SlideShare a Scribd company logo
1 of 1
ACF.CW.LA1.S01.1
LEMBAGA PEPERIKSAAN
KEMENTERIAN PELAJARAN MALAYSIA
ASSESSMENT CHECKLIST FORM
LEARNING AREA: INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
Name of Candidate
IC No
Index No
Construct : S01 Computer Security Measures
Aspect : LA1.S01.1 Apply Correct Security Procedures Using Antivirus
Instrument : Demonstration
Assessment : 1 / 2 / 3
No.
Criterion
Maximu
mMark
Evidence
(to be filled by candidate if
necessary)
Mark Obtained Remarks
by
assessorH1 H2 H3
1. Choose antivirus software to be used.
Write the name of the antivirus
software.
1
1
H1
H2
H3
2. Start the antivirus software and select
area to be scanned.
State the area selected.
1
1
H1
H2
H3
3. Scan the selected area.
Copy scan summary.
1
1
H1
H2
H3
4. Choose and apply any or all of the
following when virus is detected –
delete/remove, clean/heal,
quarantine/move to vault.
State action taken.
1
1
H1
H2
H3
8 Total Mark
Actual Mark
Date
Candidate’s Signature
------------------------------
Assessor’s Signature
----------------------------------
Name :

More Related Content

What's hot

Installation Automation Tool - springer conference(ITool)
Installation Automation Tool - springer conference(ITool)Installation Automation Tool - springer conference(ITool)
Installation Automation Tool - springer conference(ITool)Nvk Chaitanya
 
NetBeez Live - Anomaly detection
NetBeez Live - Anomaly detectionNetBeez Live - Anomaly detection
NetBeez Live - Anomaly detectionNetBeez, Inc.
 
A study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsA study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsUltraUploader
 
Are free Android app security analysis tools effective in detecting known vul...
Are free Android app security analysis tools effective in detecting known vul...Are free Android app security analysis tools effective in detecting known vul...
Are free Android app security analysis tools effective in detecting known vul...Venkatesh Prasad Ranganath
 
Snively Inc Safety Tracker Handheld
Snively Inc Safety Tracker HandheldSnively Inc Safety Tracker Handheld
Snively Inc Safety Tracker Handheldtruvolo
 
Continual Monitoring
Continual MonitoringContinual Monitoring
Continual MonitoringTripwire
 

What's hot (7)

Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Installation Automation Tool - springer conference(ITool)
Installation Automation Tool - springer conference(ITool)Installation Automation Tool - springer conference(ITool)
Installation Automation Tool - springer conference(ITool)
 
NetBeez Live - Anomaly detection
NetBeez Live - Anomaly detectionNetBeez Live - Anomaly detection
NetBeez Live - Anomaly detection
 
A study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsA study of anti virus' response to unknown threats
A study of anti virus' response to unknown threats
 
Are free Android app security analysis tools effective in detecting known vul...
Are free Android app security analysis tools effective in detecting known vul...Are free Android app security analysis tools effective in detecting known vul...
Are free Android app security analysis tools effective in detecting known vul...
 
Snively Inc Safety Tracker Handheld
Snively Inc Safety Tracker HandheldSnively Inc Safety Tracker Handheld
Snively Inc Safety Tracker Handheld
 
Continual Monitoring
Continual MonitoringContinual Monitoring
Continual Monitoring
 

Similar to Acf.cw.la1.s01.1

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4cikguchaen
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...CompTIA
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxsleeperfindley
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentanandeee88
 
plan for penetration test
plan for penetration testplan for penetration test
plan for penetration testhetvi naik
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Reportbtpsec
 
Software for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - NasctechSoftware for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - NasctechNasc Technologies Ltd
 
Hazard identification and risk assessment(HIRA) &Safe Work method Statement.
Hazard identification and risk assessment(HIRA) &Safe Work method Statement.Hazard identification and risk assessment(HIRA) &Safe Work method Statement.
Hazard identification and risk assessment(HIRA) &Safe Work method Statement.Yuvraj Shrivastava
 
