi Protected Access 3 are the three security and
security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer network.
3. Wi-Fi Protected Access 2 (WPA2) is the final version of WPA agreed on by the Wi-Fi Alliance; it implements all
aspects of the ratified 802.11i security standard and is mandatory in the Wi-Fi certification process.
Q13: Explain each of the following certificate related infrastructure in 50-150 words? Satisfactory response
2) Registration authorities
3) Repository services
1) A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital
certificates are data files used to cryptographically link an entity with a public key. Web browsers use them to
authenticate content sent from web servers, ensuring trust in content delivered online.
2) A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and
tells the certificate authority (CA) to issue it.
3). The Repository Infrastructure (RI) is designed to allow different kinds of users (researchers, academics,
technicians, museum users, web users, etc) to store, query and retrieve digital objects which have been produced
ICTNWK537 Student Assessment Task V1.0 Page 9 of 68
Training for Knowledge & Livelihood (TKL college)
ABN: 97 619 537 692 RTO Code: 45509 CRICOS Provider Code: 03770M
Suite 707, Level 7 159-175 Church Street, Westfield Shopping Centre, Parramatta, NSW 2150 P 02 8677 3602
Email: Info@tkl.edu.au www.tkl.edu.au
Q14: List three (3) most common asymmetric key algorithms and summarise their Satisfactory response
usages in 40-80 words
Yes ☐ No ☐
Standard asymmetric encryption algorithms are RSA, Diffie-Hellman, ECC, El Gamal, and DSA.
1. RSA is considered one of the most secure (and commonly used) asymmetric key encryption algorithms. It's
virtually uncrackable using modern computers
2.The Diffie-Hellman key exchange was one of the most important developments in public-key
cryptography and it is still frequently implemented in a range of today’s different security
protocols.
It allows two parties who have not previously met to securely establish a key which they can use to secure their
communications
3.DSA stands for Digital Signature Algorithm. It is a cryptographic algorithm used to generate digital signatures,
authenticate the sender of a digital message, and prevent message tampering. DSA works by having two keys: a
private key owned by the sender and a public key held by the receiver
Q15: What do you understand by reply attacks? Write your response in 100-150 Satisfactory response
words.
Yes ☐ No ☐
A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data
transmission is maliciously or fraudulently repeated or delayed.[1] This is carried out either by the originator or
by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP
packet substitution. This is one of the lower-tier versions of a man-in-the-middle attack. Replay attacks are
usually passive in nature.
Q16: List and explain five (5) security problems and challenges arise due to Satisfactory response
organisational issues?
Yes ☐ No ☐
Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft
of equipment or information, sabotage, and information extortion.
https://www.geeksforgeeks.org/threats-to-information-security/
Q17: Summarise the features and functions of access control permission in 100-200 Satisfactory response
words.
Yes ☐ No ☐
Access control identifies users by verifying various login credentials, which can include usernames and passwords,
PINs, biometric scans, and security tokens. Many access control systems also include multifactor authentication
(MFA), a method that requires multiple authentication methods to verify a user's identity.
Q18: Explain the functioning and features of the following in 100-200 words for each. Satisfactory response
B. Asymmetrical Encryption
A. Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and
decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can
be used in the decryption process
A public key is a cryptographic key that can be used by any person to encrypt a message so that
it can only be decrypted by the intended recipient with their private key. A private key -- also
known as a secret key -- is shared only with key's initiator.
When someone wants to send an encrypted message, they can pull the intended recipient's public key from a
public directory and use it to encrypt the message before sending it. The recipient of the message can then decrypt
the message using their related private key.
Q19: Summarise the features and functions of “One-way encryption”? Satisfactory response
Yes ☐ No ☐
The one-way function, Hash-Based Message Authentication Code with Secure Hashing Algorithm 1 (HMAC-SHA1),
is run over the header and payload with a secret key. The sender writes the HMAC-SHA1 hash into the
authentication tag, and the receiver runs the same computation and checks its result against the tag.
