What would you recommend as a preferred approach to building services in their service catalog?

An IT organization for a medium sized grocery retailer is considering adopting ITaaS. They are interested in offering services to the lines of business through a service catalog. As a first step, they performed an inventory of all existing IT capabilities. What would you recommend as a preferred approach to...

September 28, 2024 No Comments READ MORE +

What is a characteristic of traditional application development that differs from Agile development?

What is a characteristic of traditional application development that differs from Agile development?A . All functional activities occur in multiple phasesB . It follows the strategy of plan, develop, design, test, and implementC . The stakeholder is usually involved in only the planning phaseD . Final acceptance testing is the...

September 27, 2024 No Comments READ MORE +

Which model would be most appropriate?

A Chief Information Officer (CIO) of a financial services company is facing a peculiar dilemma. Any line of business (LOB) request for IT services takes too long to be delivered. The core problem that has been identified is that there are multiple ways to order services that involve cumbersome processes...

September 27, 2024 No Comments READ MORE +

What impact will these additional touch points have on the process?

A company wants to deploy services in a new cloud infrastructure. The cloud architect is helping the company design services and realizes that the company is having trouble because of a legacy, organizational structure. The company is introducing multiple touch points into the service delivery process. What impact will these...

September 26, 2024 No Comments READ MORE +

What emerging 3 rd Platform technologies would enable the desired capabilities?

In a hypothetical future scenario, a security company has deployed a large fleet of surveillance drones to observe customer facilities. Audio and visual as well as radio spectrum and infrared data are transmitted back to the security company for processing. The data is run through multiple virtual assistances and expert...

September 26, 2024 No Comments READ MORE +

Why would the LOB make this request?

A line of business (LOB) has been using a public cloud and is seeking services from the internal IT department. The LOB has requested an SLA for each service. Why would the LOB make this request?A . Need for a clear description of services, capabilities, key performance indicators, support responsibilities...

September 25, 2024 No Comments READ MORE +

What is the next level?

An organization is beginning its journey to ITaaS. The services that IT provides are meeting the current state of well-defined business goals. Governance is in place, and they are meeting regulatory requirements for the regions in which they operate. Teamwork, education, and discipline have been established, relevant business requirements and...

September 25, 2024 No Comments READ MORE +

As a cloud architect, what would you consider when designing a service catalog while keeping security in mind for this enterprise?

An enterprise wishes to implement ITaaS to provide services for different business units through a service catalog. As a cloud architect, what would you consider when designing a service catalog while keeping security in mind for this enterprise?A . Implement RBAC through the service catalog to control access and privilegesB...

September 24, 2024 No Comments READ MORE +

How should you assess these corporate assets?

Your company is an application service provider that hosts customer applications and data in your data center. The entire infrastructure is client-server based and you have begun to assess the risk of moving your web applications to a cloud- based infrastructure. During this phase you are required to provide the...

September 24, 2024 No Comments READ MORE +

Which IT Governance principle should cloud services adhere to?

Which IT Governance principle should cloud services adhere to?A . Asset valuationB . Data classificationC . Strategic alignmentD . Risk profilingView AnswerAnswer: C

September 23, 2024 No Comments READ MORE +