Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Exin CITM EXIN EPI Certified Information Technology Manager Exam Practice Test

Page: 1 / 5
Total 50 questions

EXIN EPI Certified Information Technology Manager Questions and Answers

Question 1

A technical team investigating possible controls concludes that the most preferred control cannot be implemented as a result of too many constraints and decides to propose the second-best control. How is this control being referred to?

Options:

A.

Deterrent

B.

Compensating control

C.

Detective control

D.

Corrective control

Question 2

In vendor selection, what is the most important reason for a reference check?

Options:

A.

To independently verify and validate a vendor’s claim

B.

To verify products by other customers

C.

To obtain financial information for vendor negotiation

D.

To identify customers not mentioned on the reference list

Question 3

In business continuity planning, the maximum age of the data to restore in the event of a disaster is considered which of the following?

Options:

A.

Maximum Time Allowed (MTA)

B.

Recovery Time Objective (RTO)

C.

Maximum Allowable Outage (MAO)

D.

Recovery Point Objective (RPO)

Question 4

Senior management requests a service requirement analysis to justify the need for a vendor. During the analysis, it is concluded that the internal IT provider has insufficient manpower and lacks the skills to deliver the work required. Which gaps are identified?

Options:

A.

Financial and organizational

B.

Technical and organizational

C.

Financial and technical

Question 5

The project brief/project charter is created. Which of the following is not part of it?

Options:

A.

Detailed planning

B.

High-level risk

C.

Summary budget

D.

Quality expectations

Question 6

What is the correct sequence of activities for a risk assessment?

Options:

A.

Monitor and review — establish context — identify — evaluate — treatment

B.

Communication — establish context — analyse — treatment — monitor and review

C.

Establish context — identify — analyse — evaluate — treatment

D.

Identify — analyse — evaluate — treatment — monitor and review

Question 7

The introduction of a security awareness program has resulted in a quick decrease in security incidents. Eight months later, security incidents are showing a sudden increase, and the blame is put on a non-functioning security awareness program. What is most likely the cause?

Options:

A.

Insufficient budget

B.

Scope of the program is too narrow, not covering all areas of interest

C.

Message materials are few and static, and renewal is not taking place

D.

Lack of resources for instructor-led sessions

Question 8

During the system (application) development project, the customer wants to know how software will be maintained to assure that future functional requirements are incorporated. What type of system maintenance is the customer looking for?

Options:

A.

Preventive maintenance

B.

Perfective maintenance

C.

Corrective maintenance

D.

Adaptive maintenance

Question 9

Senior management is concerned fraudulent activities may take place during large financial transactions. To reduce the risk of fraud, it expects the proper controls to be in place. Which security principle is in need of the highest attention?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Reliability

Question 10

The IT service catalog is being reviewed. Which of the below is not considered a criterion for review?

Options:

A.

Are any of the existing services up for retiring within the foreseeable future?

B.

Are there any new laws, codes, and/or regulations which might impact the current service offerings?

C.

Are there any changes in the IT service provider organization?

D.

Are the service offerings still relevant and appropriate?

Question 11

Before the marketing department will decide on a new advertising campaign, it wants to be able to gain more insights into the customer, being able to predict the products customers will purchase in the near future. What is a ‘must-have’ criterion in terms of the technology the marketing department is interested in?

Options:

A.

Records Management System (RMS)

B.

Advanced analytics

C.

Ad hoc analysis

D.

Business Intelligence (BI)

Question 12

During several project meetings, it is discovered that certain team members are not fully aware of, and/or do not understand, the activities for which they are responsible. Which process is most likely to be blamed for this?

Options:

A.

Risk management

B.

Cost management

C.

Communication management

D.

Scope management

Question 13

A selection process for new IT staff has started. The Human Resource department has requested to follow the corporate staff hiring protocol. One mandatory item to be included is additional screening. What is verified by doing this?

Options:

A.

Salary demands

B.

Number of years working experience

C.

Criminal record

D.

Educational level

Question 14

The team responsible for network security has proposed a firewall as the preferred control for the network perimeter. How is this type of control categorized?

Options:

A.

Technical preventive control

B.

Physical detective control

C.

Administrative deterrent control

D.

Physical corrective control

Question 15

Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?

Options:

A.

E-mail usage

B.

Instant (mobile) messaging

C.

Internet usage

D.

Social engineering

Page: 1 / 5
Total 50 questions