Q20: List two techniques to analyse data security requirements. Satisfactory response
Yes ☐ No ☐
perimeter security and authentication framework, authorization and access, data privacy, and audit and reporting.
Authentication – Required for guarding access to the system, its data, and services
Q21: What are the essential information should include in a security plan. List any Satisfactory response
three (3).
Yes ☐ No ☐
The basic tenets of information security are confidentiality, integrity and availability. Every element of the
information security program must be designed to implement one or more of these principles. Together they are
called the CIA Triad.
TASK 2 PROJECT
Scenario:
“Southern Star” company is providing public, private, hybrid and community cloud services to many companies
across the world and offering following services:
IaaS (Infrastructure-as-a-Service)
PaaS (Platform-as-a-Service)
SaaS (Software-as-a-Service)
To provide above mentioned cloud services, “Southern Star” company has following infrastructure in their data
centre.
Eight (8) Servers out of these Six (6) are connected to network and Two (2) are kept as backup
Twelve (12) Network switches with 24 port support (Nine (9) Switches are connected to network are three (3)
are kept as back up)
Six (6) Routers (4 Routers are hosing NBN connection and two (2) of them are kept as back up)
Five (5) wireless access point connected to network to provide Wi-Fi connectivity throughout data centre.
Twenty (20) SAN (Storage area network) storage area devices to store client’s data
“Shan Publications” is a premium client of “Southern Star”. “Shan publication” use cloud services offered by
“Southern Star” to store the drafts of unpublished poems, books and blueprints of printed books. One day as they
were downloading the drafts of some books to publish, they found that some of their data is missing from the server
and raised the complaint about missing data to “Southern Star”. As per the agreement “Southern Star” is liable for
client data security and company do not want to lose their client base.
Southern Star is now investigating the problem, and one of the senior consultant (Lee) is allocated to this project. Lee
is working in the company from last 10 years and has an extensive amount of experience in network, cloud and data
security.
David is a general manager of the Southern star and looking after all the operation of the organisation.
Establishing plans and protocols to protect digital files and information systems against unauthorized access,
modification and/or destruction
Anticipating security alerts, incidents and disasters and reduce their likelihood
After an initial investigation of the data loss problem, Lee has found below concerns in the southern star network
infrastructure:
After reviewing the scenario, you need to analyse the data loss problem and need to prepare a security plan including
Transmission security
You may need to research related to security plan on the internet. You must complete below security plan as a part
of the activity.
Background
“Southern Star” company is providing public, private, hybrid and community cloud services to many companies
across the world and offering following services:
IaaS (Infrastructure-as-a-Service)
PaaS (Platform-as-a-Service)
SaaS (Software-as-a-Service)
“Shan Publications” is a premium client of “Southern Star”. One day as they were downloading the drafts of some
books to publish, they found that some of their data is missing from the server and raised the complaint about
missing data to “Southern Star
After an initial investigation of the data loss problem, Lee has found below concerns in the southern star network
infrastructure:
Data loss prevention and security can be resolved by the use of Client-Server model. A domain named
SoutherStar.com.au can be created where the Shan publication can securely store their ebooks under a folder and
that folder can also be encrypted.
2 way authentication can be generated in the client-server model so that only the valid users will have valid
access.
Windows 11 pro
Authentication
Encryption Software
The above screen shot shows the successful installation of domain controller and domain name is Soutern-
Star.com.au
The above screen shot shows the shared folder where E books will be saved and only valid users will have valid
access.
The screen shot shows the tool to encrypt the files which need to be transmitted over the internet.
How identified software and hardware be aligned with the solutions- All hardware will be compatible with the
required software. We can check the hardware compatibility list in the following website
https://learn.microsoft.com/en-us/windows-server/get-started/hardware-requirements
Transmission Security
numeric
Network Database
Domain Security
reputation
Access Control Fire Wall and user access control Cisco Latest Version
will be provided by the use of networking
Access Control list on the devices as devices, Cisco ios.
well on the data/Files/folders. Windows,
Windows Server
Linux OS
2022 & Windows
11 Pro
Not satisfactory
Feedback to student:
Observer signature
After completing the security plan, you are required to review a range of encryption software on the internet and
complete below Technology cost template.
