ITIL Sample Test 3 Notes Flashcards
The security enforcement lifecycle model is
Threat, Incident, Damage, Control. In the event a security incident occurs, it must first be detected; subsequent measures to repress or minimize the damage are then taken.
_____ changes are non-emergency changes.
Normal
Minor normal changes are handled by the _____ _____.
Change Mananger
Significant normal changes are approved by the _____ _____ _____.
Change Advisor Board
Major normal changes are approved by the _____ _____ _____.
IT Management Board
What type of analysis must be conducted before implementing a security measure?
Cost-Benefit Analysis
A cost-benefit analysis must be conducted before implementing a security measure, to ensure the measure is appropriate for both the threat risk and potential loss.
The processes that support _____ _____ are Event Management, Incident Management, Problem Management, Request Management, and Access Management.
Support Operation
It is important that the _____ _____ function be made up of both support and design staff to ensure that a quality, supportable design is implemented. (Specialist Technical Architects and Designers and Specialist Maintenance and Support Staff
Technical Management
_____/_____ Contraints such as bandwidth throttling and session timeouts, and _____ Constraints such as penalties for usage in excess of base levels are methods for controlling demand and usage of services.
Physical/Technical
Financial
_____ _____ is carried out in the Service Design, Service Operation, and CSI phases.
Supplier Management
Plans used to record all improvement actions and plans agreed upon between suppliers and service providers.
Supplier Service Improvement Plans
Which role is responsible for ensuring SLA targets for incident resolution are met?
Incident Manager
Service Level Management processes are found within which two lifecycle phases?
Service Design and CSI
Service Desk, Technical Management, Application Management, and IT Operations Management are _____ _____ operation functions. Event Management is a _____ _____ process.
Service Operation
Security Process Model
Threat, Incident, Damage, Control