Tuesday, October 8, 2024

Java Program to connect SQL server and fetch results from database using stored procedure

1. Program to fecth the Output from SQL server using the stored procedure without parameter


2. Program to fecth the Output from SQL server using the stored procedure with parameter

package SqlOutput;

import java.sql.CallableStatement;

import java.sql.Connection;

import java.sql.DriverManager;

import java.sql.ResultSet;

import java.sql.SQLException;

import java.util.Scanner;


public class SQLServerConnection {

public static void main(String[] args) {

// Connection URL

String connectionUrl = "jdbc:sqlserver://myserver;"

+ "trustServerCertificate=true;"

+ "IntegratedSecurity=true;"

+ "Database=Stocks;"

+ "loginTimeout=30;";


Scanner scanner = new Scanner(System.in);


// Prompt the user for input

System.out.print("Enter Stock Name: ");

String name = scanner.nextLine();

System.out.println("Stock Name you entered is : " + name +" ");


//System.out.print("Enter your age: ");

//int age = scanner.nextInt();


// Display the input back to the user

// System.out.println("Hello, " + name + "! You are " + age + " years old.");

// Establish the connection

try (Connection connection = DriverManager.getConnection(connectionUrl))

{

// System.out.println("Connected to the SQL Server database successfully.");

CallableStatement stmt = connection.prepareCall("{call sp_StockInfo(?)}");

stmt.setString(1, name);

// Execute the stored procedure

ResultSet rs = stmt.executeQuery();

// Process the result set

while (rs.next()) {

System.out.println("Name: " + rs.getString("Name")+ " Quantity: " + rs.getString("Quantity"));

}

}

catch (SQLException e)

{

e.printStackTrace();

}

}

}



3. Program to fecth the multi results Output from SQL server using the stored procedure with parameters



import java.sql.CallableStatement;

import java.sql.Connection;

import java.sql.DriverManager;

import java.sql.ResultSet;

import java.sql.ResultSetMetaData;

import java.sql.SQLException;

import java.util.Scanner;


public class SQLServerConnection {

public static void main(String[] args) {

// Connection URL

String connectionUrl = "jdbc:sqlserver://DESKTOP-H8VE8AJ;"

+ "trustServerCertificate=true;"

+ "IntegratedSecurity=true;"

+ "Database=Stocks;"

+ "loginTimeout=30;";

try

(

Scanner scanner = new Scanner(System.in)

)

{

// Prompt the user for input

System.out.print("Enter Stock Name: ");

String name = scanner.nextLine();

System.out.println("Stock Name you entered is : " + name +" ");

// Establish the connection

try (Connection connection = DriverManager.getConnection(connectionUrl))

{

//System.out.println("Connected to the SQL Server database successfully.");

CallableStatement stmt = connection.prepareCall("{call sp_Stock_Details(?)}");

stmt.setString(1, name);

// Execute the stored procedure

Boolean results = stmt.execute();


while (results) {

ResultSet rs = stmt.getResultSet();

ResultSetMetaData rsmd = rs.getMetaData();

int columnCount = rsmd.getColumnCount();


while (rs.next()) {

for (int i = 1; i <= columnCount; i++) {

String columnName = rsmd.getColumnName(i);

Object columnValue = rs.getObject(i);

System.out.println(columnName + ": " + columnValue);

}

}

results = stmt.getMoreResults();


}

}

catch (SQLException e)

{

e.printStackTrace();

}

}

}

}




Monday, October 7, 2024

Java Program to Connect SQL Server

 First time I tried to connect SQL Server using Java


'


Faced below issue while trying to connect

This driver is not configured for integrated authentication. We need to download the jdbc libraries and place in this path.

Dowloaded file


Place file in jre path

Uploading: 3649 of 3649 bytes uploaded.



"connection refused: getsockopt. verify the connection properties. make sure that an instance of sql server is running on the host and accepting tcp/ip connections at the port. make sure that tcp connections to the port are not blocked by a firewall.".

This is due to TCP/IP Disabled. Enabled TCP/IP and restarted services.





Add jdbc drivers to connect SQL server. Download latest libraries from SQL server








PowerShell SQLInvoke-Sqlcmd Scripts

1) PowerShell Command to display date by Connecting SQL Server 


Invoke-Sqlcmd -Query "SELECT GETDATE() AS TimeOfQuery" -ServerInstance "DESKTOP-H8VE8AJ"



2) PowerShell Command to execute SQL Satement and save output to a file


Invoke-Sqlcmd -InputFile "C:\Users\OneDrive\Resumes\SQL Server Management Studio\Profit.sql" | Out-File -FilePath "C:\Users\OneDrive\Resumes\SQL Server Management Studio\Profit.rpt"



3) PowerShell command to pass the vairables

$StringArray = "MYVAR1='Machinename'", "MYVAR2='InstanceName'","MYVAR3='ServerName'


