Searching for "CH"

Q:

The Plan-Do-Check-Act cycle can be used to plan and implement Service Management Processes:
How many times should each stage of the cycle be visited?

A) There should be a single Plan and Do, and then Check and Act should be carried out multiple times to Implement Continual Improvement B) There should be a single %n. then the Do-Check-Act cycle should be repeated multiple times to Implement Continual improvement
C) The entire cycle should be repeated multiple times to Implement Continual Improvement D) Each stage should be carried out once in the order Plan-Do-Check-Act
 
Answer & Explanation Answer: D) Each stage should be carried out once in the order Plan-Do-Check-Act

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

The spell check module of a word-processing software package contains a number of errors. The Development department has corrected these errors in a new version. Which process is responsible for ensuring this updated version is tested?

A) Configuration Management B) Incident Management
C) Problem Management D) Release Management
 
Answer & Explanation Answer: D) Release Management

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

Which of the following statements BEST describes the role of Communication during Service Operation?

A) Communication is a separate process that needs to be defined and executed with Service Operation B) Good communication is essential for successful Service Operation, just as it is for any other phase of the Lifecycle
C) Communication is more important in Service Operation than in any other stage of the Service Lifecycle D) Communication is defined as part of all processes and is executed in Service Operation
 
Answer & Explanation Answer: B) Good communication is essential for successful Service Operation, just as it is for any other phase of the Lifecycle

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

The Information Security Policy should be available to which groups of people?

A) Senior business managers and all IT staff B) Information Security Management staff only
C) All customers, users and IT staff D) Senior business managers, IT executives and the Security Manager
 
Answer & Explanation Answer: C) All customers, users and IT staff

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

Which of the following is the most appropriate approach to carrying out Service Operations?

A) The internal IT view is most important as Service Operations has to monitor and manage the infrastructure B) Service Operations should maintain a balance between an internal IT view and an external business view
C) IT Operations does not take an internal or external view as they execute processes defined by Service Design D) The external business view is most important as Service Operations is the place where value is realized and the customer obtains the benefit of the services
 
Answer & Explanation Answer: B) Service Operations should maintain a balance between an internal IT view and an external business view

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

 What is the role of the Emergency Change Advisory Board (ECAB)?

A) To assist the Change Manager in ensuring that no urgent changes are made during particularly volatile business periods B) To assist the Change Manager in evaluating emergency changes and to decide whether the change should be approved
C) To assist the Change Manager in speeding up the emergency change process so that no unacceptable delays occur. D) To assist the Change Manager in implementing emergency changes
 
Answer & Explanation Answer: B) To assist the Change Manager in evaluating emergency changes and to decide whether the change should be approved

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

which IOS command enables access to high-level commands?

A) su root B) admin 0
C) enable D) init
 
Answer & Explanation Answer: C) enable

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

After the devices have been configured as shown, it is determined that the branch office in Chicago doesn't have connectivity to the Internet through the headquarters in Dallas. How would you fix the problem?

A) Change ip address on the WAN side of the Chicago router B) Change ip address on the LAN side of the Chicago router
C) Change ip address on the LAN side of the Dallas router D) Change ip address on the WAN side of the Dallas router
 
Answer & Explanation Answer: A) Change ip address on the WAN side of the Chicago router

Explanation:

192.168.20.3/30 is not a valid ip address, should be 192.168.20.1/30

Report Error

View Answer Report Error Discuss

Filed Under: CCENT