Der Vortrag „Access Management: Introduction and Process Activities“ von IT Training Zone ist Bestandteil des Kurses „ITIL® OSA - Operational Support and Analysis “. Der Vortrag ist dabei in folgende Kapitel unterteilt:
Which of the following statements BEST describes Access Management?
Which of the following statements is TRUE?
Which of the following is Access Management NOT responsible for protecting?
Which of the following statements is TRUE?
Which of the following situations would effective Access Management prevent?
Which of the following statements about Access Management is CORRECT?
Which of the following statements is TRUE?
Which of the following is a specific type of tool that is used to manage access and rights?
Which of the following basic concepts are included in access management?
Which of the following statements about Access Management is CORRECT?
Which of the following shows the correct order of activities in the Access Management process?
Which of the following statements is NOT a valid access request type?
Which of the following may authorise an access request?
Which of the following statements is TRUE?
How can a user’s identity be verified?
How can the legitimacy of the request be verified?
Which of the following statements about roles is TRUE?
Which of the following changes should be monitored to assess if access rights may need to be changed?
Which of the following actions should be taken if an abuse of access is suspected?
Which of the following statements about Access Management is CORRECT?
5 Sterne |
|
5 |
4 Sterne |
|
0 |
3 Sterne |
|
0 |
2 Sterne |
|
0 |
1 Stern |
|
0 |