ASSESSMENT TASK
ICTNWK503 Install and maintain valid authentication processes
Assessment Summary
Read all the instructions below before attempting the assessment task. Assessment tasks are tools used to determine if you have the knowledge and skills to complete tasks to industry standards within the workplace. Your trainer/assessor will help you throughout this task and it is your responsibility to provide enough evidence to justify a competent decision by the trainer/assessor. If you do not understand the questions or what is required, ask your trainer/assessor for assistance. For group assessments, all students are to contribute to the assessment tasks. You are allowed to work in groups up to a maximum of four people.
You are to complete all tasks by the due date and assessments must have a coversheet attached. If you think you do not have enough time to complete the tasks by the due date, discuss with the trainer/assessor the reasons of why you cannot submit on time.
Writing your responses
When answering questions, ensure that your answers are detailed enough to so the assessor can draw a conclusion that you have the knowledge and/or skills to demonstrate competency. Handwritten answers must be written in blue or black pen. When producing reports, ensure that your project has a title page, table of contents, page numbers, reference list, ensuring that your answers thoroughly match the questions asked.
Answer all questions in your own words to avoid plagiarism. Plagiarism is copying someone else’s work or ideas and saying that it your own work. Sources of work must be properly referenced, outlining the source of your ideas. Penalties may include having to resubmit the assessment task again, repeating the Unit of competency, or for repeat plagiarism, expulsion from Abbey Business College.
Marking of Assessments
On submission of your assessment will be marked for a result of either Satisfactory (S) or Not Yet Satisfactory (NYS). If you receive a NYS result, you will be asked to redo the tasks again. To achieve a competent result with this unit, all tasks need to be completed and marked as satisfactory. Your trainer/assessor will provide feedback to you on each task, outlining where you must improve to achieve a Satisfactory (S) result. When all tasks are marked as Satisfactory (S), you will receive a result of Competent (C) for this unit otherwise, you will be marked Not Yet Competent (NYC). Assessments submitted to the trainer/assessor after the due date may not be accepted, and you may have to a resubmission fee.
Unit of competency application
This unit describes the skills and knowledge required to design, develop, install and maintain authentication processes to reduce the vulnerability of the system.
It applies to individuals working as middle managers such as information security managers, network engineers or security analysts, who are responsible for implementing and monitoring the organisational security management system.
Elements and Performance Criteria
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Determine authentication requirements | Determine user and enterprise security requirements with reference to enterprise security plan Identify and analyse authentication options according to user and enterprise requirements Select the most appropriate authentication and authorisation processes |
2. Configure authentication software or tools | Create an authentication realm and reuse as required to protect different areas of server Add users and authorisation rules to new realm according to business needs Describe user attributes and user attribute set-up Set up an authentication filter and authorisation parameters on the appropriate server according to business requirements |
3. Apply authentication methods | Develop or obtain authentication protocols as required Develop and distribute related methods to users according to business need Brief user on authentication system and their responsibilities according to enterprise security plan Apply authentication system to network and user according to system product requirements Record and store permission and configuration information in a secure central location |
4. Monitor authentication system | Review the authentication system according to user and enterprise security and quality of service requirements Ensure ongoing security monitoring, using incident management and reporting processes, according to enterprise security plan Adjust authentication system if required |
Foundation Skills
This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.
