You are on page 1of 3

ISOM QUIZ #1

• It is a major function of the IS department that includes jobs that must be run,
sequence of job execution and conditions = SCHEDULING
• It is in charge of the daily support of an organization hardware and software
environment. = INFORMATION SYSTEM OPERATIONS
• SLA defiles the level of service expected by a customer from a supplier….
What does SLA stand for? = SERVICE-LEVEL AGREEMENT
• It’s goal is to determine the root cause of an issue. = PROBLEM
MANAGEMENT
• TRUE OR FALSE: Service management like IT services are better managed
without SLA? = FALSE
• It is also known as the known error = ROOT CAUSE
• IS Operation management functions are (choose all that apply) =
RESOURCE ALLOCATION,
PROCESS MONITORING,
STANDARDS & PROCEDURES
• Fill in the blank: Performing _________ backup is one of the day-to-day
activities of Infrastructure Operations. = TIMELY
• Which among the options below are considered as a computer resources
(choose all that apply) =
HARDWARE/SOFTWARE,
DATA, TELECOMMUNICATIONS,
NETWORKS,
APPLICATIONS
• TRUE OR FALSE: Part of the management control functions for information
system operation is maintaining job accounting reports and other audits log
reviews. = TRUE

ISOM QUIZ #2
• This follows a method of prioritizing items to determine the impact of urgency =
INCIDENT HANDLING
• FILL IN THE BLANKS _____________ is necessary to make sure that IS
resources are optimally used. = JOB SCHEDULING
• This follows a method of prioritizing items to determine the impact of urgency. =
INCIDENT HANDLING
• (TRUE OR FALSE) Backup is an example of a high priority jobs. = TRUE
• This is a process where software is made available for user and the term
release often described as the collection of authorized changes. = RELEASE
MANAGEMENT
• In I.S. Management, unresolved problems should be? = ESCALATED
• The function is to provide a specialized knowledge of production system,
identify and assist in system change and assist in problem resolution. =
SUPPORT/HELPDESK
• (CHOOSE ALL THAT APPLIES) Logs should contain the following kinds of
error: =
HARDWARE LOGS,
NETWORK LOGS,
SYSTEM LOGS,
APPLICATION LOGS.
• It can also be used when changing hardware or upgrading software off-the-shelf
applications. = CHANGE MANAGEMENT PROCESS
• (CHOOSE ALL THAT APPLIES) Computer resources includes but no limited to;
DATA,
APPLICATION SOFTWARE,
NETWORKS,
TELECOMMUNICATIONS,
HARDWARE
• It aims to resolve issues through in-depth analysis and investigations of a major
incident. = PROBLEM MANAGEMENT
ISOM QUIZ #3
• It is a type of server that connects printers. = PRINT SERVER
• CPU is an acronym that stand for? = CENTRAL PROCESSING UNIT
• It is the most important software related to computer = OPERATING SYSTEM
• It is the process of converting information or data into a code, especially to
prevent unauthorized access. = ENCRYPTION
• It is a networking device that forwards data packets between computer
networks. = ROUTERS
• RFID is an acronym for? = RADIO-FREQUENCY IDENTIFICATION
• There are important in maintaining the integrity and up-to-date Operating
System = SOFTWARE PATCHES
• The virus present itself as something useful but basically they are not =
MALWARE
• Scanner is what type of device? = INPUT DEVICE
• It refers to the exchange of data between a source and a receiver via form of
transmission media whether wireless or wire cable. = DATA COMMUNICATION
SOFTWARE
• I/O stands for? = INPUT / OUTPUT
• It acts as a gateway between you and the internet. It’s an intermediary server
separating end users from the websites they browse. = PROXY SERVER
• It is a server which controls access to separately stored files, as part of a
multiuser system = FILE SERVER
• It refers to the act of ensuring a business maximizes its potential activities and
production output – at all times, under all conditions with the use of planning and
monitoring of resources. = CAPACITY MANAGEMENT
• It is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a define set
of security rules. = FIREWALL

You might also like