Preview

Service Manager Interview Questions

Powerful Essays
Open Document
Open Document
2160 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Service Manager Interview Questions
Interview Questions

Q1. If we used an external organization to help us develop part of our service, what would that be called?

Q2. Can you name a risk that might occur whilst designing a service?

Q3. Can you name 3 types of SLA?

Q4. In your opinion, what should an SLA contain?

Q5. Why would you use SACM?

Q6. What is an OLA?

Q7. Why do we need CSFs?

Q8. When would we create a Service Design Package?

Q9. What type of information would you store in the Service Catalogue?

Q10. Can you give an example of a policy?

Q11. Why would you use Change Management?

Q12. What are the steps you would follow when a Change Request comes in?

Q13. What information would you attach to a Release Policy?

Q14. What inputs do we need before we can being testing a service?

Q15. Can you name 3 types of testing?

Answers to the above questions:

A1

Outsourcing

A2

Risks can come in many different forms including; financial markets, failures with IT or business projects, legal liabilities, credit risk, accidents and mistakes, natural causes and disasters as well as deliberate attacks from an adversary such as hacking.

A3

* Service based SLA * Customer based SLA * Multi level SLA

A4

Typically, an SLA is made up of any of the following:

* 1.Service name * 2.Clearance information (with location and date) * 3.Contract duration * 4.Description/ desired customer outcome * 5.Service and asset criticality * 6.Reference to further contracts which also apply (e.g. SLA Master Agreement) * 7.Service times * 8.Required types and levels of support * 9.Service level requirements/ targets * 10.Mandated technical standards and specification of the technical service interface * 11.Responsibilities * 12.Costs and pricing * 13.Change history * 14.List of annexes

A5

SACM stands for Service Asset and Configuration Management. By capturing

You May Also Find These Documents Helpful

  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Fin 516 Mini Case

    • 1678 Words
    • 7 Pages

    Within business, there will always be operational risks to consider. "Operating risk is the basic…

    • 1678 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    The first risk, business risk, includes threats associated with the lack of a company to achieve its goals and objectives (Hunton, Bryant, & Bagranoff, 2004, pg. 48). Some measures to address risks and controls first must take place in the company. This means that the company must have continuity measures in place to address the likelihood of things such as failures in equipment. The company must also contend with the possibility of fraudulant activity occuring on the systems.…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fin/370 Week 1 Assignment

    • 636 Words
    • 3 Pages

    Risk is a probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action. The role of risk in finance is the probable ability of an investment to fail.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Definitions  Risk: Probability that an intentional or unintentional act will harm resources  Threat: Any accidental or intentional event that negatively impacts company resources  Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA). NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    According to the PowerPoint presentation “A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device, software, data, information, or processing capability.” Therefore, some examples of digital security risks include unauthorized access and use, malicious internet and network attacks, hardware theft, system failures, software theft, and information theft. Additionally, sources of digital security risk are hackers, crackers, script kiddies, corporate spies, unethical employees, cyber extortionists, and cyber…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The risk analysis of an IT asset for each vulnerability comprises of evaluating the dangers and remunerating controls to focus the probability that weakness could be abused and the potential effect ought to the helplessness be misused. For managing the risk impact of a potential threats and vulnerability is to be studied first. Taking into consideration the likelihood and vulnerability risk analysis is done. Risk is proportional to both likelihood of exploitation and possible impact. The discovering and related danger level was utilized to focus the proposals that ought to be connected as a means to alleviate the danger.…

    • 640 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Nvq 3

    • 760 Words
    • 4 Pages

    3. Describe the functions of external agencies with whom your work setting or service interacts…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Describe the functions of external agencies with whom your work setting or service interacts…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Without threats or vulnerabilities you have very little risk or having an incident. The more likely a threat can exploit any vulnerability the higher the risk becomes. Risk…

    • 498 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Note that cybersecurity is a risk management issue; therefore, the project risks are identified to reveal the events that may negatively impact the project’s objectives or results. Essentially, a risk assessment is a process of evaluating the project risks; hence, the risk assessment provides details on the risk factors associated with implementing the project as well as how to mitigate those risks. Following is a risk analysis and cost-benefit analysis of the project moving forward.…

    • 77 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Risks Associated with Mis

    • 302 Words
    • 2 Pages

    all levels of the organization, MIS risk can extend to all levels of theoperations. Additionally, poorly programmed or non-secure systems in which…

    • 302 Words
    • 2 Pages
    Good Essays