Skill | Performance Criteria | Description |
Reading | 1.1, 1.2, 3.3, 4.2 | Gathers, interprets and analyses technical data to determine requirements according to user and enterprise plans |
Writing | 2.3, 3.1, 3.2, 3.5 | Prepares workplace documentation that incorporates an evaluation of technical information and specialised and cohesive language in a format and style appropriate for a specific audience |
Oral Communication | 1.2, 3.1-3.3, 4.2 | Uses active listening, observational and questioning techniques in order to identify information and confirm, clarify or revise understandingInitiates and contributes to a range of formal and informal conversations relevant to role, responding, clarifying, explaining and expanding on information as required |
Navigate the world of work | 1.1, 3.3 | Recognises and follows explicit and implicit protocols, and meets expectations associated with own role |
Get the work done | 1.1, 1.3, 2.1, 2.2, 2.4, 3.4, 3.5, 4.1-4.3 | Reflects on the ways in which digital systems and tools are used or could be used to achieve work goals and begins to recognise strategic and operational applicationsUses digital technologies and systems safely and securely when implementing and monitoring a system with a growing awareness of the permanence and transparency of all activitiesUses a combination of formal, logical planning processes and an increasingly intuitive understanding of context to plan control methods and systems processesWhen dealing with complex issues such as authentication failure and security incidents may use intuition to identify the general problem area, switching to analytical processes to clarify goals and key issues and using lateral thinking processes to generate possible solutionsMakes decisions in relatively complex situations, taking a range of factors into consideration |
Performance Evidence Evidence of the ability to:
- design and deploy authentications solutions to the business technology environment and business needs
- configure authentication software or tools
- monitor and test authentication process after implementation
- ensure authentication solutions are current.
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
- summarise the problems and challenges dealing with organisational authentication issues, including resource accounting through authentication
- discuss common virtual private network (VPN) issues, including:
- quality of service (QoS) considerations
- bandwidth
- dynamic security environment
- function and operation of VPN concepts
- outline authentication adaptors
- summarise biometric authentication adaptors
- summarise digital certificates, such as VeriSign, X.509, and SSL
- explain the function and operation of authentication controls including:
- passwords
- personal identification numbers (PINs)
- smart cards
- biometric devices
- other authentication protocols
- outline network authentication services, such as Kerberos and NT LAN Manager (NTLM)
- summarise the features of common password protocols, such as:
- challenge handshake authentication protocol (CHAP)
- challenge phrases
- password authentication protocol (PAP)
- remote authentication dial-in user service (RADIUS) authentication
- describe the principles of security tokens.
Assessment 1 – Knowledge Assessment (Written Tasks)
- What do you mean by authentication? Mention some of the authentication issues that may occur in an organization.
- What is VPN? Explain the functions and operation of VPN? Explain about the following VPN issues:
- Quality of service (QoS) considerations
- Bandwidth
- Dynamic security environment
- Explain the role of adaptors in biometric authentication process? Biometric devices seem to provide the strongest authentication however, they do have disadvantages.
Discuss two disadvantages of using biometric authentication methods.
- Explain how digital certificates work. Mention some of the trusted Certificate Authority across the world? Summaries the following terms associated with digital certificates:
- VeriSign
- SSL
c) X.509
- Explain how the following types of authentication works:
- passwords
- personal identification numbers (PINs)
- smart cards
- biometric devices
- Explain the function and operation of the following authentication protocols. Explain each in 100-150 words.
- Secure Remote Password protocol
- Protocol for Carrying Authentication for Network Access
- Password-authenticated key agreement
- To authenticate a network of devices, several authentication methods are used. Please explain how the following methods work.
- Kerberos
- NT LAN Manager NTLM)
- Mention some of the features of the common password protocols like,
- Challenge handshake authentication protocol (CHAP)
- Challenge phrases
- Password authentication protocol (PAP)
- Remote authentication dial-in user service (RADIUS) authentication
- Describe the principle of security tokens?