After completing the template, you are required to send email to David(Trainer/assessor) including technology cost
document for approval. Email must include:
Subject
Body
Explain that which option is the best and why we should use it.
NordLocker is
2. nCrypted NordLocker a file encryption
https:// 2 An end-to-end
Cloud software integr nordlock encrypted cloud
ated with end- er.com/ such as
e.g. to-end plans/ NordLocker
encrypted cloud
storage. It is helps you
Nord Locker
available protect your
on Windows an data from a
d macOS.
variety of
NordLocker is
developed threats.
by Nord Whether used
Security, a for personal or
company
behind business data,
the NordVPN vi secure cloud
rtual private storage protects
network, and is
the users from
based in the
ICTNWK537 Student Assessment Task V1.0 Page 28 of 68
Training for Knowledge & Livelihood (TKL college)
ABN: 97 619 537 692 RTO Code: 45509 CRICOS Provider Code: 03770M
Suite 707, Level 7 159-175 Church Street, Westfield Shopping Centre, Parramatta, NSW 2150 P 02 8677 3602
Email: Info@tkl.edu.au www.tkl.edu.au
UK and the
Netherlands.[3]
data exposure,
loss, theft, and
NordLocker
uses malware.
a freemium bus
iness model,
where users
are offered a
free account
with unlimited
local file
encryption and
a set amount of
cloud storage
with sync and b
ackup features.
More cloud
storage is
available via
a paid
subscription.
simply do not
matter because
only you can
access your files
in the cloud.
Boxcryptor
works great
with Dropbox,
Google Drive,
and OneDrive
among many
others
Windows
applications and
no one can
unlock vault
without a
password.
Subject
Body
Explain that which option is the best
and why we should use it.
Not satisfactory
Feedback to student:
Observer signature
Feedback:
Second attempt:
Trainer/Assessor Name
Trainer/Assessor I hold:
Declaration
☐ Vocational competencies at least to the level being delivered
☐ Current relevant industry skills
☐ Current knowledge and skills in VET, and undertake
☐ Ongoing professional development in VET
Trainer/Assessor
Signature
Date
Project
This is the third (3) assessment task you must successfully complete to be deemed competent in this
unit of competency.
This assessment task is a project.
You are required to implement secure encryption technologies in this assessment task.
You will receive your feedback within two (2) weeks, and you will be notified by your trainer/assessor
when your results are available.
You must attempt all activities of the project for your trainer/assessor to assess your competence in
this assessment task.
Applicable conditions:
This skill test is untimed and is conducted as an open book assessment (this means you are able to
refer to your textbook or other learner materials during the test).
You will be assessed independently on this assessment task.
No marks or grades are allocated for this assessment task. The outcome of the task will be Satisfactory
or Not Satisfactory.
As you complete this assessment task, you are predominately demonstrating your skills, techniques
and knowledge to your trainer/assessor.
Your trainer/assessor may ask you relevant questions during this assessment task
Where a student’s answers are deemed not satisfactory after the first attempt, a resubmission attempt
will be allowed.
The student may speak to their trainer/assessor if they have any difficulty in completing this task and
require reasonable adjustments.
For more information, please refer to the Training Organisation’s Student Handbook.
Location:
☐ a classroom
☐ learning management system (i.e. Moodle),
☐ workplace,
☐ simulated work environment,
☐ or an independent learning environment.
Your Trainer/Assessor will provide you with further information regarding the location for completing
this assessment task.
The purpose of this assessment task is to implement secure encryption technologies in a range of contexts and
industry settings.
Skills to create and document a security plan for the encryption of at least two applications or
solutions.
Skills to carry out and evaluate encryption of applications or solutions,
Skills to analyse enterprise data security requirements,
Skills to determine encryption methods.
Task instructions
This is an individual assessment.
To ensure your responses are satisfactory you should consult a range of learning resources and other
information such as handouts, textbooks, learner resources etc.
