The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Plan advanced network server security according to business needs
|
|
Consult with client and key stakeholders to identify security requirements in an advanced network server environment Completed |
Evidence:
|
Analyse and review existing client security documentation and predict network service vulnerabilities Completed |
Evidence:
|
Research network authentication and network service configuration options and implications to produce network security solutions Completed |
Evidence:
|
Ensure features and capabilities of network service security options meet the business needs Completed |
Evidence:
|
Produce or update server security design documentation to include new solutions Completed |
Evidence:
|
Obtain sign-off for the security design from the appropriate person Completed |
Evidence:
|
Prepare for |
|
Completed |
Evidence:
|
Network server security implementation
|
|
Prepare for work in line with site-specific safety requirements and enterprise occupational health and safety (OHS) processes and procedures Completed |
Evidence:
|
Identify safety hazards and implement risk control measures in consultation with appropriate personnel Completed |
Evidence:
|
Consult appropriate person to ensure the task is coordinated effectively with others involved at the worksite Completed |
Evidence:
|
Back up server before implementing configuration changes Completed |
Evidence:
|
Configure the advanced network server security according to design
|
|
Configure update services to provide automatic updates to ensure maximum security and reliability Completed |
Evidence:
|
Configure network authentication, authorisation and accounting services to log and prevent unauthorised access to the server Completed |
Evidence:
|
Configure basic service security and access control lists to limit access to authorised users, groups or networks Completed |
Evidence:
|
Implement encryption as required by the design Completed |
Evidence:
|
Configure advanced network service security options for services and remote access Completed |
Evidence:
|
Configure the operating system or third-party firewall to filter traffic in line with security requirements Completed |
Evidence:
|
Ensure security of server logs and log servers are appropriately implemented for system integrity Completed |
Evidence:
|
Implement backup and recovery methods to enable restoration capability in the event of a disaster Completed |
Evidence:
|
Monitor and test network server security
|
|
Test server to assess the effectiveness of network service security according to agreed design plan Completed |
Evidence:
|
Monitor server logs, network traffic and open ports to detect possible intrusions Completed |
Evidence:
|
Monitor important files to detect unauthorised modifications Completed |
Evidence:
|
Investigate and verify alleged violations of server or data security and privacy breaches Completed |
Evidence:
|
Recover from, report and document security breaches according to security policies and procedures Completed |
Evidence:
|
Evaluate monitored results and reports to implement and test improvement actions required to maintain the required level of network service security Completed |
Evidence:
|