Pass the Exin EPI IT Management CITM Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

In project management, what is the objective of a 'lessons learned' report?

Options:

A.

To inform the project owner with the overall achievement of the project’s objectives


B.

To establish accountability for the mistakes being made in the project


C.

To identify all risks that occurred during the project


D.

Bringing forward positive and negative elements with the intent to benefit future projects


Questions # 2:

During the system (application) development project, the customer wants to know how software will be maintained to assure that future functional requirements are incorporated. What type of system maintenance is the customer looking for?

Options:

A.

Preventive maintenance


B.

Perfective maintenance


C.

Corrective maintenance


D.

Adaptive maintenance


Questions # 3:

Senior management is concerned fraudulent activities may take place during large financial transactions. To reduce the risk of fraud, it expects the proper controls to be in place. Which security principle is in need of the highest attention?

Options:

A.

Confidentiality


B.

Availability


C.

Integrity


D.

Reliability


Questions # 4:

In testing the business continuity plan, senior business managers wish to compare data which is in both the main and alternative site, before participating in a full interruption test. Which type of test do they want to take place?

Options:

A.

Parallel test


B.

Simulation test


C.

Structured walk-through test


D.

Checklist test


Questions # 5:

The Service Level Agreement (SLA) mentions a section ‘estimated system response times’. What is not a key factor for a successful delivery?

Options:

A.

The technical specifications of the system


B.

The price for the IT service


C.

The skills and knowledge of staff working at the IT service provider organization


D.

The technical specifications of the IT infrastructure


Questions # 6:

From the list below, which activity is not considered to be an activity in the software development phase?

Options:

A.

Code writing


B.

Testing


C.

Documenting


D.

Implementation


Questions # 7:

Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?

Options:

A.

E-mail usage


B.

Instant (mobile) messaging


C.

Internet usage


D.

Social engineering


Questions # 8:

One of the company’s assets is valued at $200,000.00. Based on historical data, the exposure factor is 25%, and the Annual Loss Expectancy (ALE) is calculated at $100,000.00. What is the Annualized Rate of Occurrence (ARO)?

Options:

A.

0.4


B.

1


C.

2


Questions # 9:

The new social media platform is multi-media supported and will generate a large volume of raw data. The marketing department has a need for advanced analysis of this data. Which data management technology applies best?

Options:

A.

Master Data Management (MDM)


B.

Digital Asset Management (DAM)


C.

Online Analytical Processing (OLAP)


D.

Big Data Analysis


Questions # 10:

Little to no budget is available for hiring new staff for the IT service desk. What is the ideal method of sourcing knowing that little time is available?

Options:

A.

Word of mouth


B.

Internal IT staff based on a SWOT analysis


C.

Internet job board


D.

Recruitment agency


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions