Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
C. Multi-level implementation
D. None
Ans: B
2) Multiprogramming systems:
Ans: C
3) which is the first program run on a computer when the computer boots up?
A. System software
B. Operating system
C. System operations
D. None
Ans: B
Ans: A
5) When a computer is first turned on or restarted, a special type of absolute loader called ____ is
executed
C. Bootstrap loader
D. Relating loader
Ans: C
A. Memory management
B. Disk management
C. Application management
D. Virus Protection
Ans: D
A. command.com
C. autoexec.bat
D. config.sys
Ans: C
8) Virtual Memory is
Ans: C
Ans: C
10) The file system NTFS stands for
Ans: C
A. The time taken by the dispatcher to stop one process and start another
D. None of Above
Ans: A
A. Contiguous allocation
B. Linked allocation
C. Indexed allocation
Ans: D
Ans: A
Ans: A
A. Sector
B. Offset
C. Page
D. Frame
Ans: D
A. Prompt
B. Shell
C. Command
D. DOS Prompt
Ans: B
17) The operating system keeps the information of files in a table called
Ans: C
A. Page Table
B. Paging File
C. Main Memory
D. Virtual Memory
Ans: A
A. Demand Memory
B. Demand Paging
C. Page Fault
D. Page Segmentation
Ans: B
20) Dived logical memory into blocks with the same size as frames are called
A. Pages
B. Frames
C. Page Table
D. Segmentation
Ans: A
21) When a thread waits indefinitely for some resource, but other threads are actually using it is called
A. Starvation
B. Demand Paging
C. Segmentation
D. None of them
Ans: A
22) Which of the following memory unit that processor can access more rapidly
A. Main Memory
B. Virtual Memory
C. Cache memory
Ans: C
Ans: D
24) First-in-First-Out (FIFO) scheduling is
B. Preemptive Scheduling
D. Deadline Scheduling
Ans: A
25) Copying a process from memory to disk to allow space for other processes is Called
A. Swapping
B. Deadlock
C. Demand Paging
D. Page Fault
Ans: A
A. Operation
B. Administration
C. Primary
D. Shadow
Ans: D
A. True
B. False
Ans: A
28) How do you create a group by using Active Directory Users and Computers snap in?
A. Left click the OU in Find which you want to create a group, select New, and choose Group.
B. Right click the OU in Find which you want to create a group, select New, and choose Group.
Ans: B
29) Find what option can you use to prevent deleting a group in Windows Server 2012?
Ans: C
A. Three
B. Zero
C. Ten
D. Five
Ans: A
A. Physical groupings independent of the domain and OU structure. Sites distinguish between locations
connected by low and high speed connections and are defined by one or more IP subnets.
B. The collection of every object, its attributes and attribute syntax in the Active Directory.
C. Containers in Find which domains can be grouped. They create a hierarchy for the domain and create
the structure of the Active Directorys company in geographical or organizational terms.
D. A collection of computers that share a common set of policies, a name and a database of their
members.
Ans: B
A. Store the database, maintain the policies and provide the authentication of domain logons.
Ans: A
33) What are Group Policy Objects?
A. A set of folder rules that determine where Outlook will save email messages.
B. Affords the capability for secure extension of network operations to the Web
C. They determine the hierarchy of a domain; Find which can fit the operational structure of an
organization.
D. A collection of settings that define Find what a system will look like and how it will behave for a
defined group of users.
Ans: D
34) From Which version of Windows did Microsoft adopt Kerberos as an authentication policy?
A. Windows NT
D. Windows 2008
Ans: C
35) Between Sites you can also choose to use ________ for replication, but only for changes in the
Schema or Configuration.
D. Email
Ans: C
B. NTLM
C. Samba (software)
Ans: B
37) Which of the following Active Directory containers can Group Policies are applied?
A. sites
B. OUs
C. domains
Ans: D
38) To create a GPO for a domain or an organizational unit, you use either the Active Directory Users
and Computers console or the __________.
Ans: C
39) Each GPT folder is identified by the ___________ for the GPO.
A. GPCID
B. GPTID
C. GPID
D. GUID
Ans: D
40) Group Policy settings are divided into two categories: Computer Configuration settings and
__________.
Ans: D
41) Which of the following containers contains all Registry based Group Policy settings, including
settings for Windows Components, System, and Network?
