EAITSM Inc. Members Blog
empty_cart_icon Cart is empty
View cart
about_us contact_us useful-links forum
Register     member_login
lang Homelink   » News » Monthly Competition - February Edition
Training and Exam Providers
Which of the following patterns of events is preferred and easier to attend for you?
Online virtual several hours multi-session conference
Several standalone webinars for around one hour on different dates, for example monthly
Physical full day conferences in actual places that require physical presence
Not able to attend events in real time, and preferring to watch recordings
Amazon Kindle Books
ITSM Tenders Service
Join Membership Now for Free

Monthly Competition - February Edition

By answering the questions of last month's edition of the monthly competition, we earned a blue gadget, then we rolled the die and got "3" moves. The current state of the board is as shown below.

The new set of questions for February edition ogame-board-current-statef the monthly competition are the following:

  1. What does the acronym UC stand for?
  2. Which Service Operation function is responsible for supporting and maintaining applications?
  3. Which process ensures that IT has enough data storage and processing power to deliver its activities?
  4. The modification of the KEDB (Known Error Database) comes under which process?
  5. Which role is responsible for ensuring that a process is fit for its purpose?
  6. Can the way services are charged be integrated into the SLA?


Help us move our token further. Send your answers to this month's questions through the contact us form.

This month's prize is: Free online subscription to our Annual Conference Proceedings CD - 2016 Edition.


Last month's model answers:

  1. Is Operational Escalation a type of escalation within Incident Management? No
  2. What does the acronym CI stand for? Configuration Item
  3. Which Service Operation process is strongly linked to Information Security Management? Access Management
  4. Which process informs customers regarding the security levels of the services provided by IT? Service Level Management
  5. Where must all authorized software versions be stored? In the DML (Definitive Media Library)
  6. Where must all the information concerning configurtion items be listed? In the CMDB

Follow us

Share this page

© The EAITSM Inc. All Rights Reserved.
The EAITSM Inc. is an affiliate of the OneWayForward Inc.

Terms and conditions | FAQs

Advertise with usSponsorship opportunities | Join us on Patreon