The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Ensure user accounts are controlled
|
|
Modify default user settings to ensure that they conform to security policy Completed |
Evidence:
|
Modify previously created user settings to ensure they conform to updated security policy Completed |
Evidence:
|
Ensure legal notices displayed at logon are appropriate Completed |
Evidence:
|
Check strength of passwords using the appropriate utilities and consider tightening rules for password complexity Completed |
Evidence:
|
Take action to ensure password procedures are reviewed with appropriate other internal departments Completed |
Evidence:
|
Monitor email to uncover breaches in compliance with legislation Completed |
Evidence:
|
Access information services to identify security gaps and take appropriate action using hardware and software or patches Completed |
Evidence:
|
Secure file and resource access
|
|
Review inbuilt security and access features of the operating system and consider need for further action Completed |
Evidence:
|
Develop or review the file security categorisation scheme, and develop an understanding of the role of users in setting security Completed |
Evidence:
|
Monitor and record security threats to the system Completed |
Evidence:
|
Implement a virus checking process and schedule for the server, computer and other system components Completed |
Evidence:
|
Investigate and implement inbuilt or additional encryption facilities Completed |
Evidence:
|
Monitor threats to the network
|
|
Use third-party software or utilities to evaluate and report on system security Completed |
Evidence:
|
Review logs and audit reports to identify security threats Completed |
Evidence:
|
Carry out spot checks and other security strategies to ensure that procedures are being followed Completed |
Evidence:
|
Prepare and present an audit report and recommendations to appropriate person Completed |
Evidence:
|
Obtain approval for recommended changes to be made Completed |
Evidence:
|