The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Maintain physical security
|
|
Maintain physical security to ensure the safeguarding of official matters. Completed |
Evidence:
|
Report breaches of physical security to appropriate personnel. Completed |
Evidence:
|
Maintain communications security
|
|
Protect classified and sensitive material as it is passed over communications paths. Completed |
Evidence:
|
Handle classified and cryptographic material. Completed |
Evidence:
|
Document and report security violations. Completed |
Evidence:
|
Maintain information system security
|
|
Protect information systems media, assets and data. Completed |
Evidence:
|
Record and report breaches of security. Completed |
Evidence:
|
Maintain personnel security
|
|
Apply personnel security principles to protect against the threat of subversion, sabotage and espionage. Completed |
Evidence:
|
Record and report breaches of security. Completed |
Evidence:
|
Maintain physical security
|
|
Maintain physical security to ensure the safeguarding of official matters Completed |
Evidence:
|
Report breaches of physical security to appropriate personnel |
|
Completed |
Evidence:
|
Maintain communications security
|
|
Protect classified and sensitive material as it is passed over communications paths Completed |
Evidence:
|
Handle classified and cryptographic material |
|
Completed |
Evidence:
|
Document and report security violations |
|
Completed |
Evidence:
|
Maintain information system security
|
|
Protect information systems media, assets and data Completed |
Evidence:
|
Record and report breaches of security |
|
Completed |
Evidence:
|
Maintain personnel security
|
|
Apply personnel security principles to protect against the threat of subversion, sabotage and espionage Completed |
Evidence:
|