
Information for students
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
- review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
- comply with the due date for assessment which your assessor will provide
- adhere with your RTO’s submission guidelines
- answer all questions completely and correctly
- submit work which is original and, where necessary, properly referenced
- submit a completed cover sheet with your work
- avoid sharing your answers with other students.
| Assessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedthe maximum time allowed for completing this assessment taskwhether or not this task is open-book. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. |
Questions
Provide answers to all of the questions below:
- Outline each of the wireless network survey techniques in the table below:
| Wireless network survey technique | Outline of the technique |
| Audit and intrusion detection systems | |
| Auditing and penetration testing techniques |
- Explain how quality of service policies can help to allocate bandwidth.
- List three factors that affect signal quality.
- Complete the following table regarding technical considerations in relation to a wireless network:
| Technical considerations | Explain how you would take this into account when designing a wireless local area network |
| Antenna design features | |
| Layer 2 and layer 3 design issues | |
| Radio frequency | |
| Problems associated with topography and obstacles in radio transmission path | |
| Wireless topologies | |
| Wi-Fi access points |
- Outline why a business would choose to implement a Wireless Local Area Networks (WLAN) rather than a Wireless Metropolitan Access Networks (WMAN).
- Explain the purpose of the TCP/IP Model.
- Complete the following table by listing two security threats that may affect a WLAN and a strategy that can used to address these threats.
| Security threat | Security strategy to manage this threat |
- Explain why it is important to discuss and then document a client’s current and future network needs.
- Document key steps that may be included in an implementation plan for an enterprise WLAN.
- List three ways you could present a WLAN design to a client.
- Complete the following table by describing each of listed legislation, codes, standards and procedures as relevant to networks.
| Item | Description as relevant to networks |
| Workplace Health and Safety Act 2011 | |
| Workplace Health and Safety Regulations 2021 | |
| AZ/NZ ISO31000 standard for risk management | |
| Security procedures | |
| Code of Practice |
Assessment Task 1: Checklist
| Student’s name: | ||||
| Did the student provide a sufficient and clear answer that addresses the suggested answer for the following? | Completed successfully? | Comments | ||
| Yes | No | |||
| Question 1 | ||||
| Question 2 | ||||
| Question 3 | ||||
| Question 4 | ||||
| Question 5 | ||||
| Question 6 | ||||
| Question 7 | ||||
| Question 8 | ||||
| Question 9 | ||||
| Question 10 | ||||
| Question 11 | ||||
| Task outcome: | Satisfactory | Not satisfactory | ||
| Assessor signature: | ||||
| Assessor name: | ||||
| Date: | ||||

The post Assessment Task 1: Knowledge Questions appeared first on Universal Assignment.