Invoke-Sqlcmd -Query "SELECT SERVERPROPERTY(`$(MYVAR1)) AS ComputerName,

SERVERPROPERTY(`$(MYVAR2)) AS InstanceName,

SERVERPROPERTY(`$(MYVAR3)) AS ServerName;" -Variable $StringArray -ServerInstance "DESKTOP-H8VE8AJ"




4) 

Saturday, September 7, 2024

Openssl command for certficates and key generation

 1) To connect secure port using SSL we can use the below command

openssl s_client -connect hostname/localhostip:portnumber

ex :  openssl s_client -connect 127.0.0.1:443


2) To show the certificate from website we can use the below command

openssl s_client -showcerts -connect 127.0.0.1:443


3) To Print Certificate we can use OpenSSL

echo | openssl s_client www.google.con -connectwww.google.con:443 2>dev/null | openssl x509 text


4) To covert pkcs12 to pem format we can use OpenSSL

openssl pkcs12 -in "certificate in pkcs12 format" -nodes -out "new_cert.pem"


5) to convert the certificate from crt to pem format

openssl x509 -in "cert.crt" -out "cert.pem"

6) to convert the certificate from cer to pem format

openssl x509 -in "cert.cer" -out "cert.pem"

7) to convert the certificate from pem to der format

openssl x509 -outform der -in "cert.pem" -out "cert.der"


8)  Openssl can used to generate public private key pair. Below uses pkcs8 format

openssl genrsa 4096 | openssl pkcs8 -topk8 -inform PEM -out rsa_key_4096.p8 -nocrypt

openssl rsa -in rsa_key_4096.p8 -pubout rsa_key_4096.pub


9)  Openssl can used to generate public private key pair. Below uses pkcs8 format





Wednesday, July 24, 2024

DB2 Commands

 1) db2level


This will show the DB2 product version.


2) db2 list node directory


This will show nodeDirectory list that contains hostname, service name, protocol, node name


3) db2 list database directory


This will show database name , database version, authetication type etc details


4)  db2 connect to "databasename" user "üsername" using "Password"


This will connect to database



Wednesday, May 15, 2024

Incident Repsonse Planning

 1. Network segregation and isolation procedures should be part of the CSIRT expertiences to:? Pick two reasons

a. Whether to reset password or rapidly recreate account

b. Procedures and criteria for when to clean vs. rebuild

c. Host OS (and Application) rebuild procedures

d. Isolate HVAs from other end points in the production environment (such as compromised workstations and servers), if feasible

e.Block attacker C2 channels at internet egress points


2. Of of five core functions defined in NIST CSF, where would security monitoring fall?

a.Detect

b.Identify

c.Protect

d.Respond


3. To successfully respond to incidents, you must: (Choose two)

a.Minimize risks

b.Notify your legal department

c.Fire the CISO

d.Minimize the number and severity of security incidents


4. When documenting a security incident it is recommended to: (Choose two)

a.Wait till the incident is being reviewed to document it

b.Write up the report by hand in a note book

c.move fast to stop the intruder

d.Make sure to include dates and times


5. If you do not have a robust incident response plan, you should what?

a.Set firm plans to update your incident response plan

b.Treat each event as an incident

c.Search the Internet for a plan you can use

d.Panic


6. An what is a system occurrence that could happen regularly or due to hardware or software malfunction, not necessarily caused by a security compromise

a.Bug

b.Event

c.Activity

d.Incident


7. Performing password resets and C2 channel blocking alone is ineffective without also detecting and removing attacker malware from hosts True or Flase?

a.True

b.False


8. It is possible to stop a hacker attack by removing your systems from the network. You have stopped the attack, but you have essentially done a denial of service attack on yourself. In this case you have taken the wrong steps. what prinicple have you violated?

a.Be Accurate

b.Do no harm

c.Keep calm

d.Implement the response plan


9. A successful CSIRT team consists of several key members Pick three

a.Incident Lead

b.Lead from Legal

c.Sales team

d.External partners

e.Departmental managers


10. In NIST SP 800-61 it recommends four caegories of Incident Serverity(Choose two)

a.Very Low

b.Low

c.Very High

d.None


11. Your companies security incident has been mitigated, to prevent it from happening again, you need to understand what actually happened.

a.The best process to investigate the how, what, when, and why of th eincident is what?

b.Implement Azrue Security Center

c.Post-incident review

d.Review the Pre-incident system status

e.Wait for the security consultants to share their report


12. It is NOT recommendedto try to determine who attacked. NIST in their Computer Security Incident Handling Guide states “Identifying and attacking host can be a time-consuming and futile process that can prevent a team from achieving its primary goal". What should be your primary goal?

a.Notify the government

b.Minimizing the business impact

c.Restoring from backups

d.Enabling two factor authentication


13. Two-thirds of survey respondents ranked cybersecurity as a top five risk management priority, but only x% expressed high confidence in their organization’s ability to manage and respond to a cyber event.What percentage of the surveyed companies had high confidence in their ability to response to a cyber event?

a.35

b.19

c.10

d.3


14. Of of five core functions defined in NIST CSF, where would managment of GDPR fall?

a.Respond

b.Protect

c.Detect

d.Identify

Tuesday, May 7, 2024

Curl Commands

 
1) Curl Command to download the data from a internet site.

curl  -O https://testserver.com.au/file.zip 

sometimes if secure option is enabled it will not allow to download the file. We may get error
curl failed the legitimacy of the server and therefore could not establish a secure connection to it.  so to fix this we use -k option.

curl  -k -O https://testserver.com.au/file.zip 

 2) to check curl version, below command will be used

curl --version

3) To download the files from Mainframe we can use curl command. 

