IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

EXIN EX0-114 (IT Service Mgmt Foundation Bridge based on ISO/IEC 20000 )덤프공부자료

Pass4Test는 여러분이  EXIN EX0-114 (IT Service Mgmt Foundation Bridge based on ISO/IEC 20000 )인증시험 패스와 추후사업에 모두 도움이 되겠습니다.  Pass4Test제품을 선택함으로 여러분은 시간도 절약하고 돈도 절약하는 일석이조의 득을 얻을수 있습니다. 또한 구매후 일년무료 업데이트 버전을 받을수 있는 기회를 얻을수 있습니다. EXIN EX0-114 (IT Service Mgmt Foundation Bridge based on ISO/IEC 20000 ) 인증시험패스는 아주 어렵습니다. 자기에 맞는 현명한 학습자료 선택은 성공의 지름길을 내딛는 첫발입니다. 퍼펙트한 자료만이 시험에서 성공할수 있습니다. Pass4Test시험문제와 답이야 말로 퍼펙트한 자료이죠. Pass4Test  EXIN EX0-114 (IT Service Mgmt Foundation Bridge based on ISO/IEC 20000 )인증시험자료는 100% 패스보장을 드립니다.





NO.1 What is used for the assessment of maturity of organizations?
A. CMMI
B. CobITTM
C. ITIL
D. MOF
Answer: A

NO.2 What is the difference between a process owner and a process manager?
A. a process owner is responsible for the effectiveness of the process and a process manager is
responsiblefor the realization of the process
B. a process owner is a director and a process manager is a manager
C. a process owner must have a Manager's Certificate and a process manager must have a
Practitioner'scertificate
D. a process owner will work directly with business leadership and the process manager only works within
IT
Answer: A

NO.3 A company decides to apply the principle of continual improvement. Which action would result from this
decision.?
A. Analyze and evaluate the existing situation to identify areas for improvement
B. Analyze customer satisfaction and identify resulting actions
C. Review the Service Management System at least annual
D. Start an internal service organization evaluation
Answer: A

NO.4 Which of the following is a best practice concerning information security risk assessment?
A. Information security risk assessments should be carried out by an external auditor to maintain
objectivity.
B. Information security risk assessments should be performed as a result of the review of every incident.
C. Information security risk assessments should be performed at agreed intervals and be maintained
duringchanges.
D. Information security risk assessments should be performed once a year.
Answer: C

NO.5 What is required to be in place for emergency changes?
A. Capacity plans
B. Controlled Acceptance Test environment
C. policies and procedures
D. Service Continuity Plans
Answer: C

NO.6 What data is recorded when an incident is reported to the Service Desk?
A. the name of the person reporting the Incident
B. the name of the person handling the Problem
C. the name of the person who approves the Request for Change (RFC)
D. the names of persons who are authorized to implement Changes in the Configuration
ManagementDatabase (CMDB)
Answer: A

NO.7 Which process aims to prevent incidents resulting from changes to the IT infrastructure?
A. Availability Management
B. Change Management
C. Incident Management
D. Problem Management
Answer: B

NO.8 Due to excessive workload, the Desktop Support group has been unable to meet their agreed service
levels. One of the major contributing factors is the time being spent in direct communication with users.
Which Process or Function can help to alleviate some of this workload?
A. Incident Management
B. Problem Management
C. Service Desk Service
D. Level Management
Answer: C

NO.9 What defines Service Quality?
A. A series of activities that can be assessed in advance by a provider and customer
B. Achieving a 99.999% continuous level of availability
C. Meeting stated customer requirements and expectations
D. Providing a cost-effective service
Answer: C

NO.10 Which aspect of the IT-Service Industry is considered to be one of the most important, but also one of
the most difficult?
A. constant quality
B. incorporating technological innovations
C. innovating the way services are provided
D. methodological order based on best practices
Answer: A
Posted 2013/6/20 7:10:44  |  Category: 미분류  |  Tag: