- (Topic 2)
Firekiller 2000 is an example of a _____.
Correct Answer:
D
- (Topic 2)
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
* 1. To account for all IT assets
* 2. To provide precise information support to other ITIL disciplines
* 3. To provide a solid base only for Incident and Problem Management
* 4. To verify configuration records and correct any exceptions
Correct Answer:
C
- (Topic 2)
Which of the following policies define how Identification and Authorization occur and determine access control, audits, and network connectivity?
Correct Answer:
C
- (Topic 3)
You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of _____.
Correct Answer:
D
- (Topic 2)
Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?
Correct Answer:
A