A. IT Service Continuity Management
B. Financial Management for IT Services
C. Service Level Management
D. Availability Management
A. Information security risk assessments should be performed once a year.
B. Information security risk assessments should be performed as a result of the review of every incident.
C. Information security risk assessments should be carried out by an external auditor to maintain objectivity.
D. Information security risk assessments should be performed at agreed intervals and be maintained during changes.
A. During service reporting
B. Never
C. After the breach
D. Before the breach
A. MOF
B. CMMI
C. ITIL
D. CobITTM
A. a process owner will work directly with business leadership and the process manager only works within IT
B. a process owner is a director and a process manager is a manager
C. a process owner is responsible for the effectiveness of the process and a process manager is responsible for the realization of the process
D. a process owner must have a Manager's Certificate and a process manager must have a Practitioner's certificate
A. to manage information security effectively relating to the financial administration of service activities
B. to manage information security effectively for critical services only
C. to manage information security effectively for IT staff
D. to manage information security effectively within all service activities
A. the Requirements for a Management System process
B. those that support business critical services
C. the Planning & Implementing Service Management process
D. all of the processes within the scope
A. Decisions about service provision should be based on cost effectiveness comparisons.
B. The resilience of the infrastructure components should be measured and included in the Capacity plan.
C. A Capacity plan documenting the actual performance and the expected requirements should be produced at least annually.
D. The Service Catalog should be maintained and kept up-to-date.