EXIN EPI Certified Information Technology Manager Questions and Answers
Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?
One particular incident repeatedly occurs every first day of the working week. As part of problem management, it is decided to gather a group of technical specialists to conduct problem analysis. Which technique is recommended?
Senior management is concerned fraudulent activities may take place during large financial transactions. To reduce the risk of fraud, it expects the proper controls to be in place. Which security principle is in need of the highest attention?
To further reduce fraud cases in the transfer of land titles, the government introduces a new system which, in the back-end, makes use of blockchain technology. Key functionality of the system is speed of transmission and privacy. Which type of blockchain is most preferred for this type of application?
Whilst creating the IT service catalog, a needs analysis is conducted. One of the items discussed is the data points required for the IT services. What is the objective of these data points?
In project management, what is the objective of a 'lessons learned' report?
During Post Implementation Review (PIR) of changes, it is lately concluded that an unusual high number of changes failed to meet their objectives. What is the most likely cause of this?
The IT department is requested to select and implement technology and support which will deliver knowledge capable of supporting cross-functional business units. What do you require?
In system (application) development, a use case (user story) is a list of steps defining interactions between a role and a system to achieve a goal. What type of requirement is mentioned here?
The introduction of a security awareness program has resulted in a quick decrease in security incidents. Eight months later, security incidents are showing a sudden increase, and the blame is put on a non-functioning security awareness program. What is most likely the cause?
During financial year closing, a processing error in a critical financial system occurs. Senior management demands a change to be implemented in order to not further delay the business processes. Which sort of change is applied?
A new system (application) is developed for the marketing department. Stakeholders have demanded an independent white box test to take place. What are the stakeholders’ biggest concern?
Controls to manage risk have been implemented and evaluated successfully. Risks are now at the level which the organization is willing to accept. What is the name of this risk?
What is the Critical Success Factor (CSF) in IT services review?
Senior management suspects possible threats in the IT organization and demands a high-level assessment which will list risks identified in order of priority for treatment. Which type of analysis should be conducted?