Beruflich Dokumente
Kultur Dokumente
System
DF9N 34
Assessment Exemplar for Higher National Unit
Price: £20.00
Published by the Scottish Qualifications Authority, Hanover House, 24 Douglas Street, Glasgow,
G2 7NQ, and Ironmills Road, Dalkeith, Midlothian, EH22 1LE
Contents
1 Introduction
3 Assessment exemplar
1 Introduction
This pack must be used in conjunction with a copy of the Unit specification which details
the standard of performance expected of the candidate. A copy of the Unit specification
can be obtained from SQA.
This pack supplements the assessment guidelines and support notes of the Unit
specification. It aims to provide an example of assessment that is valid, reliable and
practicable. The assessment task(s) detailed in this pack correspond to the assessment
guidelines outlined in the Unit specification.
The example provided is intended for guidance only. It may be used in a variety of ways
including, for example:
It is important that you make sure that the assessment exemplar is used in a context
appropriate to the delivery of the Unit and to the Group Award of which it forms a part.
It is also very important that you note that using this assessment exemplar does not
automatically guarantee successful external moderation. It is still your responsibility to
make sure that all the appropriate internal quality assurance procedures are satisfactorily
completed. For example, a valid, effective and approved internal moderation system
must be in use at your centre.
Recommended reading
Before using this material you might find it useful to look at some of our other
publications, in particular:
Details of these and other SQA publications are available in SQA Information, our
publications catalogue which is updated and printed twice a year (telephone:
0845 279 1000). SQA Information lists all published HN assessment exemplars. You
could also visit our website at www.sqa.org.uk.
A free copy of this pack is available to all SQA approved centres at the time of initial
distribution. Additional copies can be obtained, price £20.00, from SQA’s Customer
Contact Centre, Scottish Qualifications Authority, 24 Douglas Street, Glasgow, G2 7NQ
(telephone: 0845 279 1000 or fax: 0141-242 2123).
The core Units for HND Computer Networking and Internet Technology include the
above, plus:
Core Skills
Where Core Skills have been embedded in a Unit specification and an Assessor wishes to
use an alternative method of assessment, she/he must ensure that the assessment generates
the Evidence Requirements specified in the Unit specification. It is recommended that
the centre seek prior moderation for the alternative method to ensure that the Core Skill is
still covered. The Unit specification will detail the Core Skills covered within the Unit.
1
The SCQF provides the national common framework for describing all relevant programmes of learning
qualifications in Scotland. The level a qualification is assigned within the framework is an indication of
how hard it is to achieve. There are 12 levels, from level 1 for Access 1 through to level 12 for
doctorates. For further information on the level and credit rated see the Unit specification.
Introduction
The Scottish Qualifications Authority’s system of assessment measures the evidence of a
candidate’s attainment of knowledge, understanding and skills against defined criteria.
The assessment process must allow for evidence of each candidate’s performance to be
generated and collected. This evidence must then be judged against the standards set out
in the Unit specification. To achieve the Unit the candidate must successfully meet the
standards and there must be evidence to prove this.
The Unit specification defines the criteria you need to use to judge whether or not the
candidate has met the standards. All Units have the following:
Outcomes
This section details the essential knowledge and skills which the candidate must attain in
order to achieve each Outcome, combination of Outcomes or for the Unit as a whole.
Evidence Requirements
Evidence Requirements can be written for each Outcome, for a combination of Outcomes,
or for the Unit as a whole. There is no standard format for writing Evidence
Requirements. Provided that they state clearly and unambiguously the type, standard and
amount of evidence which candidates have to produce in order to be judged competent,
the Evidence Requirements can be written in the format which will be most easily
understood by users of the Unit.
Note: The national standard of achievement expected, which was previously specified as
Performance Criteria, is now stated in the Evidence Requirements.
Where it is not possible to cover all the items listed under knowledge and/or skills through
holistic assessment, sampling can be used as a method of gaining additional evidence.
Sampling may also sometimes be an appropriate method of assessing very knowledge-
based Units. This type of assessment must always be carried out in supervised conditions.
♦ the standard of evidence required for each knowledge and/or skills item so that
satisfactory performance can be judged whichever items are sampled on any one
occasion
♦ the proportion of knowledge and/or skills which can be sampled
♦ whether any item(s) must be included in each assessment, ie if it is crucial to the
achievement of the Outcome(s) or to an embedded Core Skill
♦ the fact that a different sample should be chosen on each assessment occasion to
prevent candidates being able to foresee what they will be asked
♦ the conditions of assessment
Assessment guidelines
This section should give guidance on how best to conduct the assessment to generate the
evidence required, eg recommending the use of a particular assessment instrument. It
should include guidance on how to integrate the assessment of the whole Outcome or, if
appropriate, how to link assessment holistically with other Outcomes in the Unit. Like
Evidence Requirements, assessment guidelines can be written for each Outcome, a
combination of Outcomes, or for the Unit as a whole.
It is important to realise that it is up to the Assessor to judge when and if the candidate
has satisfactorily met the standards. This decision should be based on the quality and
correct quantity of evidence collected, set against the standards in the Unit.
The assessment instrument in this pack should not create any unnecessary barriers to
achievement for open/distance learning delivery or candidates with special needs.
However, you may need to adapt it so that you can assess candidates with special needs
or candidates who are undertaking the Unit on an open/distance learning basis.
Obviously, whilst taking into account the needs of the candidate concerned, the methods
of assessment you choose must still be valid, reliable and practicable. If you have any
questions or problems, or if you are in any doubt as to whether or not the alternative
assessment you have chosen is still valid, please contact the Customer Contact Centre at
the Scottish Qualifications Authority on telephone: 0845 279 1000.
3 Assessment exemplar
Assessment tasks
The table below summarises how each assessment exemplar task relates to coverage of
the Outcomes detailed in the Unit specification. It also indicates the evidence which
should be retained for external moderation.
Suggested evidence to be
Outcome Suggested task
retained
All 1 Restricted response test Candidate responses to restricted
(40 questions) response test
Conditions of assessment
Restricted response test
Candidates must answer at least 70% of the questions correctly in order to obtain a pass.
