ICTNWK503 Install and maintain valid authentication processes

ASSESSMENT TASK

ICTNWK503 Install and maintain valid authentication processes

Assessment Summary

Read all the instructions below before attempting the assessment task. Assessment tasks are tools used to determine if you have the knowledge and skills to complete tasks to industry standards within the workplace. Your trainer/assessor will help you throughout this task and it is your responsibility to provide enough evidence to justify a competent decision by the trainer/assessor. If you do not understand the questions or what is required, ask your trainer/assessor for assistance. For group assessments, all students are to contribute to the assessment tasks. You are allowed to work in groups up to a maximum of four people.

You are to complete all tasks by the due date and assessments must have a coversheet attached. If you think you do not have enough time to complete the tasks by the due date, discuss with the trainer/assessor the reasons of why you cannot submit on time.

Writing your responses

When answering questions, ensure that your answers are detailed enough to so the assessor can draw a conclusion that you have the knowledge and/or skills to demonstrate competency. Handwritten answers must be written in blue or black pen. When producing reports, ensure that your project has a title page, table of contents, page numbers, reference list, ensuring that your answers thoroughly match the questions asked.

Answer all questions in your own words to avoid plagiarism. Plagiarism is copying someone else’s work or ideas and saying that it your own work. Sources of work must be properly referenced, outlining the source of your ideas. Penalties may include having to resubmit the assessment task again, repeating the Unit of competency, or for repeat plagiarism, expulsion from Abbey Business College.

Marking of Assessments

On submission of your assessment will be marked for a result of either Satisfactory (S) or Not Yet Satisfactory (NYS). If you receive a NYS result, you will be asked to redo the tasks again. To achieve a competent result with this unit, all tasks need to be completed and marked as satisfactory. Your trainer/assessor will provide feedback to you on each task, outlining where you must improve to achieve a Satisfactory (S) result. When all tasks are marked as Satisfactory (S), you will receive a result of Competent (C) for this unit otherwise, you will be marked Not Yet Competent (NYC). Assessments submitted to the trainer/assessor after the due date may not be accepted, and you may have to a resubmission fee.

Unit of competency application

This unit describes the skills and knowledge required to design, develop, install and maintain authentication processes to reduce the vulnerability of the system.

It applies to individuals working as middle managers such as information security managers, network engineers or security analysts, who are responsible for implementing and monitoring the organisational security management system.

Elements and Performance Criteria

ELEMENTPERFORMANCE CRITERIA
Elements describe the essential outcomes.Performance criteria describe the performance needed to demonstrate achievement of the element.
1. Determine authentication requirementsDetermine user and enterprise security requirements with reference to enterprise security plan   Identify and analyse authentication options according to user and enterprise requirements   Select the most appropriate authentication and authorisation processes
2. Configure authentication software or toolsCreate an authentication realm and reuse as required to protect different areas of server   Add users and authorisation rules to new realm according to business needs   Describe user attributes and user attribute set-up   Set up an authentication filter and authorisation parameters on the appropriate server according to business requirements
3. Apply authentication methodsDevelop or obtain authentication protocols as required   Develop and distribute related methods to users according to business need   Brief user on authentication system and their responsibilities according to enterprise security plan   Apply authentication system to network and user according to system product requirements   Record and store permission and configuration information in a secure central location
4. Monitor authentication systemReview the authentication system according to user and enterprise security and quality of service requirements   Ensure ongoing security monitoring, using incident management and reporting processes, according to enterprise security plan   Adjust authentication system if required

Foundation Skills

This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.

