What has to be included in a well defined process?
A. Expected outcomes
B. Functions
C. Statistical support
D. Timelines
Deming proposed a system of continuous improvement. Which four activities does this system involve?
A. Plan. Do. Check and Act
B. Plan. Do. Evaluate and Act
C. Plan. Perform. Audit and Improve
D. Plan. Perform. Evaluate and Act
What does the term "Integrity" mean in the context of Information Security Management?
A. Protecting the information against unauthorized use
B. Monitoring the access to information
C. The accuracy, completeness and correctness of the information
D. Screening the support staff on their loyalty to the IT organization
A Change leads to a modification of an IT element. Which of the following terms best describes the element being modified?
A. A developed application
B. A Configuration Item
C. A Service
D. A deployed infrastructure
In many organizations, management tasks or parts of those tasks are performed t>y third parties.
Agreements are made with these parties that are expressed in contracts.
What are these contracts called?
A. Service Level Agreements (SLAs)
B. Operational Level Contracts
C. Service Contracts
D. Underpinning Contracts
One of the responsibilities of Release Management is to ensure that the master copies of software are stored in a secure location. What is the name of this location?
A. Capacity Database
B. Configuration Management Database (CMDB)
C. Definitive Software Library (DSL)
D. Software Distribution Library
Which processes should the Plan, Do, Check, Act methodology be applied to?
A. all of the processes within the scope
B. the Planning and Implementing Service Management process
C. the Requirements for a Management System process
D. those that support business critical services
When can the building and testing of a Change begin?
A. As soon as the impact analysis has been discussed by the members of the Change Advisory Board
B. As soon as there is a correct network plan for the change
C. As soon as the Request for Change (RFC) has been formally authorized
D. As soon as the Request for Change (RFC) has been classified
Due to excessive workload, the Desktop Support group has been unable to meet their agreed service levels. One of the major contributing factors is the time being spent in direct communication with users. Which Process or Function can help to alleviate some of this workload?
A. Incident Management
B. Problem Management
C. Service Desk Service
D. Level Management
What is the objective of the Security Management process?
A. to manage information security effectively for critical services only
B. to manage information security effectively for IT staff
C. to manage information security effectively relating to the financial administration of service activities
D. to manage information security effectively within all service activities