If subtests are used, they must also score at least 70% in each subtest. It is not necessary
to score 70% in each individual Outcome — an overall score of 70% is sufficient to
obtain a pass.
Testing must take place in a closed-book environment where candidates have no access to
books, handouts, notes or other learning material. Testing can be done in either a
machine-based or paper-based format and must be invigilated by a tutor or mentor. There
must be no communication between candidates and communication with the invigilator
must be restricted to matters relating to the administration of the test.
The suggested time allocation for a restricted response test is two minutes for each
question plus five minutes’ starting-up time and five minutes’ finishing-off time; thus a
total of 90 minutes should be allocated for a 40-question end of Unit test and 110 minutes
for a 50-question test.
Although individual Outcome tests are permissible, it is suggested that if subtests are to
be used, Outcomes should be combined to produce tests of no fewer than 10 questions. A
10-question test would, therefore, have a time allocation of 30 minutes.
Logbook
If an Outcome has a practical component, this must be assessed by having the candidate
use a logbook to record the practical tasks successfully completed. The logbook can be in
paper or electronic form and must be authenticated by the tutor or mentor.
For some Outcomes only a sample of the practical tasks needs to be completed and
recorded for assessment purposes, eg three out of five. This is clearly indicated in the
logbook instructions for the Outcomes involved. Where this occurs, tutors must inform
candidates of the tasks to be completed.
Assessment task 1
Outcome(s)
covered All
The suggested time allocation for a restricted response test is two minutes for each
question plus five minutes’ starting-up time and five minutes’ finishing-off time; thus a
total of 90 minutes should be allocated for a 40-question end of Unit test and 110 minutes
for a 50-question test.
This test covers all Outcomes. This test is closed-book — no reference material is
permitted.
Each question has only one answer unless otherwise indicated. All questions should be
attempted.
1 You want to ensure that only WHQL-signed drivers can be installed on your Windows
Server 2003 computer. Which of the following Driver Signing options settings should you
choose?
(a) Allow.
(b) Warn.
(c) Block.
(d) Ignore.
2 You have just installed a new Windows 2003 Server domain and you want to write a script
to create a large number of user accounts quickly. Which of the following command-line
utilities could you use?
(a) Adduser.
(b) Useradd.
(c) Dsadd.
(d) Usermgr.
3 You move a file called JuneData.txt from the D:\LiveData folder to the D:\OldData folder
on the same NTFS-formatted volume. The JuneData.txt file currently has Modify
permission applied for the Users group. The D:\OldData folder has the Write permission
applied for the Users group. What permission will the JuneData.txt file have after it has
been moved?
(a) Read.
(b) Write.
(c) Modify.
(d) Full Control.
4 Your company operates 24 hours a day, every day of the week. There are three eight-hour
shifts which use the same computers. You’ll soon be upgrading to Windows Server 2003.
Which of the following licensing models would be most cost-effective?
5 All of the Windows 2003 server computers in your domain are scheduled to be backed up
every day at 1:00 am. You want to write a batch file to automate the backup procedures.
Which of the following command-line utilities is your batch file most likely to incorporate?
(a) Ntbackup.
(b) Winbackup.
(c) Backupschedule.
(d) Backup/schedule.
6 Your Windows server 2003 computer is a 3 GHz Pentium 4 which has a single basic disk
installed. Which of the following configurations is valid?
7 A user who has just been transferred to the Accounts department complains that she cannot
access files on the Accounts share from her workstation. You check her account and you
find that she hasn’t yet been added to the Accounts group, so you add her and tell her that
that she should now be able to access the files. However, she calls back a few minutes later
to say that she still can’t access them. Which of the following is the most likely source of
her problem?
(a) She needs to log off and log on again before the new settings will take effect.
(b) She needs to allow time for the changes to replicate across the Active Directory
Network.
(c) She has only been granted access to the shared folder and not the individual files
within it.
(d) She needs membership of the Administrators group.
8 A user is unable to view the previous versions of a file that has been shadow copied on the
server. When he examines the file’s properties, there is no tab for previous versions. Other
users of the network can view previous versions without problems. Which of the following
is the most likely the cause of this problem?
(a) The Previous Versions Manager hasn’t been installed on the server.
(b) The Previous Versions Client hasn’t been installed on the user’s computer.
(c) The user isn’t a member of the Administrators group.
(d) There have been no changes to the file since shadow copying was enabled.
9 You have six workstations connected to a network which has a Windows Server 2003
computer as a domain controller. You want to allow any user to log on at any workstation
and receive their own desktop settings, but you also want to ensure that any changes made
by the users to their desktop settings are removed when they log off. Which type of profile
should the users be allocated?
(a) local.
(b) global.
(c) roaming.
(d) mandatory.
10 Users store data files on the D: drive of your Windows 2003 Server computer, which is
continually running out of space. You discover that the problem is largely due to two users,
Robin and Mike, who insist on keeping large and outdated files. You decide that the
solution is to impose disk quotas, so you do this, limiting each user to 10 GB of disk space
on the D: drive. Robin already has 8.5 GB of files stored. He attempts to store another 4
GB file and it is stored successfully. Why does this happen?
11 You are developing a plan for backing up several Windows 2003 Server computers every
night. You want the backups to be carried out as quickly as possible, but you also want data
to be restored as quickly as possible following a disaster. Which of the following backup
strategies would be the most effective?
12 You are configuring permissions for a shared folder. You want to allow Authenticated
Users to save files to the folder, read all files in the folder and change or delete files that
they own. Which of the following permissions do you need to set? (Choose two.)
(a) Partitions.
(b) Volumes.
(c) Logical drives.
(d) Sectors.
14 You have a job which you wish to print urgently. You examine the print queue and notice
that there are a number of jobs, including several long ones, queued before yours. What is
the best way to ensure that your document is printed next?
15 You are the network administrator for a Windows 2003 Server domain called
coatbank.com. You have created two new child domains called north.coatbank.com and
south.coatbank.com. You now want to move two Windows 2003 member servers from
coatbank.com to south.coatbank.com. Which of the following tools should you use to move
the computer accounts?