SkillPerformance CriteriaDescription
Reading1.1, 1.2, 3.3, 4.2Gathers, interprets and analyses technical data to determine requirements according to user and enterprise plans
Writing2.3, 3.1, 3.2, 3.5Prepares workplace documentation that incorporates an evaluation of technical information and specialised and cohesive language in a format and style appropriate for a specific audience
Oral Communication1.2, 3.1-3.3, 4.2Uses active listening, observational and questioning techniques in order to identify information and confirm, clarify or revise understandingInitiates and contributes to a range of formal and informal conversations relevant to role, responding, clarifying, explaining and expanding on information as required
Navigate the world of work1.1, 3.3Recognises and follows explicit and implicit protocols, and meets expectations associated with own role
Get the work done1.1, 1.3, 2.1, 2.2, 2.4, 3.4, 3.5, 4.1-4.3Reflects on the ways in which digital systems and tools are used or could be used to achieve work goals and begins to recognise strategic and operational applicationsUses digital technologies and systems safely and securely when implementing and monitoring a system with a growing awareness of the permanence and transparency of all activitiesUses a combination of formal, logical planning processes and an increasingly intuitive understanding of context to plan control methods and systems processesWhen dealing with complex issues such as authentication failure and security incidents may use intuition to identify the general problem area, switching to analytical processes to clarify goals and key issues and using lateral thinking processes to generate possible solutionsMakes decisions in relatively complex situations, taking a range of factors into consideration

Performance Evidence Evidence of the ability to:

  • design and deploy authentications solutions to the business technology environment and business needs
  • configure authentication software or tools
  • monitor and test authentication process after implementation
  • ensure authentication solutions are current.

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

  • summarise the problems and challenges dealing with organisational authentication issues, including resource accounting through authentication
  • discuss common virtual private network (VPN) issues, including:
  • quality of service (QoS) considerations
  • bandwidth
  • dynamic security environment
  • function and operation of VPN concepts
  • outline authentication adaptors
  • summarise biometric authentication adaptors
  • summarise digital certificates, such as VeriSign, X.509, and SSL
  • explain the function and operation of authentication controls including:
  • passwords
  • personal identification numbers (PINs)
  • smart cards
  • biometric devices
  • other authentication protocols
  • outline network authentication services, such as Kerberos and NT LAN Manager (NTLM)
  • summarise the features of common password protocols, such as:
  • challenge handshake authentication protocol (CHAP)
  • challenge phrases
  • password authentication protocol (PAP)
  • remote authentication dial-in user service (RADIUS) authentication
  • describe the principles of security tokens.


Assessment 1 – Knowledge Assessment (Written Tasks)

  1. What do you mean by authentication? Mention some of the authentication issues that may occur in an organization.
  1. What is VPN? Explain the functions and operation of VPN? Explain about the following VPN issues:
  1. Quality of service (QoS) considerations
    • Bandwidth
    • Dynamic security environment
  1. Explain the role of adaptors in biometric authentication process? Biometric devices seem to provide the strongest authentication however, they do have disadvantages.

Discuss two disadvantages of using biometric authentication methods.

  1. Explain how digital certificates work. Mention some of the trusted Certificate Authority across the world? Summaries the following terms associated with digital certificates:
    • VeriSign
    • SSL

c) X.509

  1. Explain how the following types of authentication works:
    • passwords
    • personal identification numbers (PINs)
    • smart cards
    • biometric devices
  1. Explain the function and operation of the following authentication protocols. Explain each in 100-150 words.
    1. Secure Remote Password protocol
    1. Protocol for Carrying Authentication for Network Access
    1. Password-authenticated key agreement
  1. To authenticate a network of devices, several authentication methods are used. Please explain how the following methods work.
    1. Kerberos
    1. NT LAN Manager NTLM)
  1. Mention some of the features of the common password protocols like,
    • Challenge handshake authentication protocol (CHAP)
    • Challenge phrases
    • Password authentication protocol (PAP)
    • Remote authentication dial-in user service (RADIUS) authentication
  1. Describe the principle of security tokens?

Assessment 1 – Observation Checklist

Observation CriteriaSNS
1.1 What do you mean by authentication? Mention some of the authentication issues that may occur in an organization.  
1.2 What is VPN? Explain the functions and operation of VPN?  
Explain about the following VPN issues: a)       Quality of service (QoS) considerations  
b)       Bandwidth  
c)        Dynamic security environment  
1.3 Explain the role of adaptors in biometric authentication process? Biometric devices seem to provide the strongest authentication however, they do have disadvantages. Discuss two disadvantages of using biometric authentication methods.  
1.4 Explain how digital certificates work. Mention some of the trusted Certificate Authority across the world?  
Summaries the following terms associated with digital certificates: a)       VeriSign  
b)       SSL  
c)        X.509  
1.5 Explain how the following types of authentication works: a)       passwords  
b)       personal identification numbers (PINs)  
c)        smart cards  
d)       biometric devices  
1.6 Explain the function and operation of the following authentication protocols. Explain each in 100-150 words. a)       Secure Remote Password protocol  
b)       Protocol for Carrying Authentication for Network Access  
c)        Password-authenticated key agreement  
1.7 To authenticate a network of devices, several authentication methods are used. Please explain how the following methods work. a) Kerberos  
b)       NT LAN Manager NTLM)  
1.8 Mention some of the features of the common password protocols like, a)       Challenge handshake authentication protocol (CHAP)  
b)       Challenge phrases  
c)        Password authentication protocol (PAP)  
d)       Remote authentication dial-in user service (RADIUS) authentication  
1.9 Describe the principle of security tokens?  

