Nav
(855) 776-7763
?
Take a Quiz
All Products
Brain Games
ProProfs.com
Login
Sign Up Free
Ask a Question
+ Ask Question
Discuss
Speak now
Seacrh
Ask a Question
+ Ask Question
Discuss
Sitemap
Question
All time popular questions
37501.
What type of connector is used to plug a telephone line into a modem?
37502.
What is at the center of the Tibetan mandala?
37503.
What are the requirements of a linear programming problem?
37504.
Which of the following is not a good source of heme iron?
37505.
Which of the following is not a major function of phosphorus in the body?
37506.
What is not a function of calcium?
37507.
What is the strongest form of authentication used these days?
37508.
What is the most costly method of an authentication?
37509.
How would you describe a challenge-response session?
37510.
What is used to make access decisions in a MAC (Mandatory Access Control) environment?
37511.
Which access control methods provides the most granular access to protected objects?
37512.
How would you describe an access control mechanism that allows the data owner to create and administer access control?
37513.
Which of the following (pain, itchiness, swelling, heat) is not a sign of inflammation?
37514.
What are the three types of security?
37515.
What type of attacks occurs when a rogue application has been planted on an unsuspecting users workstation?
37516.
What may help in ensuring that certain bidders in the procurement process do not receive preferential treatment?
37517.
What is the traditional way to display a reporting structure among project team members?
37518.
What defines the total scope of project and represents the work specified in the current approved project scope statement?
37519.
Which precedence relationship is least commonly used in precedence Diagramming Method?
37520.
What is the primary risk with includingreservesor contingency allowances in your cost estimate?
37521.
Can you give an example of a valid MAC address?
37522.
What is a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key?This question is...
37523.
What is the next step in the troubleshooting methodology after identifying the problem?
37524.
Which distance-vector routing protocol used on TCP / IP networks?
37525.
Which precedence relationship is least commonly used in precedence Diagramming Method in construction?
37526.
What do we call a detailed version of a new idea stated in meaningful consumer terms?
37527.
How would you describe Fault Tolerance in Information technology?
37528.
What do you mean by the term event?
37529.
How would you describe the goal of Information Security Management Process?
37530.
What aspects would you not expect to see in a Service Level report designed for the customer?
37531.
What is access management?
37532.
Which of the following best means Combination of Internal & External Sourcing?
37533.
Which process reviews Operational Level Agreements (OLAs) on a regular basis?
37534.
Why should monitoring and measuring be used when trying to improve services?
37535.
What is Insourcing and Outsourcing delivery model options?
37536.
Which of the following would not be stored in the Definitive Media Library (DML)?
37537.
What is the purpose of the Request Fulfillment Process?
37538.
What are the disadvantages of organizing Continual Service Improvement (CSI) using the RACI model?
37539.
How does an organization use Resources and Capabilities in creating value?
37540.
What does a higher interest rate induce people?
37541.
Which of the following areas would technology help to support during the Service Design phase of the Lifecycle?
37542.
Which are the missing Service Operation processes from the following?1. Incident Management2. Problem Management3. Access Management4. ? 5. ?
37543.
What is the most appropriate approach to carrying out Service Operations?
37544.
Which of the following is a characteristic of every process?1. It is measurable2. It is timely3. It delivers a specific result4. It responds to a specific event5. It...
37545.
How would you describe a Local Service Desk structure?
37546.
Which activities are Service Level Management responsible for?
37547.
What is the correct sequence of events in the selection of a technology tool?
37548.
What are the objective of Service Operation?
37549.
What is the main reason forestablishinga baseline?
37550.
What is the RACI model used for? "What does the "I" stand for?
37551.
What are the steps in the Continual Service Improvement (CSI) model?
37552.
How would you describe Service Management as a practice?
37553.
Which of the following is release and deployment management responsible for?
37554.
What is the task of Capacity Management?
37555.
Which term best describes the movement or tearing down of deteriorated buildings to make way for the building of new ones?
37556.
Where are activities documented with the aim of improving an IT service?
37557.
Which ITIL process is responsible for analyzing risks and counter measures?
37558.
Which of the following is not part of Capacity Management?
37559.
Which ITIL process is responsible for annually allocating the costs of underpinning contracts?
37560.
What are the main economic gropus?
37561.
What are the three types of metrics that an organization should collect to support Continual Service Improvement (CSI)?
37562.
When shall you use the Join command?
37563.
Where are the statuses of changes recorded?
37564.
What are the 4 functions of ITIL?
37565.
What is the correct sequence of activities for handling an incident?
37566.
Which is the firstactivityof the continual service improvement (CSI) approach?
37567.
What best summarizes the purpose of event management?
37568.
What are the valid elements of a service design package (SDP)?
37569.
What is positive economic analysis?
37570.
How would you define scarcity?
37571.
Which ITIL process provides change proposals in order to eliminate structural errors?
37572.
Which is the correct sequence of polypeptide transport in the secretory (releasing secretions) pathway?
37573.
Which of these is not found in the nucleus?
37574.
What is the MAIN purpose of availability management?
37575.
What does the term IT operations control refer to?
37576.
Which of the following is not a characteristic of a process?
37577.
Which of the following is not an element of Availability Management?
37578.
What is the correct description of "Impact"?
37579.
What are the three sub-processes of capacity management?
37580.
Why are semiotic gestures the most utilized for computer-based gesture recognition?
37581.
Which transportation developments opened the West to settlement and trade between 1790 and 1830?
37582.
Which type of feather is long and extend beyond the body for lift?
37583.
What permits the feather to "zip" and "unzip"?
37584.
Which two countries were the first to declare war on Germany in WW2?
37585.
Why is a secondary immune response stronger?
37586.
What is not a function of sertoli cells?
37587.
What are the functions of sertoli cells?
37588.
Which material is most likely to be transported as suspended load in a river?
37589.
How do the strength and cohesion of clay-rich regolith or soil change with the addition of water?
37590.
How does Problem Management work with Change Management?
37591.
What is the aim of the Change Management process?
37592.
What are the concerns of Risk Management?
37593.
How would you describe business case?
37594.
Where would you expect incident resolution targets to be documented?
37595.
What does the Emergency Change Advisory Board (ECAB) do?
37596.
How many people should be accountable for a process as defined in the RACI model?
37597.
How would you best describe the goal of Access Management?
37598.
What is the best description of a Service-based Service Level Agreement (SLA)?
37599.
What are the three Service Provider business models?
37600.
Which functions are included in IT Operations Management?
Prev
1
...
373
374
375
376
377
378
379
...
476
Next