The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Develop design for an enterprise network.
|
|
OHS processes and procedures for a given work area are identified, obtained and understood. Completed |
Evidence:
|
The extent of the network to be designed is determined from design brief and/or in consultation with appropriate persons. Completed |
Evidence:
|
Business requirements of the enterprise are analysed taking into account existing and projected business model, organisational and Information Technology management structures. Completed |
Evidence:
|
Consideration is given to factors that will have an impact on the design such as business priorities, growth, growth strategy, regulatory framework, risk, and cost. Completed |
Evidence:
|
Existing and planned technical and environment goals of the enterprise are evaluated and documented. (See Note 1) Completed |
Evidence:
|
Consideration is given to technical factors that will have an impact on the design. (See Note 2) Completed |
Evidence:
|
Client access and end-user needs and usage patterns and disaster recovery requirements are evaluated and documented. Completed |
Evidence:
|
Design specification is written using information obtained from the analysis and evaluations of enterprise business and technical requirements. Completed |
Evidence:
|
Network specification is presented and discussed with person(s) of higher authority. Completed |
Evidence:
|
Alterations to the network specification resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy. Completed |
Evidence:
|
Design an enterprise network.
|
|
Knowledge and complexities of alternative network infrastructures and currently available technologies are applied to network design. (See Note 3) Completed |
Evidence:
|
Network design is developed to incorporate all required Wide Area Network (WAN) infrastructure, Internet connectivity and implementation and management strategies. Completed |
Evidence:
|
Risk management strategies are sought and obtained for incorporating into the network design. Completed |
Evidence:
|
Network design is reviewed against all inputs and adjusted to rectify any anomalies. Completed |
Evidence:
|
Network design proposal is documented in accordance with organisation policies and procedures. Completed |
Evidence:
|
Network design is presented and discussed with person(s) of higher authority. Completed |
Evidence:
|
Alterations to the network design resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy. Completed |
Evidence:
|
Final design is documented and approval obtained from appropriate person(s). Completed |
Evidence:
|
Implement and manage an enterprise network.
|
|
OHS risk control measures and procedures for carrying out the work are followed. Completed |
Evidence:
|
Server and client computer hardware are installed and configures in compliance with design specifications and network industry standards. (See Note 4) Completed |
Evidence:
|
User and Group objects are created and group policy implemented. (Notes 5 and 6) Completed |
Evidence:
|
Directory services, data storage, shared resources Internet information services, remote access and network security are managed to ensure effective operation of the network. (Notes 7 to 11) Completed |
Evidence:
|
Approaches to issues/problems are analysed to provide most effective solutions. Completed |
Evidence:
|
Quality of work is monitored against personal performance agreement and/or established organisational or professional standards. Completed |
Evidence:
|
Diagnose network malfunctions.
|
|
OHS risk control measures and procedures for carrying out the work are followed. Completed |
Evidence:
|
Network operation is monitored and malfunctions are diagnosed to ascertain their cause using network diagnostic tools. (Note 12) Completed |
Evidence:
|
Network malfunctions are rectified using effective techniques and drawing knowledge of network topology and complexities of network interactivity. Completed |
Evidence:
|
Approaches to issues/problems are analysed to provide most effective solutions. Completed |
Evidence:
|
Quality of work is monitored against personal performance agreement and/or established organisational or professional standards. Completed |
Evidence:
|
Report network management activities.
|
|
Written justification is produced for enterprise network services solutions and forwarded to appropriate person/s in accordance with established procedures. Completed |
Evidence:
|
Network service development records are maintained in accordance with established procedures. Completed |
Evidence:
|
Notes. |
|
Completed |
Evidence:
|
Examples are company size, user and resource distribution, various site connectivity, bandwidth, service performance, availability and scalability, data and system access patterns, network roles and responsibilities and security considerations |
|
Completed |
Evidence:
|
Examples are currently available resources, services, network infrastructure, protocols and hosts, Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network and systems management. |
|
Completed |
Evidence:
|
Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy, Design of name resolution services, Multi-protocol strategy and Distributed File Strategy |
|
Completed |
Evidence:
|
Hardware installation includes using qualified tools, driver signing options, digital signatures on driver files and systems support for legacy hardware devices. |
|
Completed |
Evidence:
|
Example of user and group objects are computer accounts, groups configuring accounts via a directory service, searching for objects, use of templates for creating user accounts and resetting accounts |
|
Completed |
Evidence:
|
Examples of group policy implementation are deploying software, updates and assigning and publishing applications. |
|
Completed |
Evidence:
|
Examples of directory services are publishing resources, performing searches and configuring printer objects |
|
Completed |
Evidence:
|
Examples of data storage are NTFS and FAT file systems such as New Technology File Systems (NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and basic and dynamic disks, file and folder permissions and compression and domain-based distributed file systems. |
|
Completed |
Evidence:
|
Examples of shared resources are folders, web sharing, folder permissions, printers and printer permissions. |
|
Completed |
Evidence:
|
Examples of Internet Information Services are virtual directories and servers, Internet and intranet browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and access permissions for intranet server |
|
Completed |
Evidence:
|
Examples of Network security are user account lockout settings, password management, Group Policy to run logon scripts and link objects, auditing and security log file. |
|
Completed |
Evidence:
|
Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name resolution, starting servers, client computers, User and group objects, directory service replication problems, End-User Group Policy and remote access. |
|
Completed |
Evidence:
|