Uncategorized

BHI & CAE ASSESSMENT

BHI & CAE ASSESSMENT COVER SHEET

This form must be attached to the front of all submitted hard copy assessments.

Student Details: Student to complete
Student Name: Xuan Yu(Faith) Tiong
Student ID : 10094267
Student Declaration: By signing below, I declare that the work submitted here is my own work and it does not include work which is plagiarised, copied in whole or in part from another student or other source such as published books, internet or journals without due acknowledgement in the text.
Student Signature: Xuan Yu Tiong Date: Insert the date you submitted this assessment
Assessment Details: Teacher to complete
Course National ID and Title 22334VIC Certificate IV in Cyber Security
Unit/s National ID and Title VU21988 – Utilise basic network concepts and protocols required in cyber security
Assessment Task number and name Assessment Task 3
Date due: Date submitted:
Assessor Name: Lily Huang
Assessment Result and Feedback
Result Satisfactory Not yet Satisfactory Re-submit date if required:
Feedback:






Assessor’s signature:
Date:
Assessment Review If you believe that you have been assessed unfairly, you have the right to request an informal assessment review. When your assessment cover sheet is returned to you, you can request an informal review by filling in the section below and returning it to your assessor or the Operations Manager of your area. If you are not satisfied with the outcome, you can apply for a formal review of assessment on the application form located on the Box Hill Institute Website https://goo.gl/Pb3Rtx
VCE courses: VCAA rules and regulations replace the above assessment review. Please see your VCE Teacher or VCE Coordinator for further discussion.
I request a review of my assessment for the following reasons (not applicable to VCE courses):
Student Signature
Date
Instructions to Student
Assessment task name Assessment Task 3
Assessment task type Questioning
Time allowed Due week 14
Where the assessment will take place In timetabled classroom Nelson Campus
Personal protective equipment required N/A
Emergency procedures Report Issues to Teacher or coordinators as appropriate
Equipment provided PC on campus during class time
Individual or group work Individual
Support equipment allowed i.e.: calculator, dictionary All tools as appropriate for the assessment
Context and conditions of assessment Evidence should show competency working in a realistic environment and a variety of conditions. The candidate will have access to all tools, equipment, materials and documentation required. The candidate will be permitted to refer to any relevant workplace procedures, product and manufacturing specifications, codes, standards, manuals and reference materials. This unit may be assessed on the job, off the job or a combination of both. Where assessment occurs off the job, then an appropriate simulation must be used where the range of conditions reflects realistic workplace situations. The competencies covered by this unit would be demonstrated by an individual working alone or as part of a team. The assessment environment should not disadvantage the candidate.
What to submit The completed file, with all topics covered, coversheet filled out then submitted to StudentWeb under the Assessment Task 3
How to submit Submit the completed questions file to the Assessment Task 3 section on StudentWeb.
How to present your work A word or pdf file with student Id and student name inside the document. The coversheet must be submitted when uploading to StudentWeb
How many attempts at assessment are permitted Students will be given 3 attempts to resubmit an assessment; additional attempts must be organized with teacher and student prior to submission.
Naming protocol for electronic files ID_AT3.doc E.g.: S10054440_AT3.doc
All files that do not have this naming convention will be sent back to you as it resembles part of you assessment that the information is corrected handled and stored.
How will the assessment judgement be made
Observation checklist Exemplar
Performance checklist Rubric
Answer guide
Safety
If at any time during the learning and assessment process, your Trainer/Assessor considers that the safety of any person is at risk they will abort the session.
Reasonable Adjustment
Students identifying as having a disability may access reasonable adjustment to enable them to participate in training and assessment on the same basis as other students. Students can learn more about this through the Learners with a disability policy and procedure on the Box Hill Institute website http://www.boxhill.edu.au/for-students/student-support or by calling Student Life on 9286 9891, by emailing the Disability liaison service on dls@boxhill.edu.au or by calling into the Student Life office at Elgar Campus in E3.G56, just near the cafeteria.
Special Consideration
Where a student anticipates that a result will be impacted by special circumstances such as ill health or bereavement, application can be made for special consideration. Forms can be accessed from the Student Life office at Elgar Campus in E3.G56 or downloaded at: http://www.boxhill.edu.au/for-students/student-information/forms-and-downloads.
VCE courses: Supplementary exam procedures apply. Please see your VCE Teacher or VCE Coordinator for further discussion.

Assessment Task 3 – Knowledge test

Please read all assessment instructions to ensure you are clear and fully understand the requirements as outlined in each assessment task. 

To successfully complete this assessment task, you must meet the requirements for all criteria as listed below. Where you are unsuccessful, or you are required to provide further evidence your teacher will provide feedback and request further evidence as needed.  

It is important that you clearly understand all the requirements of this assessment task. If you have difficulty with the assessment terms or the steps to follow please speak to your teacher as soon as possible. Your teacher is your first point of contact when you need clarification and they will provide additional information as required to help you.

