100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Mng IT Final SATISFIED REVIEW EXAM QUESTIONS AND ANSWERS VERIFIED SOLUTION

Puntuación
-
Vendido
-
Páginas
13
Subido en
25-04-2025
Escrito en
2024/2025

In the event of the user cancelling or quitting the process 'Update Customer' any changes made by the user will be reversed," is an example of what type of non-functional requirement? - ANSWERSProcess Which of the following are top objectives for adopting cloud, according to the Deloitte survey? - ANSWERSCatalyze IT Innovation Improve Speed/Time to Market Gain Access to New Technology What percentage of respondents indicated that regulations around data privacy and protection are affecting their disruptive outsourcing decisions? - ANSWERS76% According to Gartner, which external factor has the largest impact on sourcing and service decision making? - ANSWERSDigital Business Transformation According to the Gartner survey, what percentage of VMOs report to IT? - ANSWERS60% Which of the following are best practices for outsourcing? - ANSWERS-Develop strategic partnerships with the outsourcing vendor -Robust and thorough business and QA processes are developed and maintained for the project by both the company that is outsourcing as well as the vendor -Both parties must understand the compliance requirements that the partnership may be subject to -The outsourcing vendor participates in formulating design specifications Security and Privacy - ANSWERS-Different countries have different laws related to the protection and privacy of data -There is a lot of concern about the security and privacy of the data. Many CIOs are not comfortable about their data located in a data center in a foreign country Maturity and Performance - ANSWERS-High availability is a major concern.Hence a reliable service is very much necessary -Many Cloud providers may not be ableto provide 24/7 service always. Cloudoutages may cause severe damage tothe services and any breach of servicelevel agreements will lead to hugepotential losses Compliance and Data Sovereignty - ANSWERS-Organizations in many countries have specific requirements and laws about data sovereignty -Cloud service providers need to comply with the requirements that may restrict about hosting services in the data centers in that country. Organizations are subject to audits and oversights which may restrict them from free exchange of data from one country to another Lack of standards - ANSWERS-Cloud service providers have their own proprietary standards and switching from one Cloud service provider to another becomes quite complicated -True standards for how applications communicate and control applications that are in a vendor's Cloud have not yet been established What are some common reasons that solution fail to meet requirements? - ANSWERS-Poor understanding of the business need or problem -Poorly stated requirements -Inadequately explored solution options -Misalignment between requirements and project scope -Poor project planning/execution -Poor change management What is considered a best practice for capturing user requirements in a way that they can best understand? - ANSWERSUse Case Observation of users in the course of their use of the existing system to gather requirements is referred to as - ANSWERSJob Shadowing The process of gathering requirements from stakeholders is best referred to as - ANSWERSelicitation Which of the following is a common characteristic of non-functional requirements? - ANSWERSThey often end in "-ility" or "-ity" Blamco is rolling out a new IT service. The strategic importance of this service is low, but it will contribute highly to operational performance. What is the best sourcing strategy for this new service? - ANSWERSOutsource According to Gartner, the practice of managing two separate but coherent styles of work - one focused on predictability and the other on exploration, describes what approach to IT management? - ANSWERSBimodal According to recent survey data from Deloitte, what is the primary motivation for outsourcing to the cloud? - ANSWERSCatalyzing IT innovation Asking a stakeholder "how many times do you expect to run this process per hour," is eliciting what kind of a non-functional requirement? - ANSWERSA capacity requirement In terms of sourcing decisions, which of the following is a specific challenge for cloud computing? - ANSWERSOrganizations in many countries have specific requirements and laws about data sovereignty Business Analysis Knowledge Areas - ANSWERS1. Business Analysis Planning and Monitoring 2. Elicitation and Collaboration 3. Requirement Life Cycle Management 4. Strategy Analysis 5. Requirement Analysis and Design Definition 6. Solution Evaluation Julie is a BA who is carefully analyzing and deconstructing the way that a user interacts with an application, and the way one application interacts with another. What elicitation technique is she using? - ANSWERSInterface Analysis Who is allowed to execute this transaction? - ANSWERSSecurity How many transactions per day will the system process? - ANSWERSCapacity What is the maximum amount of time a user can be expected to wait for this transaction to complete? - ANSWERSPerformance What hours must this transaction be supported? - ANSWERSAvailability "For American users all currency will be stored as USD" is an example of what type of non-functional requirement? - ANSWERSData What is the cybersecurity principle that advises putting as many layers of protection in place as possible, and avoiding any single point of failure? - ANSWERSdefense in depth Malware that targets your critical data and systems for the purpose of extortion is known as: - ANSWERSRansomware The video discussed in class, explained 'vishing in action' and social engineering at the DEFCON conference. Which of the following were actual examples? - ANSWERSIt is really easy for people to use basic information you share online to impersonate someone associated with you and get support staff to provide access to your account - as illustrated by the 'Jess and the crying baby' example. People are easily manipulated via phishing and can readily provide hackers access to sensitive data - as illustrated with the narrator and installing certificates that granted access to the webcam and computer What technology can protect the confidentiality and integrity of data when it is in-transit over the network and also at-rest in persistent storage? - ANSWERSEncryption