Assessment 1 – Observation Checklist
Observation Criteria | S | NS |
1.1 What do you mean by authentication? Mention some of the authentication issues that may occur in an organization. | ||
1.2 What is VPN? Explain the functions and operation of VPN? | ||
Explain about the following VPN issues: a) Quality of service (QoS) considerations | ||
b) Bandwidth | ||
c) Dynamic security environment | ||
1.3 Explain the role of adaptors in biometric authentication process? Biometric devices seem to provide the strongest authentication however, they do have disadvantages. Discuss two disadvantages of using biometric authentication methods. | ||
1.4 Explain how digital certificates work. Mention some of the trusted Certificate Authority across the world? | ||
Summaries the following terms associated with digital certificates: a) VeriSign | ||
b) SSL | ||
c) X.509 |
1.5 Explain how the following types of authentication works: a) passwords | ||
b) personal identification numbers (PINs) | ||
c) smart cards | ||
d) biometric devices | ||
1.6 Explain the function and operation of the following authentication protocols. Explain each in 100-150 words. a) Secure Remote Password protocol | ||
b) Protocol for Carrying Authentication for Network Access | ||
c) Password-authenticated key agreement | ||
1.7 To authenticate a network of devices, several authentication methods are used. Please explain how the following methods work. a) Kerberos | ||
b) NT LAN Manager NTLM) | ||
1.8 Mention some of the features of the common password protocols like, a) Challenge handshake authentication protocol (CHAP) | ||
b) Challenge phrases | ||
c) Password authentication protocol (PAP) |
d) Remote authentication dial-in user service (RADIUS) authentication | ||
1.9 Describe the principle of security tokens? |
Assessment 2 – Performance Assessment (Skills) Requirements
Read the case study carefully then answer the questions following. You may assume any
information that has not been mentioned in the case study, however any assumptions you make must be clearly identified as assumptions.
Case Study/ Practical implementation: Enterprise Wireless Local Area Network
Mark is working in an internet service provider (ISP company) MAXnet which provides services in the metropolitan areas of Sydney. The company has several Cisco equipment’s specially routers and switch. They received a few complaints that newly joined NOC engineers can’t access the routers for trouble shoot and monitoring. It is very hard to create password/Access for new engineers on every router. Mark is planning to implement central authentication servers ( Radious or TACACS+) on their Network.
A scenario and sample topology diagram given below with tasks, similar or as a part of Mark’s
Network
Addressing Table:
Case Scenario
The network topology shows routers R1, R2 and R3. Currently all administrative security is based on knowledge of the enable secret password. Your task is to configure and test local and server- based AAA solutions.
You will create a local user account and configure local AAA on router R1 to test the console and VTY logins.
- User account: Admin1 and password admin1pa55
You will then configure router R2 to support server-based authentication using the TACACS+ protocol. The TACACS+ server has been pre-configured with the following:
- Client: R2 using the keyword tacacspa55
- User account: Admin2 and password admin2pa55
Finally, you will configure router R3 to support server-based authentication using the
RADIUS protocol. The RADIUS server has been pre-configured with the following:
- Client: R3 using the keyword radiuspa55
- User account: Admin3 and password admin3pa55
The routers have also been pre-configured with the following:
- Enable secret password: ciscoenpa55
- RIP version 2
Note: The console and VTY lines have not been pre-configured.
Learning Objectives
- design and deploy authentications solutions to the business technology environment and business needs
- configure authentication software or tools
- monitor and test authentication process after implementation
- ensure authentication solutions are current.
- Discuss what benefit will get MAXnet from such deployment of authentication solutions?
- Complete the following tasks by cisco packet tracer, show relevant configuration to your trainer and Document relevant configuration:
Task 1: Configure Local AAA Authentication for Console Access on R1 Task 2: Configure Local AAA Authentication for VTY Lines on R1
Task 3: Configure Server-Based AAA Authentication Using TACACS+ on R2 Task 4: Configure Server-Based AAA Authentication Using RADIUS on R3
- Show following test to your trainer and provide test screen shoot with proper explanation:
- Configure a local user account on R1 and authenticate on the console and VTY lines using local AAA.
- Verify local AAA authentication from the R1 console and the PC-A client.
- Configure a server-based AAA authentication using TACACS+.
- Verify server-based AAA authentication from PC-B client.
- Configure a server-based AAA authentication using RADIUS.
- Verify server-based AAA authentication from PC-C client.
- Discuss difference between RADIUS and TACACS+? Which one Mark should use and why?
