Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Exin CITM Dumps

Page: 1 / 5
Total 50 questions

EXIN EPI Certified Information Technology Manager Questions and Answers

Question 1

Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?

Options:

A.

E-mail usage

B.

Instant (mobile) messaging

C.

Internet usage

D.

Social engineering

Question 2

One particular incident repeatedly occurs every first day of the working week. As part of problem management, it is decided to gather a group of technical specialists to conduct problem analysis. Which technique is recommended?

Options:

A.

Kepner-Tregoe

B.

Technical observation post

C.

5-Whys

D.

Fault isolation

Question 3

Senior management is concerned fraudulent activities may take place during large financial transactions. To reduce the risk of fraud, it expects the proper controls to be in place. Which security principle is in need of the highest attention?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Reliability

Question 4

To further reduce fraud cases in the transfer of land titles, the government introduces a new system which, in the back-end, makes use of blockchain technology. Key functionality of the system is speed of transmission and privacy. Which type of blockchain is most preferred for this type of application?

Options:

A.

Community blockchain

B.

Public blockchain

C.

Private blockchain

D.

Consortium blockchain

Question 5

Whilst creating the IT service catalog, a needs analysis is conducted. One of the items discussed is the data points required for the IT services. What is the objective of these data points?

Options:

A.

To measure the performance of IT services delivered

B.

To identify the data being used by the customer

C.

To determine the life expectancy of IT services

D.

To establish the operating hours of the IT services

Question 6

In project management, what is the objective of a 'lessons learned' report?

Options:

A.

To inform the project owner with the overall achievement of the project’s objectives

B.

To establish accountability for the mistakes being made in the project

C.

To identify all risks that occurred during the project

D.

Bringing forward positive and negative elements with the intent to benefit future projects

Question 7

During Post Implementation Review (PIR) of changes, it is lately concluded that an unusual high number of changes failed to meet their objectives. What is the most likely cause of this?

Options:

A.

Lack of effort in assessing and evaluating change requests

B.

Insufficient resources for change implementation

C.

Change Advisory Board (CAB) meetings are not taking place

D.

Insufficient budget allocation

Question 8

The IT department is requested to select and implement technology and support which will deliver knowledge capable of supporting cross-functional business units. What do you require?

Options:

A.

Information management

B.

Data management

C.

Both

Question 9

In system (application) development, a use case (user story) is a list of steps defining interactions between a role and a system to achieve a goal. What type of requirement is mentioned here?

Options:

A.

Functional requirement

B.

Behavioral requirement

C.

Non-functional requirement

D.

Security requirement

Question 10

The introduction of a security awareness program has resulted in a quick decrease in security incidents. Eight months later, security incidents are showing a sudden increase, and the blame is put on a non-functioning security awareness program. What is most likely the cause?

Options:

A.

Insufficient budget

B.

Scope of the program is too narrow, not covering all areas of interest

C.

Message materials are few and static, and renewal is not taking place

D.

Lack of resources for instructor-led sessions

Question 11

During financial year closing, a processing error in a critical financial system occurs. Senior management demands a change to be implemented in order to not further delay the business processes. Which sort of change is applied?

Options:

A.

Normal

B.

Standard

C.

Exceptional

D.

Emergency

Question 12

A new system (application) is developed for the marketing department. Stakeholders have demanded an independent white box test to take place. What are the stakeholders’ biggest concern?

Options:

A.

The capacity of the new system

B.

The performance of the system

C.

The quality of the source code of the system

D.

The functionality of the system

Question 13

Controls to manage risk have been implemented and evaluated successfully. Risks are now at the level which the organization is willing to accept. What is the name of this risk?

Options:

A.

Reduced risk

B.

Lowered risk

C.

Residual risk

D.

Modified risk

Question 14

What is the Critical Success Factor (CSF) in IT services review?

Options:

A.

Evaluate deliverables before meeting the customer for an IT service review

B.

Suitable location for the IT service review meeting to take place

C.

Explain shortcomings and bottlenecks during IT services review meeting with the customer

D.

Inform customers on improvements made

Question 15

Senior management suspects possible threats in the IT organization and demands a high-level assessment which will list risks identified in order of priority for treatment. Which type of analysis should be conducted?

Options:

A.

Quantitative analysis

B.

Semi-quantitative analysis

C.

Ad hoc analysis

D.

Qualitative analysis

Page: 1 / 5
Total 50 questions