(a) Dsmove.
(b) Movetree.
(c) Active Directory Users and Computers.
(d) Active Directory Domains and Trusts.
16 You have just installed a non Plug and Play SCSI controller in your Windows server 2003
computer. You now need to configure its resource settings, but you are unable to find the
controller in Device Manager. Which of the following is the most likely explanation?
18 You are the network administrator for a Windows 2003 Server domain. Your server
computer has C: and D: volumes. You want to see what shares have been created on the
server for all volumes. Which of the following utilities could you use?
19 Which of the following command-line utilities can be used to display performance counter
data on the screen?
(a) perfmon.exe
(b) relog.exe
(c) typeperf.exe
(d) logman.exe
20 You are designing a backup strategy for all the servers within your domain. You want to
perform a complete backup every Friday night and from Saturday to Thursday you want to
create backups every day at 1am and 1pm, using the minimum amount of space. Which of
the following backup options should you use?
(a) Differential.
(b) Incremental.
(c) Daily.
(d) Copy.
21 You want to use the dsmod.exe tool to enable the user account for Margaret Kerr in the
coatbank.com domain. Which of the following commands should you use?
22 Your manager has asked you to generate an audit log of all users who attempt to access a
folder which stores confidential company information. She wants to know about users who
try to access the folder, but are stopped due to insufficient NTFS permissions, as well as
those who successfully access the folder. Which of the following types of auditing should
you configure? (Choose two.)
23 You have just installed a new USB device on your Windows server 2003 computer, but it
isn’t working correctly. You want to use the Hardware Troubleshooting Wizard to
investigate the problem. Which of the following utilities will give you access to the
Wizard?
24 A publishing company keeps all its current projects in a folder called Projects. The
company employs two groups of staff who are allowed access to this folder, editors and
reviewers. The Editors group has Full Control permission on the folder, while the Deny
Write permission is assigned to the Reviewers group. George is promoted from Reviewer
to Editor and is added to the Editors group, but the network administrator forgets to remove
him from the Reviewers group. Which of the following statements best describes the
cumulative effect of the permissions resulting from his membership of both groups?
25 A virus has been discovered on one of your Windows 2003 Server computers and you
suspect that some of the operating system files have been corrupted. Which of the
following recovery techniques would you use to recover the operating system files?
26 Your Windows Server 2003 computer has a single 80GB hard disk. You want to add
another identical disk and configure the two disks as a mirror to improve fault tolerance.
After installing the new disk you reboot and go into the disk management MMC. When
you right-click on the C: drive, Add Mirror is greyed-out. Which of the following is the
most likely cause of this problem?
(a) The original disk needs to have its format changed to NTFS.
(b) The new disk needs to be formatted to NTFS.
(c) The original disk needs to have an Extended Partition placed on it.
(d) The new disk needs to be upgraded from basic to dynamic.
27 Your organisation often employs temporary staff and allocates user accounts to them. You
want to disable these accounts when temporary staff leave. You decide to do this by
checking which accounts have not been used for two weeks and disabling them
automatically. Which of the following commands would you use?
28 You have configured your Windows Server 2003 member server computer as a Terminal
Services server. Which of the following utilities would you use to view all the users who
are currently connected?
29 Which of the following authentication methods are supported by IIS 6.0? (Choose two.)
30 Which of the following will prevent a successful ASR restore? (Choose two.)
31 Users of your Windows Server 2003 computer have complained that file access speeds
have deteriorated dramatically over the last few months. The number and size of files and
the number of times they have been accessed has remained fairly constant over this period.
Which of the following would be most likely to improve access speeds?
32 You have just created a new Active Directory group on a Windows 2003 Server domain
controller. Which of the following properties can you configure for this group?
33 You have configured a number of client computers with the Terminal Services Client,
Remote Desktop Connection, and configured a Terminal Server in Remote Desktop for
Administration mode. However, when users attempt to connect to the terminal server, they
receive an error message saying that the local policy of this system does not permit them to
log on interactively. Which of the following steps should you take to resolve this problem?
(a) Enable the Terminal Services Remote Control Setting for each user.
(b) Add the Users to the Remote Desktop Users group.
(c) Enable the Client/Server data redirection setting in Group Policy for each client
computer.
(d) Enable the Client/Server data redirection setting in Group Policy for the Terminal
Server computer.
34 Users have reported that several server-based applications are running slowly. You notice
that the LED is blinking rapidly on the applications disk, so you suspect that a disk
controller problem is responsible. Which of the following counters would you add to
System Monitor to check this?
35 Which of the following methods will allow successful completion of a backup job to be
verified automatically?
(a) When starting the backup job, click on Advanced and select Verify Data After
Backup.
(b) Use the Backup Wizard to run a verification check.
(c) Check the Properties of the backup job from the from the Restore and Manage
Media tab of the Backup Utility.
(d) The Windows Server 2003 Backup Utility does not allow a backup to be verified.
36 You have started a new employee to help manage backup and restore tasks for Windows
2003 Server computers within the Accounts department. You want to allow her to carry out
backups and restores, but you do not wish to allow her access to the file system. Which of
the following groups should you assign her to?
37 An employee with the username gbrown has left the company. You want to reassign
ownership of her files to the Administrators group. You open a command prompt and
navigate to the directory where her home folder is located. Which of the following
commands would you type to change the ownership of her files?
38 You are a senior systems administrator, based at your company’s headquarters in Glasgow.
A junior administrator based at a branch office in Inverness has contacted you to say that
he needs to modify some registry settings on one of the servers in Inverness and he wants
you to watch him remotely so that you can check that he does this correctly. Which of the
following techniques will allow you to watch him carry out the modifications and talk him
through anything he does not understand?
39 You have just installed a new application on a Windows 2003 member server computer.
The installation procedure involved editing several registry settings manually. When you
try to restart the server it hangs before reaching the logon screen. Which of the following
recovery options should you try first?
40 You want to list the devices connected to your Windows Server 2003 computer
numerically by IRQ. Which of the following procedures would achieve this? (Choose two).