What is the term to describe the set of activities and other measures intended to protect-from attack, disruption, or other threats-computers, computer networks, related hardware and devices software and the information they contain and communicate, including software and data, as well as other elements of cyberspace? - ANSWERSCybersecurity This technology is leveraged to control and limit inbound and outbound network traffic and secure network access. - ANSWERSFirewalls Cyberattacks on elections are most likely a threat to which element of information security? - ANSWERSIntegrity The reading on TikTok clarifies that the app does what? - ANSWERSCollects users app browsing data, app search history, in-app messages, and if they grant permission: phonebook, phone number, social contacts, GPS data, age/biographic information, payment information, etc. As software vendors incorporate stronger security measures into their products, it is becoming more expensive for hackers to successfully penetrate software. As a result, adversaries are increasingly using what technique in cyberattacks? - ANSWERSSocial Engineering A cyberattack that uses multiple computers to flood a system with information from many sources at the same time is known as: - ANSWERSDDoS Which of the following are reasons why it is so challenging to make a precise risk determination for cybersecurity? - ANSWERS-We have a poor understanding of adversary capabilities and resources -We have a poor understanding of the consequences of a successful attack -We have a poor understanding of the effectiveness of cybersecurity countermeasures Why are small businesses especially vulnerable to cybersecurity threats? - ANSWERS-They tend to have limited resources -They don't usually have the know-how to protect themselves What is an option Congress should consider to handle situations similar to TikTok according to the CRS document? - ANSWERSDevelop an overarching legal and regulatory framework to protect the security and privacy of U.S. citizens' data and communication According to CrowdStrike, which industry was has seen a dramatic increase in intrusions between 2019 and 2020? - ANSWERSManufacturing According to CrowdStrike, which vertical has the most activity from China during the first half of 2020? - ANSWERSTelecommunications What is the most important preventive measure that organizations can implement in order to protect themselves against ransomware attacks? - ANSWERSUsers awareness and training According to the federal government, which of the following are factors that that organizations should consider before paying a ransom? - ANSWERS-Paying a ransom does not guarantee an organization will regain access to their data -Some victims who paid the demand were targeted again by cyber actors -After paying the originally demanded ransom, some victims were asked to pay more to get the promised decryption key The Four Ps of Service Design - ANSWERSPeople Process Products Partners Service Level Management - ANSWERSEnsure that IT and the customers have a clear and unambiguous understanding of the level of service to be delivered Capacity Management - ANSWERSEnsures that all the current and future performance aspects of the business requirements are provided Availability Management - ANSWERSProvides management of IT services with operational disciplines to avoid unnecessary and potentially devastating outages IT Service Continuity Management - ANSWERSEnsures that required IT technical and services facilities can be recovered within required, and agreed, business timescales What was the primary metaphor that the video used to illustrate an IT service catalog? - ANSWERSThe menu at a restaurant Looking at the sample IT service catalog, would you say it is more of a business or technical service catalog? - ANSWERSBusiness service catalog The first component of risk management establishes a risk context, describing the environment in which risk-based decisions are made. What is the name for this component of risk management? - ANSWERSFrame According to the CEO, what was the probability of a tsunami breaching the sea wall at the Fukushima Daiichi plant? - ANSWERS0% A weighted risk factor based on an analysis of the probability that a given threat is capable of exploiting a given weakness - ANSWERSLikelihood A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited - ANSWERSVulnerability The magnitude of harm that can be expected to result from the consequences of a negative event - ANSWERSImpact Any circumstance or event with the potential to adversely impact organizational operations and assets - ANSWERSThreat A team may choose to postpone or even cancel a project due to concerns about risk. What kind of risk response does this represent? - ANSWERSAvoidance Availability, skill level, and retention of the members of the development team - ANSWERSPeople Risk Inaccuracies in assessing the resources and the time required to build the product properly - ANSWERSEstimation Risk Changes to the statekholder requirements or lack of understanding of the impact of these changes - ANSWERSCustomer Risk Software or hardware that are being used as part of the system being developed - ANSWERSTechnology Risk How do we calculate risk exposure? - ANSWERSRE = Probability x Impact In ITIL, what is the primary purpose of CSI? - ANSWERSContinually align and re-align IT services to business needs In the seven step improvement process, the final step is: - ANSWERSImplement corrective action According to CSI, what are the reasons why we should monitor and measure? - ANSWERSTo validate To direct To justify To intervene Increase sales - ANSWERSObjective Percentage of visitors converting to leads as compared to last month - ANSWERSKPI (Key Performance Indicator) Leads increased by 25% over the next 12 months - ANSWERSCSF (Critical Success Factor) Page Views - ANSWERSMeasure Key Performance Indicators (KPI) are best described as: - ANSWERSCalculated measures that quantify strategic performance Which of the following are examples of operational metrics? - ANSWERSDefect Rates Help Desk Response time A project is _____ in that it has a defined _____ and end in time, and therefore defined _____ and resources. - ANSWERSTemporary Beginning Scope According to your reading, where is most of the e-waste leaving the United States shipped to first? - ANSWERSHong Kong Which of the following are second order impacts of IT ? - ANSWERS-Intelligent