A. Administrative Templates
B. Software Templates
C. Windows Templates
D. Logon Settings
Ans: A
A. It can be used to link sites, search for sites, and to delegate Group Policy related features.
C. It provides administrators with the ability to back up, restore, import, and copy/paste GPOs, as well as
to create, delete, and rename them.
Ans: C
Hyper-v Questions
43) You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. You deploy a
new virtual machine. You add two virtual network adapters to the virtual machine. You need to ensure
that the virtual machine maintains network connectivity if one virtual network adapter fails. What
should you do?
Ans: D
44) You administer a server that runs Windows Server 2012 R2 that has the Hyper-V role installed. You
plan to apply an update to a virtual machine (VM).
Ans: B
45) You need to ensure that the environment supports online virtual hard disk resizing. What should you
do?
C. Convert the drive format of the virtual machines to the VHDX file format.
Ans: C
46) A company has seven Windows Server 2012 R2 virtual machines (VMs). The VMs are running and are
accessible over the network. You plan to copy a large .ISO file from the host server to each of the VMs.
The copy operations must meet the following requirements:
The VMs must remain accessible over the network during the copy operations.
The copy operations must NOT use a network connection.
You need to configure the VMs. What should you do on each VM?
C. Add a network adapter, and then enable the virtual machine queue (VMQ) option on the adapters.
D. Set the value of the Smart Paging File Location property to %SYSTEMROOT%\temp.
Ans: A
47) You administer a Windows Server 2012 R2 Hyper-V host server that contains production and test
virtual machines (VMs). You plan to optimize the performance of the VMs. The following settings must
be applied to the VMs: You must set a maximum value for the input/output operations per second
(IOPS) on the test VMs. You must set a minimum value for the IOPS on the production VMs. You need to
configure the environment. What should you do?
Ans: D
48) You administer two Windows 2012 R2 servers that have the Hyper-V role installed. You plan to
deploy a new Hyper-V cluster. The cluster instance must NOT be added to Active Directory. You need to
deploy the cluster. What should you do?
C. Run the Windows PowerShell cmdlet New-Cluster. Specify ActiveDirectoryAndDNS for the
AdministrativeAccessPoint parameter.
D. Run the Windows PowerShell cmdlet New-Cluster. Specify DNS for the AdministrativeAccessPoint
parameter.
Ans: D
49) You are the virtualization administrator for an organization that manages private and public cloud-
based resources. The organization uses Windows Server 2008 R2 SP1 Hyper-V. All Hyper-V host servers
are configured as nodes in a four-node cluster. The organization also uses System Center 2012 R2.
Operating system updates to each host server require a system reboot. You need to ensure that the
virtual machines remain online during any reboots required by the updates. What should you do?
B. Configure orchestrated updates of Hyper-V host clusters in System Center 2012 R2 Virtual Machine
Manager (VMM).
D. In System Center 2012 R2 Configuration Manager, add all of the servers to a collection. Deploy
updates to the collection.
Ans: B
50) A company has Active Directory Domain Services (AD DS) domain controllers that run Windows
Server 2012 R2. You prepare a disaster recovery plan for Active Directory. You have the following
requirements: The domain controller restore process must complete as quickly as possible. After the
restore process completes, the Active Directory database on the domain controller must be brought up
to date by using replication. You need to implement the disaster recovery plan. What should you do?
B. Restore the domain controllers by using the Active Directory Recycle Bin.
C. Back up and restore the domain controllers by using the wbadmin.exe tool.
D. Back up and restore the domain controllers by using the Idp.exe tool.
Ans: C
51) A company has a network that contains one Active Directory Domain Services (AD DS) domain. The
domain and forest functional levels are set to Windows Server 2008. All domain controllers run
Windows Server 2012. You need to enable the Active Directory Recycle Bin for the forest. What should
you do?
A. Raise the domain and forest functional levels to Windows Server 2012 R2.
B. Deploy new domain controllers that have Windows Server 2012 R2 installed.
C. Raise the domain and forest functional levels to Windows Server 2008 R2.
Ans: C
52) You administer the virtual machines and the Hyper-V host server for a large organization. All Hyper-
V virtual machines must start even when the host server does not have enough physical memory
available. You need to ensure that all Hyper-V virtual machines start. What should you do?
