The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Ensure user accounts are controlled
|
|
Review organisation's network and security policy to ensure up-to-date knowledge and understanding of policies Completed |
Evidence:
|
Modify default and previously created user settings to ensure that they conform with organisational securitypolicy Completed |
Evidence:
|
Investigate log-on procedures for security and appropriateness and modify log-on requirements, using relevant utilities, where applicable Completed |
Evidence:
|
Review and monitor user wireless access of mobile equipment to the network where applicable Completed |
Evidence:
|
Ensure that appropriate procedures are put in place to deal with user accounts that are no longer required Completed |
Evidence:
|
Access information resources to identify and understand current, documented security gaps and their associated repair procedure Completed |
Evidence:
|
Ascertain the security repairs applicable to the current network and discuss with appropriateperson to gain approval for repair implementation Completed |
Evidence:
|
Obtain and implement the appropriate hardware and software necessary for network security repair Completed |
Evidence:
|
Secure file and resource access
|
|
Review inbuilt security and access features of the operating system and document areas for concern Completed |
Evidence:
|
Analyse the file security categorisation scheme and the role of users in setting file security, in relation to organisational securitypolicy and recommend revision, if necessary Completed |
Evidence:
|
Implement, if necessary, a process for ongoing updates of virus checking software, at server and workstation levels Completed |
Evidence:
|
Investigate and implement inbuilt or additional encryption facilities, as appropriate, to meet organisational security needs Completed |
Evidence:
|
Monitor threats to the system
|
|
Investigate the current security of the network, including physical aspects, utilising appropriate third-party testing software where applicable Completed |
Evidence:
|
Review logs and audit reports to identify and record securitythreats, intrusions or attempts Completed |
Evidence:
|
Carry out spot checks and other activities to ensure that procedures are not being bypassed Completed |
Evidence:
|
Evaluate the findings of the state of security and prepare recommendations for improvement Completed |
Evidence:
|
Prepare documentation in a report for presentation to appropriate person to gain approval for changes to be made Completed |
Evidence:
|