The LMJ-Ad corporate management has been informed by the network adm.docx
The LMJ-Ad corporate management has been informed by the network adm.docxThe LMJ-Ad corporate management has been informed by the network adm.docx
The LMJ-Ad corporate management has been informed by the network adm.docxlaurieellan
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration TestingKiwiQA
 
Software for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - NasctechSoftware for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - NasctechDenis Pankratov
 
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...IRJET Journal
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System ModularityFasiul Alam
 
Hide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxHide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxsimonithomas47935
 
Usability engineering-file
Usability engineering-fileUsability engineering-file
Usability engineering-fileeko_apt
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 

Similar to Acf.cw.la1.s01.1 (20)

Acf.cw.la1.s01.1
Acf.cw.la1.s01.1Acf.cw.la1.s01.1
Acf.cw.la1.s01.1
 
Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docx
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
plan for penetration test
plan for penetration testplan for penetration test
plan for penetration test
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Malware Incident Response
Malware Incident ResponseMalware Incident Response
Malware Incident Response
 
Software for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - NasctechSoftware for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - Nasctech
 
Hazard identification and risk assessment(HIRA) &Safe Work method Statement.
Hazard identification and risk assessment(HIRA) &Safe Work method Statement.Hazard identification and risk assessment(HIRA) &Safe Work method Statement.
Hazard identification and risk assessment(HIRA) &Safe Work method Statement.
 
The LMJ-Ad corporate management has been informed by the network adm.docx
The LMJ-Ad corporate management has been informed by the network adm.docxThe LMJ-Ad corporate management has been informed by the network adm.docx
The LMJ-Ad corporate management has been informed by the network adm.docx
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
 
Software for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - NasctechSoftware for Ebola Emergency Response - Nasctech
Software for Ebola Emergency Response - Nasctech
 
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System Modularity
 
Security Testing Report Hitachi Application Q1 Sep 2015
Security Testing Report Hitachi Application Q1 Sep 2015Security Testing Report Hitachi Application Q1 Sep 2015
Security Testing Report Hitachi Application Q1 Sep 2015
 
Hide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxHide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docx
 
Usability engineering-file
Usability engineering-fileUsability engineering-file
Usability engineering-file
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 

More from Bazlin Ahmad

Template s07.1 [2015]
Template s07.1 [2015]Template s07.1 [2015]
Template s07.1 [2015]Bazlin Ahmad
 
Hsp nasa taip column i think
Hsp nasa taip column i thinkHsp nasa taip column i think
Hsp nasa taip column i thinkBazlin Ahmad
 
Bukulatihanict la1
Bukulatihanict la1Bukulatihanict la1
Bukulatihanict la1Bazlin Ahmad
 
Bukulatihanict la1
Bukulatihanict la1Bukulatihanict la1
Bukulatihanict la1Bazlin Ahmad
 
Tugas tugas komputer
Tugas tugas komputerTugas tugas komputer
Tugas tugas komputerBazlin Ahmad
 
Tmk dan kemasyarakat
Tmk dan kemasyarakatTmk dan kemasyarakat
Tmk dan kemasyarakatBazlin Ahmad
 
Perkakasan komputer
Perkakasan komputerPerkakasan komputer
Perkakasan komputerBazlin Ahmad
 
Etika & penyalahgunaan
Etika & penyalahgunaanEtika & penyalahgunaan
Etika & penyalahgunaanBazlin Ahmad
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bazlin Ahmad
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bazlin Ahmad
 
Bidang pembelajaran-1-3-tingkatan-4
Bidang pembelajaran-1-3-tingkatan-4Bidang pembelajaran-1-3-tingkatan-4
Bidang pembelajaran-1-3-tingkatan-4Bazlin Ahmad
 
Bidang pembelajaran-1-2-tingkatan-4
Bidang pembelajaran-1-2-tingkatan-4Bidang pembelajaran-1-2-tingkatan-4
Bidang pembelajaran-1-2-tingkatan-4Bazlin Ahmad
 
