Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
CIS 500 CHAPTER 12 QUIZ Which of the following is used to filter and categorize events and to decide on appropriate actions? Which of the following processes is accountable for frequently occurring changes where risk and cost are low? Which of the following is responsible for Incident Management? Which of the following is responsible for low risk, frequently occurring, and low cost changes? Which of the following processes essentially executes policies defined in IT security management? The request fulfillment process is suitable for which of the following? Requests can be fulfilled by the following: 1. Service desk staff 2. Second-line staff 3. Service level manager 4. Business relationship manager Requests must be as follows: 1. Authorized by the CAB 2. Authorized by the budget holder when an expense will be incurred 3. Authorized by technical management 4. May be preauthorized Which of the following could be defined as a service request? 1. "Is the service available at weekends?" 2. "How do I get training on this application?" 3. "I need this application changed to include a web interface" 4. "We have a new member of staff starting. Can you set them up on the system?" For which of these situations would automation by using event management not be appropriate? 1. Hierarchical escalation of incidents 2. Speeding up the processing of month-end sales figures 3. Notification of "intruder detected" to local police station 4. Running backups Event management can be used to monitor which of the following? Which of the following is the best description of a request? Which of the following are types of event monitoring? OPTIONS 1. Passive 2. Virtual 3. Active 4. Standard Which of the following is the best description of an alert? Which of the following is the best description of access management? What is meant by the term request fulfillment in the ITIL framework? . What is the purpose of event management? How is the process of access management used in the service operation stage of the service lifecycle? Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Ask a question
Experts are online
Answers (1)
CIS 500 CHAPTER 12 QUIZ 100% CORRECT
Answer Attachments
1 attachments —