ITIL Sample Test 3 Notes Flashcards

1
Q

The security enforcement lifecycle model is

A

Threat, Incident, Damage, Control. In the event a security incident occurs, it must first be detected; subsequent measures to repress or minimize the damage are then taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ changes are non-emergency changes.

A

Normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Minor normal changes are handled by the _____ _____.

A

Change Mananger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Significant normal changes are approved by the _____ _____ _____.

A

Change Advisor Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Major normal changes are approved by the _____ _____ _____.

A

IT Management Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of analysis must be conducted before implementing a security measure?

A

Cost-Benefit Analysis
A cost-benefit analysis must be conducted before implementing a security measure, to ensure the measure is appropriate for both the threat risk and potential loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The processes that support _____ _____ are Event Management, Incident Management, Problem Management, Request Management, and Access Management.

A

Support Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is important that the _____ _____ function be made up of both support and design staff to ensure that a quality, supportable design is implemented. (Specialist Technical Architects and Designers and Specialist Maintenance and Support Staff

A

Technical Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____/_____ Contraints such as bandwidth throttling and session timeouts, and _____ Constraints such as penalties for usage in excess of base levels are methods for controlling demand and usage of services.

A

Physical/Technical

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ _____ is carried out in the Service Design, Service Operation, and CSI phases.

A

Supplier Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plans used to record all improvement actions and plans agreed upon between suppliers and service providers.

A

Supplier Service Improvement Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which role is responsible for ensuring SLA targets for incident resolution are met?

A

Incident Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Service Level Management processes are found within which two lifecycle phases?

A

Service Design and CSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Service Desk, Technical Management, Application Management, and IT Operations Management are _____ _____ operation functions. Event Management is a _____ _____ process.

A

Service Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Process Model

A

Threat, Incident, Damage, Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ ____ are intended to handle and log large volume of calls, and typically have low resolution rates on the first customer contact. Calls are usually routed to more specialized staff for resolution.

A

Call Centers