Question sources
Question 1 2 3 4 5 6 7 8 9 10
number
Unit 1.4 2.3 3.3 4.2 5.5 1.1 3.1 5.1 2.1 4.4
reference
Question 11 12 13 14 15 16 17 18 19 20
number
Unit 5.4 3.1 1.1 4.4 2.2 1.2 2.1 3.1 4.1 5.2
reference
Question 21 22 23 24 25 26 27 28 29 30
number
Unit 2.2 4.1 1.2 3.3 5.3 1.3 2.3 3.2 4.6 5.1
reference
Question 31 32 33 34 35 36 37 38 39 40
number
Unit 1.3 2.4 3.2 4.5 5.2 2.4 3.3 4.3 5.3 1.4
reference
Answer sheet
Name: Date:
College: Class:
Write the letter (or letters) corresponding to the correct answer in the box below
each question number.
Question 1 2 3 4 5 6 7 8 9 10
number
Answer
Question 11 12 13 14 15 16 17 18 19 20
number
Answer
Question 21 22 23 24 25 26 27 28 29 30
number
Answer
Question 31 32 33 34 35 36 37 38 39 40
number
Answer
Assessment task 1
Outcome(s)
covered All
A candidate must score at least 70% in order to pass. If subtests are used, candidates must
score at least 70% in each subtest in order to pass.
It is not necessary for candidates to pass each discrete Outcome, ie if a subtest covers
Outcomes 1 and 2, it is sufficient that the candidate scores 70% overall. He/she does not
require to score 70% in the questions relating to each Outcome.
Correct responses
Question 1 2 3 4 5 6 7 8 9 10
number
Correct c c c d a c a b d b
response
Question 11 12 13 14 15 16 17 18 19 20
number
Correct c b, c b d b a c d a b
response
Question 21 22 23 24 25 26 27 28 29 30
number
Correct d a, b c a d d b a c, d c, d
response
Question 31 32 33 34 35 36 37 38 39 40
number
Correct b a b d a a d b d a, c
response
Distribution of responses
Notes: the total frequency is greater than 40 because some questions have more than one
answer. The total percentage is less than 100 due to rounding.
Assessment Task 2
Outcomes(s) 1, 2, 3, 4 and 5
Covered
Logbook
Candidate logbook
HN Unit: DF9N 34 – Network Server Operating System
Candidate name:
Candidate number:
Centre:
Start date:
Finish date:
Tutor/mentor:
Summary: In order to successfully complete this Unit, the candidate must carry out the
specified practical tasks relating to Outcomes 1 to 5. There may be a degree of overlap between
tasks, depending on the tasks chosen, so a single task may allow more than one log book entry
to be completed. The tutor should fill in the date of completion against each completed task.
Outcome 1
Task 1.1
Task 1.2
Task 1.3
Task 1.4
Outcome 2
Task 2.1
Task 2.2
Task 2.3
Task 2.4
Outcome 3
Task 3.1
Task 3.2
Task 3.3
Outcome 4
Task 4.1
Task 4.2
Task 4.3
Task 4.4
Task 4.5
Task 4.6
Outcome 5
Task 5.1
Task 5.2
Task 5.3
Task 5.4
Task 5.5
I certify that all the work detailed in this logbook has been carried out unaided by the candidate
named above.
Signed: Date:
You must complete at least two of the four tasks listed below (1.1–1.4).
The tasks to be completed will be selected by your tutor.
Carry out any three of the six tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
Carry out any two of the three tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
Carry out both of the tasks listed below and either give a brief description of the steps you took
or attach annotated printouts or screen dumps showing the steps you took.
1.3.1 Implement one of the following RAID solutions: RAID-0, RAID-1 or RAID-5
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
1.4.1 Install and configure at least two server hardware devices, taking account (where
relevant) of device properties and settings, hardware drivers, driver upgrades, driver
rollback and driver signing options.
Device 1:
Device 2:
You must complete at least two of the four tasks listed below (2.1–2.4).
The tasks to be completed will be selected by your tutor.
Carry out both of the tasks listed below and either give a brief description of the steps you took
or attach annotated printouts or screen dumps showing the steps you took.
Carry out any three of the six tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
Carry out any two of the three tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
2.3.1 Diagnose and resolve user account lockouts and issues relating to user account
properties
2.3.3 Diagnose and resolve issues related to computer accounts by using the Active
Directory Users and Computers MMC snap-in and resetting computer accounts
Carry out any two of the four tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
2.4.3 Use Active Directory Users and Computers MMC snap-in to manage group
membership
You must complete at least two of the three tasks listed below (3.1–3.3).
The tasks to be completed will be selected by your tutor.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
3.1.1 Configure access to shared folders and manage shared folder permissions
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
3.2.1 Diagnose and resolve issues relating to client access and terminal services security
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
3.3.1 Configure file system permissions, verify effective permissions and change ownership
of files and/or folders
You must complete at least three of the six tasks listed below (4.1–4.6).
The tasks to be completed will be selected by your tutor.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.1.1 Carry out monitoring, using counter logs, trace logs and alerts
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.2.1 Use the Software Update Service to manage software updates and site licensing
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.3.1 Manage a server remotely by using Remote Assistance and/or Terminal Services
Remote Administration mode
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.4.1 Monitor disk quotas, print queues and server hardware bottlenecks
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.5.1 Monitor and optimise server memory, network usage, processor usage and disk
performance and use counters and thresholds
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
You must complete at least three of the five tasks listed below (5.1–5.5).
The tasks to be completed will be selected by your tutor.
Carry out at least two of the four tasks listed below and either give a brief description of the
steps you took or attach annotated printouts or screen dumps showing the steps you took.
5.1.2 Use the following system recovery tools: Automated System Recovery (ASR) the
Recovery Console
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
5.2.1 Verify the successful completion of backup jobs and manage backup storage media
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
5.3.1 Recover from at least two of: hardware failure, corrupt registry, viruses, corrupt
boot file, by making use of use of at least two of: Safe Mode, Last Known Good and
Recovery Console
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
5.4.1 Documentary evidence that the candidate can use system tools to restore backup data
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
5.5.1 Documentary evidence that the candidate can use system tools to schedule backup
jobs
Assessment task 2
Outcome(s)
Covered 1, 2, 3, 4, and 5
All of the exemplar tasks described here require little in the way of subjective judgment to
ascertain whether the candidate has completed the task — either the required task has
been performed and evidenced or it has not. The most important factor is the candidate’s
ability to carry out the required task, rather than the quality of his/her description.