Assessment 2 – Observation Checklist
Observation Criteria | S | NS |
2.1 Discuss what benefit will get MAXnet from such deployment of authentication solutions? | ||
2.2 Complete the following tasks by cisco packet tracer, show relevant configuration to your trainer and Document relevant configuration: | ||
2.3 Show following test to your trainer and provide test screen shoot with proper explanation: | ||
2.4 Discuss difference between RADIUS and TACACS+? Which one Mark should use and why? |
As part of the course requirements you are required to complete Self-paced activities each week and submit them to your class trainer. These activities should take no more than 5 hours per week and are based on your current unit of competency.
Please speak to your trainer if you have any questions about the tasks and due dates.
Assessment 3 – Portfolio Checklist
Assessment | Submitted | Complete | Relevant | S | NS |
SPA 3.1 | Yes / No | Yes / No | Yes / No | ||
SPA 3.2 | Yes / No | Yes / No | Yes / No | ||
SPA 3.3 | Yes / No | Yes / No | Yes / No | ||
SPA 3.4 | Yes / No | Yes / No | Yes / No | ||
SPA 3.5 | Yes / No | Yes / No | Yes / No |
Introduction
Presentation is the process of showing and explaining the content of a topic to an audience. It is often used to assess student learning in individual or group research projects.
Presentation assessment consists of a topic for the student to research, discuss and present, followed by a question and answer session between a tutor and the presenter(s). This measures the ability of students to respond, think under pressure and manage discussion. It is in this part of the presentation that the student shows his/her in-depth knowledge of the topic and presentation skills.
A good presentation is generally expected to consist of:
- Introduction/ Aims/Objectives
- Major points and ideas explained and summarised
- Results/Related points/Issues/or others depending on the topic
- Conclusion – future work
- The presentation should be presented in the time allowed
Presentation Requirements:
Develop a class presentation of no more than 15 minutes to demonstrate your understanding of valid authentication processes.
Install and maintain valid authentication processes
Be prepared to answer questions from your trainer and your fellow class members following the presentation.
Assessment 4 – Criteria
Criteria | Excellent | Proficient | Average |
4.1 Presentation Content: Relates to topic, detailed, and accurate | All content directly related to the topic. Opinions were always supported by fact if possible. | Content directly related to the topic. Almost all opinions were supported by facts. | Demonstrated basic understanding of the topic. Many opinions were not supported by facts. |
4.2 Subject Knowledge: Demonstrate knowledge of subject | Showed a thorough knowledge of the topic. Able to use assessor questions to further demonstrate understanding of the topic. | Showed a working knowledge of the topic. Able to satisfactorily answer assessor questions and provided additional information upon request. | Showed basic knowledge of the topic. Able to address assessor questions by repeating parts of the presentation – did not provide any additional information. |
4.3 Audience Engagement: Engage and interact with audience | Moderated speaking style based on audience feedback. Calmly and eloquently addressed audience questions and comments. Engaged audience for the duration of the presentation. | Adjusted volume, pace, and enthusiasm several times. Answered audience questions and addressed comments. Presenter adjusted enthusiasm or pace to hold audience attention. | Spoke more loudly when requested by audience members. Presenter was clearly uncomfortable. Presenter attempted to adjust enthusiasm or pace to hold audience attention |
4.4 Presentation Timing: Length of Presentation Length of Q&A | Perfect timing | Adequate Timing | Too short or too long |
4.5 Presenter Interaction: Ability to interact with joint presenter | Good level of interaction between joint presenters. Roles clearly defined prior to presentation. | Reasonable level of interaction between joint presenters. Presentation roles not clear. | Poor interaction between presenters. No evidence of roles being defined prior to presentation. |
Assessment 4 – Observation Checklist
Observation Criteria | S | NS |
4.1 Presentation content | ||
4.2 Subject knowledge | ||
4.3 Audience engagement/communication | ||
4.4 Presentation timing | ||
4.5 Presenter interaction / roles |
Assessment Outcome
Satisfactory Unsatisfactory Comments:
Trainer’s signature Date
Student Signature: Date
What happens if your result is ‘Not Yet Competent’ for one or more assessment tasks?
