Exam Code : CITP
Exam Name : Certified Information Technology Professional (CITP)
Vendor Name :
"Financial"
CITP Dumps CITP Braindumps
CITP Real Questions CITP Practice Test CITP Actual Questions
killexams.com Financial CITP
Certified Information Technology Professional (CITP)
https://killexams.com/pass4sure/exam-detail/CITP
Advantages of outsourcing the service desk include:
Quicker implementation time
Lower customer satisfaction
More comprehensive training
None of the above
Knowledge management includes:
Documenting how-to-use applications
Sharing information on problems and fi xes
Making information available to users
All of the above
An objective of incident management is to:
Minimize the adverse impact of incidents and problems
Restore operations as soon as possible
Develop a workaround
Resolve problems
Problem severity is an important aspect of problem management needed to:
Prioritize problem resolution
Determine the cost/benefi t of resolving individual problems
Identify regulatory compliance issues
All of the above
Problem management tools should be part of a common toolset integrated with:
Asset management
Change management
Service desk
All of the above
A problem reporting process is needed to:
Measure against SLAs
Identify the root cause of problems
Follow up on action responses
All of the above
ISO 17799 covers:
Security policy
Security organization
Asset classifi cation and control
All of the above
Answer: D
An information security policy provides all of the following, Except:
Guide to decision making about information security
High-level statements of security objectives
Instructions for implementing security attributes
Ways to prevent and respond to threats
According to the CERT, what percent of actual security incidents goes unreported?
20 percent
40 percent
60 percent
80 percent
Information security requires participation and support from which one of the the following groups:
Local system administrators
Department managers
Contractors
All of the above
Vulnerability management includes which one of the following process:
Inventory of physical assets
Change management
Virus protection software
None of the above
Implementing identity management can result in all of the following benefits, Except:
Reduced help desk call volume
Consistent security and accountability
Improved password selection
Improved turnaround time for adding users
Encryption technologies electronically store information in an encoded form that can only be decoded by an authorized individual who has the appropriate decryption technology and a:
Private key
Public key
Authorization to decrypt
Ability to decrypt
To be effective, which one of the following groups must support a contingency and disaster recovery plan to off er a business the best chance to survive?
Auditors and management
Technical personnel and management
Management and staff
Auditors and security offi cers
To be usable, a disaster recovery plan must be:
Written
Approved
Tested
Enforced
Which of the following would not be included in a companywide policy on end-user computing (EUC)?
Wireless encryption standards
Appropriate documentation
Segregation of duties
Backup procedures