The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Maintain system software
|
|
Evaluate system effectiveness against organisationalrequirements and benchmarks, to determine if maintenance activities should be commenced Completed |
Evidence:
|
Use system utilisation, file and disk structure, performance reports and files to identify peak periods and possible performance problems Completed |
Evidence:
|
Monitor system data levels to determine whether system performance is consistent with predetermined standards Completed |
Evidence:
|
Troubleshoot the system, if required, with appropriate system tools Completed |
Evidence:
|
Monitor and retune the system, where applicable, to improve performance Completed |
Evidence:
|
Set up and manage the system files
|
|
Evaluate systemrequirements and monitor the appropriateness of file and folder structures Completed |
Evidence:
|
Use the appropriate administration and tools to create file and folder structures Completed |
Evidence:
|
Set security, access and sharing of file system to meet requirements Completed |
Evidence:
|
Identify the virus protection requirements of the network in line with policies and organisational requirements Completed |
Evidence:
|
Scan the system for viruses and remove detected viruses Completed |
Evidence:
|
Test the file system to ensure that appropriate access is available to the user groups Completed |
Evidence:
|
Ensure log-on scripts and custom written utilities and programs conform to organisational guidelines for simple programming constructs Completed |
Evidence:
|
Document the file system created in accordance with organisational guidelines Completed |
Evidence:
|
Monitor and manage system usage and security
|
|
Monitor user access against user access levels Completed |
Evidence:
|
Review securityrequirements for user and data to be stored on network Completed |
Evidence:
|
Determine risks that data is exposed to, and formulate appropriate prevention and recovery processes Completed |
Evidence:
|
Implement a system to provide back-up and to restore services in the event of a disaster Completed |
Evidence:
|
Document disaster recovery procedures Completed |
Evidence:
|
Carry out system backup
|
|
Confirm the back-up schedule meets organisationalrequirements Completed |
Evidence:
|
Ensure system back-ups are completed according to organisational, scheduling and system requirements Completed |
Evidence:
|
Ensure that a secure off-site location for the storage of back-up media is provided and used Completed |
Evidence:
|
Ensure system back-ups are recorded according to organisational requirements Completed |
Evidence:
|
Restore system backup
|
|
Ensure system restores are completed when required for system recovery or testing according to organisationalguidelines Completed |
Evidence:
|
Optimise the restored system according to organisationalrequirements Completed |
Evidence:
|
Ensure system restores are documented according to organisational requirements Completed |
Evidence:
|