Your Perfect Assignment is Just a Click Away

Starting at $8 per Page

100% Original, Plagiarism Free, Customized to Your instructions!

glass
pen
clip
papers
heaphones

CIS 500 WEEK 9 UCERTIFY Quiz: 12. The Other Service Operation

CIS 500 WEEK 9 UCERTIFY Quiz: 12. The Other Service Operation

CIS 500 WEEK 9 UCERTIFY Quiz: 12. The Other Service Operation

WEEK 9 Quiz: 12. The Other Service Operation …, 1 of 18
Q: Which of the following could be defined as a service request?

1. “Is the service available at weekends?”
2. “How do I get training on this application?”
3. “I need this application changed to include a web interface”
4. “We have a new member of staff starting. Can you set them up on the system?”

1, 2, and 4

1, 2, and 3

3 and 4

All the answers are correct.
Quiz: 12. The Other Service Operation …, 2 of 18
Q: Requests can be fulfilled by the following:

1. Service desk staff
2. Second-line staff
3. Service level manager
4. Business relationship manager

All the answers are correct.

1 and 3

2 and 3

1 and 2
Quiz: 12. The Other Service Operation …, 3 of 18
Q: How is the process of access management used in the service operation stage of the service lifecycle?

Access management is used to ensure the correct people are able to use the correct systems in the correct way.

Access management is used to manage the security technology in the infrastructure.

Access management is used to maintain security controls over the business environment.

Access management is used to ensure the active directory entries are audited for accuracy.
Quiz: 12. The Other Service Operation …, 4 of 18
Q: What is meant by the term request fulfillment in the ITIL framework?

Request fulfillment is a process for managing the requests from users to the IT department.

Request fulfillment is used to deliver non-IT-related business components to the users.

Request fulfillment is a means of managing the changes that users request in the IT environment.

Request fulfillment is the report produced on the number of password resets carried out by the IT department
Quiz: 12. The Other Service Operation …, 5 of 18
Q: Which of the following processes essentially executes policies defined in IT security management?

Access management

Data management

Policy management

Event management
Quiz: 12. The Other Service Operation …, 6 of 18
Q: Which of the following is used to filter and categorize events and to decide on appropriate actions?

Application management

Access management

Data management

Event management
Quiz: 12. The Other Service Operation …, 7 of 18
Q: Which of the following processes is accountable for frequently occurring changes where risk and cost are low?

Incident Management

Request Fulfillment

Access Management

Release Management
Quiz: 12. The Other Service Operation …, 8 of 18
Q: Which of the following is responsible for low risk, frequently occurring, and low cost changes?

Request Fulfillment

Demand Management

Incident Management

Deployment Management
Quiz: 12. The Other Service Operation …, 9 of 18
Q: Which of the following is responsible for Incident Management?

Service Support

Service Desk

Service Level Management

Service Delivery
Quiz: 12. The Other Service Operation …, 10 of 18
Q: Which of the following are types of event monitoring?

1. Passive
2. Virtual
3. Active
4. Standard

All the answers are correct.

1 and 2

2, and 3

1 and 3
Quiz: 12. The Other Service Operation …, 11 of 18
Q: Requests must be as follows:

1. Authorized by the CAB
2. Authorized by the budget holder when an expense will be incurred
3. Authorized by technical management
4. May be preauthorized

1 only

1 and 3

2 only

2 and 4
Quiz: 12. The Other Service Operation …, 12 of 18
Q: For which of these situations would automation by using event management not be appropriate?

1. Hierarchical escalation of incidents
2. Speeding up the processing of month-end sales figures
3. Notification of “intruder detected” to local police station
4. Running backups

1, 3, and 4

3 and 4

All the answers are correct.

2, and 3
Quiz: 12. The Other Service Operation …, 13 of 18
Q: Event management is a key operational process in the service operation lifecycle stage.
What is the purpose of event management?

Event management monitors the infrastructure of the IT services and guarantees that no outages occur in peak times of business usage.

Event management detects events that are significant for the management of the service and ensures the appropriate actions are taken.

Event management monitors the underlying causes of failures and ensures that changes are made to prevent further failures from taking place.

Event management manages failures in the infrastructure and ensures that services are restored to normal working as quickly as possible
Quiz: 12. The Other Service Operation …, 14 of 18
Q: Which of the following is the best description of an alert?

The unknown, underlying cause of one or more incidents

An unplanned interruption to a service

A change of state that has significance for the management of a CI

An event that notifies staff of a failure or that a threshold that has been breached
Quiz: 12. The Other Service Operation …, 15 of 18
Q: Event management can be used to monitor which of the following?

1. Environmental conditions
2. System messages
3. Staff rosters
4. License use

2, and 3

2, and 4

All the answers are correct.

1 and 2
Quiz: 12. The Other Service Operation …, 16 of 18
Q: The request fulfillment process is suitable for which of the following?

Common, low-risk requests with a documented fulfillment procedure

All requests, including RFCs

Only requests that have been approved by the CAB

Emergency requests for change, because the process will ensure a fast implementation
Quiz: 12. The Other Service Operation …, 17 of 18
Q: Which of the following is the best description of a request?

A request from a user for information, advice, or a standard change, or access to an IT service

An RFC

The procurement process

A standard change
Quiz: 12. The Other Service Operation …, 18 of 18
Q: Which of the following is the best description of access management?

Access management enables authorized access to services and data. Information security management removes or prevents access to nonauthorized staff.

Access management decides what services users should have access to.

Access management is responsible for setting security policies.

Access management grants authorized users the right to use a service, while preventing access to nonauthorized users.


"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.