The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Record security access
|
|
Obtain client access requirements and clearance levels according to organisational requirements Completed |
Evidence:
|
Issue computer or network user account and password details to client Completed |
Evidence:
|
Provide security documentation and access to client Completed |
Evidence:
|
Record user account and security access details to maintain system integrity and assist later auditing Completed |
Evidence:
|
Record software licences
|
|
Determine what licensed software is used within the organisation Completed |
Evidence:
|
Maintain records of licence number and location Completed |
Evidence:
|
Check personal computers and network for illegal software Completed |
Evidence:
|
Report illegal software to appropriate person Completed |
Evidence:
|
Carry out system backup
|
|
Create or review organisational backup schedule Completed |
Evidence:
|
Complete file backups according to schedule Completed |
Evidence:
|
Label and store backups according to organisational requirements Completed |
Evidence:
|
Maintain record of backups Completed |
Evidence:
|
Restore system backup
|
|
Determine and test restore procedures according to organisational guidelines Completed |
Evidence:
|
Complete a restore under supervision of an appropriate person Completed |
Evidence:
|
Record completed restore according to organisational guidelines Completed |
Evidence:
|
Apply security access controls
|
|
Document security access as per clearance guidelines set by management Completed |
Evidence:
|
Maintain a security access register in line with organisational guidelines to record which client or groups have access to which resources Completed |
Evidence:
|
Identify the security controls on the file system provided by the operating system Completed |
Evidence:
|
Apply effective access control on files and directories Completed |
Evidence:
|