Who responsible for signing off on project closure documents

Assignment Help Management Information Sys
Reference no: EM131030501

1. What is the name specified to the type of charging where no money is exchanged inter-departmentally mainly involving the IT Department & the customer? Availability Management deals with the day-to-day availability of services. Which of the following are the activities of Availability Management? Each correct answer represents a complete solution. Choose all that apply.

A. It meets SLAs by ensuring service availability.

B. It coordinates the changes.

C. It determines the reason of availability failures.

D. It analyzes business requirements for availability of business systems.

2. Which of the following is a benefit of using ITIL? Each correct answer represents a complete solution. Choose all that apply.

A. The costs of the IT Services can be controlled more efficiently

B. The quality of the IT Services can be controlled more efficiently

C. It is possible to charge for IT Services

D. The users can influence the IT organization providing the IT Services

3. Which one of these statements about the service portfolio is correct?

A. The service portfolio is a database of the infrastructure used for managing service assets.

B. The service portfolio is used to manage improvements to all IT services.

C. The service portfolio is used to provide information on costs, benefits, and issues for input into a business case.

D. The service portfolio is used to manage all changes to IT services.

4. Which of the following features are identified by a Business Impact Analysis? Each correct answer represents a complete solution. Choose all that apply.

A. It identifies the critical business processes and essential business functions.

B. It identifies a policy that exists on the financial management of services.

C. It identifies necessary resources that are required to allow continuity of critical business processes.

D. It identifies possible escalations caused due to any damage or loss.

5. Which of the following is the central repository of the IT organization's data, information, and knowledge?

A. Service Knowledge Management System

B. Compliance Management

C. Supplier and Contract Database

D. Knowledge Management

6. The Business has submitted requirements for a new ERP system. Which authority is responsible for documenting the Service Level Requirements (SLRs) with the Business delegate?

A. Project Management

B. Service Owner

C. Service Level Management

D. Service Level Manager

7. The primary aim of Incident Management is to ensure a quick recovery of the system. It supervises and directs the internal or external resources. Which of the following are the activities of Incident Management?

Each correct answer represents a complete solution. Choose all that apply.

A. It assures that the other activities do not take away the focus on the incident resolution.

B. It keeps track and record of the time lines.

C. It behaves as an interface towards other technicians, customer technical staff, and other groups within the organization.

D. It provides the proactive prevention of problems.

8. Where are the details of a workaround documented?

A.Known Error

B. Problem Record

C. Operational Level Agreement

D. Service Level Agreement

9. At which phase of the release and deployment process would you expect to receive feedback on the success or failure of the release?

A. Release and deployment planning

B. Deployment

C. Review and close

D. Release build and test

10. What are the two aspects of operations management?

A. Resource management and capability management

B. Facilities management and infrastructure management

C. Resource management and operations control

D. Facilities management and operations control

11. Measurement is a crucial aspect of continual service improvement and the delivery of service metrics will be most important to which stakeholders?

A. The technical management function

B. The operations management function

C. The customer

D. The service provider

12. In which of the following is defining the processes required to operate a new service?

A. Service Strategy: Develop the offerings

B. Service Operation: IT Operations Management

C. Service Design: Design the processes

D. Service Transition: Plan and prepare for deployment

13. The Service Level Management (SLM) process defines, agrees, records, and manages levels of service. Which of the following are the objectives of the Service Level Management process?

Each correct answer represents a complete solution. Choose all that apply.

A. It aligns IT strategy according to the business needs.

B. It improves IT Service Delivery in a controlled way.

C. It plans the successful roll-out of software and associated hardware.

D. It describes the services offered to the customer in a terminology that the customers can easily understand.

14. Which of the following roles in Service Design is responsible for ensuring the confidentiality, integrity, and availability of an organization's assets, information, data, and IT services?

A. The IT Service Continuity Manager

B. The Availability Manager

C. The Compliance Manager

D. The IT Security Manager

15. Which of the following is the objective for the planning and implementation of new or changed services?

A. It is used to define and control service and infrastructure components and maintain accurate configuration information.

B. It is used to produce agreed, timely, reliable, and accurate reports for the purpose of decision making and effective communication.

C. It ensures that new services and changes to the services will be delivered and managed at the agreed cost and service quality.

D. It ensures that the service provider has, at all times, sufficient capacity so that the current and the future needs of the customer get fulfilled.

16. Who is responsible for signing off on project closure documents?

A. End user

B. Sponsor

C. Project team members

D. Project manager

17. Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?

A. Service Reporting

B. Service Level Management

C. Capacity Management

D. Service Continuity Management

18. In which of the following approaches of Service Desk does the location of Service Desk is immaterial?

A. Centralized Service Desk

B. Local Service Desk

C. Virtual Service Desk

D. Apparent Service Desk

19. The objective of Capacity Management is to ensure that the service provider has, at all times, sufficient capacity so that the current and the future needs of the customer's business is fulfilled. Which of the following are the sub-processes of the Capacity Management? Each correct answer represents a complete solution. Choose all that apply.

