The IT department is requested to select and implement technology and support which will deliver knowledge capable of supporting cross-functional business units. What do you require?
In business continuity planning, the maximum age of the data to restore in the event of a disaster is considered which of the following?
Senior management requests a service requirement analysis to justify the need for a vendor. During the analysis, it is concluded that the internal IT provider has insufficient manpower and lacks the skills to deliver the work required. Which gaps are identified?
When selecting a new vendor, continuity needs to be guaranteed as much as possible. At a minimum, which criteria are considered?
During Post Implementation Review (PIR) of changes, it is lately concluded that an unusual high number of changes failed to meet their objectives. What is the most likely cause of this?
During the system (application) development project, the customer wants to know how software will be maintained to assure that future functional requirements are incorporated. What type of system maintenance is the customer looking for?
The new social media platform is multi-media supported and will generate a large volume of raw data. The marketing department has a need for advanced analysis of this data. Which data management technology applies best?
The new system (application) is ready for adoption (implementation). The customer is concerned that an instant change-over from the current system to the new system will create a large impact on the user base. You are requested to propose an approach for adoption. Which of the items listed below is recommended?
Being part of service management, business relationship management follows the principles of the service lifecycle. Which of the below is not part of activities defined in service operation?
Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?
Vendor management meetings take place several times per year. What is the main objective for these meetings?