Assessment 2 – Performance Assessment (Skills) Requirements

Read the case study carefully then answer the questions following. You may assume any

information that has not been mentioned in the case study, however any assumptions you make must be clearly identified as assumptions.

Case Study/ Practical implementation: Enterprise Wireless Local Area Network

Mark is working in an internet service provider (ISP company) MAXnet which provides services in the metropolitan areas of Sydney. The company has several Cisco equipment’s specially routers and switch. They received a few complaints that newly joined NOC engineers can’t access the routers for trouble shoot and monitoring. It is very hard to create password/Access for new engineers on every router. Mark is planning to implement central authentication servers ( Radious or TACACS+) on their Network.

A scenario and sample topology diagram given below with tasks, similar or as a part of Mark’s

Network

Addressing Table:

Case Scenario

The network topology shows routers R1, R2 and R3. Currently all administrative security is based on knowledge of the enable secret password. Your task is to configure and test local and server- based AAA solutions.

You will create a local user account and configure local AAA on router R1 to test the console and VTY logins.

  • User account: Admin1 and password admin1pa55

You will then configure router R2 to support server-based authentication using the TACACS+ protocol. The TACACS+ server has been pre-configured with the following:

  • Client: R2 using the keyword tacacspa55
  • User account: Admin2 and password admin2pa55

Finally, you will configure router R3 to support server-based authentication using the

RADIUS protocol. The RADIUS server has been pre-configured with the following:

  • Client: R3 using the keyword radiuspa55
  • User account: Admin3 and password admin3pa55

The routers have also been pre-configured with the following:

  • Enable secret password: ciscoenpa55
  • RIP version 2

Note: The console and VTY lines have not been pre-configured.

Learning Objectives

  • design and deploy authentications solutions to the business technology environment and business needs
  • configure authentication software or tools
  • monitor and test authentication process after implementation
  • ensure authentication solutions are current.
  • Discuss what benefit will get MAXnet from such deployment of authentication solutions?
  • Complete the following tasks by cisco packet tracer, show relevant configuration to your trainer and Document relevant configuration:

Task 1: Configure Local AAA Authentication for Console Access on R1 Task 2: Configure Local AAA Authentication for VTY Lines on R1

Task 3: Configure Server-Based AAA Authentication Using TACACS+ on R2 Task 4: Configure Server-Based AAA Authentication Using RADIUS on R3

  • Show following test to your trainer and provide test screen shoot with proper explanation:
    • Configure a local user account on R1 and authenticate on the console and VTY lines using local AAA.
    • Verify local AAA authentication from the R1 console and the PC-A client.
    • Configure a server-based AAA authentication using TACACS+.
    • Verify server-based AAA authentication from PC-B client.
    • Configure a server-based AAA authentication using RADIUS.
    • Verify server-based AAA authentication from PC-C client.
  • Discuss difference between RADIUS and TACACS+? Which one Mark should use and why?

Assessment 2 – Observation Checklist

Observation CriteriaSNS
2.1 Discuss what benefit will get MAXnet from such deployment of authentication solutions?  
2.2 Complete the following tasks by cisco packet tracer, show relevant configuration to your trainer and Document relevant configuration:  
2.3 Show following test to your trainer and provide test screen shoot with proper explanation:  
2.4 Discuss difference between RADIUS and TACACS+? Which one Mark should use and why?  

As part of the course requirements you are required to complete Self-paced activities each week and submit them to your class trainer. These activities should take no more than 5 hours per week and are based on your current unit of competency.

