Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Exin CITM Dumps Questions Answers

Page: 1 / 4
Total 50 questions

EXIN EPI Certified Information Technology Manager Questions and Answers

Question 1

In testing the business continuity plan, senior business managers wish to compare data which is in both the main and alternative site, before participating in a full interruption test. Which type of test do they want to take place?

Options:

A.

Parallel test

B.

Simulation test

C.

Structured walk-through test

D.

Checklist test

Buy Now
Question 2

The organization’s online retail system popularity has resulted in global demand. To provide customers with a 24x7 option for support in regard to returning products, a virtual assistant is designed providing simple instructions based on pre-defined questions which are commonly asked by customers. Which type of Machine Learning (ML) is applied?

Options:

A.

Unsupervised

B.

Supervised

C.

Reinforcement learning

D.

Deep learning

Question 3

When selecting a new vendor, continuity needs to be guaranteed as much as possible. At a minimum, which criteria are considered?

Options:

A.

Scope, maintenance, and price

B.

Terms and conditions, maintenance, and terms of engagement

C.

Price, training, and support

D.

Head count, support, and financial stability

Question 4

Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?

Options:

A.

E-mail usage

B.

Instant (mobile) messaging

C.

Internet usage

D.

Social engineering

Question 5

Business is changing fast, resulting in the need to formally appoint a new staff member responsible for guiding the process in a controlled manner. Which role does apply?

Options:

A.

Risk Manager

B.

Service Level Manager

C.

Business Relationship Manager

D.

Change Manager

Question 6

What is the correct sequence of activities for a risk assessment?

Options:

A.

Monitor and review — establish context — identify — evaluate — treatment

B.

Communication — establish context — analyse — treatment — monitor and review

C.

Establish context — identify — analyse — evaluate — treatment

D.

Identify — analyse — evaluate — treatment — monitor and review

Question 7

Users (customers) are complaining about the quality of how problems are being solved. What is the most likely cause?

Options:

A.

Poor registration of problems

B.

Wrong allocation of problems

C.

Errors in priority

D.

Lack of budget to manage problems

Question 8

Your organization considers a job rotation program. What is the main objective?

Options:

A.

Support the long-term continuity of the organization

B.

Train staff on a range of activities common in daily operations

C.

Increase staff job satisfaction

D.

Allow staff a diversity in their daily responsibilities

Question 9

A selection process for new IT staff has started. The Human Resource department has requested to follow the corporate staff hiring protocol. One mandatory item to be included is additional screening. What is verified by doing this?

Options:

A.

Salary demands

B.

Number of years working experience

C.

Criminal record

D.

Educational level

Question 10

The IT service catalog is being reviewed. Which of the below is not considered a criterion for review?

Options:

A.

Are any of the existing services up for retiring within the foreseeable future?

B.

Are there any new laws, codes, and/or regulations which might impact the current service offerings?

C.

Are there any changes in the IT service provider organization?

D.

Are the service offerings still relevant and appropriate?

Question 11

The team responsible for network security has proposed a firewall as the preferred control for the network perimeter. How is this type of control categorized?

Options:

A.

Technical preventive control

B.

Physical detective control

C.

Administrative deterrent control

D.

Physical corrective control

Question 12

To further reduce fraud cases in the transfer of land titles, the government introduces a new system which, in the back-end, makes use of blockchain technology. Key functionality of the system is speed of transmission and privacy. Which type of blockchain is most preferred for this type of application?

Options:

A.

Community blockchain

B.

Public blockchain

C.

Private blockchain

D.

Consortium blockchain

Question 13

Little to no budget is available for hiring new staff for the IT service desk. What is the ideal method of sourcing knowing that little time is available?

Options:

A.

Word of mouth

B.

Internal IT staff based on a SWOT analysis

C.

Internet job board

D.

Recruitment agency

Question 14

During the system (application) development project, the customer wants to know how software will be maintained to assure that future functional requirements are incorporated. What type of system maintenance is the customer looking for?

Options:

A.

Preventive maintenance

B.

Perfective maintenance

C.

Corrective maintenance

D.

Adaptive maintenance

Question 15

Senior management requests a service requirement analysis to justify the need for a vendor. During the analysis, it is concluded that the internal IT provider has insufficient manpower and lacks the skills to deliver the work required. Which gaps are identified?

Options:

A.

Financial and organizational

B.

Technical and organizational

C.

Financial and technical

Page: 1 / 4
Total 50 questions