It is important that the candidate should describe tasks he or she has actually carried out,
under the oversight of the tutor or mentor, and not simply give theoretical instructions as
to how a task should be carried out.
The range of assessment tasks available should make it reasonably straightforward for a
tutor or mentor to select a suitable range of tasks, depending on the equipment and
facilities available.
There may be some judgment required to determine if the log contains sufficient detail. In
general a log should contain sufficient detail to allow the task to be repeated by another
user with a similar level of skill and background knowledge to the candidate.
If each of the fields in the pro forma contains the required information then there is
probably sufficient evidence. Fields with little or no information may indicate a lack of
evidence.
Example responses are given for only a selection of the tasks contained in the exemplar
assessment. These are intended to illustrate the general standard of responses expected,
rather than to provide model answers.
The use of the pro formas in not mandatory — candidates can provide the logbook in an
alternative form, such as a narrative document or a blog. If assessment tasks are based on
practical activities from a textbook or lab sheet, it may be more to provide a copy of the
instructions issued to the candidate, supplemented by additional evidence (completion
items, screen dumps etc) to show that the candidate has carried out the tasks
successfully.
Candidate logbook
Summary: In order to successfully complete this Unit, the candidate must carry out the
specified practical tasks relating to Outcomes 1 to 5. There may be a degree of overlap between
tasks, depending on the tasks chosen, so a single task may allow more than one log book entry
to be completed. The tutor should fill in the date of completion against each completed task.
Outcome 1 The candidate must complete at least two of the four tasks
Task 1.1 Completed 21/2/2005
Task 1.2 Completed 22/2/2005
Task 1.2 Completed 23/2/2005
Task 1.4 Completed 24/2/2005
Outcome 2 The candidate must complete at least two of the four tasks
Task 2.1 Completed 25/2/2005
Task 2.2 Completed 26/2/2005
Task 2.3
Task 2.4
Outcome 3 The candidate must complete at least two of the three tasks
Task 3.1 Completed 29/2/2005
Task 3.2
Task 3.3 Completed 30/2/2005
Outcome 4 The candidate must complete at least three of the six tasks
Task 4.1 Completed 31/2/2005
Task 4.2
Task 4.3
Task 4.4
Task 4.5 Completed 1/3/2005
Task 4.6 Completed 2/3/2005
Outcome 5 The candidate must complete at least three of the five tasks
Task 5.1
Task 5.2
Task 5.3
Task 5.4
Task 5.5
I certify that all the work detailed in this logbook has been carried out unaided by the candidate
named above.
Signed: A Teacher Date: 5/3/2005
You must complete at least two of the four tasks listed below (1.1–1.4).
The tasks to be completed will be selected by your tutor.
Carry out any three of the six tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
1. I started up the Disk Management MMC from the Computer Management Console.
2. I right-clicked the unallocated space on the C: drive
3. I clicked New partition on the pop-up menu. This started the New Partition Wizard
4. I clicked Next to continue.
5. On the Select Partition Type window, I selected Primary partition.
6. I clicked Next to continue. I was then prompted to specify the partition size.
7. I specified the partition size as 10 MB and clicked Next to continue.
8. I assigned the partition the drive letter D and clicked Next to continue.
9. I now needed to format the new partition. I chose to format it as NTFS and then
clicked Next to continue.
10. The Completing the New Partition Wizard window appeared. I read over the summary
to verify that I had made the correct selections and then clicked Finish to complete
the process.
www.syngress.com
1. I right-clicked on disk D.
2. I selected Convert to Dynamic Disk from the pop-up menu. This gave me the Convert
to Dynamic Disk selection window. The disk I wanted to upgrade was already checked,
so I clicked OK to continue.
3. I was shown a summary screen that indicated which disks were to be converted and I
clicked Convert to continue.
4. Windows warned me that I was about to convert to dynamic. I clicked Yes on the
warning screen to continue.
5. I was warned that file system currently in use on the disk would be dismounted during
the upgrade. I clicked Yes to dismount the file system.
6. I Clicked OK on the confirmation window to reboot my your PC.
7. Once the PC had been rebooted I used the Disk Management MMC to check that the
disk had been upgraded to dynamic.
Carry out any two of the three tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
1. I selected Control Panel from the Start menu and then selected System from the
list.
2. I selected the Hardware tab in the System Properties dialog box, then clicked Device
Manager.
This allowed me to view devices in four different ways: Devices by type view (default),
Devices by connection view, Resources by type view and Resources by connection view.
Devices that are disabled have their sections automatically expanded in the default view
and an icon with an ‘X’ (disabled) or exclamation point (error).
I investigated a problem with the sound card by opening the device Properties dialog box
by right-clicking the device entry and selecting Properties from the context menu to get
access to the Device status section. When I clicked on the Driver tab I discovered that
there was no driver installed, so I downloaded the correct driver from the vendor’s web
site and this resolved the problem.
Certain Control Panel applets including Network Connections, Mouse, Keyboard, Sounds
and Audio Devices allow you to display and modify hardware status information. These
applets often bring you back to Device Manager’s Properties dialog boxes to do actual
management. I used the Mouse applet to increase the double click speed on my mouse and
the Keyboard applet to change my keyboard setting from US to UK.
Carry out both of the tasks listed below and either give a brief description of the steps you took
or attach annotated printouts or screen dumps showing the steps you took.
1.3.1 Implement one of the following RAID solutions: RAID-0, RAID-1 or RAID-5
1. I started the Disk Management snap-in and right-clicked the simple volume I
wanted to mirror (Volume E: on Disk 1) then I chose Add Mirror from the context
menu.
3. After the mirror was created, both volumes making up the two parts of the mirror
appeared in the Disk Management console with the same drive letter.