Please speak to your trainer if you have any questions about the tasks and due dates.

Assessment 3 – Portfolio Checklist

AssessmentSubmittedCompleteRelevantSNS
SPA 3.1Yes / NoYes / NoYes / No  
SPA 3.2Yes / NoYes / NoYes / No  
SPA 3.3Yes / NoYes / NoYes / No  
SPA 3.4Yes / NoYes / NoYes / No  
SPA 3.5Yes / NoYes / NoYes / No  

Introduction

Presentation is the process of showing and explaining the content of a topic to an audience. It is often used to assess student learning in individual or group research projects.

Presentation assessment consists of a topic for the student to research, discuss and present, followed by a question and answer session between a tutor and the presenter(s). This measures the ability of students to respond, think under pressure and manage discussion. It is in this part of the presentation that the student shows his/her in-depth knowledge of the topic and presentation skills.

A good presentation is generally expected to consist of:

  • Introduction/ Aims/Objectives
  • Major points and ideas explained and summarised
  • Results/Related points/Issues/or others depending on the topic
  • Conclusion – future work
  • The presentation should be presented in the time allowed

Presentation Requirements:

Develop a class presentation of no more than 15 minutes to demonstrate your understanding of valid authentication processes.

Install and maintain valid authentication processes

Be prepared to answer questions from your trainer and your fellow class members following the presentation.

Assessment 4 – Criteria

CriteriaExcellentProficientAverage
4.1 Presentation Content: Relates to topic, detailed, and accurateAll content directly related to the topic. Opinions were always supported by fact if possible.Content directly related to the topic. Almost all opinions were supported by facts.Demonstrated basic understanding of the topic. Many opinions were not supported by facts.
4.2 Subject Knowledge: Demonstrate knowledge of subjectShowed a thorough knowledge of the topic. Able to use assessor questions to further demonstrate understanding of the topic.Showed a working knowledge of the topic. Able to satisfactorily answer assessor questions and provided additional information upon request.Showed basic knowledge of the topic. Able to address assessor questions by repeating parts of the presentation – did not provide any additional information.
4.3 Audience Engagement: Engage and interact with audienceModerated speaking style based on audience feedback. Calmly and eloquently addressed audience questions and comments. Engaged audience for the duration of the presentation.Adjusted volume, pace, and enthusiasm several times. Answered audience questions and addressed comments. Presenter adjusted enthusiasm or pace to hold audience attention.Spoke more loudly when requested by audience members. Presenter was clearly uncomfortable. Presenter attempted to adjust enthusiasm or pace to hold audience attention
4.4 Presentation Timing: Length of Presentation Length of Q&APerfect timingAdequate TimingToo short or too long
4.5 Presenter Interaction: Ability to interact with joint presenterGood level of interaction between joint presenters. Roles clearly defined prior to presentation.Reasonable level of interaction between joint presenters. Presentation roles not clear.Poor interaction between presenters. No evidence of roles being defined prior to presentation.

Assessment 4 – Observation Checklist

Observation CriteriaSNS
4.1 Presentation content  
4.2 Subject knowledge  
4.3 Audience engagement/communication  
4.4 Presentation timing  
4.5 Presenter interaction / roles  

Assessment Outcome

                 

Satisfactory                    Unsatisfactory Comments:

Trainer’s signature                                                  Date                                     

Student Signature:                                           Date                               

What happens if your result is ‘Not Yet Competent’ for one or more assessment tasks?

The assessment process is designed to answer the question “has the participant satisfactorily demonstrated competence yet?” If the answer is “Not yet”, then we work with you to see how we can get there.

In the case that one or more of your assessments has been marked ‘NYC’, your Trainer will provide you with the necessary feedback and guidance, in order for you to resubmit/redo your assessment task(s).

What if you disagree on the assessment outcome?

You can appeal against a decision made in regard to an assessment of your competency. An appeal should only be made if you have been assessed as ‘Not Yet Competent’ against specific competency standards and you feel you have sufficient grounds to believe that you are entitled to be assessed as competent.

You must be able to adequately demonstrate that you have the skills and experience to be able to meet the requirements of the unit you are appealing against the assessment of.

