Infra
Security
Professional Services
Application Services
Agile Principles
100

Three Primary Cloud Delivery Models/Services

What are IaaS, PaaS, SaaS?

100

____is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

Cyber attack

100

What is the full form of OpSID?

Optum Service Integrated Delivery

100

ILM

What is Life cycle management

100

An opportunity for the Development Team to synchronize activities over a 24 hour period

What is Daily Scrum ?

200

OCAP

What is Optum Connect Automation Platform?

200

......... is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

Pharming

200

Name a few industry standards which form the building blocks of our OpSID framework

ITIL, ITSM, COBIT, Lean, Agile

200

Enables the management of data across the enterprise and standardization of shared capabilities, such as consistent definition of data, consistent usage of data from authoritative sources and coordinated resolution of issues, amongst others.

Data Governance ?

200

The set of PBIs selected for the sprint plus a plan for delivering them

What is Sprint Backlog ?

300

Modern Azure Native Cloud Security

What is Defender?

300

A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack.........

Buffer-overflow

300

Which service from ITSM minimizes the adverse impact of incidents, and proactively prevents the recurrence of incidents, problems and errors?

ITSM - Problem Management

300

Primary tool explored by EDM team for Data Governance & Data Quality

What is Informatica or Collibra?

300

A framework within which people can address complex adaptive problems

What is Scrum ?

400

Technologies used to reduce hardware costs

What is Virtual Servers/ Virtualization?

400

_______is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

Phishing Attack

400

Which service establishes horizontal Supplier/Customer IT resource estimation, forecasting, reporting and planning model to enable resource management, capacity alignment, and utilization?

ITBM - Time & Capacity Management

400

Framework used to measure the current state of the organization’s Data management practices

What is Maturity assessment framework?

400

The Scrum team gathers to agree on a sprint goal & which PBIs can be delivered

What is Sprint Planning ?

500

Application which leverages terraform modules/registries for Infrastructure as a Code deployment

What is Terraform Enterprise(TFE)?

500

_______is the least strong security encryption standard.

WEP(Wired Equivalent Privacy)

500

Name any 2 deliverables/ outcomes of the ITSM Assessment Framework.


    1. Assessment Report with Maturity Level Analysis Summary and dimension wise scores
    2. Gap and Remediation Plan listing identified gaps & opportunities of improvement
    3. Prioritized Roadmap of initiatives with Process Heatmap prioritizing the identified improvements
500

This book presents a comprehensive view of the challenges, complexities, and value of effective data management.

What is DMBOK (Data Management book of knowledge)

500

Asserts that knowledge comes from experience

What is Empirical Process Control ?