Ans: A
53) You administer two Windows Server 2012 R2 servers that have the Hyper-V role installed. You need
to create a server lab environment. The lab servers have the following requirements: All of the lab
servers must be virtual zed. All of the lab servers must be on an isolated network. All of the lab servers
must be able to communicate with each other. You need to configure networking for the lab
environment. What should you do?
Ans: D
54) You are the virtualization administrator for an organization that manages private and public cloud
resources. You need to create a virtual machine template that allows virtual machines to be moved from
Hyper-V to Windows Azure. What should you do?
A. Create a new virtual machine that uses a .vhd file. Run the Sysprep tool on the virtual machine.
B. Create a new Generation 2 virtual machine that uses a .vhdx file that is attached to a SCSI controller.
Run the Sysprep tool on the virtual machine.
C. Create a new virtual machine that uses a .vhdx file. Run the Sysprep tool on the virtual machine.
D. Create a virtual machine by using a differencing disk. Use the Clone a virtual machine option to create
new virtual machines.
Ans: A
55) A company has a visualization infrastructure that consists of two Hyper-V host servers. The host
servers and all of the virtual machines (VMs) run Windows Server 2012 R2. The company plans to deploy
VMs by using file shares that use the Server Message Block (SMB) protocol. You need to store the
maximum amount of VM data on the SMB file shares. Which three file types should you store on the
SMB file shares? Each correct answer presents part of the solution.
B. VM configuration files
D. VM snapshots
Ans: BDE
56) You have three Windows Server 2012 R2 servers that are set up as a Hyper-V cluster. You use
System Center 2012 R2 Virtual Machine Manager to manage the Hyper-V environment. Users report
that when a Hyper-V host server becomes overloaded, the performance of the virtual machines is
unacceptable. You need to analyze workloads and automatically migrate virtual machines from
overloaded host servers to host clusters that have available capacity. What should you configure?
B. Placement Rules
D. Dynamic Optimization
Ans: D
57) A company has Hyper-V host servers and virtual machines (VMs). All host servers and VMs run
Windows Server 2012 R2. You need to ensure that new VMs can boot from a SCSI virtual hard disk.
What should you create?
A. virtual disks that use the virtual hard disk (VHD) format
C. Generation 1 VMs
D. Generation 2 VMs
Ans: D
58) You administer an environment that contains a Windows Server 2012 R2 server that has the Hyper-V
role installed and a server that has System Center 2012 R2 Virtual Machine Manager (VMM). You plan to
deploy two virtual machines (VMs).
You have the following requirements:
You must minimize the likelihood that the VMs will be offline at the same time.
You must minimize the likelihood that the VMs will reside on the same Hyper-V host server in
the Hyper-V cluster.
You need to configure the two VMs. What should you do?
A. Configure the two VMs to include a value for the preferred owners setting.
D. Configure the VMs to use a custom property that contains the same value. Then, configure the VMs
as members of the same availability set.
Ans: B
59) A company has a highly-secure network infrastructure environment. All servers in the environment
run Windows Server 2012 R2. You must create a new virtual machine (VM) that meets the following
requirements:
The VM must minimize the risk that unauthorized firmware will run when the VM starts.
The VM must load the operating system only if all operating system files have a valid signature.
You need to create the new VM. What should you do?
Ans: D
60) You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. You plan to
test an update to a virtual machine (VM) in a production environment. You must meet the following
requirements: migrate the VM to another Hyper-V host as quickly as possible ensure that the VM
configuration is preserved after the migration is complete
You need to migrate the virtual machine. What should you do first?
61) You plan to use a Hyper-v host server to host virtual desktops for external customers. You have the
following requirements:
You need to configure the virtual environment. What should you do?
A. Configure a port virtual local area network (PVLAN). Connect all new VMs to the PVLAN.
B. Configure virtual networking with network isolation. Create a unique VM network for each VM.
C. Deploy VMs to the same VM network. Enable DHCP Guard and Router Guard network extensions.
D. Configure a virtual network with no isolation. Deploy VMs to the same VM network. Configure
Windows firewall on each VM to prevent the VM from communicating with other VMs on the same VM
network.
