Flashcards in ITIL Sample Test 3 Notes Deck (16)
The security enforcement lifecycle model is
Threat, Incident, Damage, Control. In the event a security incident occurs, it must first be detected; subsequent measures to repress or minimize the damage are then taken.
_____ changes are non-emergency changes.
Minor normal changes are handled by the _____ _____.
Significant normal changes are approved by the _____ _____ _____.
Change Advisor Board
Major normal changes are approved by the _____ _____ _____.
IT Management Board
What type of analysis must be conducted before implementing a security measure?
A cost-benefit analysis must be conducted before implementing a security measure, to ensure the measure is appropriate for both the threat risk and potential loss.
The processes that support _____ _____ are Event Management, Incident Management, Problem Management, Request Management, and Access Management.
It is important that the _____ _____ function be made up of both support and design staff to ensure that a quality, supportable design is implemented. (Specialist Technical Architects and Designers and Specialist Maintenance and Support Staff
_____/_____ Contraints such as bandwidth throttling and session timeouts, and _____ Constraints such as penalties for usage in excess of base levels are methods for controlling demand and usage of services.
_____ _____ is carried out in the Service Design, Service Operation, and CSI phases.
Plans used to record all improvement actions and plans agreed upon between suppliers and service providers.
Supplier Service Improvement Plans
Which role is responsible for ensuring SLA targets for incident resolution are met?
Service Level Management processes are found within which two lifecycle phases?
Service Design and CSI
Service Desk, Technical Management, Application Management, and IT Operations Management are _____ _____ operation functions. Event Management is a _____ _____ process.
Security Process Model
Threat, Incident, Damage, Control