1.
Which of the following defines the level of protection in Information Security Management?
2.
Which of these would fall outside the scope of a typical service change management process?
3.
Hierarchic escalation is best described as?
4.
Which of the following is NOT a valid objective of Problem Management?
5.
There are four types of metrics that can be used to measure the capability and performance of processes. Which of the four metrics is missing from the list below? 1. Progress 2. Effectiveness 3. Efficiency 4. ?
6.
Which process is responsible for providing the rights to use an IT service?
7.
Which of the following can help determine the level of impact of a problem?
8.
Which statement should NOT be part of the value proposition for Service Design?
9.
Which of the following are objectives of Service Level Management? 1: Defining, documenting and agreeing the level of IT Services to be provided 2: Monitoring, measuring and reporting the actual level of services provided 3: Monitoring and improving customer satisfaction 4: Identifying possible future markets that the Service Provider could operate in
10.
What is the objective of Access Management?