Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Q: Which of the following could be defined as a service request?

1. "Is the service available at weekends?"

2. "How do I get training on this application?"

3. "I need this application changed to include a web interface"

4. "We have a new member of staff starting. Can you set them up on the system?"

1, 2, and 4

1, 2, and 3

3 and 4

All the answers are correct.

 

Q: Requests can be fulfilled by the following:

1. Service desk staff

2. Second-line staff

3. Service level manager

4. Business relationship manager

All the answers are correct.

1 and 3

2 and 3

1 and 2

 

Q: How is the process of access management used in the service operation stage of the service lifecycle?

Access management is used to ensure the correct people are able to use the correct systems in the correct way.

Access management is used to manage the security technology in the infrastructure.

Access management is used to maintain security controls over the business environment.

Access management is used to ensure the active directory entries are audited for accuracy.

Q: What is meant by the term request fulfillment in the ITIL framework?

Request fulfillment is a process for managing the requests from users to the IT department.

Request fulfillment is used to deliver non-IT-related business components to the users.

Request fulfillment is a means of managing the changes that users request in the IT environment.

Request fulfillment is the report produced on the number of password resets carried out by the IT department

 

Q: Which of the following processes essentially executes policies defined in IT security management?

Access management

Data management

Policy management

Event management

 

Q: Which of the following is used to filter and categorize events and to decide on appropriate actions?

Application management

Access management

Data management

Event management

 

Q: Which of the following processes is accountable for frequently occurring changes where risk and cost are low?

Incident Management

Request Fulfillment

Access Management

Release Management

 

Q: Which of the following is responsible for low risk, frequently occurring, and low cost changes?

Request Fulfillment

Demand Management

Incident Management

Deployment Management

 

Q: Which of the following is responsible for Incident Management?

Service Support

Service Desk

Service Level Management

Service Delivery

 

Q: Which of the following are types of event monitoring?

1. Passive

2. Virtual

3. Active

4. Standard

All the answers are correct.

1 and 2

2, and 3

1 and 3

 

Q: Requests must be as follows:

1. Authorized by the CAB

2. Authorized by the budget holder when an expense will be incurred

3. Authorized by technical management

4. May be preauthorized

1 only

1 and 3

2 only

2 and 4

 

Q: For which of these situations would automation by using event management not be appropriate?

1. Hierarchical escalation of incidents

2. Speeding up the processing of month-end sales figures

3. Notification of "intruder detected" to local police station

4. Running backups

1, 3, and 4

3 and 4

All the answers are correct.

2, and 3

 

Q: Event management is a key operational process in the service operation lifecycle stage.

What is the purpose of event management?

Event management monitors the infrastructure of the IT services and guarantees that no outages occur in peak times of business usage.

Event management detects events that are significant for the management of the service and ensures the appropriate actions are taken.

Event management monitors the underlying causes of failures and ensures that changes are made to prevent further failures from taking place.

Event management manages failures in the infrastructure and ensures that services are restored to normal working as quickly as possible

 

Q: Which of the following is the best description of an alert?

The unknown, underlying cause of one or more incidents

An unplanned interruption to a service

A change of state that has significance for the management of a CI

An event that notifies staff of a failure or that a threshold that has been breached

 

Q: Event management can be used to monitor which of the following?

1. Environmental conditions

2. System messages

3. Staff rosters

4. License use

2, and 3

2, and 4

All the answers are correct.

1 and 2

 

Q: The request fulfillment process is suitable for which of the following?

Common, low-risk requests with a documented fulfillment procedure

All requests, including RFCs

Only requests that have been approved by the CAB

Emergency requests for change, because the process will ensure a fast implementation

 

Q: Which of the following is the best description of a request?

A request from a user for information, advice, or a standard change, or access to an IT service

An RFC

The procurement process

A standard change

 

Q: Which of the following is the best description of access management?

Access management enables authorized access to services and data. Information security management removes or prevents access to nonauthorized staff.

Access management decides what services users should have access to.

Access management is responsible for setting security policies.

Access management grants authorized users the right to use a service, while preventing access to nonauthorized users.

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M91412665
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Business Management

National city financial services corporation information

NATIONAL CITY FINANCIAL SERVICES CORPORATION INFORMATION GOVERNANCE PROGRAM: PHASE I: Please read and familiarize yourself with the general description for your research project included in the CONTENT section of iLearn. ...

What are the challenges in implementing a healthcare

What are the challenges in implementing a Healthcare application in cloud environment? ((Need research reference links from research papers, at least 1 journal paper or 2 conference papers - The referred conference resea ...

Describe the hacker behavior why do hackers hack is it

Describe the Hacker Behavior. Why do hackers hack? Is it ethical?

What is the difference between a heroic leader and a

What is the difference between a heroic leader and a transformational leader and which of the two is best suited to work in today's business world?

Adding -ing to verbsa program similar to the morphology

Adding -ing to verbs A program similar to the morphology program for plurals discussed in class. Your program should take a single word as input, modifying it as appropriate, and adding  ing  to the end of the word. Spec ...

Aligning staffing systems with organizational strategyfirst

Aligning Staffing Systems with Organizational Strategy First, consider your firm's (Walgreens Pharmacy) orientation in regards to the Miles and Snows framework. How will the firm retrain, hire staff, or outsource to meet ...

During this stage ofnbspselecting the optimal supplier a

During this stage of  selecting the optimal supplier , a buyer will compile a list of all possible suppliers or at least a reasonable number of potential suppliers.

What should employers consider about compensation and

What should employers consider about compensation and benefits for successful recruitment of talented Gen Xers and millennials?

Question 1 systems theory integrated the ideas of the

Question 1 "Systems theory integrated the ideas of the classical and human relations' theories while contingency theory extended them."  Discuss. Question 2 "An individual's behaviour is sometimes based on their percepti ...

Suppose a firm sells 15000 units when the price is 20 but

Suppose a firm sells 15,000 units when the price is $20, but sells 25,000 units when the price falls to $14. A. Calculate the percentage change in the quantity sold over this price range using the midpoint formula. B. Ca ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As