Ans: A
62) A company has Hyper-v host servers that run Windows Server 2012. The company also has virtual
machines that run Windows Server 2008 R2 or Windows Server 2012.
You upgrade the Hyper-V host servers to Windows Server 2012 R2.
You need to ensure that all virtual machines can PXE boot by using a standard network adapter. What
should you do?
C. Upgrade the existing virtual machines that run Windows Server 2008 R2 to Windows Server 2012 R2.
D. Create Generation 1 virtual machines.
Ans: A
63) You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. The server
hosts three virtual machines (VMs).
One of the VMs is managed by a security engineer. The security engineer must capture traffic on
another VM that is running on the same server.
You need to ensure that the security engineer can access the network traffic information from the target
VM. Which networking feature should you enable?
A. port mirroring
B. NIC teaming
C. protected network
Ans: A
64) A company has one Active Directory Domain Services (AD DS) forest that contains two domains. All
servers run Windows Server 2012 R2. The company uses iSCSI storage and Fibre Channel storage. You
plan to deploy a single Hyper-V failover cluster that uses Cluster Shared Volumes (CSV).
You need to ensure that you can deploy a failover cluster. What should you do?
Ans: A
65) You administer a server that runs Windows Server 2012 R2 with the Hyper-V role installed. You plan
to deploy a new virtual machine (VM to the server. The data stored by the VM doubles each month. You
have the following requirements:
The virtual hard disk (VHD) must minimize the storage space requirements.
Changes to the VHD must NOT require user intervention.
B. a file that uses the VSV file format for the data LUN
Ans: C
66) A company has an Active Directory Domain Services (AD DS) environment. All domain controllers run
Windows Server 2012 R2. The company also has a virtualization infrastructure that consists of two
Hyper-V host servers. The host servers and all of the virtual machine (VMs) run Windows Server 2012
R2. The company must deploy VMs by using file shares that use the Server Message Block (SMB)
protocol. You create a file share. You must follow the principle of least privilege.
You need to implement the NTFS and share permissions required to use the file share. Which objects
should you grant permissions to?
C. computer objects for the VMs, the SYSTEM account, and all Hyper-V administrators
D. computer objects for the Hyper-V host servers, the SYSTEM account, and all Hyper-V administrators
Ans: D
67) A company has a server that runs Windows Server 2012 R2. The Hyper-V role is installed on the
server. The server has virtual machines (VMs) that run Windows Server 2012 R2. You create two VMs.
You also create four virtual hard disks. Two of the virtual hard disks use the VHD file format and two use
the VHDX file format.
You plan to create a failover cluster by using the two VMs on the Hyper-V host server.
You need to prepare the storage for the VMs. What should you do?
A. Enable virtual hard disk sharing for one of the VHDX-based hard disks.
B. Run the Windows PowerShell cmdlet Optimize-VHD against the VHD-based hard disks.
C. Enable virtual hard disk sharing for one of the VHD-based hard disks.
D. Run the Windows PowerShell cmdlet Optimize-VHD against the VHDX-based hard disks.
Ans: A
DNS Questions
68) The entire hostname has a maximum of
A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Ans: A
Ans: D
70) If a server has no clue about where to find the address for a hostname then
A. server asks to the root server
B. server asks to its adjacent server
C. request is not processed
D. none of the mentioned
Ans: A
71) Which one of the following allows client to update their DNS entry as their IP address change?
A. Dynamic DNS
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Ans: A
Ans: B
73) The right to use a domain name is delegated by domain name registers which are accredited by
A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Ans: D
Ans: C
A. DNS Server
B. Hub
C. DHCP Server
D. Firewall
Ans: A
A. DNS handler
B. DNS resolver
C. DNS updater
D. None of the above
Ans: B
A. domain space
B. main name
Ans: C
A. a linear list
B. an inverted-tree
C. a graph
Ans: B
A. semicolons
B. dots
C. colons
Ans: B
80) What a server is responsible for or has authority over is called a _________.
A. domain
B. label
C. zone
Ans: C
A. domain server
B. zone server
C. root server
Ans: C
82) A ________ server loads all information from the disk file.
A. primary
B. secondary
C. zone
Ans: A
83) When the secondary downloads information from the primary, it is called ______ transfer.
A. domain
B. zone
C. label
Ans: B
A. inverse
B. reverse
C. root
Ans: A
85) DNS can use the services of ________ using the well-known port 53.
A. UDP
B. TCP
Ans: C
SMTP and Network Basic Questions
86) Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for
electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
Ans: A
Ans: A
Ans: D
Ans: A
90) Which one of the following is an SMTP server configured in such a way that anyone on the internet
can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) none of the mentioned
Ans: A
91) If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
Ans: C
92) Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
Ans: A
Ans: B
DHCP
SMTP
HTTP
TFTP
FTP
A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
Ans: B
95) You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
Ans: C
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
Ans: D
97) Which of the following allows a router to respond to an ARP request that is intended for a remote
host?
A. Gateway DP
C. Proxy ARP
Ans: C
98) Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class D
Ans: C
A. 1 only
B. 2 and 3
C. 3 and 4
D. 2, 3 and 4
Ans: C
100) what protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
Ans: B
Ans: D
B. windows
Ans: D
A. public-key cryptography
B. private-key cryptography
Ans: A
104) which standard TCP port is assigned for contacting SSH servers?
A. port 21
B. port 22
C. port 23
D. port 24
Ans: B
105) which one of the following is a file transfer protocol using SSH?
A. SCP
B. SFTP
C. Rsync
Ans: D
A. RCP protocol
B. DHCP protocol
C. MGCP protocol
Ans: A
A. public-key
B. host based
C. password
Ans: D
108) Which file is used to change the default ssh port in Linux?
A. /etc/ssh/sshc_config
B. /etc/sshd/ssh_config
C. /etc/ssh/sshd_config
D. /etc/ssh/sshserver_config
Ans: C
B. Secure Copy
C. Simple Copy
D. Sequential Copy
Ans: B
110) __________ which allows you to establish a secure SSH session and then tunnel arbitrary TCP
connections through it.
A. SSH Tunneling
B. SSH Masking
C. SSH Translation
D. SSH NAT
Ans: A
111) _______ is a command which allows us to automatically supply password to the command prompt
so that automated scripts can be run.
A. SSH Password
B. sshpass
C. SecurePass
D. SCP
Ans: B
A. ssh V
B. ssh S
C. ssh T
D. ssh H
Ans: A
113) Default Port for Telnet
A. 21
B. 23
C. 27
D. 26
Ans: B
Ans: A
A. dm
B. rm
C. delete
D. erase
Ans: B
A. SPARC
B. IBM-compatible
C. Alpha
D. Macintosh
Ans: D
117) How can you add Amit, a new user, to your system?
A. Using useradd
B. Using adduser
C. Using linuxconf
Ans: D
118) What file specifies the order in which to use specified name services?
A. /etc/services
B. /etc/nsorder
C. /etc/nsswitch.conf
D. /etc/hosts
Ans: C
A. 16
B. 4
C. 2
D. 1
Ans: B
Ans: D
A. fdisk
B. mkfs
C. fsck
D. mount
Ans: B
122) Which of the following command can you execute to count the number of lines in a file?
A. lc
B. wc - l
C. cl
D. count
Ans: B
A. grep
B. mail
C. mesg
D. write
Ans: A
A. au
B. ps
C. du
D. pid
Ans: B
125) Which of the following command is used to access an SMB share on a Linux system?
A. NFS
B. SMD
C. smbclient
D. smbserver
Ans: C
A. tar
B. dir
C. lp
D. ls
Ans: D
A. mount
B. df
C. du
D. dd
Ans: B
A. Ext2
B. Ext3
C. Isofs
D. Procfs
Ans:C
129) Which file contains the filesystems to be automatically mounted during boot?
