Which of the following activities is be performed by access management?
Which of the following activities is be performed by access management?
Which process is responsible for ensuring that appropriate testing of a service or application takes place?
Which process is responsible for ensuring that appropriate testing of a service or application takes
place?
Which of the following are within the scope of service asset and configuration management?
Which of the following are within the scope of service asset and configuration management?
1. Identification of configuration items (CIs)
2.Recording relationships between CIs
3. Recording and control of virtual Cis
4. Approving finance for the purchase of software to support service asset and configuration
management
Which of the following availability management activities an?
Which of the following availability management activities an? Considered to be proactive as
opposed to reactivate
1. Monitoring system availability
2. Designing availability into a proposed solution
Which of the following is event management NOT used for?
Which of the following is event management NOT used for?
Which of the following is NOT defined as part of every process?
Which of the following is NOT defined as part of every process?
Which of the following is NOT a characteristic of a process?
Which of the following is NOT a characteristic of a process?
Customer perceptions and business outcomes help lo define what?
Customer perceptions and business outcomes help lo define what?
Which of the following questions does the guidance in service strategy help to answer?
Which of the following questions does the guidance in service strategy help to answer?
1. What services should we offer and to whom?
2. How do we differentiate ourselves from competing alternatives?
3. How do we create value for our customers?
Which core publication will you find detailed descriptions of service catalog management, information security
Which core publication will you find detailed descriptions of service catalog management,
information security and support management?