Which process is responsible for managing relationships with vendors?
Which process is responsible for managing relationships with vendors?
What is the purpose of the second step, authentication?
In most organizations, access to the computer or the network is granted only after the user
has entered a correct username and password. This process consists of 3 steps:
identification, authentication and authorization. What is the purpose of the second step,
authentication?
Which of the following service desk organizational structures are described in service operation?
Which of the following service desk organizational structures are described in service operation?
1. Local service desk
2. Virtual service desk
3. IT help desk
4. Follow the sun
Which of these is not malicious software?
Which of these is not malicious software?
What are the categories of event described in the UIL service operation book?
What are the categories of event described in the UIL service operation book?
What is an example of an intentional human threat?
Some threats are caused directly by people, others have a natural cause. What is an
example of an intentional human threat?
What would you call the groups of people who have an interest in the activities, targets, resources and delive
What would you call the groups of people who have an interest in the activities, targets, resources
and deliverables from service management?
What is the definition of the Annual Loss Expectancy?
What is the definition of the Annual Loss Expectancy?
Which of the following are the MAIN objectives of incident management?
Which of the following are the MAIN objectives of incident management?
1. To automatically detect service-affecting events
2. To restore normal service operation as quickly as possible
3. To minimize adverse impacts on business operations
What is the most important reason for applying segregation of duties?
What is the most important reason for applying segregation of duties?