Bidang pembelajaran-1-1-tingkatan-4
Bidang pembelajaran-1-1-tingkatan-4Bidang pembelajaran-1-1-tingkatan-4
Bidang pembelajaran-1-1-tingkatan-4Bazlin Ahmad
 
Slot1tmk 140124182837-phpapp01
Slot1tmk 140124182837-phpapp01Slot1tmk 140124182837-phpapp01
Slot1tmk 140124182837-phpapp01Bazlin Ahmad
 

More from Bazlin Ahmad (20)

Class2
Class2Class2
Class2
 
Rf.cwla5 s11.1
Rf.cwla5 s11.1Rf.cwla5 s11.1
Rf.cwla5 s11.1
 
Template s07.1 [2015]
Template s07.1 [2015]Template s07.1 [2015]
Template s07.1 [2015]
 
Template s05.1
Template s05.1Template s05.1
Template s05.1
 
Hsp nasa taip column i think
Hsp nasa taip column i thinkHsp nasa taip column i think
Hsp nasa taip column i think
 
Cover s07.1
Cover s07.1Cover s07.1
Cover s07.1
 
Cover s05.1
Cover s05.1Cover s05.1
Cover s05.1
 
Bukulatihanict la1
Bukulatihanict la1Bukulatihanict la1
Bukulatihanict la1
 
Bukulatihanict la1
Bukulatihanict la1Bukulatihanict la1
Bukulatihanict la1
 
Virus
VirusVirus
Virus
 
Tugas tugas komputer
Tugas tugas komputerTugas tugas komputer
Tugas tugas komputer
 
Tmk dan kemasyarakat
Tmk dan kemasyarakatTmk dan kemasyarakat
Tmk dan kemasyarakat
 
Perkakasan komputer
Perkakasan komputerPerkakasan komputer
Perkakasan komputer
 
Etika & penyalahgunaan
Etika & penyalahgunaanEtika & penyalahgunaan
Etika & penyalahgunaan
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2
 
Bidang pembelajaran-1-3-tingkatan-4
Bidang pembelajaran-1-3-tingkatan-4Bidang pembelajaran-1-3-tingkatan-4
Bidang pembelajaran-1-3-tingkatan-4
 
Bidang pembelajaran-1-2-tingkatan-4
Bidang pembelajaran-1-2-tingkatan-4Bidang pembelajaran-1-2-tingkatan-4
Bidang pembelajaran-1-2-tingkatan-4
 
Bidang pembelajaran-1-1-tingkatan-4
Bidang pembelajaran-1-1-tingkatan-4Bidang pembelajaran-1-1-tingkatan-4
Bidang pembelajaran-1-1-tingkatan-4
 
Slot1tmk 140124182837-phpapp01
Slot1tmk 140124182837-phpapp01Slot1tmk 140124182837-phpapp01
Slot1tmk 140124182837-phpapp01
 

Acf.cw.la1.s01.1

  • 1. ACF.CW.LA1.S01.1 LEMBAGA PEPERIKSAAN KEMENTERIAN PELAJARAN MALAYSIA ASSESSMENT CHECKLIST FORM LEARNING AREA: INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY Name of Candidate IC No Index No Construct : S01 Computer Security Measures Aspect : LA1.S01.1 Apply Correct Security Procedures Using Antivirus Instrument : Demonstration Assessment : 1 / 2 / 3 No. Criterion Maximu mMark Evidence (to be filled by candidate if necessary) Mark Obtained Remarks by assessorH1 H2 H3 1. Choose antivirus software to be used. Write the name of the antivirus software. 1 1 H1 H2 H3 2. Start the antivirus software and select area to be scanned. State the area selected. 1 1 H1 H2 H3 3. Scan the selected area. Copy scan summary. 1 1 H1 H2 H3 4. Choose and apply any or all of the following when virus is detected – delete/remove, clean/heal, quarantine/move to vault. State action taken. 1 1 H1 H2 H3 8 Total Mark Actual Mark Date Candidate’s Signature ------------------------------ Assessor’s Signature ---------------------------------- Name :