The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Maintain system software
|
|
Evaluate system effectiveness against organisational requirements and benchmarks to determine if maintenance activities should be commenced Completed |
Evidence:
|
Use system utilisation, file and disk structure, performance reports and files to identify peak periods and possible performance problems Completed |
Evidence:
|
Monitor system data levels to determine whether system performance is consistent with predetermined standards Completed |
Evidence:
|
Troubleshoot the system, if required, with appropriate system tools Completed |
Evidence:
|
Monitor and retune the system to improve performance Completed |
Evidence:
|
Set up and manage system files
|
|
Evaluate system requirements and monitor the appropriateness of file and folder structures Completed |
Evidence:
|
Use appropriate administration and tools to create file and folder structures Completed |
Evidence:
|
Set security, access and sharing of file system to meet requirements Completed |
Evidence:
|
Identify virus protection requirements of the network in line with policies and organisational requirements Completed |
Evidence:
|
Scan system for viruses and remove detected viruses Completed |
Evidence:
|
Test file system to ensure appropriate access is available to user groups Completed |
Evidence:
|
Ensure logon scripts and custom written utilities and programs conform to organisational guidelines for simple programming constructs Completed |
Evidence:
|
Document the file system created according to organisational guidelines Completed |
Evidence:
|
Monitor and manage system usage and security
|
|
Monitor user access against user access levels Completed |
Evidence:
|
Review security requirements for user and data to be stored on network Completed |
Evidence:
|
Determine risks that data is exposed to, and formulate appropriate prevention and recovery processes Completed |
Evidence:
|
Implement a system to provide backup and to restore services in the event of a disaster Completed |
Evidence:
|
Document disaster recovery procedures Completed |
Evidence:
|
Carry out system backup
|
|
Confirm backup schedule meets organisational requirements Completed |
Evidence:
|
Ensure system backups are completed according to organisational, scheduling and system requirements Completed |
Evidence:
|
Ensure that a secure off-site location for the storage of backup media is provided and used Completed |
Evidence:
|
Ensure system backups are recorded according to organisational requirements Completed |
Evidence:
|
Restore system backup
|
|
Ensure system restores are completed when required for system recovery or testing according to organisational guidelines Completed |
Evidence:
|
Optimise the restored system according to organisational requirements Completed |
Evidence:
|
Ensure system restores are documented according to organisational requirements Completed |
Evidence:
|