What are these four Ps?
Implementation of IT1L service management requires the preparation and planning of the effective
and efficient use of “the four Ps.”
What are these four Ps?
What is the ALE for this attack against this server?
Your organization assigns an Annual Loss Expectancy to assets during a risk analysis meeting.
You have a server which if down for a day will lose the company $35,000, and has a serious root
access attack against it once per month. What is the ALE for this attack against this server?
Which SMF provides root cause analysis?
Which SMF provides root cause analysis?
What are the IP addresses of the source and destination hosts involved in this communication?
Network Monitor was run on a Windows Server 2003. The exhibit shows the actual contents of a
Network Monitor capture file.
What are the IP addresses of the source and destination hosts involved in this communication? To
help you determine the two hosts, they have been outlined within the captured content.
identify from the list below the correct order of the Control Bits in the TCP header from the left to the righ
As per the specifications of the RFC on TCP, identify from the list below the correct order of the
Control
Bits in the TCP header from the left to the right (i.e., in the order they are sent):
When can the building and testing of a Change begin?
When can the building and testing of a Change begin?
Which of the following should IT service continuity strategy be based on?
Which of the following should IT service continuity strategy be based on?
1. Design of the service metrics
2. Business continuity strategy
3. Business impact analysis (BIA)
4. Risk assessment
Which of the following best describes the Repair Model?
Which of the following best describes the Repair Model?
Which Team role type is the accountable role type for the Deliver Phase?
Which Team role type is the accountable role type for the Deliver Phase?
From the following, select all the access list statements that are required to make this possible.
The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are
connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is
connected to the Internet.
The objective is to allow only network 192.168.20.0 to access e-commerce Web sites on the
Internet, while allowing all internal hosts to access resources within the internal network. From the
following, select all the access list statements that are required to make this possible.