Your writing must be concise, to the point, not provide irrelevant information and according to the
word limit given.
You must write your responses in your own words.
You will be required to complete all parts of this assessment task.
Assessment environment
The purpose of this assessment task is to select, implement and monitor secure file encryption technologies
on a computer network or local environment.
The training organisation must ensure that the online assessment environment is in accordance with the
requirements specified.
The training organisation will assign a supervisor to the student.
The training organisation will provide the resources required to complete the assessment task.
The student must use the templates provided to document their responses.
The student must follow the word-limits specified in the templates.
The trainer/assessor must assess the student using the performance checklist provided.
This assessment task will be completed in an online environment prepared by your training organisation.
All required resources to complete the assessment task will be discussed with the student before they commence
the assessment. The online environment is very much like a learning environment where a student is able to
practice, use and operate appropriate industrial equipment, techniques, practices under realistic workplace
conditions.
The trainer/assessor will ensure that the online assessment environment is set up to complete this assessment
task.
A learning management system where the student will be required to complete their job-related tasks and
activities
The trainer/assessor will provide the student with assistance throughout the assessment activity.
Gain experience in the challenges and complexities of dealing with multiple tasks
Online assessment environment sufficient to communicate, contribute and participate in tasks and
activities.
The following resources, tools and equipment required to complete the assessment task will be discussed with the
student before they commence the assessment:
You are required to select, implement and monitor secure file encryption technologies on a computer network or
local environment. You are required to read and understand a predetermined issue and/or situation and
participate in a number of assessment activities.
A supervisor will be assigned to you by your training organisation. The supervisor can answer your questions
related to understanding the requirements associated with the assessment task. The supervisor will act according
to job role and responsibilities.
The supervisor can be your trainer or assessor or a different trainer or assessor or a staff member (including
mentors) from the training organisation.
As part of your job role, you have the following job responsibilities:
Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a
computer network or local environment. The assessment activities are mentioned within the assessment task.
This assessment task will be completed in a simulated environment prepared by your training organisation.
The simulated environment will provide you with all the required resources (such as the equipment and
participants, etc.) to complete the assessment task. The simulated environment is very much like a learning
environment where a student is able to practice, use and operate appropriate industrial equipment, techniques,
practices under realistic workplace conditions.
The trainer/assessor will ensure that the simulated assessment environment is sufficient to complete this
assessment task.
The training organisation as the workplace where the student will be required to complete their job-
related tasks and activities
The trainer/assessor will provide the student with assistance throughout the assessment activity.
Gain experience in the challenges and complexities of dealing with multiple tasks
The following resources, tools and equipment will be made available by the training organisation at the simulated
workplace to complete this assessment task:
You are required to select, implement and monitor secure file encryption technologies on a computer network or
local environment. You are required to read and understand a predetermined issue and/or situation and
participate in a number of assessment activities.
The following are the goals and objectives to complete this assessment task:
A supervisor will be assigned to you by your training organisation. The supervisor can answer your questions
related to understanding the requirements associated with the assessment task. The supervisor will act according
to job role and responsibilities.
The supervisor can be your trainer or assessor or a different trainer or assessor or a staff member (including
mentors) from the training organisation.
As part of your job role, you have the following job responsibilities:
becomes compromised.
Operates industry standard digital systems and tools effectively to complete routine tasks.
Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a
computer network or local environment. The assessment activities are mentioned within the assessment task.
The purpose of this assessment task is to select, implement and monitor secure file encryption technologies
on a computer network or local environment.
The training organisation must ensure that the workplace assessment environment is in accordance with the
requirements specified.
The workplace will assign a supervisor to the student.
The trainer/assessor can also act as a supervisor to the student as well.
The workplace will provide the resources required to complete the assessment task.
The student must use the templates provided to document their responses.
The student must follow the word-limits specified in the templates.
The trainer/assessor must assess the student using the performance checklist provided.
Workplace requirements
The assessment task can be completed in the workplace if the student is currently working or has access to a
workplace meeting the assessment criteria.