The assessment process is designed to answer the question “has the participant satisfactorily demonstrated competence yet?” If the answer is “Not yet”, then we work with you to see how we can get there.
In the case that one or more of your assessments has been marked ‘NYC’, your Trainer will provide you with the necessary feedback and guidance, in order for you to resubmit/redo your assessment task(s).
What if you disagree on the assessment outcome?
You can appeal against a decision made in regard to an assessment of your competency. An appeal should only be made if you have been assessed as ‘Not Yet Competent’ against specific competency standards and you feel you have sufficient grounds to believe that you are entitled to be assessed as competent.
You must be able to adequately demonstrate that you have the skills and experience to be able to meet the requirements of the unit you are appealing against the assessment of.
You can request a form to make an appeal and submit it to your Trainer, the Course Coordinator, or an Administration Officer. The RTO will examine the appeal and you will be advised of the outcome within 14 days. Any additional information you wish to provide may be attached to the form.
What if I believe I am already competent before training?
If you believe you already have the knowledge and skills to be able to demonstrate competence in this unit, speak with your Trainer, as you may be able to apply for Recognition of Prior Learning (RPL).
Credit Transfer
Credit transfer is recognition for study you have already completed. To receive Credit Transfer, you must be enrolled in the relevant program. Credit Transfer can be granted if you provide the RTO with certified copies of your qualifications, a Statement of Attainment or a Statement of Results along with Credit Transfer Application Form. (For further information please visit Credit Transfer Policy)
ICTNWK503 Install and maintain valid authentication processes Assessment Outcome Record
In order to be deemed competent in this unit, the candidate must answer all written questions correctly and satisfactorily complete all practical tasks. In order to complete all practical tasks, all Observation Criteria need to be satisfied, i.e. demonstrated and marked as an ‘S’. The task summary outcome must be noted as satisfactory to note the demonstration of a satisfactory outcome for each practical task requirement.
Student Name | ||
Not Yet Competent | Competent | |
Comments | ||
Assessor (Name) | ||
Assessor Signature | ||
Date | ||
Student Feedback Form | ||||||||
Unit | ICTNWK503 Install and maintain valid authentication processes | |||||||
Student Name: | Date | |||||||
Assessor Name: | ||||||||
Please provide us some feedback on your assessment process. Information provided on this form is used for evaluation of our assessment systems and processes. This information is confidential and is not released to any external parties without your written consent. There is no need to sign your name as your feedback is confidential. | ||||||||
Strongly Disagree | Agree | Strongly Agree | ||||||
I received information about the assessment requirements prior to undertaking the tasks | 1 | 2 | 3 | 4 | 5 | |||
The assessment instructions were clear and easy to understand | 1 | 2 | 3 | 4 | 5 | |||
I understood the purpose of the assessment | 1 | 2 | 3 | 4 | 5 | |||
The assessment meets your expectation | 1 | 2 | 3 | 4 | 5 | |||
My Assessor was organised and well prepared | 1 | 2 | 3 | 4 | 5 | |||
The assessment was Fair, Valid, Flexible and Reliable | 1 | 2 | 3 | 4 | 5 | |||
My Assessor’s conduct was professional | 1 | 2 | 3 | 4 | 5 | |||
The assessment was an accurate reflection of the unit requirements | 1 | 2 | 3 | 4 | 5 | |||
I was comfortable with the outcome of the assessment | 1 | 2 | 3 | 4 | 5 | |||
I received feedback about assessments I completed | 1 | 2 | 3 | 4 | 5 | |||
The pace of this unit was: | Too Slow | Great Pace | Too Fast | |||||
Comments: | ||||||||
Please return this completed form to Reception once you have completed this unit of competency.
Get expert help for ICTNWK503 Install and maintain valid authentication processes and many more. 24X7 help, plag free solution. Order online now!