Pass4itsure > EXIN > EXIN Inc Certification > ITSM20F.EN > ITSM20F.EN Online Practice Questions and Answers

ITSM20F.EN Online Practice Questions and Answers

Questions 4

What has to be included in a well defined process?

A. Expected outcomes

B. Functions

C. Statistical support

D. Timelines

Buy Now
Questions 5

Deming proposed a system of continuous improvement. Which four activities does this system involve?

A. Plan. Do. Check and Act

B. Plan. Do. Evaluate and Act

C. Plan. Perform. Audit and Improve

D. Plan. Perform. Evaluate and Act

Buy Now
Questions 6

What does the term "Integrity" mean in the context of Information Security Management?

A. Protecting the information against unauthorized use

B. Monitoring the access to information

C. The accuracy, completeness and correctness of the information

D. Screening the support staff on their loyalty to the IT organization

Buy Now
Questions 7

A Change leads to a modification of an IT element. Which of the following terms best describes the element being modified?

A. A developed application

B. A Configuration Item

C. A Service

D. A deployed infrastructure

Buy Now
Questions 8

In many organizations, management tasks or parts of those tasks are performed t>y third parties.

Agreements are made with these parties that are expressed in contracts.

What are these contracts called?

A. Service Level Agreements (SLAs)

B. Operational Level Contracts

C. Service Contracts

D. Underpinning Contracts

Buy Now
Questions 9

One of the responsibilities of Release Management is to ensure that the master copies of software are stored in a secure location. What is the name of this location?

A. Capacity Database

B. Configuration Management Database (CMDB)

C. Definitive Software Library (DSL)

D. Software Distribution Library

Buy Now
Questions 10

Which processes should the Plan, Do, Check, Act methodology be applied to?

A. all of the processes within the scope

B. the Planning and Implementing Service Management process

C. the Requirements for a Management System process

D. those that support business critical services

Buy Now
Questions 11

When can the building and testing of a Change begin?

A. As soon as the impact analysis has been discussed by the members of the Change Advisory Board

B. As soon as there is a correct network plan for the change

C. As soon as the Request for Change (RFC) has been formally authorized

D. As soon as the Request for Change (RFC) has been classified

Buy Now
Questions 12

Due to excessive workload, the Desktop Support group has been unable to meet their agreed service levels. One of the major contributing factors is the time being spent in direct communication with users. Which Process or Function can help to alleviate some of this workload?

A. Incident Management

B. Problem Management

C. Service Desk Service

D. Level Management

Buy Now
Questions 13

What is the objective of the Security Management process?

A. to manage information security effectively for critical services only

B. to manage information security effectively for IT staff

C. to manage information security effectively relating to the financial administration of service activities

D. to manage information security effectively within all service activities

Buy Now
Exam Code: ITSM20F.EN
Exam Name: IT Service Management Foundation based on ISO/IEC 20000
Last Update: Apr 25, 2024
Questions: 136
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99