2. I clicked the Analyze button to analyze my disks and give me a report of how
fragmented they were.
3. I clicked the View Report button to see the status of my disk. This gave a report
similar to the previous one.
6. When the defragmentation process is complete I was given the option of viewing a
defragmentation report, so I clicked on View Report to do this.
7. www.syngress.com
8. I compared the defragmentation report with the analysis report produced in step
2. There was a significant decrease in file fragmentation.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
1.4.1 Install and configure at least two server hardware devices, taking account (where
relevant) of device properties and settings, hardware drivers, driver upgrades, driver
rollback and driver signing options.
1. My computer came with built-in graphics. I installed a new AGP Graphics Adapter.
2. Windows Server 2003 immediately detected the device, but couldn’t find a
suitable driver. The Found New Hardware wizard started and prompted me to
insert the CD that came with the mouse. I did this and the driver was installed
correctly.
3. I then checked with the manufacturer’s web site and located what appeared to be
a more recent driver. I downloaded this and attempted to install it, using the
Update button on the Drivers tab of the Device Manager Properties box.
4. I was warned that the new driver was unsigned, but I chose to continue installing
it. After installation I was instructed to restart the computer.
5. When the computer was restarted the display was fuzzy and flickered badly. I
went back to Device Manager and clicked the Driver Rollback button in the
Properties box.
6. I was again asked to restart the computer. Once I did this the display worked OK.
1. My computer came with built-in sound, but it did not work with some my legacy
audio software so I decided to install an older sound card (Sound Blaster Gold Plus
Pro).
2. I installed this card in a PCI slot, started up the machine and started the Add
Hardware Wizard by selecting Start | Control Panel | Add Hardware.
3. The Wizard searched for new hardware. I selected Yes, I Have Already
Connected the Hardware and clicked the Next button.
4. The Wizard displayed a list of installed hardware, but my sound card wasn’t listed.
I highlighted Add a New Hardware Device and clicked Next.
5. In the next dialog box I chose Install the hardware that I manually select from
a list (Advanced) and clicked Next.
6. The next dialog box asked me to select a device - I chose Sound, video and game
controllers. This produced a list of manufacturers including Creative Technology,
but my sound card wasn’t listed, so I clicked Have Disk and specified the location
of the driver.
7. The next dialog box listed my sound card correctly. I clicked the Next button and
the drivers were installed, then clicked the Finish button to complete the
installation. When I restarted the machine my sound card and software worked
perfectly.
You must complete at least two of the four tasks listed below (2.1–2.4).
The tasks to be completed will be selected by your tutor.
Carry out both of the tasks listed below and either give a brief description of the steps you took
or attach annotated printouts or screen dumps showing the steps you took.
To create a shared directory for user profiles on my server, I carried out the following
steps:
To create a shared directory for users’ home folders, I did the following:
9. I selected Active Directory Users And Computers from the Administrative Tools
folder.
10. I right-clicked on the appropriate User and selected Properties.
11. I selected the Profile tab and selected the Connect radio button.
12. I selected the drive letter and entered the network path to the user’s home folder.
1. From File Explorer, I open the shared folder where all of my roaming user profiles
were stored (user_profiles).
2. From the Tools menu, I selected Folder Options, then selected the View tab and then
the Show Hidden Files and Folders option.
3. I selected the directory of the user that I wanted to change to a mandatory profile
and renamed the Ntuser.dat file to Ntuser.man.
Carry out any three of the six tasks listed below and either give a brief description of the steps
you took or attach annotated printouts or screen dumps showing the steps you took.
I wanted to add Fred’s address to his account details, so I managed the user account as
follows:
1. I opened Advanced Directory Users and Computers as above and selected Fred’s
account.
2. I clicked the View button on the menu bar and selected Advanced from the drop-down
menu.
3. I clicked on the Address tab and added Fred’s details including: Street Name, City,
State, Zip Code and Country, then clicked OK to finish.
Tools | Active Directory Users and Computers) and right-clicked the domain where I
wanted to create a computer account.
2. I click New from the pop-up menu, clicked Computer from the pop-up menu and typed
the name for the computer account (Workstation2) in the Computer name field.
3. I selected the the built-in Domain Admins group as the group that can join the PC to
the domain and clicked Next to continue.
4. I again clicked Next to continue. This gave me the summary window, where I clicked
Finish to create the account. The final screen showed the newly created computer
account.
I wanted to add the name of the workstation’s owner to the description in the computer
account details, so I managed the computer account as follows:
You must complete at least two of the three tasks listed below (3.1–3.3).
The tasks to be completed will be selected by your tutor.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
3.1.1 Configure access to shared folders and manage shared folder permissions
1. I clicked on My Computer, then clicked on the icon for the C: drive and created a new
folder by selecting File | New | Folder and giving it the name SharedDocs.
2. I thern right-clicked the folder icon, chose Properties from the pop-up menu and
selected the Sharing tab which allowed me enable and disable the share for the folder
and set the permissions on the share.
3. I shared the folder, limited the number of concurrent users to 5 and entered a
description of “Joe’s Shared files”
4. I set permissions by clicking the Permissions button in the Shared Properties window
which opened the Permissions window for the folder. By default, the Everyone group
had Read permission assigned to it.
5. I changed this to Full Control then clicked on OK to apply the permissions. I clicked
OK again in the Shared Properties window to finish the task.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
3.3.1 Configure file system permissions, verify effective permissions and change
ownership of files and folders
♦ Windows Server 2003 (Standard Edition) was installed as Server1 and configured as
a domain controller in the coatbank.com domain.
♦ Two first-level organisational units (OUs) were set up: Security Groups and Staff.
♦ The Domain Users group was made a member of Print Operators.
♦ Five domain local security groups were set up in the Security Groups OU: Project1,
Project2, Engineers, Managers and Contractors.
♦ User accounts were set up in the Staff OU for Joe Bloggs, Fred Smith and Jane
Gray, with Joe Bloggs belonging to the Engineers, Contractors and Project1 groups,
Fred Smith belonging to the Engineers and Project1 groups and Jane Gray
belonging to the Managers and Project1 groups.