You can request a form to make an appeal and submit it to your Trainer, the Course Coordinator, or an Administration Officer. The RTO will examine the appeal and you will be advised of the outcome within 14 days. Any additional information you wish to provide may be attached to the form.

What if I believe I am already competent before training?

If you believe you already have the knowledge and skills to be able to demonstrate competence in this unit, speak with your Trainer, as you may be able to apply for Recognition of Prior Learning (RPL).

Credit Transfer

Credit transfer is recognition for study you have already completed. To receive Credit Transfer, you must be enrolled in the relevant program. Credit Transfer can be granted if you provide the RTO with certified copies of your qualifications, a Statement of Attainment or a Statement of Results along with Credit Transfer Application Form. (For further information please visit Credit Transfer Policy)

ICTNWK503 Install and maintain valid authentication processes Assessment Outcome Record

In order to be deemed competent in this unit, the candidate must answer all written questions correctly and satisfactorily complete all practical tasks. In order to complete all practical tasks, all Observation Criteria need to be satisfied, i.e. demonstrated and marked as an ‘S’. The task summary outcome must be noted as satisfactory to note the demonstration of a satisfactory outcome for each practical task requirement.

Student Name 
  Not Yet Competent  Competent
Comments
 
 
 
 
 
Assessor (Name) 
Assessor Signature 
Date 
Student Feedback Form
UnitICTNWK503 Install and maintain valid authentication processes
Student Name: Date 
Assessor Name: 
Please provide us some feedback on your assessment process. Information provided on this form is used for evaluation of our assessment systems and processes. This information is confidential and is not released to any external parties without your written consent. There is no need to sign your name as your feedback is confidential.
 Strongly Disagree Agree Strongly Agree
  I received information about the assessment requirements prior to undertaking the tasks  1  2  3  4  5
The assessment instructions were clear and easy to understand1  2345
I understood the purpose of the assessment12345
The assessment meets your expectation12345
My Assessor was organised and well prepared12345
The assessment was Fair, Valid, Flexible and Reliable12345
My Assessor’s conduct was professional12345
The assessment was an accurate reflection of the unit requirements12345
I was comfortable with the outcome of the assessment12345
I received feedback about assessments I completed12345
The pace of this unit was:Too Slow Great Pace Too Fast
Comments:
 

Please return this completed form to Reception once you have completed this unit of competency.

Order Now

Get expert help for ICTNWK503 Install and maintain valid authentication processes and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (September 7, 2024) ICTNWK503 Install and maintain valid authentication processes. Retrieved from https://universalassignment.com/ictnwk503-install-and-maintain-valid-authentication-processes/.
"ICTNWK503 Install and maintain valid authentication processes." Universal Assignment - September 7, 2024, https://universalassignment.com/ictnwk503-install-and-maintain-valid-authentication-processes/
Universal Assignment July 26, 2022 ICTNWK503 Install and maintain valid authentication processes., viewed September 7, 2024,<https://universalassignment.com/ictnwk503-install-and-maintain-valid-authentication-processes/>
Universal Assignment - ICTNWK503 Install and maintain valid authentication processes. [Internet]. [Accessed September 7, 2024]. Available from: https://universalassignment.com/ictnwk503-install-and-maintain-valid-authentication-processes/
"ICTNWK503 Install and maintain valid authentication processes." Universal Assignment - Accessed September 7, 2024. https://universalassignment.com/ictnwk503-install-and-maintain-valid-authentication-processes/
"ICTNWK503 Install and maintain valid authentication processes." Universal Assignment [Online]. Available: https://universalassignment.com/ictnwk503-install-and-maintain-valid-authentication-processes/. [Accessed: September 7, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

FPC006 Taxation for Financial Planning

Assignment 2 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,000 words Weighting: 40% Download and use the Assignment 2 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the wdue

Read More »

TCHR5001 Assessment Brief 1

TCHR5001 Assessment Brief 1 Assessment Details Item Assessment 1: Pitch your pedagogy Type Digital Presentation (Recorded) Due Monday, 16th September 2024, 11:59 pm AEST (start of Week 4) Group type Individual Length 10 minutes (equivalent to 1500 words) Weight 50% Gen AI use Permitted, restrictions apply Aligned ULOS ULO1, ULO2,

Read More »

HSH725 Assessment Task 2

turquoise By changing the Heading 3 above with the following teal, turquoise, orange or pink you can change the colour theme of your CloudFirst CloudDeakin template page. When this page is published the Heading 3 above will be removed, but it will still be here in edit mode if you wish to change the colour theme.