A. Business Capacity Management

B. Internal Capacity Management

C. Resource Capacity Management

D. Service Capacity Management

20. The goal of Change Management is to ensure that standardized methods and procedures are used for efficient handling of all changes. Which of the following are Change Management terminologies?

Each correct answer represents a part of the solution. Choose three.

A. Request for Change

B. Forward Schedule of Changes

C. Change

D. Service Request Management

21. Which of the following is used to continually improve the process performance by taking actions?

A. Do

B. Check

C. Act

D. Plan

22. Financial Management for IT Services defines which of the following major cost types? Each correct answer represents a complete solution. Choose all that apply.

A. People

B. Customer service

C. CRM

D. Hardware

E. Software

F.Accommodation

23. Which of the following roles is responsible for monitoring activities and events in the IT Infrastructure?

A. Incident Management

B. ICT Operations Management

C. Capacity Management

D. Events Management

24. Which of the following activities in the Problem Management process is responsible for generating Requests for Change (RFCs)?

A. Problem Control Process

B. Business Transaction Management

C. Error Control

D. Problem Management Process

25. The objective of Configuration Management is to define and control the service and infrastructure components, and to maintain accurate configuration information. Which of the following are the activities of Configuration Management? Each correct answer represents a complete solution. Choose all that apply.

A. Performing a Trend Analysis

B.Status Accounting

C. Management & Planning

D. Control

Reference no: EM131030501

Questions Cloud

Orders a printer network system from computrs : Xander, Inc. orders a printer network system from CompuTrs & Co.  The system works for the first 90 days without any issues.  During the next 30 days, the system begins to malfunction.  Xander, Inc. contacts CompuTrs & Co and, after several visits fr..
What important advice did george washington give american : What important advice did George Washington give the American people in his Farewell Address? How did the Alien Acts and Sedition Act affect the administration of President John Adams?
Sort the pointers to the strings not the actual strings : Provide functions to sort the strings into alphabetical order, using variations of the bsort() and order() functions from the PTRSORT program in this chapter. Sort the pointers to the strings, not the actual strings.
Explain how the gothic church in england differed : Art History Question (600 word minimum response) - Explain how the Gothic church in England differed from the Gothic church in France.
Who responsible for signing off on project closure documents : The objective of Configuration Management is to define and control the service and infrastructure components, and to maintain accurate configuration information. Which of the following are the activities of Configuration Management? Each correct a..
Turbulent business environment : In today's turbulent business environment, how can the integration of authentic leadership and fostering collaboration be used to increase organizational success and employee satisfaction?
The company started with a small production plant in el : The company started with a small production plant in EL Paso and gradually built a customer base throughout Texas. A distribution center was established in Ft.Worth, Texas, and later, as business expanded to the north, a second distribution center wa..
Write some code in main() to test upit() : This function uses the CCTYPE header file. Write some code in main() to test upit().
According to kouzes and posner, : According to Kouzes and Posner, which of the following is an action of the best leaders?

Reviews

Write a Review

Management Information Sys Questions & Answers

  The main parts of the frame for analysis of is

The field of MIS deals with ____ issues as well as technical issues. The main parts of the FRAME for analysis of IS are

  Essay about google and the future of computing

2500 word essay about Google and the future of computing. Research Google and discover at least 5 technologies they have developed (or are currently developing), other than the search and advertising features

  Tronic technologytronic technology has preferred stock

tronic technologytronic technology has preferred stock outstanding that pays a 4.50 annual dividend. it has a price of

  Sdlc methodology and purchasing life cycle1 describe the

sdlc methodology and purchasing life cycle1. describe the role of the vendor for each of the three phases of the

  Discussion of the registered traveler program

Provide a discussion of the Registered Traveler program. Be sure to include a discussion of the technology as well as the impact for airports and airlines. How do Centralized Communication Centers improve airport efficiency

  Information security program

In order for an Information Security program to be successful within an organization it must relate to the mission. CyberSecurity should not prevent an organization from accomplishing its mission or meeting the needs of their customer.

  Any idea how to open and convert pod file to ms project

Any idea how to open and convert POD file to MS project

  Iso 9000 and the supply chaindescribe iso 9000 and its role

iso 9000 and the supply chaindescribe iso 9000 and its role in supply chains. search the internet for an example of a

  What are the pros and cons of methods such as single sign-on

What are the pros and cons of methods such as Single Sign-On (SSO). Weigh the user benefits to security risks when considering the remote access methods.

  Situation where partitioned views might be appropriate

Partitioned Views - Provide an example of a situation where partitioned views might be appropriate.

  Question about asp - what are asps

Question about ASP - What are ASPs and How have they become an important element of e-business

  Question about resistance to change1according to yukl 2010

question about resistance to change1.according to yukl 2010 people resist change for many reasons. choose one reason

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd