Question 121
What is the purpose of the 'information security management1 practice?
Question 122
A major incident has been closed, but there is a risk that it might happen again. How should this be logged and managed?
Question 123
What should be used to set user expectations for request fulfillment times?
Question 124
Which two practices interact the MOST with the service desk practice?
Question 125
Which is an input to the service value system?