production processes -Intelligent design and operation of products -Reorganisation of supply chains and business organisation -The process of e-materialisation Which of the following renewable energy sources does Apple use to power its data centers? - ANSWERSBiogas fuel cells Micro-hydro Solar Wind According to OECD research, approximately what percentage of jobs in the United States are at high risk of automation? - ANSWERS10% What age group is most at risk due to automation? - ANSWERSYoung people Which of the following statements accurately describe objective metrics? - ANSWERSObjective metrics are easily quantifiable, like time or cost In terms of metrics, efficiency measures tell us what? - ANSWERSHow well the organization uses its resources In the Deming Cycle, the elements are: - ANSWERSPlan, Do, Check, Act In the Deming Cycle, "check" refers to: - ANSWERSAuditing to verify What is the vision? - ANSWERSVision and business objectives Where are we now? - ANSWERSAssessments Where do we want to be? - ANSWERSMeasurable Targets How do we get there? - ANSWERSProcess improvement or re-engineering Did we get there? - ANSWERSMeasurement and Metrics In implementing corrective action, steps being taken to make the improvement are communicated to the organization and then - ANSWERSA new baseline is established and the cycle can start anew You are the manager of an IT helpdesk. Which of the following KPIs would be most useful for you? - ANSWERSWeb page response times The cost of software development projects trend steadily downward Percentage decrease in backlog of unresolved trouble tickets What kind of risk factor would a denial-of-service (DOS) attack represent? - ANSWERSThreat Determining appropriate courses of action consistent with organizational risk tolerance is a component of what risk management process? - ANSWERSRisk Response Greater awareness of the impact of IT on the world at large has focused attention on three key components for sustainable IT. Which of the following components are included in that list? - ANSWERSEconomic performance Effects on society Impact to the natural environment Your company does not have an audit process to ensure that software security updates are applied in a timely manner. This is an example of what kind of risk factor? - ANSWERSVulnerability Which of the following is a first order environmental impact of IT? - ANSWERSElectronic waste (e-waste) Ultimately, risk determination is a product of what two elements? - ANSWERSLikelihood and impact Dave is an IT manager overseeing a PC upgrade project. He wants to dispose of the old devices in the most sustainable manner possible. Which of the following should he do? - ANSWERSFind an e-steward certified recycler to responsibly dispose of the old devices Data in a database is accessed via four basic operations abbreviated as CRUD. - ANSWERSCreate Read Update Delete In a database, business entities like "customer" correspond to what two-dimensional structure? - ANSWERSTable What is the term commonly used to describe the non-relational database paradigms that are often used to store Big Data? - ANSWERSNoSQL Which of the following are challenges for IoT? - ANSWERSSecurity and privacy issues Regulatory standards for data markets Technical skills to leverage newer aggregation tools Standard for handling UNstructured data According to NIST, Big Data refers to the inability of traditional data architectures to efficiently handle the new datasets. Characteristics of Big Data that force new architectures are - ANSWERSVariety Variability Velocity Volume Technologies and techniques that improve compliance with prescribed action - ANSWERSAugmented behavior Analytical tools that improve the ability to describe, predict, and exploit relationships among phenomena - ANSWERSAugmented intelligence A mechanism for communicating an electronic signal - ANSWERSNetworks A device that generates an electronic signal from a physical condition or event - ANSWERSSensors What is the first layer of a neural network called? - ANSWERSInput Layer What acronym describes the AI/ML use case where the goal is to automate manual processes through the creation of software robots to replace or supplement repetitive tasks performed by humans? - ANSWERSRPA What is the term used to describe the subfield of machine learning where algorithms learn to classify complex patterns such as images? - ANSWERSDeep Learning Zillow awarded $1M earlier this year to data scientists who helped improve the accuracy of the Zestimate home estimator, a machine learning algorithm that today estimates the market value of roughly 110 million homes in the US. The Zestimate is a good example of what kind of analytics? - ANSWERSPredictive analytics What is the term used to describe the Machine Learning (ML) method where the learning algorithm must discover latent patterns and structure from unlabeled observations? - ANSWERSUnsupervised True or False, OLAP databased are designed to be used for transactional processing, and are optimized for reliability and performance. - ANSWERSFalse Decision support databases support complex dashboards and reports, combine data from multiple sources, and are optimized for query and analysis operations (fast read only) as opposed to transaction processing (fast read and write) operations. What is the term commonly used to describe these kinds of environments? - ANSWERSData Warehouse What key component in IoT does this IEEE definition describe: "an electronic device that produces electrical, optical, or digital data derived from a physical condition or event. Data produced is then electronically transformed, by another device, into information (output) that is useful in decision making done by "intelligent" devices or individuals (people)?" - ANSWERSSensor What is the name for the Big Data solution that is a data-driven design pattern optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics, and operations? - ANSWERSData Lake Petabyte-sized (1015 bytes, or 1,000 terabytes) databases can now be searched and analyzed, even when populated with unstructured (for example, text or video) data sets. Software that learns might substitute for human analysis and judgment in a few situations. Which of the technologies enabling the Internet of Things (IoT) does this describe? - ANSWERSAugmented intelligence Which of the following are categories of NoSQL databases? - ANSWERSKey-Value Stores Document-oriented databases