Users in the Project1 Can read data, add files and folders and have Full Control
of the files and folders they create.
Managers Can read and modify all files, but cannot delete any files
that they did not create. Full Control of the files and
folders they create.
5. When I had configured these I clicked Apply, clicked Advanced and ensured that
Allow inheritable permissions … was not checked. This ensured that users outwith the
Project1 group would not be able to read files in the Project1 folder.
6. All user accounts for contractors are members of the Contractors group and do not
belong to any other group in the domain. No further steps need to be taken to ensure
that they cannot access files in the Project1 folder as they do not have permissions
given to them by the current ACL that would allow any resource access.
7. Some user accounts, e.g. Joe Bloggs, belong to both the Contractors and the Engineers
groups. In this case it was necessary to assign Deny permissions to the Contractors
group. Because they will receive Allow permissions assigned to other groups,
these must be overridden so I configured the folder to Deny Contractors Full Control.
1. I opened the Advanced Security Settings dialog box for the Project1 folder by
opening the folder’s Properties, clicking Security, then clicking Advanced.
2. I clicked Effective Permissions.
3. I selected each of the following users and verify their permissions.
Fred Smith Traverse Folder, Execute File, List Folder, Read Data, Read Attributes,
Read Extended Attributes, Create Files, Write Data, Create Folders,
Append Data, Read Permissions
Jane Gray Traverse Folder, Execute File, List Folder, Read Data, Read Attributes,
Read Extended Attributes, Create Files, Write Data, Create Folders,
Append Data, Write Attributes, Write Extended Attributes, Read
Permissions
Change Ownership
You must complete at least three of the six tasks listed below (4.1–4.6).
The tasks to be completed will be selected by your tutor.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.1.1 Carry out monitoring, using counter logs, trace logs and alerts
5. I then I clicked OK to exit the dialog box, create the log file and record the activities
for the counter specified.
5. I then clicked OK to exit the dialog box, create the log file and record the activities
for the counter specified.
Creating an Alert
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.5.1 Monitor and optimise server memory, network usage, processor usage and disk
performance and use counters and thresholds
Server Memory
4. I clicked the Close button and a graph appeared showing how the computer’s memory
was being used.
5. To generate some activity I selected Start | Help and Support, closed it and then
opened it again. The first time I opened Help and Support the Memory>Pages/Sec
counter spiked, but the second time I accessed it the spike was much lower, because
the program was already in memory and didn’t need to be fetched from disk.
6. I checked the Paging>%Usage counter. This was below 99% so there was no excessive
paging.
7. I checked the Memory>Available Mbytes counter. This was above 4MB, so I had
sufficient RAM.
Network Usage
1. System Monitor was already open from the previous task, so I clicked the Add button
on the toolbar.
2. In the Add Counters dialog box I selected the following performance objects and
counters:
♦ I selected Network Interface from the Performance Object drop-down list,
selected Bytes Total/Sec from the counter list box and clicked the Add button.
♦ I selected TCPv4 from the Performance Object drop-down list, selected
Segments/Sec from the counter list box and clicked the Add button.
3. I clicked the Close button and these counters were added to my graph.
4. To generate some activity I copied some files between my server and a workstation.
5. I noted the Network Interface > Bytes Total/Sec and TCPv4 > Segments/Sec
counters.
6. I copied more files and noted the counters again. The values had increased as these
counters are cumulative.
Processor Usage
1. System Monitor was already open from the previous task, so I clicked the Add button
on the toolbar.
2. In the Add Counters dialog box I selected the following performance object and
counter:
♦ I selected Processor from the Performance Object drop-down list, selected
Interrupts/Sec from the counter list box and clicked the Add button.
3. I clicked the Close button and this counter was added to my graph. The Processor >
%Processor Time counter was added by default.
4. I noted the Processor > %Processor Time counter. This counter’s average was below
85%, indicating that there was no processor bottleneck.
5. I noted the Processor > Interrupts/Sec counter. This counter’s average was below
1000, indicating that there was nothing generating excessive interrupts.
Disk Activity
1. System Monitor was already open from the previous task, so I clicked the Add button
on the toolbar.
2. In the Add Counters dialog box I selected the following performance objects and
counters:
♦ I selected Physical Disk from the Performance Object drop-down list, selected
%Disk Time from the counter list box and clicked the Add button.
♦ I selected Physical Disk from the Performance Object drop-down list, selected
Current Disk Queue Length from the counter list box and clicked the Add
button.
3. I clicked the Close button and these counters were added to my graph.
4. To generate some activity I opened and closed some applications and copied some files
between my server and a workstation.
5. I noted the Physical Disk > %Disk Time counter. This counter’s average was below
90%, indicating that there were no excessive requests being generated for this disk.
I noted the Physical Disk > Current Queue Length counter. This counter’s average was
below 2, indicating that there were no excessive requests being generated for this disk.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
4.6.1 Use IIS to set up a Web Site, an FTP server or an SMTP server
You must complete at least three of the five tasks listed below (5.1–5.5).
The tasks to be completed will be selected by your tutor.
Carry out at least two of the four tasks listed below and either give a brief description of the steps you
took or attach annotated printouts or screen dumps showing the steps you took.
1. I started the Backup Utility by clicking Start | All Programs | Accessories | System
Tools | Backup.
2. The Backup or Restore Wizard opened. I clicked the text link on the Welcome screen
labeled Advanced Mode. This closed the wizard and opened the Backup Utility. I then
clicked the tab labeled Backup and clicked New on the Job menu.
3. In the left pane of the Backup tab, I selected the C: drive. This changed the display in the
right pane to shows the contents of the C: drive.
4. I scrolled through the contents of the C: drive and selected the files I wanted to back up
by clicking the check box beside each file or folder.
5. I also clicked the check box beside System State to indicate that I wanted the System
State Data included in the backup.
6. In the Backup Destination drop-down menu, I accepted the default of backing up to a file.
7. In the Backup Media or File Name text box, I entered the path and filename for the
backup file as C:\backup.bkf.
8. From the Tools menu, I clicked Options and then clicked the General tab and ensured that
the Verify data after the backup completes check box was checked.
