The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Review network policies
|
|
Review organisational policies for network use and administration arrangements Completed |
Evidence:
|
Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisationalpolices Completed |
Evidence:
|
Determine and document settings and parameters that should be used in order to meet policies and procedures Completed |
Evidence:
|
Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools Completed |
Evidence:
|
Create an interface with existing system
|
|
Identify and document the current system and components and configuration through audits of hardware and software Completed |
Evidence:
|
Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed Completed |
Evidence:
|
Examine existing applications and plan required upgrades/reconfigurations to new system or applications Completed |
Evidence:
|
Test reconfiguration for successful interface with existing system Completed |
Evidence:
|
Set up and manage the network file system
|
|
Evaluate the network requirements of the user and design an appropriate file and folder structure Completed |
Evidence:
|
Create the designed file and folder structure using appropriate administration and system tools Completed |
Evidence:
|
Set the security, access and sharing of file system to meet user requirements Completed |
Evidence:
|
Identify and implement the virus protection requirements for the network in line with organisational procedures Completed |
Evidence:
|
Test the file system to ensure that appropriate access is available to the user groups Completed |
Evidence:
|
Document the created file system in accordance with organisational standards Completed |
Evidence:
|
Manage user services
|
|
Evaluate the network requirements of the user and design an appropriate set of services that should be provided Completed |
Evidence:
|
Implement the services required by using the appropriate administration and system tools Completed |
Evidence:
|
Create users and groups as required to facilitate user security and network access in accordance with user authorisation Completed |
Evidence:
|
Test successful access by users to authorised network data and resources and record outcomes Completed |
Evidence:
|
Monitor user accounts
|
|
Modify default user settings to ensure that they match security policies Completed |
Evidence:
|
Modify existing user settings for non-compliant security according to security and access policies Completed |
Evidence:
|
Check that appropriate legal notices at log on are displayed Completed |
Evidence:
|
Use appropriate utilities to check strength of passwords Completed |
Evidence:
|
Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted Completed |
Evidence:
|
Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software Completed |
Evidence:
|
Provide and support backup security
|
|
Scan and, if required, clean the network of viruses before back-up Completed |
Evidence:
|
Review security requirements for users and data to be stored on network Completed |
Evidence:
|
Determine risks to which data is exposed and provide appropriate prevention and recovery processes Completed |
Evidence:
|
Implement systems to provide back-up and service restoration capability in the event of a disaster Completed |
Evidence:
|
Document and disseminate the disaster recovery procedures Completed |
Evidence:
|