Instructions to student:

For this Assessment task you will individually complete the assessment, answer the questions and upload the assessment with a copy of your packet tracer file to Studentweb. You may use your learning journal and the resources found on Studentweb to complete this assignment. Any material used to answer a question must not be plagiarised and be written in your own words with referencing where required.

  1. Define the difference between Network Security and Cyber Security?

cyber security is protecting internet-connected systems and networks from attacks. Network security, on the other hand, is the act of protecting files and stuffs in a network of computers against misuse, hacking, and unauthorized accesses to the system.

  1. Define the OSI and TCP/IP models of data communication highlighting the commonalities and differences

– TCP/IP is a more practical model while – TCP/IP model is a protocol-oriented standard. OSI model gives guidelines on how communication needs to be done, while TCP/IP protocols layout standards on which the Internet was developed.

  1. Demonstrate the commonalities and differences between the OSI and TCP/IP models by inserting the correct answers into the table
Layer OSI model Protocols and Services TCP/IP model






















Layer 1 Layer 7 Application Layer 2

Application Session HTTP TCP/UDP

Layer 3 Transport Presentation Transport

Network Layer 4 IP Internetworking

Ethernet Network Interface Physical Layer 5

Layer 6 Data Link

  1. Define the function and basic operation of protocols in the TCP/IP model, give an example where you have used the protocol.

Protocols to define

HTTP

TCP or UDP

ICMP

Ethernet

  1. According to Deloitte what are possible business implications of cyber security breaches
  1. Define the binary and hexadecimal number system
  1. Convert the hexadecimal number 7A into decimal and binary
  1. Briefly explain the OSI Layer 1 and identify which of the following is an OSI Layer one standard?

Ethernet MAC IPV4 ARP EIGRP

  1. Open the packet tracer file MACWAN.pka, correctly configure the IPV4 and IPV6 addressing scheme below and answer the following questions.

Interface IPV4 Subnet mask Default gateway IPV6
PC0
192.168.3.1 /30 192.168.3.2 2001:DB8:ACAD:A::/64
PC1 192.168.1.1 /24 192.168.1.10 SLAAC
PC2 192.168.2.1 255.255.255.0 192.168.2.10 SLAAC
ROUTER 0 F 0/0 192.168.2.10 /24

ROUTER 0 F 0/1 192.168.1.10 /24
ROUTER 0 E 0/1 192.168.10.1 255.255.255.0 2001:DB8:ACAD:C::/64
ROUTER 1 F 0/0 192.168.10.2 /24 2001:DB8:ACAD:C::/64
ROUTER 1 S 0/3/0 209.165.200.1 /30
ROUTER 2 F 0/0 192.168.200.1 /24
ROUTER 2 S 0/1/0 209.165.200.2 /30
ROUTER 3 F 0/0 192.168.200.23 /24
ROUTER 3 F 0/1 192.168.3.2 /30 2001:DB8:ACAD:C::/64

What is the source and destination MAC address of the frame that travels from PC1 – R0 0/1?

What is the source and destination MAC address of the packet that travels from R2 – R3?

What is the source and destination MAC address of the packet that travels from R1 ­- R2?

– There’s no mac addresses there.

.

If data is to be sent from PC2 – PC0, what will be the destination IPV4 address found on the packet between R0 – R1?

What is the function of a router?

Insert a screenshot clearly displaying the operational status of the router.

What command would enable a ports link status to be changed to UP?

What troubleshooting methodology should be implemented if a network has not converged?

– Bottom up

What troubleshooting commands could be deployed to ensure the network has fully converged?

Can you successfully ping the IPV4 address of PC0 from PC1?

What change did you implement to successfully ping from PC0 to PC1?

  1. Describe the routing protocol RIP and why we use routing protocols.
  1. Explain the TCP 3-way handshake and how a SYN flood attack would work.
  1. Demonstrate by highlighting on the RTP diagram below where a flooding attack would take place
  1. Define the following layer 5-7 protocols HTTP, Telnet and DHCP
  1. Describe the function of a hardware and software firewall, insert an image to help explain your answer.

Insert a screenshot clearly displaying the operational status of a software firewall.

  1. What is the purpose of a security policy?
  1. According to the Dept of Industry, Innovation and Science, what are some of the issues a security policy should cover?
  1. According to the Dept of Industry, Innovation and Science, a security policy should include guidelines on? (list 5)
  1. Information security is deemed to safeguard three main objectives, list these objectives and briefly explain each one.
  1. How did Donn Parker add to these objectives?
  1. What is the function of a network switch?

Insert a screenshot clearly displaying the operational status of the switch.

  1. What protocols would use UDP not TCP, and why?
  1. Explain the use of Virtual Machines and the processing of constructing a Virtual OS Image.
  1. Describe the value and risks of using a scripting language when using CLI commands.
  1. Describe the function of a firewall and elaborate on how software firewalls could impact lab exercises

Leave a Reply

Your email address will not be published. Required fields are marked *