The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Record security access
|
|
Obtain client access requirements and clearance levels according to organisational requirements Completed |
Evidence:
|
Issue computer or network user account and password details to client Completed |
Evidence:
|
Provide security documentation and access to client Completed |
Evidence:
|
Record user account and security access details to maintain system integrity and assist later auditing Completed |
Evidence:
|
Record software licences
|
|
Determine what licensed software is used within the organisation Completed |
Evidence:
|
Maintain records of licence number and location Completed |
Evidence:
|
Check personal computers and network for illegal software Completed |
Evidence:
|
Report illegal software to appropriate person Completed |
Evidence:
|
Carry out system backup
|
|
Create or review organisational back-up schedule Completed |
Evidence:
|
Complete file back-ups according to the schedule Completed |
Evidence:
|
Label and store back-ups according to organisationalrequirements Completed |
Evidence:
|
Maintain records of back-ups Completed |
Evidence:
|
Restore system backup
|
|
Determine and test restore procedures according to organisational guidelines Completed |
Evidence:
|
Complete a restore under supervision of an appropriateperson Completed |
Evidence:
|
Record completed restore according to organisationalguidelines Completed |
Evidence:
|
Apply security access controls
|
|
Document security access as per clearance guidelines set by management Completed |
Evidence:
|
Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources Completed |
Evidence:
|
Identify the security controls on the file system provided by the operating system Completed |
Evidence:
|
Apply effective access control on files and directories Completed |
Evidence:
|