Read More »

Evidence in Health Assessment 2: Evidence Selection

Evidence in Health Assessment 2: Evidence Selection Student name:                                                                    Student ID: Section 1: PICO and search strategy Evidence Question: Insert evidence question from chosen scenario here including all key PICO terms.       PICO Search Terms                                                                                                                                                                                                          Complete the following table.   Subject headings Keywords Synonyms Population  

Read More »

Assessment 1 – Lesson Plan and annotation

ASSESSMENT TASK INFORMATION: XNB390 Assessment 1 – Lesson Plan and annotation This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference Assessment (CRA) Marking Matrix that XNB390 markers will use to grade the assessment task

Read More »

XNB390 Task 1 – Professional Lesson Plan

XNB390 Template for Task 1 – Professional Lesson Plan CONTEXT FOR LESSON: SOCIAL JUSTICE CONSIDERATIONS: Equity Diversity Supportive Environment UNIT TITLE:    TERM WEEK DAY TIME 1   5           YEAR/CLASS STUDENT NUMBERS/CONTEXT LOCATION LESSON DURATION         28 Children (chl): 16 boys; 12

Read More »

A2 Critical Review Assignment

YouthSolutions Summary The summary should summarise the key points of the critical review. It should state the aims/purpose of the program and give an overview of the program or strategy you have chosen. This should be 200 words – included in the word count. Critical analysis and evaluation Your critical

Read More »

PUN364 – Workplace activity Assignment

Assessment 1 – DetailsOverviewFor those of you attending the on-campus workshop, you will prepare a report on the simulated simulated inspection below. For those of you who are not attending, you will be required to carry out your own food business inspection under the supervision of a suitably qualified Environmental

Read More »

FPC006 Taxation for Financial Planning

Assignment 1 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,600 words Weighting: 40% Download and use the Assignment 1 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the due

Read More »

Mental health Nursing assignment

Due Aug 31 This is based on a Mental health Nursing assignment Used Microsoft word The family genogram is a useful tool for the assessment of individuals, couples, and families.  It can yield significant data and lead to important, new patient understandings and insights as multigenerational patterns take shape and

Read More »

Assessment 2: Research and Policy Review

Length: 2000 words +/- 10% (excluding references)For this assessment, you must choose eight sources (academic readings and policy documents) as the basis of your Research and Policy Review. You must choose your set of sources from the ‘REFERENCES MENU’ on the moodle site, noting the minimum number of sources required

Read More »

HSN702 – Lifespan Nutrition

Assessment Task: 2 Assignment title: Population Nutrition Report and Reflection Assignment task type: Written report, reflection, and short oral presentation Task details The primary focus of this assignment is on population nutrition. Nutritionists play an important role in promoting population health through optimal nutritional intake. You will be asked to

Read More »

Written Assessment 1: Case Study

Billy a 32-year-old male was admitted to the intensive care unit (ICU) with a suspected overdose of tricyclic antidepressants. He is obese (weight 160kg, height 172cm) and has a history of depression and chronic back pain for which he takes oxycodone. On admission to the emergency department, Paramedics were maintaining

Read More »

Assessment Task 8 – Plan and prepare to assess competence

Assessment Task 8 – Plan and prepare to assess competence Assessment Task 8 consists of the following sections: Section 1:      Short answer questions Section 2:      Analyse an assessment tool Section 3:      Determine reasonable adjustment and customisation of assessment process Section 4:      Develop an assessment plan Student Instructions To complete this

Read More »

Nutrition Reviews Assignment 2 – Part A and Part B

This assignment provides you with the opportunity to determine an important research question that is crucial to address based on your reading of one of the two systematic reviews below (Part A). You will then develop a research proposal outlining the study design and methodology needed to answer that question

Read More »

NUR332 – TASK 3 – WRITTEN ASSIGNMENT

NUR332 – TASK 3 – WRITTEN ASSIGNMENT for S2 2024. DESCRIPTION (For this Task 3, the word ‘Indigenous Australians’, refers to the Aboriginal and Torres Strait Islander Peoples of Australia) NUR332 Task 3 – Written Assignment – Due – WEEK 12 – via CANVAS on Wednesday, Midday (1200hrs) 16/10/2024. The

