The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Configure the file transfer protocol client
|
|
Review and select the file transfer protocol (FTP) client, based on features and functions Completed |
Evidence:
|
Ensure that the file transfer protocol client is suitable for the technical environment Completed |
Evidence:
|
Enter client details, including the user identity (ID), password and the host name or ID, into profile fields to create a permanent profile Completed |
Evidence:
|
Choose settings such as auto-detect, save profile, and password, depending on organisational security and privacy policy, and the organisational guidelines Completed |
Evidence:
|
Test and verify, the configuration by connecting to the web-hosting server Completed |
Evidence:
|
Plan and prepare for the data transfer
|
|
Prepare the data content, and back it up on the local computer or server Completed |
Evidence:
|
Identify data as compressed, or uncompressed, with the tools available on the server to manage uploaded data Completed |
Evidence:
|
Ensure that the files are in an appropriate form for recognition and interaction by the operating system Completed |
Evidence:
|
Ensure that the receiving directory structure is applicable for the data to be uploaded Completed |
Evidence:
|
Establish the connection to server
|
|
Log on to remote server using administrative, guest or anonymous accounts Completed |
Evidence:
|
Proceed through the security layers, based on organisational guidelines Completed |
Evidence:
|
Initiate the file transfer protocol client program and locate the destination directory Completed |
Evidence:
|
Transfer the data to a remote server
|
|
Select files to be transferred and choose the mode, American Standard Code for Information Interchange (ASCII), or binary Completed |
Evidence:
|
Run the antivirus software on the downloaded files Completed |
Evidence:
|
Move, rename, copy, and delete files on the server as necessary, and as permissions allow Completed |
Evidence:
|
Store and order files, according to requirements and file extensions Completed |
Evidence:
|
Conduct appropriate steps for downloaded files, such as translation, decompression, or de-archival of the files for use Completed |
Evidence:
|
Confirm the data transfer and content functionality, and close the connection Completed |
Evidence:
|