9. I clicked the Backup Type tab and selected Normal as the type of backup to perform.
10.I clicked the Backup Log tab and clicked the option labeled Detailed. This provided a
detailed log of the files being backed up.
11.I clicked OK to exit the dialog box, then clicked the Start Backup button.
12.When the Backup Job Information dialog appeared, I accept the default values and clicked
the Start Backup button to begin the backup job.
5.1.2 Use the following system recovery tools: Automated System Recovery (ASR) and the
Recovery Console.
1. I selected Start | All Programs | Accessories | System Tools | Backup and clicked the
Advanced Mode link to open the main Backup utility screen.
2. I clicked the Automated System Recovery Wizard button on the Welcome tab. The
Automated System Recovery Preparation Wizard started and I clicked the Next button.
3. The Backup Destination page appeared. I specified the D: drive as the location of my
backup media and clicked the Next button. I waited for almost half-an-hour as the system
partition was backed up, then clicked the Finish button.
4. The Backup Utility dialog appeared and I was prompted to insert a blank floppy disk into
drive A:. I did this, then clicked the OK button.
5. I was then prompted to remove the floppy disk and label it Windows Automated System
Recovery Disk for Backup.bkf created mm/dd/yyyy at hh:mm. I labelled the disk and
1. I booted my computer using the Windows Server 2003 CD and pressed F2 when prompted
to initiate the recovery process. I was then prompted to insert the ASR floppy disk and
press any key.
2. The system reformatted the C: drive automatically and the Automated System Recovery
Wizard began an installation process similar to the initial Windows Server 2003
installation.
3. After the Windows Server 2003 files were copied to the hard drive the computer
rebooted and the Windows Server 2003 setup procedure continued.
4. During this procedure the Automated System Recovery Wizard prompted for the backup
location. I selected the correct backup location to complete the wizard and continue with
the setup process.
5. At the end of the Automated System Recovery process, the Backup utility opened
automatically and restored the system.
Recovery Console
1. I inserted the Windows Server 2003 installation CD into the CD-ROM drive (D:) of my
server.
2. I clicked Run on the Start menu and when the Run command box appeared, I typed
D:/I386/Winnt32.exe /cmdcons.
3. A message box appeared asking if I would like to install the Recovery Console. I clicked
Yes.
4. Windows Setup started and began installing the Recovery Console. When this completed,
another message box appeared informing me that the Recovery Console was installed. I
clicked OK to exit the message box and restarted the server.
5. After the restart, a menu appeared, asking which operating system I would like to start:
Windows Server 2003 or the Microsoft Windows Recovery Console. I used the up and
down arrow keys to select Recovery Console, and then pressed Enter.
6. After Recovery Console started, a command-line interface appears on the screen, enabling
me to enter commands at the prompt.
7. I typed MAP to view a list of drive mappings.
8. I typed MORE C:\BOOT.INI to view the contents of the BOOT.INI file.
9. I typed LISTSVC and a list of available services and drivers was displayed on the screen.
10. I pressed the spacebar to scroll through the list until I reached the end of the list and the
command prompt appeared again.
11. At the prompt, type EXIT to exit the Recovery Console.
Carry out the task listed below and either give a brief description of the steps you took or attach
annotated printouts or screen dumps showing the steps you took.
5.4.1 Documentary evidence that the candidate can use system tools to restore backup data
1. I ran the Backup Utility program and clicked the Advanced Mode link.
2. I clicked the Restore and Manage Media tab, expanded the media item that I wanted
to restore from and then expand the backup set.
3. I marked the check box for each drive, folder, or individual file that I wanted to
restore.
4. From the Restore Files to drop-down list box, I selected that I wanted restored files
to be copied to the Original Location.
5. I clicked the Start Restore button to begin the restore operation.
6. When the Confirm Restore message box appeared, I clicked the Advanced button to
specify advanced restore options.
7. From the Advanced Restore Options dialog box I ensured that the Restore Security
check box was marked to restore NTFS security settings for restored files and
folders.
8. I clicked OK to save the advanced restore options settings and then clicked OK to
begin restoring the data.
9. The Restore Progress window kept me updated on the progress of the restore job and
notified me when the restore is finished. I clicked the Report button to view the
Restore Report log.
10. Finally I clicked the Close button to finish the restore operation.
Carry out the task listed below and either give a brief description of the steps you took or
attach annotated printouts or screen dumps showing the steps you took
5.5.1 Documentary evidence that the candidate can use system tools to schedule backup
jobs
1. I started the Backup Utility by clicking Start | Programs | Accessories | System Too
| Backup.
2. In the Welcome part of the to the Backup or Restore Wizard window, I clicked the
Advanced Mode link.
3. From the Welcome tab in Advanced Mode, I clicked the Backup tab, rather than using
the Backup Wizard (Advanced), for greater control over the backup process.
4. From the Backup tab, I selected the folders and files that I wanted to back up.
5. From the drop-down list box I selected D:/Backup.bkf as the Backup Destination.
6. I clicked Start Backup to enter descriptions and choose options for the Backup Job
Information dialog box, then clicked the Schedule button.
7. I clicked Yes when prompted to save the backup selections.
8. At the Set Account Information dialog box, I accepted the logged-on user account name
and typed and confirmed the password, then clicked OK.
9. In the Scheduled Job Options dialog box, I typed ShugsBackup in the Job Name box.
10. I clicked the Backup Details tab to view a summary of the details and options configured
11. I clicked on the Schedule Data tab and clicked the Properties button to schedule the
job.
12. I clicked OK to save the schedule settings. The scheduled backup job appeared on the
calendar for the Scheduled Jobs tab for each time that it was scheduled to run.
Assessment checklists
Class Group
Candidate Candidate
Name Number
Outcomes 1–5
Evidence Requirements Record of Performance
Satisfactory/ Comments
Unsatisfactory
Assessment Task 1
Overall comments:
Class Group
Candidate Candidate
Name Number
Outcomes 1–5
Evidence Requirements Record of Performance
Satisfactory/ Comments
Unsatisfactory
Assessment Task 2
Overall comments:
Class Group
* Mark as appropriate