A. /etc/mount
B. /etc/fstab
C. /etc/inittab
D. /etc/boot
Ans: B
Ans: B
A. 0
B. 1
C. 32767
Ans: B
A. waitpid
B. getpid()
C. getppid()
D. parentid()
Ans: C
A. any terminal
B. no terminal
C. root terminal
D. system console
Ans: B
D. write only
Ans: C
A. /etc/shadow
B. /etc/enpasswwd
C. /etc/.passwd
D. /etc/passwd
Ans: A
A: services.chm
B: services.exe
C: services.msc
D: services.cpl
Ans: C
137) A virtual infrastructure administrator has been asked to restore a virtual machine to its previous
configuration from a snapshot. Which of the following actions should take?
A: Delete all
B: Revert
C: Consolidate
D: Delete
Ans: B
138) To migrate to a new host and datastore in a single operation, what is most likely the reason if the
option is grayed out in the Migrate Virtual Machine Wizard?
Ans: B
A: VMXNET 2
B: vlance
C: VMXNET 3
D: VMXNET
Ans: C
140) Which disk mode results in a disk that loses all changes at virtual machine power off or reset?
A: Dependent Persistent
B: Dependent NonPersistent
C: Independent Persistent
D: Dependent NonPersistent
Ans: D
141) When the virtual machine has been converted to a template, what is the file extension
configuration?
A: .vmxf
B: .vmx
C: .vmsd
D: .vmtx
Ans: D
A: VMCI
B: Mouse
C: Memory Control
D: VMXNet
143) What is the largest VMDK file that can be created on a new VMFS-5 datastore for your ESXi host?
A: 1TB
C: 64TB
D: 2TB
Ans: B
144) While the virtual machine is powered on, which of the following options can be modified in the
virtual machine properties?
A: CPUID Mask
B: Power Management
Ans: C
145) Which file is a database that stores information and metadata about snapshots for a virtual
machine?
A: .vmsd
B: .vswp
C: .vmsn
D: .vmss
Ans: A
146) Choose two. Which file types can be moved outside the working location of a virtual machine?
A: VMDK
B: VMX
C: LOG
D: VSWP
Ans: A,D
150) VMware vSphere can be evaluated prior to purchase. What is the maximum number of days the
evaluation can be used before a license must be purchased?
A. 30 Days
B. 60 Days
C. 90 Days
D. 120 Days
Ans: B
151) What protocol is used by an ESXi host to communicate with NAS devices?
A. NFS
B. iSCSI
C. CIFS
D. SMB
Ans: B
152) What the packaging format used by the VMware ESXi Image Builder?
A. .rar
B. .zip
C. .iso
D. VIB
Ans: C
153) What are the three default roles provided on an ESXi host?
A. No Access, Read Only and Administrator
B. Read only, Operator Access and Administrator
C. Virtual Machine User, Virtual Machine Power User and Administrator
D. Network Consumer, Datastore Consumer and Resource Pool Administrator
Ans: A
154) Distributed Power Management (DPM) requires which technology to be available on the NIC?
A. Wake On LAN (WOL)
B. DNS
C. BMC
D. NetBIOS
Ans: A
Ans: C
1 - standard change
2 - normal change
3 - urgent change
A. 1 only
B. 2 and 3 only
C. 1 and 2 only
Ans: C
A. An SLA covering all Customer groups and all the services they use
B. SLAs for each service that are Customer-focused and written in business language
C. An SLA for each service type, covering all those Customer groups that use that Service
D. An SLA with each individual Customer group, covering all of the services they use
Ans: D
158) Which of the following is not an element of Availability Management?
A. Verification
B. Security
C. Reliability
D. Maintainability
Ans: A
Ans: A
160) The activity that aims to identify the potential damage or loss to an Organisation resulting from
disruption to critical business processes is:
Ans: B
161) Intermediate Recovery is initially concerned with which of the following time periods?
A. 4 to 24 hours
C. 24 to 72 hours
D. 4 to 8 hours
Ans: C
A. When it is urgent
D. Never
Ans: D
B. A mixture of business, technical and legal language, so that they can be understood by everyone
Ans: C
164) A remote site has recently had its network upgraded. The users are now complaining of slow
responses and have heard that this is due to problems with capacity. Who should they contact for
assistance?
A. Network Management
C. Capacity Management
D. Problem Management
Ans: B
165) Which of the following metrics is most relevant in determining the value added by Problem
Management to the Service Desk?
Ans: B