The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Determine authentication requirements
|
|
Determine user and enterprise security requirements with reference to enterprise security plan Completed |
Evidence:
|
Identify and analyse authentication options according to user and enterprise requirements Completed |
Evidence:
|
Select the most appropriate authentication and authorisation processes Completed |
Evidence:
|
Configure authentication software or tools
|
|
Create an authentication realm and reuse as required to protect different areas of server Completed |
Evidence:
|
Add users and authorisation rules to new realm according to business needs Completed |
Evidence:
|
Describe user attributes and user attribute set-up Completed |
Evidence:
|
Set up an authentication filter and authorisation parameters on the appropriate server according to business requirements Completed |
Evidence:
|
Apply authentication methods
|
|
Develop or obtain authentication protocols as required Completed |
Evidence:
|
Develop and distribute related methods to users according to business need Completed |
Evidence:
|
Brief user on authentication system and their responsibilities according to enterprise security plan Completed |
Evidence:
|
Apply authentication system to network and user according to system product requirements Completed |
Evidence:
|
Record and store permission and configuration information in a secure central location Completed |
Evidence:
|
Monitor authentication system
|
|
Review the authentication system according to user and enterprise security and quality of service requirements Completed |
Evidence:
|
Ensure ongoing security monitoring, using incident management and reporting processes, according to enterprise security plan Completed |
Evidence:
|
Adjust authentication system if required Completed |
Evidence:
|