Top Banner
GuSection–A 1. Answer al (a) Net Inte (NI (b) Site (c) IDS Tec (d) Cry (e) Pri 2. (a) Discuss The proce Expendit These sy (i) Finan featu econo of a f (ii) Reve Accou shipm accou Reven Sou Sale Deliv Rem Dep Gurukripa’s ideline A A Question l the following twork erface Card C) e Blocking, S chnologies. yptography mary Memory s the different c essing cycles o ture Cycle, Hum ystems are disc ncing Cycle: res or similar omic event on firm’s processin enue Cycle: I unts Receivabl ment of the go unts receivable nue Cycle are a urce Documen es Order very Ticket mittance Advice posit Slip s Guideline An Answers 1 is compul questions in br Network In receives, and permanent a Address and Site Blockin (a) Site Bloc sites tha (b) In addit amount IDS Techno (a) An Intr monitor produce (b) IDS mon (c) IDS Tec Net Hos Hyb Net Cryptograp communicati about const and which confidentialit that transfor the authent converted in Primary Me (in contrast w Random Acc ycles of an Acc of an Account man Resource a cussed as follow A transaction objectives. Th the financial st ng framework. It includes tran e, Inventory a oods; recording e; and capturin as follows: nt Fun Rec Rec e Rec Rec nswers for In for Infor Man lsory. Answ rief: nterface Card d processes da and unique MAC is provided by ng: cking is a softw at are deemed tion to blocking of item spent ologies: rusion Detect s network or sy es reports for a nitors network chnologies inclu twork Intrusion st–based Intrus brid Intrusion D twork–Node Int phy: Cryptogr ion in the pres ructing and an are related ty, integrity, a rm data into co tication to acc to Cipher text. emory: These with sequentia cess Memory (R count Business ts Business Pr and the Genera ws: processing cy he cycle consis tatements. It i nsactions surro and General L g of the cost o ng and record nction cord Customer cord Delivery to ceive Cash cord Amounts D nformation Te 1 rmation nagemen wer any 5 Q d (NIC): Netwo ata to and from C (Media Acces y the manufact ware–based ap inappropriate g sites, Compan on the Interne ion System (I ystem activities ppropriate acti assets to dete ude the followin n Detection (NI sion Detection Detection\ trusion Detecti aphy is the sence of third nalyzing protoc to various a authentication, odes that appe cess the respe are devices in l order) directly RAM) and Read s Process Mana rocess Manage al Ledger & Re ycle combines sts of a set of s through the ounding the re Ledger. It invo of goods sold; ing of cash re Order o Customer Deposited echnology an Technolnt Questions fro ork Interface C m a host to netw ss Control) add urer. proach, which by Managemen nies can also lo et and identifies IDS) is a devic s for malicious ion by Manage ct anomalous b ng – ID) (HID) on (NNID) practice and parties (called cols that overc spects in info and non-repu ear meaningles ective system which any loca y by the CPU. T d Only Memory agement. (Any 4 ement are nam eporting System one or more f transactions study of transa ecognition of r olves capturing the billing pr eceipts. Comm d Strategic M ogy and om the rema Card constructs work. Each NIC dress which is k prohibits acces nt. og activities and s the sites visit ce or software activities or po ment. behaviour and study of tec Adversaries). come the influ ormation secu udiation. These ss to anyone w resource or f ation can be ac These are prim (ROM). 4 points) mely Financing ms and the flow types of tran leading to the action cycles th revenue involv g and recordin rocess and the on Source Do Management Strategic aining ques (2 × 5 = , transmits, C has 8 bytes known as Phys ss to certain we d determines th ed. application tha olicy violations misuse. chniques for s More generally uence of adver urity such as e are the pro who does not po ile. i.e. plain ccessed in any marily of two ty g Cycle, Reven w of data betwe nsactions havin recognition o hat we gain a ving accounts l ng of custome e recording of cuments & fun c stions. 10 Marks) ical eb– he at and secure y, it is rsaries s data ograms ossess nt text order pes: (4 Marks) nue Cycle, een them. ng related of a major clear view like Sales, er orders; sales and nctions of
15

IPCC ITSM Model Exam Answer Key 24.3.2015

Dec 07, 2015

Download

Documents

vaishnavi

For Ipcc November 2015 exams
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IPCC ITSM Model Exam Answer Key 24.3.2015

Gui

Section–A

1. Answer al(a) Net

Inte(NI

(b) Site

(c) IDSTec

(d) Cry

(e) Pri

2. (a) Discuss

The proceExpenditThese sy

(i) Finanfeatueconoof a f

(ii) ReveAccoushipmaccouReven

SouSaleDelivRemDep

Gurukripa’s

ideline A

A Question l the following twork erface Card C)

e Blocking,

S chnologies.

yptography

mary Memory

s the different c

essing cycles oture Cycle, Humystems are disc

ncing Cycle: res or similar omic event on firm’s processin

enue Cycle: Iunts Receivablment of the gounts receivablenue Cycle are a

urce Documenes Order very Ticket

mittance Adviceposit Slip

s Guideline An

Answers

1 is compulquestions in br

Network Inreceives, andpermanent aAddress andSite Blockin(a) Site Bloc

sites tha(b) In addit

amount IDS Techno(a) An Intr

monitorproduce

(b) IDS mon(c) IDS Tec

• Net• Hos• Hyb• Net

Cryptograpcommunicatiabout constand which confidentialitthat transforthe authentconverted inPrimary Me(in contrast wRandom Acc

ycles of an Acc

of an Accountman Resource acussed as follow

A transaction objectives. Ththe financial st

ng framework.

It includes trane, Inventory a

oods; recordinge; and capturinas follows: nt Fun

RecRec

e RecRec

nswers for In

for InforMan

lsory. Answrief: nterface Cardd processes daand unique MAC is provided byng: cking is a softwat are deemed tion to blockingof item spent

ologies: rusion Detects network or sy

es reports for anitors network chnologies inclutwork Intrusionst–based Intrusbrid Intrusion Dtwork–Node Int

phy: Cryptogrion in the presructing and anare related

ty, integrity, arm data into cotication to accto Cipher text.

emory: These with sequentia

cess Memory (R

count Business

ts Business Prand the Generaws:

processing cyhe cycle consistatements. It i

nsactions surroand General Lg of the cost ong and record

nction cord Customer cord Delivery toceive Cash cord Amounts D

nformation Te

1

rmation nagemen

wer any 5 Q

d (NIC): Netwoata to and fromC (Media Accesy the manufact

ware–based apinappropriate

g sites, Companon the Interne

ion System (Iystem activitiesppropriate actiassets to dete

ude the followinn Detection (NIsion Detection Detection\ trusion Detecti

aphy is the sence of third nalyzing protocto various a

authentication, odes that appecess the respe are devices in l order) directly

RAM) and Read

s Process Mana

rocess Manageal Ledger & Re

ycle combines sts of a set ofs through the

ounding the reLedger. It invoof goods sold;ing of cash re

Order o Customer

Deposited

echnology an

Technolont

Questions fro

ork Interface Cm a host to netwss Control) addurer.

proach, which by Managemennies can also loet and identifies

IDS) is a devics for malicious ion by Managect anomalous bng – ID) (HID)

on (NNID)

practice and parties (called cols that overcspects in infoand non-repu

ear meaninglesective system

which any locay by the CPU. Td Only Memory

agement. (Any 4

ement are nameporting System

one or more f transactions study of transa

ecognition of rolves capturing the billing pr

eceipts. Comm

d Strategic M

ogy and

om the rema

Card constructswork. Each NICdress which is k

prohibits accesnt. og activities ands the sites visit

ce or software activities or poment. behaviour and

study of tecAdversaries).

come the influormation secuudiation. Thesess to anyone wresource or f

ation can be acThese are prim(ROM).

4 points)

mely Financingms and the flow

types of tranleading to theaction cycles th

revenue involvg and recordinrocess and theon Source Do

Management

Strategic

aining ques(2 × 5 =

, transmits, C has 8 bytes known as Phys

ss to certain we

d determines thed.

application thaolicy violations

misuse.

chniques for sMore generally

uence of adverurity such ase are the pro

who does not pofile. i.e. plain

ccessed in anymarily of two ty

g Cycle, Revenw of data betwe

nsactions havin recognition ohat we gain a

ving accounts lng of customee recording of cuments & fun

c

stions. 10 Marks)

ical

eb–

he

at and

secure y, it is rsaries

s data ograms ossess

nt text

order pes:

(4 Marks)

nue Cycle, een them.

ng related of a major clear view

like Sales, er orders; sales and nctions of

Page 2: IPCC ITSM Model Exam Answer Key 24.3.2015

Cred

(iii) ExpePurchrecordinvoicincludDocu

SouPurcPurcReceChe

(iv) Hum

W4 TimJob

(v) GeneGeJou

(vi) Databe cothat eStorahas bagent

(b) Discus1. Circu

(a) AT

(b) T(c) O(d) T(e) E

2. Pack(a) Packe

betwemessPack

(b) Data (c) Each (d) Each

whicha vari

(e) Each addrebits. Tdestin

(f) Each PackeselectPacke

(g) The Pdestin

Gurukripa’s

dit Memo

enditure Cyclehases, Accountding of purchaces; recording des the prepaments & functi

urce Documenchase Requisitiochase Order eiving Report ck

an Resource Source

forms me cards b time tickets

eral Ledger &neral Ledger

urnal Voucher

a Processing Collected and proevent, the agege, Alerts, Con

been updated ats who particip

ss various swituit Switching:A Circuit SwitchTerminals beforThere is a dediOn each physicThe route is deExample: Tele

ket Switchinget Switching is een computers sages to be trakets and then pis divided into packet is transPacket of User

h gives the destiety of control iPacket contain

esses, synchronThe Packets arnation addresseswitching nod

et into its memts the next nodet and sends itPackets may evnation.

s Guideline An

Sup

e: It includes ts Payable, Caase orders; reof accounts p

aration of emons of Revenunt on

Cycle: CommoDocument

& Reporting Syand Reportin

Cycle: In the Docessed are idents who partintrols and Feedand stored. Thated in the act

tching techniqu: hing network isre the Users micated commcal link, a Chandicated and ex

ephone Networ

: a method of coin a network i

ansmitted are fplaced on the cblocks called ‘P

smitted individur Data travels intination addresinformation.

ns source and dnizing error core routed usinges. e in a minicom

mory, examinesde to which it t on its way. ven follow diffe

nswers for In

pport Adjustme

transactions suash Disbursemeeceipt of goodpayable and pployee pay-che Cycle are as

FunctionRequest thRequest goRecord recePay for item

on Source Doc

ystem: Commng System

Data Processingentified. Furtheicipate in that dback. All the ahe stored infortivity.

ues in telecomm

s one that estaay communicaunication patnel is dedicated

xclusive, and rerk for continuou

ommunication n which blockformed into channel. Packets’. ually across then a data enveloss of the packe

destination rrection and co the source an

mputer reads ths the address, shall transmit

rent routes to

nformation Te

2

ents to Custome

urrounding theents, Inventorys and the rec

preparation andhecks and thefollows:

at purchasing doods from vendeipt of merchams.

cuments & Func

CollRecRec

mon Source Doc

Rec

g Cycle, the prer, the emphasevent; where

above cycles ofmation has de

munication netw

ablishes a fixedte. th (i.e. sequend to the conneeleased only whus flow of data

ks of

e Net. ope, et and

ntrol d

he

the

the

echnology an

er Accounts

e recognition oy and Genera

cording of the d recording ofe recording o

department orddors. ndise.

ctions are as foF

lect employee wcord time workecord time spent

cument and its

cord entry poste

rocesses of bussize could be othe event cou

f processing inetails about the

works.

d bandwidth ci

ce of links) betction. hen the commu.

B

Packet 2

Pac

A

d Strategic M

of expendituresl Ledger. It incost of inven

f cash disbursf payroll activ

der goods.

ollows: Function withholding daed by employet on specific job

function is as

ed to general l

siness activitieson the activitieuld be the Inpvolves data proe resources aff

ircuit (or chann

tween two stat

unication sessio

Packet Swit

D

C

Packet

cket 5

Management

s involving accncludes preparntory; receipt sements. The cvities. Commo

ta. es. bs.

follows:

edger.

s about which es, resources afput, Output, Pocessing activifected by the e

nel) between N

tions.

on terminates.

tching

Packet 1

Packet 4

3 F

counts like ration and of vendor cycle also

on Source

data must ffected by rocessing, ties which event and

(4 Marks)

Nodes and

E

Page 3: IPCC ITSM Model Exam Answer Key 24.3.2015

3. Message(a) Excha

transa(b) In Me

messa(c) The M

receiv(d) Electr

3. (a) Discuss

Businessthe approprocessesbusiness pthe work useful infoidentify anprovide a

BusinessBusiness IBusiness I

1. Simp

what requirone cthrouanywfor fuit to t

2. Busin

Businuser Transneedshelpin

3. Dash

usersthingsas peactivit

4. Scoremappperfoconteprovidstratehas aof eac

5. Datato mquestquerydivers

Gurukripa’s

e Switching: ange of logicalaction queries essage Switchinage (logical unMessage is thved, stored brieronic Mail (e–m

s Business Intels Intelligenceopriate decision. BI is comprispartners and eprocesses andormation to thnd develop necompetitive m

s IntelligenceIntelligence tooIntelligence too

ple Reportinghappened.” Thres that BI mucommon formaghout the ente

where to be cleaurther processinthe people who

ness Analysisness analysis reto plot data i

sform, Load) ts, and then loang to increase

hboards: This s as snapshots s, but without

er user requiremties as progres

ecards: This inping them to srmance of spe

ext of larger ende users with aegic milestonesactually performch goal.

a Mining or Stine through lations. The objeying. Data Minse data.

s Guideline An

l units of dataand responsesng, a dedicatenit of informatioen passed threfly and then t

mail) and Voice

lligence and itse: Business Intn makers withsed of informatemployees. BI d technologies he user who new opportunitiearket advantag

e Tools ols are a type ools are given as

and Queryinhe objective ofst be connecte

at. Data wareherprise in differaned up, summng. There are o need it.

s: This involvesefers to presenin row and coools bring in dad the results data quality.

involves usingof many differtoo much effo

ments. It includss on a specific

nvolves providistrategic goals ecific initiativesnterprise stratean at a glance s, combined witmed specified a

tatistical Anaarge volumes ective is to pring involves da

nswers for In

a called Messas. ed path betweon) it appends rough the Netransmitted to tMail are exam

s tools. telligence (BI) in the necessation that contais essentially tused to obtai

eed it, when tes. Making usege and longterm

of software thas follows:

ng: This involvef a BI implemeed with the entousing (DW) prent application

marized, converreporting tools

s using the datnting visualizingolumn coordinadata from outinto the comp

g the informatirent things wit

ort”. Dashboarddes a collectioninitiative.

ing a visual repthroughout th

s, business unegy. Scorecards

perspective ofth metrics thatactivities are lin

alysis: This invof data andovide interestiata analysis fo

nformation Te

3

ages. Exampl

een the two noa destination a

twork from nothe next node. ples of Messag

may be defineary time frameains patterns, rtimely, accuratn them. Businthey need it. B of new opporm stability.

at is designed t

es using the dantation is to tuterprise data anprovides the pens in a variety rted and integrs used to arran

a to get respong data in a muates to furtheside sources,

pany database.

ion gathered fth the objectiveds are flexible tn of graphs, re

presentation ofhe enterprise. nits, or the ents distil informaf information. At serve as bencnked in the sco

volves using staproviding knong and useful

or discovering u

echnology an

les: Telegrams

odes is not neaddress to the ode to node. A

(Store and Foge Switching sy

ed as the delive to support erelationships, ate, high-value, ness intelligencBI can handle rtunities and im

to retrieve, ana

ata warehouse urn operationalnd all the neceerfect architectof formats, on

rated into one cnge information

nse to the queultidimensionalr understand transform it to Metadata too

from the data e of getting retools that can eports, and KPI

f the enterpriseScorecards offterprise as a w

ation into a smA scorecard hachmarks. Speciforecard with g

atistical, artificwledge withou information tuseful patterns

d Strategic M

s, Electronic M

ecessary. If a message. At each node,orward Techn

ystems.

very of accurateffective decisiand trends abo

and actionablece systems pro

large amountsmplementing a

alyze and repor

to get respons data into mea

essary data is ature to combinn a range of hacommon forman into a readab

ry: “Tell me wh manner. Busithe intersectino meet busine

ols tools gather

warehouse ansponse to the be bent into aIs that can hel

e strategy by tafer a rich, visuwhole and theall number of

as a graphical lfic measures oraphical display

ial intelligence,ut users even o users by des that are “hid

Management

Mail, Computer

station wishes

, the entire mnique)

te, useful inforon making for

out customers, e business ins

ocess, store ans of informatio

an effective str

rt data. Some o

se to the queryaningful knowleavailable in onene all the data ardware, whichat and availableble format and

hat happened aness analysis a

ng points. ETLess specified or and analyze

d making it avquery: “Tell ms many differep monitor such

aking critical mual gauge to de individual gometrics and taist of specific, n how well they highlighting t

, and related thaving to as

esign even withden” in large v

Files and

to send a

message is

(4 Marks) rmation to r business suppliers, ights, and

nd provide on to help rategy can

of the key

y: “Tell me edge. This e place, in dispersed

h could be e centrally distribute

and why.” allows the L (Extract, operational metadata,

vailable to me a lot of ent shapes h business

metrics and isplay the

oals in the argets and attainable

e company the status

techniques sk specific hout their volume of

Page 4: IPCC ITSM Model Exam Answer Key 24.3.2015

(b) Softwa

Differ

Softwon-devia a

Platfserveapplicalso cand oto the

4. (a) Discus Relationa

retrieval oand each relationshat a timeextensivelA Relationthe set of

All relationcolumns issingle valu

(b) Write a (i) Clo

1. Ca

2. IC

Featu1. S

o

2. RtC

3. Aa

4. A‘D

5. Mv

6. MDC

7. Mo

8. Vm

9. PC

Gurukripa’s

are as a Service

rences between

ware as a Seremand. A servistandard Web

form as a Serers and associacations. The cocontrol softwarother services. eir own servers

ss Relational Daal Database operations and record in a taips, or links, bee. The relationy in relational

n is a table withvalues the attr

ns in a relations immaterial inue for each of

a short note on oud ComputingCloud Computinand Software, oInternet is geComputing.

ures of Cloud CScalability / Eof Clients.

Reliability / Rthere is a failurCloud with or w

Availability: Saccess databas

Agility: The aDistributed Mo

Multi–sharingvarious applicat

Multi–Device Device, e.g. DeCloud without c

Maintenance:of Cloud Compu

Virtualizationmigration from

Performance:Computing. Loo

s Guideline An

e (SaaS) and Pl

Software as a S

rvice (SaaS): ice provider hobrowser. For e

rvice (PaaS): ated services uonsumer may cre deployment For example, A

s.

atabase Model. Model: A relaintegrity constble contains thetween recordsnal database database modeh columns and ributes are allo

nal database hn a table. Seconits attributes.

any one of the g. ng is the use over the Internenerally visuali

omputing: (AnyElasticity: Dat

Resiliency: Clore of Server anwithout user aw

Since the Cloue resources thr

gility (responsde’ environmen

g: Since the Ctions can work

Access: Clouesktop PC, Noteconfining it to a

: Installation ofuting applicatio

n: This featureone physical S

: System Perforosely–coupled a

nswers for In

latform as a Se

Service (SaaS) a

Software as a osts the applicaexample - Goog

Platform as a used to run excreate softwareand configurat

AppScale allow

ational databastraints that canhe same fields.s in the databastructure depaels: Relationsrows. The nam

owed to take.

have to adherend, there can't

following: (4 M

of various servnet. ized as “Clou

y two Points) tabases in Clou

oud Computingnd Storage Reswareness and in

ud / Internet urough the Inte

siveness) and ent which share

Cloud works inmore efficient

ud Computingebook, Tablet, a particular dev

f Software Appons is easier.

e allows ServerServer to anoth

rmance and itsarchitectures a

nformation Te

4

rvice (PaaS) in

and Platform as

Service (SaaS)ation at its datgle Apps.

Service (PaaS)xisting applicae using tools antion settings. T

ws a user to dep

se allows the n be organized . Both the hierase. Both strucarts from bot

s, Attributes, med columns of

e to some basibe identical re

Marks)

vices, such as

ds”. Hence, u

ud are highly d

g is more reliaources, the wontervention.

utilizes the resrnet, from any

efficiency of Ces the resource

n a distributedly.

permits secuSmartphone,

vice.

plications in the

rs and Storageher.

s interface withare constructed

echnology an

Cloud Comput

s a Service (Paa

) features a cota centre over

) delivery modetions, or to dend/or libraries

The provider prploy some appl

definition of din a table stru

rarchical and nctures also requh these requiand Domainsf the relation a

ic rules to quaecord in a table

Software Dev

use of Intern

dynamic and s

ble because ofork is migrated

sources, availaplace, for any

Cloud Computines and tasks.

d and shared m

ured access toetc. The User

e Client’s syste

e Devices to s

h applications ad using web ser

d Strategic M

ting

aS) in Cloud Com

omplete applicathe Internet a

el allows a custesign, developfrom the provi

rovides the netlications writte

data and their cture. A table etwork data stuire that data brements. Thre.

are called Attrib

alify as relatione. And third, ea

elopment Platf

et–based com

calable to mee

f minimal infra to a different

ability of Servenumber of tim

ng is high, as

mode, multiple

o data from acan use any d

em is not requ

share and utiliz

are consistentlyrvices.

Management

mputing are as

ation offered asnd customer a

tomer to rent vp, test, deploy ider. The consutworks, serversn for Google A

structures, stois a collection otructures requibe processed oee key terms

butes, and the

ns. First, the oach record will

forms, Servers

mputing is call

et differing req

structure failurphysical resou

ers are high. Umes, etc.

the Cloud wo

e users and ta

any Network–cata or applicat

ired. Thus, ma

ze applications

y monitored un

(4 Marks)

follows:

s a service accesses it

virtualized and host

umer may s, storage,

App Engine

(4 Marks) orage and of records ire explicit one record

are used

Domain is

rdering of contain a

, Storage,

led Cloud

uirements

res. When urce in the

Users can

rks in the

asks from

connected tion in the

aintenance

s, by easy

nder Cloud

Page 5: IPCC ITSM Model Exam Answer Key 24.3.2015

10. St(

11. Ooa

12. I

13. Uc

14. Drh

15. WCCeow

16. Msr

(ii) Ex1. M

(

(

2. U(

(

(

5. (a) Discus

Multi-tiein which amiddlewarwidesprea

The clientbusiness aplaced, if

In either ainfrastruct

The advan• Forced s• Low ban• Business• Enforced

Gurukripa’s

Services in Pathe User must b(APIs) may be o

On–Demand: of the IT Infrasas is the case w

Independent:

Unlimited Dacapacity, with n

Different Cloresources to difhelp manage co

Workload MoComputing ProCenters (even expensive to ruor efficiency cworkloads.

Multi Tenancysame infrastrucrequirements.

xpert System. Meaning: (a) An Expert

Expert, to (b) Thus, Expe

and providnormally re

Usefulness: (a) Expert Sys

knowledge(b) The aim of

who furthe(c) Expert Sys

Consulting

ss multi-tier arcr Architecturan application re to service ad use of "mult

t program hasand database lnecessary, on

architecture, theure that connec

ntages of a museparation of Undwidth networs logic sits on ad separation of

s Guideline An

ay–Per–Use Mbe clearly definoffered to the

Since the Usestructure. With with internal se

: Cloud Compu

ata Storage: no substantial i

ud Types: Prfferent cloud tyosts, manage s

ovement: Thioviders can miin a different gun a workload considerations

y: Public Cloudcture. Server a

t System is a solve a problemert Systems arde decision–maeceived from h

stems are usee in narrow, spef the expert syer spread acrosstems are usServices Secto

hitecture. re: Multi-tier aris executed bydata requests

ti-tier architectu

s only User Inlogic sits whichthe same mach

e data "traffic" icts the database

ulti-tier architecUI and businessrk; a small numberf UI and busine

nswers for In

Mode: Service ned as billing isUsers for their

r Entity calls foCloud Services

ervices.

ting is an indep

Storing informncrease in cost

roject Manageypes, viz. Websecurity and all

s characteristiigrate workloageographic arein a data cente(e.g. Network

d Service Providnd Storage Iso

highly developm. re software sysakers with theuman Experts.

ed for complexecific subject aystem is to havss implementated in areas ors.

rchitecture (ofty more than os between a uure" refers to t

terface (UI) coh in turn, via ahine as the dat

is highest betwe logic with the

cture are: s logic;

r (may be just ess logic.

nformation Te

5

Level Agreems based on payaccess.

or Cloud Servics, there is no n

pendent platfo

mation in the Cts.

ers can manag Development ocate resource

c is related tods across serva). This migrater in another ck Bandwidth),

ders often canolation may be

ped DSS that u

stems that imite type of adv

x or ill–structureas.

ve a team of seions. like Defence,

ten referred toone distinct sofuser and a dthree-tier archit

ode that talksa network, talkstabase.

ween database lodatabase serve

one) of centra

echnology an

ents (SLA’s) bey–per–use mod

ces only when need to have d

rm. There is no

Cloud / Intern

ge projects beCloud, Testing

es effectively.

o resiliency anvers both insidtion might be ountry based oor regulatory

host the cloude physical or vir

tilizes knowled

tate the reasonvice (along wit

ured tasks tha

easoned specia

Government,

o as n-tier archftware agent. atabase emplotecture.

