Examlex
Scenario NEB is a financial management company that specializes in lending money for substantial property investments. They have a large IT department that is currently using the following ITSM processes: Service Level Management Availability Management IT Service Continuity Management Information Security Management Incident Management Problem Management. Each of these processes have been implemented within the planned target time and are working effectively and efficiently. Staff have adapted to the changes in a very positive manner and see the benefits of using the ITIL framework. Last Saturday, there was a security breach. A previous member of staff, who has left the company and joined a competitor organization, has been able to gain access to several client lending files. After initial investigation, it was found that access was not terminated when the staff member left the company - this has highlighted that there are insufficient processes in place to ensure access rights are terminated when staff leave the company, change roles etc and there is ongoing investigation to see how many other previous staff still have access to the system. The business has requested immediate recommendations from the IT Manager, as to what can be done to ensure this situation does not happen again and how best to inform clients, with reference to the security breach. Refer to the scenario. Which of the following options is most suitable to deal with this situation?
TODAY Function
A function in many spreadsheet programs that returns the current date, updating each time the document is opened or recalculated.
Data Tables
Structures in software and databases designed to organize, store, and manage data in rows and columns for easy retrieval and analysis.
TIMEVALUE Function
A function in spreadsheet software that converts a time in the form of text to a serial number representing the time in the software's date-time code.
TODAY() Function
A programming and spreadsheet function that returns the current date, widely used in data analysis, time-sensitive calculations, and reporting.
Q40: Which action should the administrator take before
Q50: What does an attacker use to determine
Q70: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q111: Which statement about a 'continual improvement register'
Q137: What are two reasons that cause late
Q143: Which describes a proactive trigger for problem
Q216: Which guiding principle considers which parts of
Q237: Which one of the following is the
Q259: Which of the following is the BEST
Q434: How many times should each stage of