Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Exin > EPI IT Management > CITM

CITM EXIN EPI Certified Information Technology Manager Question and Answers

Question # 4

Business is changing fast, resulting in the need to formally appoint a new staff member responsible for guiding the process in a controlled manner. Which role does apply?

A.

Risk Manager

B.

Service Level Manager

C.

Business Relationship Manager

D.

Change Manager

Full Access
Question # 5

One particular incident repeatedly occurs every first day of the working week. As part of problem management, it is decided to gather a group of technical specialists to conduct problem analysis. Which technique is recommended?

A.

Kepner-Tregoe

B.

Technical observation post

C.

5-Whys

D.

Fault isolation

Full Access
Question # 6

Before signing the contract with the proposed vendor, concerns have been raised over future price increases. The internal business units, however, insist that the agreement with the vendor must take place as a result of the vendor evaluation process. What is the likely action to take?

A.

Ignore the business units and change vendor

B.

Include contractual terms

C.

Sign the contract

D.

Re-tender the project

Full Access
Question # 7

During financial year closing, a processing error in a critical financial system occurs. Senior management demands a change to be implemented in order to not further delay the business processes. Which sort of change is applied?

A.

Normal

B.

Standard

C.

Exceptional

D.

Emergency

Full Access
Question # 8

As part of the business continuity plan preparations, management wants a site arrangement to facilitate a desk for the workers. Which site do you recommend?

A.

Hot site

B.

Cold site

C.

Warm site

D.

Mobile site

Full Access
Question # 9

Due to technical and operational constraints, the preferred control to lower the risks identified is to outsource part of IT operations to an external vendor. What type of risk treatment is applied here?

A.

Sharing

B.

Retention

C.

Transferred

D.

Modification

Full Access
Question # 10

Senior management suspects possible threats in the IT organization and demands a high-level assessment which will list risks identified in order of priority for treatment. Which type of analysis should be conducted?

A.

Quantitative analysis

B.

Semi-quantitative analysis

C.

Ad hoc analysis

D.

Qualitative analysis

Full Access
Question # 11

Activities in a project are discussed in a Work Breakdown Structure (WBS) session during the planning phase. Team members inform the project manager that whilst estimating the duration for activities, a lot of data exist about the effort required for each of them. Which estimation technique is best considered?

A.

Top-down

B.

Three-point

C.

Comparative

D.

Bottom-up

Full Access
Question # 12

Little to no budget is available for hiring new staff for the IT service desk. What is the ideal method of sourcing knowing that little time is available?

A.

Word of mouth

B.

Internal IT staff based on a SWOT analysis

C.

Internet job board

D.

Recruitment agency

Full Access
Question # 13

Controls to manage risk have been implemented and evaluated successfully. Risks are now at the level which the organization is willing to accept. What is the name of this risk?

A.

Reduced risk

B.

Lowered risk

C.

Residual risk

D.

Modified risk

Full Access
Question # 14

A technical team investigating possible controls concludes that the most preferred control cannot be implemented as a result of too many constraints and decides to propose the second-best control. How is this control being referred to?

A.

Deterrent

B.

Compensating control

C.

Detective control

D.

Corrective control

Full Access
Question # 15

During Post Implementation Review (PIR) of changes, it is lately concluded that an unusual high number of changes failed to meet their objectives. What is the most likely cause of this?

A.

Lack of effort in assessing and evaluating change requests

B.

Insufficient resources for change implementation

C.

Change Advisory Board (CAB) meetings are not taking place

D.

Insufficient budget allocation

Full Access