CITP Dumps CITP Braindumps CITP Real Questions CITP Practice Test CITP Actual Questions Financial CITP Certified Information Technology Professional (CITP) https://killexams.com/pass4sure/exam-detail/CITP Answer: A Question: 185 Advantages of outsourcing the service desk include: A. Quicker implementation time B. Lower customer satisfaction C. More comprehensive training D. None of the above Answer: A Question: 186 Knowledge management includes: A. Documenting how-to-use applications B. Sharing information on problems and fi xes C. Making information available to users D. All of the above Answer: D Question: 187 An objective of incident management is to: A. Minimize the adverse impact of incidents and problems B. Restore operations as soon as possible C. Develop a workaround D. Resolve problems Answer: B Question: 188 Problem severity is an important aspect of problem management needed to: A. Prioritize problem resolution B. Determine the cost/benefi t of resolving individual problems C. Identify regulatory compliance issues D. All of the above Answer: D Question: 189 Problem management tools should be part of a common toolset integrated with: A. Asset management B. Change management C. Service desk D. All of the above Answer: D Question: 190 A problem reporting process is needed to: A. Measure against SLAs B. Identify the root cause of problems C. Follow up on action responses D. All of the above Answer: A Question: 191 ISO 17799 covers: A. Security policy B. Security organization C. Asset classifi cation and control D. All of the above Answer: D Question: 192 An information security policy provides all of the following, Except: A. Guide to decision making about information security B. High-level statements of security objectives C. Instructions for implementing security attributes D. Ways to prevent and respond to threats Answer: C Question: 193 According to the CERT, what percent of actual security incidents goes unreported? A. 20 percent B. 40 percent C. 60 percent D. 80 percent Answer: D Question: 194 Information security requires participation and support from which one of the the following groups: A. Local system administrators B. Department managers C. Contractors D. All of the above Answer: D Question: 195 Vulnerability management includes which one of the following process: A. Inventory of physical assets B. Change management C. Virus protection software D. None of the above Answer: B Question: 196 Implementing identity management can result in all of the following benefits, Except: A. Reduced help desk call volume B. Consistent security and accountability C. Improved password selection D. Improved turnaround time for adding users Answer: C Question: 197 Encryption technologies electronically store information in an encoded form that can only be decoded by an authorized individual who has the appropriate decryption technology and a: A. Private key B. Public key C. Authorization to decrypt D. Ability to decrypt Answer: C Question: 198 To be effective, which one of the following groups must support a contingency and disaster recovery plan to off er a business the best chance to survive? A. Auditors and management B. Technical personnel and management C. Management and staff D. Auditors and security offi cers Answer: C Question: 199 To be usable, a disaster recovery plan must be: A. Written B. Approved C. Tested D. Enforced Answer: C Question: 200 Which of the following would not be included in a companywide policy on end-user computing (EUC)? A. Wireless encryption standards B. Appropriate documentation C. Segregation of duties D. Backup procedures Answer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