Gain experience in the challenges and complexities of dealing with multiple tasks
The following resources, tools and equipment must be available at the workplace to complete this assessment
task:
Workplace scenario
You are required to select, implement and monitor secure file encryption technologies on a computer network or
local environment. You are required to read and understand a predetermined issue and/or situation and
participate in a number of assessment activities.
The following are the goals and objectives to complete this assessment task:
A supervisor will be assigned to you by your training organisation. The supervisor can answer your questions
related to understanding the requirements associated with the assessment task. The supervisor will act according
to job role and responsibilities.
The supervisor can be your trainer or assessor or a different trainer or assessor or a staff member (including
mentors) from the training organisation.
As part of your job role, you have the following job responsibilities:
Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a
computer network or local environment. The assessment activities are mentioned within the assessment task.
Scenario:
This activity is continuation of assessment task 2. You are required to participate in a practical demonstration task.
You need to complete this activity in 1 to 2 hours.
Note: For This activity RTO/Assessor will provide you the following:
A live network
Servers
Encryption software
Encryption tools.
You have received a final approval from David to start the encryption project, so you must perform the installation of
encryption software and tools on the live network.
Assume yourself as “Lee” and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database “Encryption”
software by adhering below mention conditions.
Your trainer and assessor will observe you during the activity and complete the performance checklist.
Answer : We have installed the encryption software BitLocker in Windows domain using Active Directory
Not satisfactory
Satisfactory
Feedback to student:
Observer signature
Assume that Lee has implemented the encryption software successfully. As a part of his responsibilities, he needs to
analyse the effect of user roles and responsibilities.
Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and
complete the following “security plan” template.
Security plan – 2
Role Description/effect
Enterprise Intended for administrators who control the Enterprise and require administrative rights to all
Administrator groups, users, devices, and policies regardless of where they reside.
Group or Policy Intended for administrators who control any assigned group or policy.
Administrator
Enterprise Intended for Help Desk personnel who provide remote assistance when users forget their
Authenticator Endpoint Encryption password or have a technical problem. Enterprise Authenticators have
configurable privileges for the Enterprise.
Group or Policy Intended for Help Desk personnel with the same privileges as the Enterprise Authenticator
Authenticator except for being limited to the assigned group or policy only.
User Intended for basic end users with no special privileges. The user role cannot log on to Endpoint
Encryption management consoles.
Not satisfactory
Feedback to student:
Observer signature
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works. Explain the
effects of new encryption technology on user responsibilities. You need to use the template that you have developed
in the assessment activity 2 (Assessment task 3) to explain the effects of new encryption technology on user
responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User
Your trainer/assessor will act as enterprise administrator and will ask you the following questions:
Following the role play, complete minutes of meeting template with details of what was discussed.
Minutes of Meeting
Meeting Objective:
Attendees:
Lee
IT Manager-
CEO-
Venue:
Date: 23/02/2023
Time : 2 pm to 3 pm
Eye contact
Tone
Gesture
Not satisfactory
Feedback to student:
Observer signature
Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment
activities, you are required to monitor the encryption in this activity. You need to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of “Encryption software” by perform following tasks in a live
server.
2. Analyse helpdesk records for errors occurred and security compromises in encryption and print these
records as a part of this activity.
3. Check local computer security logs for encryption issues and print it as a part of this activity.
4. You need write a note on encryption issue and security compromises included error logs and network
performance issues identified in the task and submit to your trainer/assessor.
Your trainer will observe you during the activity and complete the performance checklist.
We can verify the log files to find any issues regarding the encryption.
We can Open Event Viewer and review the logs under Applications and Services Logs > Microsoft > Windows:
BitLocker-API.
Network Performance
Check network performance
Not satisfactory
Feedback to student:
Observer signature
Feedback:
Second attempt:
Trainer/Assessor Name
Trainer/Assessor I hold:
Declaration
☐ Vocational competencies at least to the level being delivered
☐ Current relevant industry skills
☐ Current knowledge and skills in VET, and undertake
☐ Ongoing professional development in VET
Trainer/Assessor
Signature
Date