, via a networs to the databa

ogic and databaer needs to be v

lized machines

d Strategic M

etween the Clode. Application

needed, they aedicated resou

o need to proc

net leads to a

etter by assigng Cloud and Pro

nd cost considde the Data Cnecessitated bon time of day y consideratio

d services for mrtual dependin

dge which is ge

ning and proceth reasoning t

at require exp

alists holding in

Finance, Tele

itecture) is a cFor example, aoys multi-tier

rk, to the "miase. In practice

ase server. Thisvery high bandw

; and

Management

oud Service ProProgramming

are not permanurces waiting to

ure specific sof

lmost unlimite

ning different oduction Cloud

derations. HereCenter and acy cost factors or power requ

ons for certain

multiple users g upon the spe

enerally posses

esses of humantherefor) that

perience and s

ndustry–wide e

ecom, Enginee

client-server aran application architecture. T

ddle tier" on we the middle ti

s means that thwidth; i.e. expen

ovider and Interfaces

nent parts o be used,

ftware.

ed storage

hardware d. This will

e, Cloud–ross Data (e.g. less

uirements) n types of

within the ecific user

ssed by an

n experts, would be

specialized

experience

ering and

(4 Marks) rchitecture that uses The most

which the ier can be

he network nsive.

Page 6: IPCC ITSM Model Exam Answer Key 24.3.2015

(b) Discus

Largeand cbrancoverc

(i) CcnW

(ii) Smta

(iii) N

pfca

(iv) I

ptdap

(v) I

sloeca

(vi) A

rlor

(vii) R

rr

6. (a) An elect No. of For th For th Over Surch

Draw a Flthe total c

Gurukripa’s

ss Data Centre pe enterprise IT complexity of dch locations. Scoming them ar

Control skyrochallenge for laneeds by elimiWAN for remote

System perfomanagers shoulthe performancadministration ti

Network conprocessors demfurther goes ucustomers to bare not designe

IT administraprotect and moto invest in sydashboards anautomatic loadproviding dashb

Inadequate Dsystems and dioss in the eveenables IT staffcenter headquaadministrators w

Adopting newresources, IT mook for enterprobust tape em

Resource balreduced operatround-the-clock

tric supply comf units consumhe first 200 unithe next 300 unit500 units

harge @ 20% oflow chart for thharges with the

s Guideline An

protection chalmanagers undata protection ome of the tore as follows:

ocketing datarge enterprisenating redundae backups, net

rmance and d look ahead 3

ce and capacitime by eliminat

gestion and mands significanp, which is one strategic wit

ed to meet the

ation and staore complex daystems that aund reporting. Md balancing anboards and rep

Disaster Recosparate disk-bant of a disastef to manage rearters. It also with a compan

w risk pronemanagers haveprise-class data

mulation and sto

lancing: The tional budgets,k monitoring an

mpany charges tmed ts ts

f the bill is to behe above, whiche consumer nu

nswers for In

lenges and besderstand the cthroughout the

op challenges f

ta growth: Des. Several typeant data. Datatwork replicatio

scalability: To-5 years and chty they will neing the need to

connectivityntly high inputne of the biggh their networsudden upsurg

aff time at pata protection sutomate disk-suMinimum reqund tuning; autporting.

overy plans:ased solutions

er. Enterprise Iemote-office ba

minimizes thenywide view of

e, cost-effect worked to proa protection soorage pooling.

enterprise chi, increased dend managemen

the following ra

e added to the h will read the mber and the u

nformation Te

6

st practices solriticality of dateir enterprisesfaced by large

Data growth ises of data dedua deduplicationon, and disaste

o avoid data choose a data proeed without ad load balance a

y architecturet/output (I/O), gest data centerk infrastructurege in network d

premium: Datstandards to mubsystem manirements for ltomatic system

Large enterpin branch offic

IT managers shackup, deduplice burden on data protection

tive data prootect their inveolutions that m

ief technical omands on exisnt, and the per

ates for its domCharges/uni

1.60 2.10 3.90

charges. consumer numunits consumed

echnology an

utions. (Any 4 ta protection ch— including da

e enterprise IT

s the biggest uplication techn also reduces r recovery.

center sprawl iotection “targetdding new sysnd tune new sy

e: The new gand if these seer infrastructue rather than udemand.

ta protection meet while stayinagement, redularge enterpris

m monitoring a

prises that havces are particuhould considercation, replicatIT administratn efficiency.

otection techestment in exismitigate these

officer needs tsting infrastrucriodic upgrades

mestic consumet (`)

mber and the nud.

d Strategic M

points) hallenges and ata centers, dismanagers an

data center nologies help ithe data that

n the data prot” system that wstem images. ystems needed f

generation of ervers are virture challenge. Vusing the tradi

IT administrating within a limuce complexityse data protecand “phone ho

ve been usingularly vulnerablr the use of a ion and restoretors in branch

hnologies: Witing technologcosts and risk

to strike a wocture, maximizis that today’s te

ers: (4 Marks)

umber of units

Management

try to mitigatesaster recoveryd the best pra

hardware infrain reducing datt must be sent

otection envirowill scale to accoIt also saves for scaling.

servers with ualized, this reqVendors shoultional LAN swit

tors have mormited budget. Ty, and providection platformsome” function

g physical tape to downtimeconsistent plate operations fro

locations and

th limited budies. IT managek with feature

orking balanceing availability,echnology dem

consumed and

(4 Marks) e the cost, y sites and actices for

astructure ta storage t across a

nment, IT ommodate money in

multi-core quirement d help its tches that

e data to They need e effective s include: ality; and

pe backup e and data tform that om a data d provides

dgets and ers should s such as

e between , ensuring

mands.

d print out

Page 7: IPCC ITSM Model Exam Answer Key 24.3.2015

(b) Enume

The appromaking reare –

St

1. DefBPAreq

A

A

Gurukripa’s

erate the steps

oach to BPA enecommendation

tep

fine why A is uired

Ta(a(b(c

YES

s Guideline An

involved in Bu

tails understanns on how bes

The Entity shoure – a) Poor and Db) Lack of Manc) Errors in Ma

STA

READ CON

IF UN> 50

IF UN> 20

AMT = UN

CHRG=AMT

PRINT CONSN

MORRECO

STO

nswers for In

usiness Process

nding how inforst to automate

ld first define w

eficient Customnagement undeanual Processe

ART

SNO, UNITS

NITS 00

NITS 00

NITS*1.60

T+AMT*0.20

NO, UNITS, CH

RE RDS

OP

NO

Y

Y

NO

NO

nformation Te

7

s Automation. (

rmation is collethose process

Dewhy it plans to

mer Service. erstanding of B

es leading to hi

AM500)

1

AM200)

HRG

YES

YES

echnology an

(Any 4 points)

ected and proceses for maximu

escription implement a B

Business Procesgher costs.

MT = (UNITS–)*3.90 + 300*10+200*1.60

MT = (UNITS–)*2.10+200*1.

CONSNO –CHRG – TotUNITS – NuAMT – Tota

d Strategic M

essed on a dayum benefit. Th

BPA. Some com

sses.

2.

–60

– Consumer Nutal charges umber of Unitsal amount

Management

y–to–day basis,he steps involv

mmon reasons f

mber

s consumed

(4 Marks)

, and then ed in BPA

for BPA

Page 8: IPCC ITSM Model Exam Answer Key 24.3.2015

St

2. UndappRuleReg

3. Docthe whibe auto

4. DefiObjeGoaachiimpBPA

5. EngBusProCon

6. ComROIProj

Gurukripa’s

tep (d

(e

(f

(g

derstand plicable es /

gulations

(a

(b

cument process,

ich is to

omated

T(a(b(c(d(e(f(g

N(i(i(i

ine the ectives /

als to be ieved by

plementing A

TG• • • • •

gage the siness cess

nsultant

T(a(b

(c

(d

mpute I of BPA ject

F(a(b(c(d(e

(f

s Guideline An

d) Problems indiscounts, p

e) Problems inreceipts an

f) Ineffective audit or law

g) Unable to r

a) GovernanceRegulations

b) The Entity sthe followin(i) Rules an(ii) Docume(iii) Legal E(iv) Audit, R

The following asa) What documb) How do thec) What formad) Who is invoe) What are thf) Can there bg) How are ex

Note: Documen) provides clari) helps to idenii) allows to re–

The Entity shouGoals should ha

Specific, i.MeasurabAttainableRelevant, Timely, i.e

The choice of BPa) Objectivityb) Experienc

in resolvingc) Expertise

proposed sod) Capability

hardware, s

inancial Impacta) Savings in Eb) Cost of Spac) Eliminating d) Reducing the) Lower Inter

avoiding duf) New Reven

nswers for In

n Payment Procpaying for goodn Collection Pr

nd payments.Document Man

wsuit or not beiecruit and train

e is establisheds and Local, Stashould ensure ng areas (illustrnd Regulationsent Retention REffect of TransaReporting and C

spects need toments need to e documents orat are they in: olved in processhe legal aspectbe a better wayxceptions in the

ntation of preseity on the procntify sources of–design the pro

ld determine thave the followin.e. clearly definle, i.e. quantifi

e, i.e. achievabi.e. applicable

e. to be achieve

PA Consultant y of the Consu

ce of the Consug critical busineof the Consultaolution.

y of the Consultsoftware and s

t of Benefits froEmployee Salarace regained fro

Fines to be pahe cost of auditrest Cost and buplicate paymenue Generation

nformation Te

8

Decesses, e.g. duds and servicesrocesses, e.g.

nagement, e.g.ing able to findn new employe

d by a combinaate, and Centrathat any BPA arative list) – applicable to t

Requirements (actions, Compliance Re

be kept in minbe captured?

riginate? Paper, Fax, emsing of the docts on processiny to do the same Process hand

ent process process, f inefficiency, bocess better.

he key objectivng attributes (Sned, iable in moneta

ble through besto the Entity, a

ed within a give

depends on thultant in undersultant – (a) withess issues. ant, to clearly a

tant in recommervices as appr

om BPA includery by not havinom paper, file aid by Entity duts and lawsuitsbetter Cash Flonts, collecting Aopportunities.

echnology an

escription plicate or late s not received, delay in collec

. not being abled all documentsees, but where

tion of Internaal Law. adheres to the

he Entity, (time period an

equirements.

nd while docum

mail, PDF, etc.?cuments? g of these docu

me job? led?

ovides the follo

bottlenecks, an

ves / goals of thSMART) –

ary terms, st efforts, and en timeframe.

e following facstanding/evaluah the Entity’s b

articulate the b

mending and imropriate to mee

e the followingng to replace thcabinets, reduc

ue to delays bes. w managemenAccounts Rece

d Strategic M

payments, misetc.

ction, mismatc

e to find docums. employees are

al Corporate Po

requirements o

nd format),

menting the pre

uments?

owing benefits –

d problems, an

he process imp

ctors – ating the Entitybusiness proces

business value

mplementing a ceting the Entity

g – hose due to attced. ing avoided.

nt by availing eeivable faster, e

Management

ssing early pay

ch between ca

ments quickly d

e urgently requ

licies, External

of law, particul

esent process:

nd

provement activ

y’s situation, sses, and (b) g

of every aspec

combination ofy’s BPA require

trition.

arly payment detc.

ash

during an

uired.

Industry

arly in

vities.

enerally

ct of the

f ements.

discounts,

Page 9: IPCC ITSM Model Exam Answer Key 24.3.2015

St

7. DevBPA

8. TesBPA

7. (a) What is

Transmiss

Guided Ma specific

1. Twismost exten

2. Coaxinsulaused periph

3. FibreSignasigna

Gurukripa’s

tep (g

(hFocoth

velop the A

(a

(b

st the A

(a

(b(c

(d

s Transmissionsion Media conn

Media/Boundpath. Some of

ted-Pair Wirewidely used m

nsively in home

xial Cable: Thate and protecin high-serviceheral devices. I

e Optics: This als are convertls and provides

Guided M

s Guideline An

g) Revenue byTranscripts,

h) Building buor Senior Manaomputed basedhe BPA Project

a) Based on thobtained.

b) Then, the C

a) The new pradditional “

b) Testing is ac) Testing –

(i) allows (ii) increas(iii) decrea

d) The Final Vthinking an

n Media? Discusnects the mess

Media: Guidethe common e

e: Twisted-pairmedia for telee and office tele

his telecommut it. Coaxial cae metropolitan It is used exten

media consistsed to light fors increased spe

Media (Wired

Twiste

Co-a

Fib

nswers for In

y way of chargi, Medical Recosiness by provagement’s decid on the above.

he ROI, BPA Re

Consultant deve

rocess should b“exception procan iterative pro

room for improses user adoptises resistance

Version of the Pd experience in

ss its various tysage source wit

ed Transmissioexamples of gu

r is ordinary tecommunicationephone system

nication mediaables can carryareas for cabl

nsively in office

s of one or mom and fired byeed and greate

Transmi

d)

ed-Pair Wire

axial Cable

ber Optics

nformation Te

9

Deing for instant rds, etc.) iding superior lsion–making p

e financial savin

eports, etc. Top

elops the requi

be tested to decessing” steps ncess, and seek

ovements prioron, and to change.

Process should n developing th

ypes. th the message

n Media uses auided media are

elephone wire, ns and is used

ms and many LA

a consists of cy a large volume TV systems, e buildings and

ore hair-thin filay laser in burs

er carrying capa

ission Media

U

echnology an

escription access to reco

levels of custompurpose, the ROngs, and compa

p Management

isite BPA to me

etermine how wneed to be incl

ks to remove al

r to the official

be documenthe BPA, and wh

e receiver by m

a "cabling" syste Twisted Pair,

consisting of cd for both voicANs and WANs.

copper or alumme of data andand for short-

d other work sit

aments of glassts. Optical fibracity than coax

Unguided Med

Terre

Radi

Micr

Infra

Com

d Strategic M

rds (e.g. Public

mer service, higOI for the BPA aring with the

t approval to go

eet the specifie

well it works anluded. l problems.

launch of the

ted, to capturehich can be use

means of Guide

tem that guideCoaxial cable

copper wire twce and data tr.

minium wire wd allows high-s-distance connetes for local are

ss fibre wrapperes can carry dxial cable and tw

dia (Wireless)

estrial Microw

io Wave

ro Wave

ared Wave

mmunication S

Management

c Information,

gher goodwill, Project should Investment req

o ahead should

ed goals.

nd identify whe

new process,

e all of the worked to train new

ed or Unguided

es the data signand Fibre optic

isted into pairsransmissions.

wrapped with sspeed data traection of compea networks.

ed in a protectidigital as well wisted-pair line

)

wave

Satellite

Student

etc. be

quired for

d be

re

k, w people.

(4 Marks) Media.

nals along cs.

s. It is the It is used

spacers to ansmission puters and

ive jacket. as analog

es.

Page 10: IPCC ITSM Model Exam Answer Key 24.3.2015

Unguidedbut nothincommon Communic ♦ Terrestsignals anform of el ♦ Radio Wa millimetcommonly ♦ Micro Wmillimetercommunic ♦ Infrareinfrared ill ♦ Commuthrough wretransmitstations).

(b) Define Thre

Threat: Asystem. N ♦ Unstrufrom the Inetwork. Tare done m For exampsite is septhey know ♦ Structuusually uncreate hatargets a intelligenc ♦ Externanot have afrom the I Internal These usediscontent

Gurukripa’s

d Media/Unbng to guide thexamples of ucation Satellites

trial Microwavnd is used exteectromagnetic

Waves: Radio ter to 100,000 y used transmis

Waves: Microwr, or equivalecation, radar sy

ed Waves: Influmination allow

unication Satwhich to transts signals; the They are used

eat. What are va

A Threat is anetwork security

ctured ThreaInternet. ManyThese include more out of cu

ple, if a compaparate from thew is that if the c

ured Threats nderstand netwcking scripts tspecific destin

ce organization

al Threats - Tauthorized accInternet or dial

Threats - Tyers either haveted former or c

s Guideline An

bound Media:hem along a sunguided medis.

ve: Terrestrial ensively for higwaves.

waves are an km, making it ssion media in

waves are radiontly, with freqystems, radio a

frared light is uw people or an

tellites: Commmit signals. A satellite acts extensively fo

arious threats t

nything that cay threats can b

ats - These oriy tools availableport-scanning

uriosity than wit

any’s external we internal inforcompany’s web

- These origiwork systems dto penetrate thnation or groups.

These originateess to organizalup access serv

ypically, these an account oncurrent employ

nswers for In

Unguided Traspecific path. Tia are Terrestr

microwave megh-volume as w

invisible form one of the widthe wireless Lo

o waves with wquencies betw

astronomy, nav

used in industnimals to be ob

munication satesatellite is so

as a relay stator high-volume

to a computer n

an disrupt thebe categorized

ginate mostly e to anyone ontools, address

th a malicious

web site is hacrmation that sb site is hacked

nate from indidesign and thehose network p. Usually, the

e from individuation’s computevers.

threats originan a server or pyee or contracto

nformation Te

10

ansmission MedThe data signarial Microwave

edia uses the awell as long-dis

of electromagndest ranges in tocal Area Netw

wavelengths raween 300 MHvigation and spe

rial, scientific, bserved without

ellites use the aome solar-powetion between sas well as long

network’s secu

e operation, fuinto four broad

from inexperien the Internet s-sweeping toointent in mind.

cked; the compits behind a pr

d, then it is an

ividuals who ae vulnerabilitiessystems. An in

ese hackers are

uals or organizer systems or

ate from indivphysical access or. Majority of

echnology an

dia consists of als are not boue, Radio Wave

atmosphere as stance commu

netic radiation the electromag

works.

anging from asz (0.3 GHz) ectroscopy.

and medical at the observer

atmosphere (mered electronicsatellite transmg-distance com

rity?

unctioning, inted themes:

enced individuacan be used to

ols, and many

pany’s integrityrotective firewunsafe place to

are highly mots of those systndividual who e hired by ind

zations workingnetwork. They

iduals who hato the networksecurity incide

d Strategic M

a means for thund to a cabli

es, Micro Wave

the medium thnication of bot

that varies in wgnetic spectrum

s long as one mand 300 GHz

applications. Nibeing detected

microwave radioc device that

missions stationmunication of

egrity, or avai

als using easilyo discover weaothers. Most o

y is damaged. Eall, the public o conduct busin

ivated and tectems. They canpresents a str

dustry competit

g outside an oy usually work t

ve authorized k. An internal tnts originate fr

Management

he data signalsng media. Somes, Infrared W

hrough which toth data and vo

wavelength from. Radio waves

meter to as shoz. These are

ght-vision devd.

o waves) as threceives, amp

ns on the grouboth data and

lability of a n

y available hacaknesses in a cof these kinds

Even if the extdoes not knowness.

chnically compn understand aructured threators, or state-s

organization, wtheir way into

access to thethreat may comrom internal th

s to travel me of the

Waves and

o transmit oice in the

om around s are most

ort as one used for

ices using

e medium lifies, and

und (earth voice.

(4 Marks)

etwork or

cking tools company's of probes

ternal web w that. All

etent and as well as t typically sponsored

which does a network

e network. me from a reats.

Page 11: IPCC ITSM Model Exam Answer Key 24.3.2015

8. (a) Discuss

1. Classadvan(a) C

a(b) D

c(c) F

2. Facto

(a) Selo

(b) To

(c) Sw

(d) Ot

Generic o

Stra

tegi

c Ta

rget

(b) Is Supply C

Supply Ch1. Scop

transpplanncompcontropoint

2. Focuof buright

(c) Explain the

1. Syncday, used E.g. F

Gurukripa’s

Questio

s strategic alter

sification: Acntage from threCost Leadersare price–sensiDifferentiatioconsumers whoFocus, i.e. prod

ors: Porter sugSharing: Manaexisting and poowering costs, Transfer of Sorder to gain coSize: Large Firwhile small FirmOthers: In addthe appropriate

or Basic Strate

Industry w

ParticulaSegment O

Chain Managem

hain Managemepe of Activitportation, ware

ning. Althoughponents. Logistolling the movof consumptio

us of Activitiessiness transforprice. It reduce

e meaning of Schro Marketinor on hour bato smoothen o

Fans and ACs s

s Guideline An

on 8 is compuls

rnatives with re

ccording to Poee different ba

ship, i.e. produitive.

on, i.e. produco are relatively ducing product

ggested that thagers should potential businesor (ii) raising d

kills: Firms caompetitive advams with greate

ms have to adodition to the abe strategy.

egies

Un

wide

ar Only

ment same as L

ent is an extensies: Logisticaehousing, hand these activitic Managemen

vement and stoon. s: Supply Chairmation and inves costs of org

Synchro Marketing: In some caasis, causing idor regularize tsold at off seas

nswers for In

sory. Answer a

eference to Mic

orter, Genericses – ucing standard

cing products price–insensiti

ts and services

he appropriate sperform cost–bss units. Sharindifferentiation. an “transfer” skantage. er access to resopt Focus stratebove, the type

niqueness per

Diffe

Logistic manag

sion of Logisticl activities typdling of materiaties also formnt can be termeorage of goods

n Managementvolves deliverinanizations and

ing and Augmeases, the demadle capacity or he pattern of on prices.

nformation Te

11

Section–B

any 5 Questions

hael Porter’s st

c or Basic St

dized products

and services ve.

s that fulfill the

strategy may bbenefit analysisng activities an

kills and expert

sources can adegy. of industry and

St

rceived by the c

erentiation

ement?

cs Managementpically includeal, fulfillment of

m part of Suped as one of its, services and

t includes moreng the right pr enhances cust

ented Marketingand for the prover–worked demand throu

echnology an

s from the rema

trategies.

trategies allo

s at a very low

considered un

needs of sma

be based on ans to evaluate “snd resources en

tise among au

dopt Cost Lead

d intensity of c

trategic Adva

customer

Focus

t. However, thee managementf orders, invenpply Chain Mts part that is related inform

e aspects apartroduct at the rtomer service.

g. oduct is irregucapacities. In gh flexible pric

d Strategic M

aining question

ow organizatio

w per unit cos

nique industry

ll groups of co

n evaluation of sharing opportnhances compe

tonomous bus

ership and / or

competition als

ntage

Low

Overall

e differences bt of inbound tory managemanagement, trelated to plan

mation between

t from the logisight time to th

ular, due to seasuch cases, sycing, promotio

Management

ns.

ons to gain co

sts, for consum

y–wide and d

onsumers.

the following –tunities” amongetitive advanta

iness units effe

r Differentiation

so play a role in

Cost Position

Cost Leaders

etween the twand outboun

ment, supply anhe latter has

nning, implemen the point of o

stics function. Ihe right place a

ason, some paynchromarketinn, and other i

(5 Marks)

ompetitive

mers who

irected at

– g a Firm’s ge by– (i)

ectively in

n strategy

n deciding

n

ship

(5 Marks)

o are – nd goods, d demand

different enting and origin and

It is a tool and at the

(5 Marks) arts of the ng can be ncentives.

Page 12: IPCC ITSM Model Exam Answer Key 24.3.2015

2. Augmprodusecreservic

9. (a) What do

Star in BCGrowth shcompany. growth rat

Stars, a pothat are gpotential.

(b) What

tradit

Strategy M1. Stayi

lie in 2. Prom

execu3. Keepi

and a4. Exerc5. Pushi

VisionaryChief EntChief AdCulture BResourceCapabilit

1. Tran

(a) Mtinc

(b) Nat

(c) Stmb

2. Tran(a) M

ae

(b) Nsre

Gurukripa’s

mented Markeucts, and introtarial services,ce to much hig

o you understan

CG Matrix: BCGhare matrix also

The matrix iste.

osition in the mgrowing rapidlyBusiness organ

are the leaderional leader.

Managers haveing on top of the path of gooting a cultureute strategy in ing the Firm reahead of rivals cising ethics leng corrective

y trepreneur andministrator Builder e Acquirer and ties Builder

sformationalMeaning: Tranthe good of thnspires involvechanges in orgaNature of Leaaffected to do throughout theSituations: Ththeir life–cyclesmajor changesbe very useful d

sactional LeaMeaning: Traactivities and aexisting cultureNature of Leasuch as pay anrewards or penenhance an org

s Guideline An

eting: It referoduction of h, etc. Such innher levels.

nd by the term

G growth-sharo known for itss based on co

matrix, are chay. They also nnisations that e

rship roles pla

e the following what is happeod execution.

e of esprit de ca competent fa

esponsive to chin developing c

eadership to ee actions to im

L

d Strategist

Allocator

Leadership Snsformational Lhe Firm. Theyement in a misanizational perfadership: Traby stretching

e organization. his style may bs, in poorly pe. Transformatioduring periods

adership stylensactional Leaare more likelye and enhance adership: Trand status. They

nalties for achieganization’s per

nswers for In

s to provision ohi–tech servicenovative offeri

star in the cont

re matrix is a s cow and dog mbinations of

racterised by heed heavy invenjoy star posit

ayed by a strat

leadership roleening, closely m

corps (i.e. teaashion and perhanging conditicompetitively vensure that the

mprove strategyLeadership R

Crisis SoSpokespNegotiaMotivatoArbitratoProcess

Style: Leadership Styy offer excitemssion, giving foformance. ansformationaltheir abilities a

be appropriate erforming orgaonal Leaders wof uncertainty

e: dership Style

y to be associacurrent practicnsactional Leadprefer a more

evement or norformance stea

nformation Te

12

of additional cues, e.g. moviengs provide a

text of BCG ma

simple way tometaphors is relative marke

high market shavestment to mations have best

tegic leader? D

es to play, to enmonitoring prog

m spirit) thatrform at a high ions, alert for valuable compee Firm conductsy execution andoles – variouolver person tor or or Integrator

le use charismament, vision, iollowers a ‘visi

Leadership Sand increasing

in turbulent ennizations when

will challenge ewhen people a

focus more onated with imprces. dership Style u

e formalized apon–achievemenadily, but not d

echnology an

ustomer servicees on demand set of benefi

atrix?.

o portray an opopularly usedet share of th

are and high gaintain their pot opportunities

Distinguish bet

nsure effective gress, solving o

t mobilizes andlevel.

new opportunietencies and cas its affairs liked overall strates aspects

HPDCPP

a and enthusiantellectual stimon’ of a highe

tyle motivates their self–con

nvironments, inn there is a neestablished parare generally fe

n designing steroving the curr

uses the authoproach to moti

nt for employeramatically.

d Strategic M

es and benefitsd, on–line comts that promis

organisation’s pd for resource ae products or

rowth rate. Thosition and finfor expansion

tween a transf

strategy execuout issues, and

d energizes org

ties, bubbling apabilities. e a model corpoegic performanc

Head CheerleadPerceptive ListeDecision–MakerCoach and AdviPolicy Maker Policy Enforcer

asm to inspire pmulation and er calling so as

s followers to dnfidence, and a

n industries at eed to inspire radigms and weeling quite dis

eps and contrrent situation.

ority of its officivation, settinges’ work effort

Management

s built around mputer repair se to increase

portfolio of invallocation in a dSBUs and the

hey are productnance their rap

and growth.

formational lea

ution– learning what

ganizational me

with innovativ

orate citizen. ce.

der ener r ser

people to exertpersonal satisf

s to elicit more

do more than also promote i

the very start a company toays of workingstressed.

olling the orgaIt tries to bu

ce to exchangeg clear goals wits and general

the actual services, customer

(3 Marks)

vestments. diversified eir market

ts or SBUs pid growth

der and a (4 Marks)

t obstacles

embers to

ve ideas,

t them for faction. It e dramatic

originally nnovation

or end of o embrace g, and will

anization’s ild on the

e rewards, ith explicit ly seek to

Page 13: IPCC ITSM Model Exam Answer Key 24.3.2015

(c) Sor

Conc• S

tbt

• Iu

10. (a) Contras

Typ

1. NewBusies

2. NatuDiveation

3. Linkto exisbusi

(b) Disting

1. Idengoal

2. Idenfunc

3. Ascefuncactiv

4. Iden& inrequ

5. Drafprog

S1. Life

Syst2. Info

requ3. Info

4. Data

5. SupMod

Gurukripa’s

Situations: Thorganizations thrun operations

clusion: Some researcheterm. This is bbusiness probleto tell them whIt can be concluuse a Leadership

st between Vertpe

w iness

Intermservic

ure of ersificn

kage

ting iness

uish between T

Step ntify Firm’s ls ntify Firm’s ctions

ertain ctional vities

ntify decisions formation

uirements

ft System gram

Step Stream

tems ormation uirements o. System

a Integration

porting dels

s Guideline An

his style may hat are performsmoothly.

ers believe thabecause few inems alone. Theen things are g

uded that there p Style that is a

tical, HorizontaVertical

mediary/ suppoces become nebusinesses.

Related

Vertical

Top-Down and BTOP DOW

• Identify Manage

• Identify • Examine• Ascertai

hierarch• Analyse

when th• Identify

informat• Provide

most us• Prepare

program• Identify • Obtain M

BOTTOM

Life Stream SPayroll, Sales Identify – (a)processing prDevelop an inExamine in desystem kept i• Enhances• Ensures t• Provides Add Decision control.

nswers for In

be appropriateming well. The

t leaders who rndividuals mayey require peopgoing wrong. is no one single

appropriate to th

l, Concentric aHo

ort ew

Similar bstage o

mark

H

Bottom-Up StraWN APPROAC

the Firm’s obement wants to

the functions e how these fuin the major ahy, in each of th

– (a) what dhey should be m

the models tion requiremean insight into

seful. These facspecific infor

mmes. files and datab

Managers’ and

UP APPROAC

Systems are thoOrder, Invento

) the basic traograms, for ea

nformation systetail the applicn different filess the shareabilithat all programadded capabiliModels & Plan

nformation Te

13

e in settled ene style is better

rely too heavilyy be talented ple around them

e style of leadehe needs of the

nd Conglomeraorizontal

business at samof production –keting chain.

Related

Horizontal

ategic PlanningH TO SYSTEM

Dbjectives and go accomplish. of the organisanctions supporactivities, decishe organisationecisions are mmade.

that guide ments for activitieo what informactors provide thrmation proces

base for variouUsers’ approva

CH TO SYSTEMD

ose, which are ory Control, Puansactions, (b)ach Life Streamtem for each lifations, files ans. File integrateity and evolvabms use uniformity for inquiry pnning Models fo

echnology an

nvironment, in r suited in pers

y upon charismand energetic

m who are able

ership suitable foorganization an

ate DiversificatiCo

me –

New busiconnecfacilities

Loop–like mor

g. (Any 3 pointsMS DEVELOPMDescription goals, and dete

ation like Markert the Firm in asions and dutnal functions.

made, (b) what

managerial dees and decisiontion is needed,he design specssing program

us decision appal, and implem

MS DEVELOPMDescription

essential for turchasing, Prod) information f

m System. fe stream systend records and ed data – bility of the datm data, and processing and or supporting t

d Strategic M

growing or msuading people

ma are not alwac and are ablee support them

or all circumstand its business s

ion. oncentric

nesses/ produccted to existings and products

Related

linkage to onere products.

s) MENT

ermine where

eting, Productiochieving its goies of Manage

t decisions nee

ecision processns. , when it is neeifications for ap

ms in detail, &

plications. ent the system

MENT

he day–to–dayuction, etc. file requiremen

em. integrate the d

tabase,

adhoc requestthe planning a

Management

mature industriee to work effic

ays effective in e to handle allm, and who are

nces. Effective situation.

Conglo

cts g s.

Compleareas of

busin

Unre

e or No linkaexisting

proces

it is going and

on, R & D, etc.als.

ers, at various

ed to be made

ses, and find

eded, and whapplication syste

& modules wit

m.

y business activ

nts, and (c) in

data of each in

ts for reports.activities of ma

es, and in ciently and

the long–l types of

e prepared

executives

(4 Marks) omerate

etely new f activity / nesses.

elated

ages with product–

ss chain.

(3 Marks)

d what its

s levels of

e, and (c)

out the

at forms is em. thin these

vities, e.g.

nformation

nformation

nagement

Page 14: IPCC ITSM Model Exam Answer Key 24.3.2015

S

6. Main

This is the

11. (a) DistingTOWS Anarrangeme(threats athink abou• TOWS• TOWS• TOWS• TOWS

usual (b) Sugges

(i) D

R

(ii) W

T

(iii) W

D

12. Write short(i) Kieret

Kieretfor laeach

(ii) HourgIn thorganincreaconstlinks manamanavarietor pro

Gurukripa’s

Step

n Model

e reverse of the

guish between Salysis is a varients of the woand opportunitut the strategy S emphasises oS matrix is aboS analysis is anS is particularly employed in

st the type of st

Dell Computer hRetrenchment S

When a Firm’s CTurnaround Str

When negative cDivestment Stra

t notes on: tsus tsus is a loosel

arge cooperativother's stock a

glass Structurehe recent yearnizations. The asingly being retricted middle lthe top and bo

agers. A shrunagers who are ty of tasks. Thoduction.

s Guideline An

Integrate all t• Facilitate • Help to a

strategiese top–down app

SWOT and TWOiant of the clasords Strengths,ies), and interof a company

on external envout the combinan action tool whrly useful in ev evaluating a c

trategy which c

has decided to eStrategy

Cash Flows and rategy

cash flows fromategy

y-coupled grouve networks ofand have many

e rs information

role played beplaced by thelayer. The struottom levels in ken middle layoften speciali

ey would be h

nswers for In

the models to eand support h

analyse differens and options tproach. Here, t

OS Matrix. ssic business t, Weaknesses, rnal environme. Following arevironment wheations of SO, Shereas SWOT avaluating the pcompany’s busi

can be used in t

nsure stability b

Profitability are

m a particular bu

up of companief businesses. Ky board membe

technology aby middle ma

e technological ucture has a sh

the organizatiyer coordinatesist, the managandling cross-f

Figure: Hou

nformation Te

14

Devolve a complhigher managemnt factors, undto deal them the Supervisory

tool, SWOT AnOpportunities

ent (weaknessee the some basiereas SWOT emST, WO, WT whanalysis is a plapotential impaciness plan.

the following s

by reallocation o

affected by risin

usiness create

es, usually in reKieretsus members in common.

nd communicaanagement istools. Hourglas

hort and narrowon taking aways diverse lowegers in the hofunctional issue

urglass Organis

echnology an

Description ete model basement activities,derstand difficu

y Level Manage

nalysis. TOWSand Threats. B

es and strengtic differences b

mphasises on inhereas SWOT manning tool. ct of sudden ev

ituations:

of resources from

ng competition,

financial proble

elated industriebers are peers

ations have sidiminishing asss organizationw middle-manay many tasks tr level activitie

ourglass structues emanating s

sation Structur

Wide at

Narrow

Widest a

d Strategic M

e. The models , and ult situations a

ement’s involve

and SWOT areBy analyzing thths), we can ubetween TOWSnternal environmatrix is about

vents or devel

m unprofitable t

business cycle

ems for the wh

es. It is a Japas and may own

gnificantly altes the tasks pn structure consagement level.that are perfores. Contrary toure are generasuch as those

e

t the top

at the middle

t the bottom

Management

nd formulate a

ement is more.

e acronyms forhe external envuse these techS and SWOT mment. S, W, O, T.

opments while

to profitable bus

es and economic

ole Company.

(3 + 4 =

nese term whin significant am

ered the functperformed by sists of three la Information te

rmed by the mo traditional mialists and perffrom marketin

alternative

(4 Marks)

r different vironment

hniques to atrix:

e SWOT is

(3 Marks)

sinesses.

c volatility.

= 7 Marks)

ch is used mounts of

tioning of them are ayers with echnology iddle level iddle level form wide g, finance

Page 15: IPCC ITSM Model Exam Answer Key 24.3.2015

HourgdecisiHowesignifmotivlatera

13. State whet

(a) E-copens opportureconfigcompan(b) SBUmulti–bu

(c) Benremedy by organ

(d) PESto moenvironm

(e) Re–partial marginaexisting(f) StraStructur(g) Pruniversabusinesdefinitelcommon

14. Fill in the b

(a) Vision(b) ––––(c) –––––(d) The business(e) MichCost Lea(f) ––––(g) Total increase

Gurukripa’s

glass structure ion making. Dever, with the ficantly. Continvation levels hially and having

ther the followincommerce tech

up a honities

guring industry value chains.U concepts fausiness operati

nchmarking for all problemnizations.

STLE analysis nitoring the mental factors.

–engineering modification

al improvement work processeategy re. rofit may notal objective,s efficiencyy an ob

n to all busines

blanks: n is always –––––––––––––––me–––––––––––inte

orientation of s process. hael Porter’s Gedership, ––––––

–––––––––– por Quality Manag in –––––––––––

s Guideline An

has obvious bDecision makinreduced size ouity at same legh. Organisatioa system of pr

ng statements ahnology ost of

for ry and .

Trueis pcondlink tcosts

acilitate ions.

Truebecoconvreplaprodratio

is a ms faced

FalsbasesearcRathBetteevolv

is used micro

Falsmacrcultuprovlikelyenco

means n or t in the es.

Falsand cont

follows Fals

t be a , but y is bjective

ss.

Truewealeconachie

––––––– orienteeans different thegrates Firms fthe redesign e

eneric Strategie–––––– and Focrtrays the distingement is a peo––––––––––– at

nswers for In

benefit of reducg authority is

of middle manaevel may bring ons try to overoper rewards

are True or False: The impact rofound, pavin

ducted both intthe customers s and allowing

e: Organizing bome a commonvenient and inaced the convduct-related/maonal organizatiose: Benchmarked on best indch for compe

her, it studies ter processes ave them to suit

se: The term Pro environmenural, technologviding a way ofy to affect an ourages managse: Business Pradical re–deemporary mea

se: Without a S

e: Profit Maximlth, increased gnomic version eving suitable i

ed. hings to differeforward or backffort refers to a

es allow organicus. nct stages in thople focused Mt continually low

nformation Te

15

ced costs. It ashifted close

agement the pmonotony andrcome these pfor performanc

se with reasonsof e-commerc

ng the way fternally, and wand the supplproduction to

business alongn practice for mtelligent groupventional grouarket-related sonal structure.king is an appdustry practicetitive advantaghe circumstancare not merelyt the organizatPESTLE Analys

ntal factors. It gical, legal andf scanning theorganization

gement into proProcess Re–engesign of procesures of perfor

Strategy, Firms

mization has a goodwill, and b

of the techninput output ra

ent people. kward in the Proa total –––––––

izations to gain

e sales history Management sywer real cost.

echnology an

lso helps in ento the source

promotion oppod lack of intereproblems by asce.

s. e technology ofor fundamentwith suppliers iers enables jumatch demand

g SBU lines andmulti-product/sping of activitiupings. SBU fspecialization,

proach of setties and is a prge. However, ces and procesy copied. Effoional circumstasis is used to involves ident

d environmente environmentaor its policy.

oactive and strugineering (BPRsses to achievermance such as

cannot design

long–term perbenefits to all Snical objectiveatios of funds, r

oduct Chain. ––––and rethink

n competitive a

of a Product. ystem that aims

d Strategic M

nhancing respoe of informatiortunities for test and it becomssigning challen

on industry andal changes inand customers

ust-in-time delivd.

d creating straervice and gloes along distinfacilitates strat

gaining cost

ing goals and rocess of contit is not pan

sses that help iorts are made ances. describe a fratification of potal influences oal influences thThe advantaguctured thinkinR) is the funde dramatic ims cost, quality,

n an Effective S

spective, and iShareholders. e of productivresources, facil

king of entire

dvantages by

s at continual

Management

onsiveness by son so that it he lower levelsmes difficult tonging tasks, tr

(1 × 7 =d company va

n the ways bus. Using the nvery, reducing

tegic business bal organizationct businessestegic planningt-economies a

measuring prtinuous improvnacea for allin superior per

to learn, imp

amework for aolitical, economon an organizhat have affecte of this tool

ng. damental re–mprovement,

service and sp

Structure.

includes develoBusiness efficie

vity, i.e. desiglities and effort

(1 × 7 =Future

Globalization

Vertical Diver

Deconstructio

Differentiatio

Product Life C

Customer Sat

simplifying is faster.

s diminish o keep the ansferring

= 7 Marks) lue chains usiness is

network to inventory

units has ons. It is a s and has g, gaining and more

roductivity vement in problems. formance. prove and

analysis of mic, socio-zation and ted or are is that it

–thinking in critical,

peed.

opment of ency is an

gning and ts.

= 7 Marks)

rsification

on

on

Cycle

tisfaction