Read More »

NUR100 Task 3 – Case study

NUR100 Task 3 – Case study To identify a key child health issue and discuss this issue in the Australian context. You will demonstrate understanding of contemporary families in Australia. You will discuss the role of the family and reflect on how the family can influence the overall health outcomes

Read More »

NUR 100 Task 2 Health Promotion Poster

NUR 100 Task 2 Health Promotion Poster The weighting for this assessment is 40%. Task instructions You are not permitted to use generative AI tools in this task. Use of AI in this task constitutes student misconduct and is considered contract cheating. This assessment requires you to develop scholarship and

Read More »

BMS 291 Pathophysiology and Pharmacology CASE STUDY

BMS 291 Pathophysiology and Pharmacology CASE STUDY Assessment No: 1 Weighting: 40% Due date Part A: midnight Friday 2nd August 2024 Due date Part B: midnight Sunday 29th September 2024 General information In this assessment, you will develop your skills for analysing, integrating and presenting information for effective evidence-based communication.

Read More »

Assessment Task: Health service delivery

Assessment Task Health service delivery is inherently unpredictable. This unpredictability can arise from, for example, the assortment of patient presentations, environmental factors, changing technologies, shifts in health policy and changes in division leadership. It can also arise from changes in policy within an organisation and/or associated health services that impact

Read More »

LNDN08002 Business Cultures Resit Assessment

LNDN08002 Business Cultures Resit Assessment Briefing 2023–2024 (Resit for Term 1) Contents Before starting this resit, please: 1 Assessment Element 1: Individual Report 1 Case Report Marking Criteria. 3 Assessment Element 2: Continuing Personal Development (CPD) 4 Guidance for Assessment 2: Reflection and Reflective Practice. 5 Student Marking Criteria –

Read More »

Assessment Task 2 – NAPLAN Exercise

Assessment Task 2 (35%) – Evaluation and discussion of test items Assessment Task 2 (35%) – Evaluation and discussion of test items AITSL Standards: This assessmeAITSL Standards: This assessment provides the opportunity to develop evidence that demonstrates these Standards: 1.2        Understand how students learn 1.5        Differentiate teaching to meet with

Read More »

EBY014 Degree Tutor Group 2 Assignment

  Assignment Brief Module Degree Tutor Group 2 Module Code EBY014 Programme BA (Hons) Business and Management with   Foundation Year Academic Year 2024/2025 Issue Date 6th May 2024 Semester Component Magnitude Weighting Deadline Learning outcomes assessed 2 1 2000 words Capstone Assessment 100% 26th July, 2024 1/2/3/4 Module Curriculum

Read More »

NTW 600 Computer Network and Security

Assessment 2 Information and Rubric Subject Code  NTW 600 Subject Name Computer Network and Security Assessment Number and Title Assessment 2: Cyber Security Threats to IT Infrastructure of a real-world Organisation Assessment Type Group Assessment Length / Duration  1500 words Weighting %  30% Project Report: 20% Presentation :10% (Recorded) Total

Read More »

LAW500 Business Law Assessment 2 – Group Project

Assessment Information and Rubric Subject Code LAW500 Subject Name Business Law Assessment Number and Title Assessment 2 – Group Project Assessment Type Group Length / Duration 3000 words maximum, no ±10%, and excluding references Weighting % 30% Total Marks 100 Submission Online Submission via TurnitIn for the written report Due

Read More »

Population Nutrition Case Study Analysis

HSN702 – Lifespan Nutrition Assessment Task: 1 Assignment title: Population Nutrition Case Study Analysis Assignment task type: Short Written Report and Literature Search Strategy Task details The primary focus of this assignment is on population nutrition. Nutritionists play an important role in promoting population health through optimal nutritional intake. In

Read More »

Applied Quantitative Economics Assignment

Goldsmiths College, University of London Applied Quantitative Economics Project ** You must attempt only one project, and you must complete it either in R or in Excel ** General Background Key Stage 4 (KS4) is a legal term for the last two years of secondary school education in England leading

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?