Mostrar más Leer menos
Institución
MNG
Grado
MNG









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
MNG
Grado
MNG

Información del documento

Subido en
25 de abril de 2025
Número de páginas
13
Escrito en
2024/2025
Tipo
Examen
Contiene
Desconocido

Temas

Vista previa del contenido

Mng IT Final SATISFIED REVIEW EXAM
QUESTIONS AND ANSWERS VERIFIED
SOLUTION


"In the event of the user cancelling or quitting the process 'Update Customer' any changes made by the
user will be reversed," is an example of what type of non-functional requirement? - ANSWERSProcess



Which of the following are top objectives for adopting cloud, according to the Deloitte survey? -
ANSWERSCatalyze IT Innovation

Improve Speed/Time to Market

Gain Access to New Technology



What percentage of respondents indicated that regulations around data privacy and protection are
affecting their disruptive outsourcing decisions? - ANSWERS76%



According to Gartner, which external factor has the largest impact on sourcing and service decision
making? - ANSWERSDigital Business Transformation



According to the Gartner survey, what percentage of VMOs report to IT? - ANSWERS60%



Which of the following are best practices for outsourcing? - ANSWERS-Develop strategic partnerships
with the outsourcing vendor

-Robust and thorough business and QA processes are developed and maintained for the project by both
the company that is outsourcing as well as the vendor

-Both parties must understand the compliance requirements that the partnership may be subject to

-The outsourcing vendor participates in formulating design specifications

, Security and Privacy - ANSWERS-Different countries have different laws related to the protection and
privacy of data

-There is a lot of concern about the security and privacy of the data. Many CIOs are not comfortable
about their data located in a data center in a foreign country



Maturity and Performance - ANSWERS-High availability is a major concern.Hence a reliable service is
very much necessary

-Many Cloud providers may not be ableto provide 24/7 service always. Cloudoutages may cause severe
damage tothe services and any breach of servicelevel agreements will lead to hugepotential losses



Compliance and Data Sovereignty - ANSWERS-Organizations in many countries have specific
requirements and laws about data sovereignty

-Cloud service providers need to comply with the requirements that may restrict about hosting services
in the data centers in that country. Organizations are subject to audits and oversights which may restrict
them from free exchange of data from one country to another



Lack of standards - ANSWERS-Cloud service providers have their own proprietary standards and
switching from one Cloud service provider to another becomes quite complicated

-True standards for how applications communicate and control applications that are in a vendor's Cloud
have not yet been established



What are some common reasons that solution fail to meet requirements? - ANSWERS-Poor
understanding of the business need or problem

-Poorly stated requirements

-Inadequately explored solution options

-Misalignment between requirements and project scope

-Poor project planning/execution

-Poor change management



What is considered a best practice for capturing user requirements in a way that they can best
understand? - ANSWERSUse Case
$17.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
paugrades1479
2.0
(1)

Documento también disponible en un lote

Thumbnail
Package deal
A PACKAGE DEAL OF MNG EXAM DISTINCTION GUARANTEED
-
15 2025
$ 238.35 Más información

Conoce al vendedor

Seller avatar
paugrades1479 Nursing
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
2 año
Número de seguidores
1
Documentos
470
Última venta
2 año hace

2.0

1 reseñas

5
0
4
0
3
0
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes