Latest CITP Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : CITP
Exam Name : Certified Information Technology Professional (CITP)
Vendor Name : "Financial"







CITP Dumps CITP Braindumps

CITP Real Questions CITP Practice Test CITP Actual Questions


killexams.com Financial CITP


Certified Information Technology Professional (CITP)


https://killexams.com/pass4sure/exam-detail/CITP




Answer: A



Question: 185

Advantages of outsourcing the service desk include:


  1. Quicker implementation time

  2. Lower customer satisfaction

  3. More comprehensive training

  4. None of the above




Answer: A



Question: 186

Knowledge management includes:


  1. Documenting how-to-use applications

  2. Sharing information on problems and fi xes

  3. Making information available to users

  4. All of the above




Answer: D



Question: 187

An objective of incident management is to:


  1. Minimize the adverse impact of incidents and problems

  2. Restore operations as soon as possible

  3. Develop a workaround

  4. Resolve problems




Answer: B



Question: 188

Problem severity is an important aspect of problem management needed to:


  1. Prioritize problem resolution

  2. Determine the cost/benefi t of resolving individual problems

  3. Identify regulatory compliance issues

  4. All of the above




Answer: D



Question: 189

Problem management tools should be part of a common toolset integrated with:


  1. Asset management

  2. Change management

  3. Service desk

  4. All of the above




Answer: D



Question: 190

A problem reporting process is needed to:


  1. Measure against SLAs

  2. Identify the root cause of problems

  3. Follow up on action responses

  4. All of the above




Answer: A



Question: 191

ISO 17799 covers:


  1. Security policy

  2. Security organization

  3. Asset classifi cation and control

  4. All of the above




Answer: D



Question: 192

An information security policy provides all of the following, Except:


  1. Guide to decision making about information security

  2. High-level statements of security objectives

  3. Instructions for implementing security attributes

  4. Ways to prevent and respond to threats




Answer: C



Question: 193

According to the CERT, what percent of actual security incidents goes unreported?


  1. 20 percent

  2. 40 percent

  3. 60 percent

  4. 80 percent




Answer: D



Question: 194

Information security requires participation and support from which one of the the following groups:


  1. Local system administrators

  2. Department managers

  3. Contractors

  4. All of the above




Answer: D



Question: 195

Vulnerability management includes which one of the following process:


  1. Inventory of physical assets

  2. Change management

  3. Virus protection software

  4. None of the above




Answer: B



Question: 196

Implementing identity management can result in all of the following benefits, Except:


  1. Reduced help desk call volume

  2. Consistent security and accountability

  3. Improved password selection

  4. Improved turnaround time for adding users




Answer: C



Question: 197

Encryption technologies electronically store information in an encoded form that can only be decoded by an authorized individual who has the appropriate decryption technology and a:


  1. Private key

  2. Public key

  3. Authorization to decrypt

  4. Ability to decrypt




Answer: C



Question: 198

To be effective, which one of the following groups must support a contingency and disaster recovery plan to off er a business the best chance to survive?


  1. Auditors and management

  2. Technical personnel and management

  3. Management and staff

  4. Auditors and security offi cers




Answer: C



Question: 199

To be usable, a disaster recovery plan must be:


  1. Written

  2. Approved

  3. Tested

  4. Enforced




Answer: C



Question: 200

Which of the following would not be included in a companywide policy on end-user computing (EUC)?


  1. Wireless encryption standards

  2. Appropriate documentation

  3. Segregation of duties

  4. Backup procedures




Answer: A