Event management is a key operational process

Assignment Help Business Management
Reference no: EM13842841

Q: Which of the following could be defined as a service request?

1. "Is the service available at weekends?"

2. "How do I get training on this application?"

3. "I need this application changed to include a web interface"

4. "We have a new member of staff starting. Can you set them up on the system?"

1, 2, and 4

1, 2, and 3

3 and 4

All the answers are correct.

Q: Requests can be fulfilled by the following:

1. Service desk staff

2. Second-line staff

3. Service level manager

4. Business relationship manager

All the answers are correct.

1 and 3

2 and 3

1 and 2

Q: How is the process of access management used in the service operation stage of the service lifecycle?

Access management is used to ensure the correct people are able to use the correct systems in the correct way.

Access management is used to manage the security technology in the infrastructure.

Access management is used to maintain security controls over the business environment.

Access management is used to ensure the active directory entries are audited for accuracy.

Q: What is meant by the term request fulfillment in the ITIL framework?

Request fulfillment is a process for managing the requests from users to the IT department.

Request fulfillment is used to deliver non-IT-related business components to the users.

Request fulfillment is a means of managing the changes that users request in the IT environment.

Request fulfillment is the report produced on the number of password resets carried out by the IT department

Q: Which of the following processes essentially executes policies defined in IT security management?

Access management

Data management

Policy management

Event management

Q: Which of the following is used to filter and categorize events and to decide on appropriate actions?

Application management

Access management

Data management

Event management

Q: Which of the following processes is accountable for frequently occurring changes where risk and cost are low?

Incident Management

Request Fulfillment

Access Management

Release Management

Q: Which of the following is responsible for low risk, frequently occurring, and low cost changes?

Request Fulfillment

Demand Management

Incident Management

Deployment Management

Q: Which of the following is responsible for Incident Management?

Service Support

Service Desk

Service Level Management

Service Delivery

Q: Which of the following are types of event monitoring?

1. Passive

2. Virtual

3. Active

4. Standard

All the answers are correct.

1 and 2

2, and 3

1 and 3

Q: Requests must be as follows:

1. Authorized by the CAB

2. Authorized by the budget holder when an expense will be incurred

3. Authorized by technical management

4. May be preauthorized

1 only

1 and 3

2 only

2 and 4

Q: For which of these situations would automation by using event management not be appropriate?

1. Hierarchical escalation of incidents

2. Speeding up the processing of month-end sales figures

3. Notification of "intruder detected" to local police station

4. Running backups

1, 3, and 4

3 and 4

All the answers are correct.

2, and 3

Q: Event management is a key operational process in the service operation lifecycle stage.

What is the purpose of event management?

Event management monitors the infrastructure of the IT services and guarantees that no outages occur in peak times of business usage.

Event management detects events that are significant for the management of the service and ensures the appropriate actions are taken.

Event management monitors the underlying causes of failures and ensures that changes are made to prevent further failures from taking place.

Event management manages failures in the infrastructure and ensures that services are restored to normal working as quickly as possible

Q: Which of the following is the best description of an alert?

The unknown, underlying cause of one or more incidents

An unplanned interruption to a service

A change of state that has significance for the management of a CI

An event that notifies staff of a failure or that a threshold that has been breached

Q: Event management can be used to monitor which of the following?

1. Environmental conditions

2. System messages

3. Staff rosters

4. License use

2, and 3

2, and 4

All the answers are correct.

1 and 2

Q: The request fulfillment process is suitable for which of the following?

Common, low-risk requests with a documented fulfillment procedure

All requests, including RFCs

Only requests that have been approved by the CAB

Emergency requests for change, because the process will ensure a fast implementation

Q: Which of the following is the best description of a request?

A request from a user for information, advice, or a standard change, or access to an IT service

An RFC

The procurement process

A standard change

Q: Which of the following is the best description of access management?

Access management enables authorized access to services and data. Information security management removes or prevents access to nonauthorized staff.

Access management decides what services users should have access to.

Access management is responsible for setting security policies.

Access management grants authorized users the right to use a service, while preventing access to nonauthorized users.

Reference no: EM13842841

Questions Cloud

Important feature of digital cameras : An important feature of digital cameras is battery life, the number of shots that can be taken before the battery needs to be recharged. The file contains battery life information for 29 subcompact cameras and 16 compact cameras. (Data extracted f..
How they are used for measuring quality : Describe how they are used for measuring quality by at least four professionals in a health care organization. You must include at least one administrative health professional, one midlevel provider, one physician, and one auxiliary staff member
Develop a leadership action plan : For this last segment to your project, you will develop a leadership action plan. In 1-3 pages, you will describe the activities you will undertake over each of the following: next month, quarter, one year, and three years to improve and maximize ..
Write paper on extrinsic and intrinsic motivation : Two page paper on Extrinsic and Intrinsic Motivation- Motivating employees has become an important objective for many organizations. In this paper, address the following: Define both extrinsic and intrinsic motivation
Event management is a key operational process : Event management is a key operational process in the service operation lifecycle stage.
How find the find the equilibrium point : find the equilibrium point
How much will earls and ivanas savings programs be worth : How much will Earl's and Ivana's savings programs be worth at the retirement age of 65? Who is better off financially at retirement, and by how much?
Service design delivers a new service : Service design delivers a new service or a change to an existing service. Which of the following are included in the service design
Random process with mean : 1. In all the following questions {Zt} is a purely random process with mean E[Zt ] = 0, variance Var(Zt) = σ 2 , and successive values of Zt are independent so that Cov(Zt , Zt+k) = 0, k 6= 0.

Reviews

Write a Review

Business Management Questions & Answers

  How sales strategies are developed in line with corporate

How sales strategies are developed in line with corporate objectives?

  Research the social and cultural aspects of the country

Research the social and cultural aspects of the country you have chosen, and discuss the demographic trends that might influence EDUS business activities in the country. Country Overview: Describe the country, its history and any pertinent inf..

  What methods were used to resolve situation

What methods were used to resolve situation. Looking back now, what methods could or should have been used to resolve that situation.

  What are the components of slds system-level design

what are the components of slds system-level design business model?a business model is defined in its most basic sense

  How do innovation communities promote an open system

How do innovation communities promote an open system - How would the use of innovation communities help companies to learn from both success and failure? Discuss.

  Pros and cons of communication strategycommunication is a

pros and cons of communication strategycommunication is a two way process so how could have the company made this

  Description of incentive plansselect three different

description of incentive plansselect three different incentive plans list the pros and cons for each plan. for a

  Illustrate what kind of behaviour is the rule to foster

Illustrate what kind of behaviour is the rule of respondent superior likely to foster? Does the rule encourage employers to train and supervise their employees better?

  Explain why is its accuracy so important

How is it is prepared? Why is its accuracy so important? How managers can use the cash budget as a monitoring and control tool?

  Case study 2 bundlinga company supplies two productscoffee

case study 2 bundlinga company supplies two productscoffee mugsnbspandnbsptea cups to two differentsegments of

  Show mastery of organizational theory

Show mastery of organizational theory and design concepts in this specific situation and apply the principles of organizational theory in the analysis.

  Explain about relational leadership

Based on research from literature, what strategies do effective leaders use to build relationships? How do these strategies impact an organization's success?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd