image


CITP Dumps CITP Braindumps

CITP Real Questions CITP Practice Test CITP Actual Questions


Financial


CITP


Certified Information Technology Professional (CITP)


https://killexams.com/pass4sure/exam-detail/CITP


Answer: A


Question: 185

Advantages of outsourcing the service desk include:


  1. Quicker implementation time

  2. Lower customer satisfaction

  3. More comprehensive training

  4. None of the above


Answer: A


Question: 186

Knowledge management includes:


  1. Documenting how-to-use applications

  2. Sharing information on problems and fi xes

  3. Making information available to users

  4. All of the above


Answer: D


Question: 187

An objective of incident management is to:


  1. Minimize the adverse impact of incidents and problems

  2. Restore operations as soon as possible

  3. Develop a workaround

  4. Resolve problems


Answer: B


Question: 188

Problem severity is an important aspect of problem management needed to:


  1. Prioritize problem resolution

  2. Determine the cost/benefi t of resolving individual problems

  3. Identify regulatory compliance issues

  4. All of the above


Answer: D


Question: 189

Problem management tools should be part of a common toolset integrated with:


  1. Asset management

  2. Change management

  3. Service desk

  4. All of the above


Answer: D


Question: 190

A problem reporting process is needed to:


  1. Measure against SLAs

  2. Identify the root cause of problems

  3. Follow up on action responses

  4. All of the above


Answer: A


Question: 191

ISO 17799 covers:


  1. Security policy

  2. Security organization

  3. Asset classifi cation and control

  4. All of the above


Answer: D


Question: 192

An information security policy provides all of the following, Except:


  1. Guide to decision making about information security

  2. High-level statements of security objectives

  3. Instructions for implementing security attributes

  4. Ways to prevent and respond to threats


Answer: C


Question: 193

According to the CERT, what percent of actual security incidents goes unreported?


  1. 20 percent

  2. 40 percent

  3. 60 percent

  4. 80 percent


Answer: D


Question: 194

Information security requires participation and support from which one of the the following groups:


  1. Local system administrators

  2. Department managers

  3. Contractors

  4. All of the above


Answer: D


Question: 195

Vulnerability management includes which one of the following process:


  1. Inventory of physical assets

  2. Change management

  3. Virus protection software

  4. None of the above


Answer: B


Question: 196

Implementing identity management can result in all of the following benefits, Except:


  1. Reduced help desk call volume

  2. Consistent security and accountability

  3. Improved password selection

  4. Improved turnaround time for adding users


Answer: C


Question: 197

Encryption technologies electronically store information in an encoded form that can only be decoded by an authorized individual who has the appropriate decryption technology and a:


  1. Private key

  2. Public key

  3. Authorization to decrypt

  4. Ability to decrypt


Answer: C


Question: 198

To be effective, which one of the following groups must support a contingency and disaster recovery plan to off er a business the best chance to survive?


  1. Auditors and management

  2. Technical personnel and management

  3. Management and staff

  4. Auditors and security offi cers


Answer: C


Question: 199

To be usable, a disaster recovery plan must be:


  1. Written

  2. Approved

  3. Tested

  4. Enforced


Answer: C


Question: 200

Which of the following would not be included in a companywide policy on end-user computing (EUC)?


  1. Wireless encryption standards

  2. Appropriate documentation

  3. Segregation of duties

  4. Backup procedures


Answer: A


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG