You are on page 1of 9

TVET Program: Learning Module Title: Learning Outcome(s) covered Protect system and application software Ensure user

r accounts are controlled Detect and remove destructive software Identify and take action to stop spam Demonstration with Oral Questioning

Ways in which evidence will be collected:

Observation

Written Test

The evidence must show that the student

Modify default user settings to ensure that they conform to security policy Previously created user settings are modified to ensure they conform to updated security policy Ensure legal notices displayed at logon are appropriate Appropriate utilities are used to check strength of passwords and consider tightening rules for password complexity

information services are accessed to identify security gaps and take appropriate action using hardware and software or patches
Common types of destructive software are defined and identified Virus protection compatible with the operating system in use are selected and installed Advanced systems of protection are described in order to understand further options Software updates on a regular basis are installed

Interview

LAP Test

Software security settings are configured to prevent destructive software from infecting computer Virus protection software are run and/or scheduled on a regular basis

Detected destructive software are reported to appropriate person and remove the destructive software
Common types of spam are defined and identified Appropriate action is taken in order to protect unauthorized access of spammers Spam filters are configured and used

Spams are reported and documented to identify the security threats and be able to perform recommended action Prepared by: Checked by: Date: Date:

Demonestration
Students Name: Teachers Name: Learning Module Title: Learning Outcome covered: Batch Class: Date of assessment: Time of assessment: Instructions for demonstration Thenewcomputersarerunningwell,thenetworkandbackuproutinesaregreat,and boththenursesandmanagementareveryhappy.Butyourworkisnotoveryet;the nursesstationcomputersareconnectedtotheInternettoallowforinvestigationonthe latestprescribeddrugsandmedicaltreatments. Thismeansthatthecomputersaregoingtobevulnerabletoviruses,aswellasspam throughtheemailbrowser.Somedatafilesarealsotransportedbetweencomputerson externalstoragemedia,sothisalsopresentsadatasecurityproblem. Materials and equipment

OBSERVATION

During the demonstration of skills, did the student:


Investigate the latest quality anti-virus software available. Find out its costs, as well as the regularity of software signature updates. Make sure you find out the cost for a site license for the software, if available. Make sure the software company has adequate help desk facilities. When you are investigating this anti-virus software find out about spam detection software to protect the organizations emails. Write up a handout explaining what a virus is, and how it can affect the nurses computers. Also explain Trojans and worms, as well as how spam can infect the organizations emails. Write up a brief explanation of the various types of viruses currently

Yes

No

N/A

in the wild, and the possible ways they can be contracted. Then write up the steps that will be required to eradicate this virus. Naturally this will depend on the anti-virus software you recommend. Investigate the latest quality anti-virus software available. Find out its costs, as well as the regularity of software signature updates. Make sure you find out the cost for a site license for the software, if available. Make sure the software company has adequate help desk facilities. When you are investigating this anti-virus software find out about spam detection software to protect the organizations emails. Write up a handout explaining what a virus is, and how it can affect the nurses computers. Also explain Trojans and worms, as well as how spam can infect the organizations emails. Write up a brief explanation of the various types of viruses currently in the wild, and the possible ways they can be contracted.

The students demonstration was: Satisfactory

Not Satisfactory

Oral Questioning / Interview Students Name: Teachers Name: Batch Class: Learning Module Title: Learning Outcome/s covered: Oral/interview questions
1. Are all viruses harmful? 2. What is a Trojan horse?

Satisfactory response Yes


No

3. How do I prevent viru


4. 5. How do I know if my computer has a virus? How do I check for and remove viruses?

6. Are all viruses harmful?

How do I prevent viru The students underpinning knowledge was: Satisfactory Teachers Signature: Feedback to student: Date: Not satisfactory

Written test True or False 1. A virus can have a devastating effect on a computer o True False

2. A Trojan is a virus that infects a computer by attaching to a legitimate program o True False

3. A virus worm sits on your hard drive waiting for a certain 'trigger' situation o True False

4. A virus writer is always someone who is 'evil' o True False

5. A virus cannot move from your floppy disk to your hard drive if your floppy disk is locked o True o True False False 6. Anti-virus software is unnecessary if you don't use illegal software

7. Some virus warning are false alarms o True False

8. Using anti-virus software is quite hard to manage o True False

9. The payload, or warhead, of a virus is its 'destructive' element o True False

10. Sometimes a virus can only be eradicated by formatting your hard drive

o True

False

11. A software register is used to keep track of both software and hardware within an organization o True False

12. SPAM is a number of emails which have been sent by an organization you asked for information o True False

13. A software register is used to keep track of an organisations software. 14. True False

Assessment Summary Results


Students Name Teachers Name TVET Program Title Batch Class Module Title Date of Assessment The performance of the student is A. Demonstration with Oral questioning B. Written Test Yes No Satisfactory Not Satisfactory

Did the students overall performance meet the required evidences / standards? OVERALL EVALUATION

COMPETENT

NOT YET COMPETENT

General Comments [Strengths / Improvements needed]

Student's signature: Teachers signature:

Date: Date:

You might also like