Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the subsequent stages of Gartner’s cost optimization framework describes the proper form of partnership with IT vendors, that could benefit every party in instances of economic upturns?
Correct
IT procurement is the method of sourcing and obtaining information technology belongings to power your enterprise or organizational operations.
Incorrect
IT procurement is the method of sourcing and obtaining information technology belongings to power your enterprise or organizational operations.
-
Question 2 of 10
2. Question
If you are the project supervisor of a big construction assignment. You are comparing the strengths, weaknesses, opportunities, and threats concerned with an assignment. In which of the subsequent techniques are you on?
Correct
Risk identification is the technique of figuring out and assessing threats to an organization, its operations, and its workforce. For example, risk identification may also consist of assessing IT safety threats consisting of malware and ransomware, accidents, natural disasters, and different probably dangerous occasions that would disrupt enterprise operations.
Incorrect
Risk identification is the technique of figuring out and assessing threats to an organization, its operations, and its workforce. For example, risk identification may also consist of assessing IT safety threats consisting of malware and ransomware, accidents, natural disasters, and different probably dangerous occasions that would disrupt enterprise operations.
-
Question 3 of 10
3. Question
Which of the objectives of the subsequent standard to limit mistakes to at least one consistent with million units produced?
Correct
Total Quality Management (TQM) is a long-term continuous management technique. It is comparable to Six Sigma in that the essential philosophy of TQM is to reduce manufacturing and service defects, increase client satisfaction with the product, and streamline delivery chain management.
Incorrect
Total Quality Management (TQM) is a long-term continuous management technique. It is comparable to Six Sigma in that the essential philosophy of TQM is to reduce manufacturing and service defects, increase client satisfaction with the product, and streamline delivery chain management.
-
Question 4 of 10
4. Question
Which of the subsequent phrases consists of overall performance goals and criteria (POCs), overall performance indicators, and every other way that compare the fulfillment in attaining a special goal?
Correct
Performance measurement systems in place may be a vital manner of maintaining the track of the development of your business. It offers you essential statistics approximately what is taking place now and it additionally gives the starting point for a system of target-setting to help you put into effect your techniques for growth.
Incorrect
Performance measurement systems in place may be a vital manner of maintaining the track of the development of your business. It offers you essential statistics approximately what is taking place now and it additionally gives the starting point for a system of target-setting to help you put into effect your techniques for growth.
-
Question 5 of 10
5. Question
Which of the subsequent is the technique of figuring out and assessing factors which could jeopardize the success of an assignment or the fulfillment of a goal?
Correct
Risk analysis is a technique that facilitates you to become aware of and manage potential issues that would undermine critical commercial enterprise initiatives or projects.
Incorrect
Risk analysis is a technique that facilitates you to become aware of and manage potential issues that would undermine critical commercial enterprise initiatives or projects.
-
Question 6 of 10
6. Question
Which of the subsequent service delivery techniques consists of controls, documents, and records, as its sub-techniques?
Correct
An Information Security Management System (ISMS) is a scientific technique to dealing with sensitive enterprise data in order that it stays secure. It encompasses people, techniques, and IT systems.
Incorrect
An Information Security Management System (ISMS) is a scientific technique to dealing with sensitive enterprise data in order that it stays secure. It encompasses people, techniques, and IT systems.
-
Question 7 of 10
7. Question
Which of the subsequent is a manner of delivering value to clients with the aid of using facilitating results that clients desire to get without the control of particular charges and risks?
Correct
A service is a transaction wherein no physical goods are transferred from the seller to the buyer. The advantages of this type of service are held to be confirmed via way of means of the buyer’s willingness to make the exchange. Public services are those who society (nation-state, financial union, or region) as an entire will pay for. Using resources, skill, ingenuity, and experience, service companies advantage service consumers.
Incorrect
A service is a transaction wherein no physical goods are transferred from the seller to the buyer. The advantages of this type of service are held to be confirmed via way of means of the buyer’s willingness to make the exchange. Public services are those who society (nation-state, financial union, or region) as an entire will pay for. Using resources, skill, ingenuity, and experience, service companies advantage service consumers.
-
Question 8 of 10
8. Question
Which of the subsequent architecture domain names for TOGAF describes the structure of an organization’s logical and physical information assets and the related data management resources?
Correct
A data architecture describes the structure of an organization’s logical and physical information belongings and data management resources, consistent with The Open Group Architecture Framework (TOGAF). An organization’s data architecture is the purview of data architects.
Incorrect
A data architecture describes the structure of an organization’s logical and physical information belongings and data management resources, consistent with The Open Group Architecture Framework (TOGAF). An organization’s data architecture is the purview of data architects.
-
Question 9 of 10
9. Question
Which of the subsequent frameworks describes preferred strategies inside enterprise information management on the strategy, management, and operations level?
Correct
BiSL is a complete technique framework for enterprise information management. It is supported with the aid of using a developing wide variety of excellent practices. Through the publication of the framework and several publications and the established order of a foundation to maintain it, BiSL has ended up a part of the general public domain.
Incorrect
BiSL is a complete technique framework for enterprise information management. It is supported with the aid of using a developing wide variety of excellent practices. Through the publication of the framework and several publications and the established order of a foundation to maintain it, BiSL has ended up a part of the general public domain.
-
Question 10 of 10
10. Question
Which of the following techniques seeks to identify the similarities and differences between the groups of customers or users?
Correct
Market segmentation is an enterprise exercise that brands use to divide their goal marketplace into smaller, greater doable businesses of humans primarily based totally on the common ground they share to optimize their marketing, advertising, and sales efforts. Simply put, clients of every marketplace phase have comparable traits that groups can leverage to improve their efforts.
Incorrect
Market segmentation is an enterprise exercise that brands use to divide their goal marketplace into smaller, greater doable businesses of humans primarily based totally on the common ground they share to optimize their marketing, advertising, and sales efforts. Simply put, clients of every marketplace phase have comparable traits that groups can leverage to improve their efforts.