First we need to configure netrc file which contains user name and password to connect mainframe file.

curl -netrc --ftp-ssl --use-ascii ftp://mainframeserver.com/"'AB.G.C'" -o /var/opt/sw/Files/output.dat

4) To upload the files to Mainframe we can use curl command.

 First we need to configure netrc file which contains user name and password to connect mainframe file.

curl -netrc --ftp-ssl --use-ascii -quote "site RDW LRECL=200 RECFM=FB CYLINDERS PRIMARY=4000 SECONDARY=400" --upload-file /var/opt/sw/Files/output.dat ftp://mainframeserver.com/"'AB.G.C'" 
 
5)  Curl Command to use verbose mode a internet site.

curl  -verbose -O https://testserver.com.au/file.zip
 
6)Curl Command to use ntlm for download file and place in specific directory

curl -k -ntlm -netrc  https://testserver.com.au/file.zip -o /var/opt/sw/Files/output.dat

7)  Curl Command to verfify firewall connection

curl -v http://ipaddress:portnumber

curl -v ftps://ipaddress:port

8)  Curl Command to download from insecure sites

curl -v -i -k -O -insecure https://testserver.com.au/file.zip -o file.zip



orapki utility commands

 1) Create a wallet using below command

orapki wallet create -wallet client_wallet -auto_login -pwd "wallet password"

2) change permission for wallet

   chmod 664 ewallet.p12
   chmod 664 cwallet.sso
 
3) Convert jks file into wallet

orapki wallet jks_to_pcks12 -wallet client_wallet -pwd "wallet password" -keystore key.jks -jkspwd "wallet password"

3) Add Trust certificate into exisitng wallet

orapki wallet add -wallet "walletlocation"  -pwd "wallet password" -trusted_cert -cert "certificatename.crt"

4) To display the certificates in wallet. Summary option means it will display onlycertificate details.

orapki wallet display -wallet "walletlocation"  -pwd "wallet password"  -summary

5) To display the certificates in wallet. Complete option means it will display complete certificate details. 

orapki wallet display -wallet "walletlocation"  -pwd "wallet password"  -complete

6) To Remove certificate from exisitng wallet

orapki wallet remove  -wallet "walletlocation"  -pwd "wallet password" -trusted_cert -cert "certificatename.crt"







ikeycmd commands for kdb database files

 1) Below command will display certificate details like expiry date in the kdb file keystore.kdb

ikeycmd -cert -details -label "Certificate name in KDB" -db keystore.kdb -pw "password of kdb file"

2) Below command will display list of certificates in kdb file

ikeycmd -cert  -list  -db keystore.kdb -pw "password of kdb file"

3) Below command will display ca certificates in kdb file

ikeycmd -cert  -list ca -db keystore.kdb -pw "password of kdb file"

4) Below command will display personal certificates in kdb file

ikeycmd -cert  -list personal -db keystore.kdb -pw "password of kdb file"

5) Below command will validate given certificate in kdb file

ikeycmd -cert  -validate -label  "Certificate name we need  to validate in KDB file" -db keystore.kdb -pw "password of kdb file"

6) Below command will display the default certificate in kdb file

ikeycmd -cert  -getdefault  -db keystore.kdb -pw "password of kdb file"

7) Below command will set the default certificate in kdb file. This will help to set default personal certificate if there are multiple certificates

ikeycmd -cert  -setdefault  -db keystore.kdb  -label "personal certificate name in KDB file"  -pw "password of kdb file"

8) Below command will import certificate into kdb file. 

ikeycmd -cert  -import -file  "Certificate file"   -pw "password of  the certificate file"   -type pkcs12 -label "personal certificate name to be in KDB file"  
-target_pw   "password of kdb file" -target_type CMS

9) Below command will help to delete certificate from kdb file. 

ikeycmd -cert  -delete -label  "Certificate name we need  to delete from KDB file" -db keystore.kdb -pw "password of kdb file" 

10) Below command will display expiry of ca certificate from kdb file

ikeycmd -cert  -list ca -db keystore.kdb -pw "password of kdb file" -expiry

11) Below command will add the certificate to the exisitng kdb file

ikeycmd -cert -add -file "Filename.crt" -db keystore.kdb -pw "password of kdb file" 

Sunday, May 5, 2024

Incident Planning Response

 1. Which law or regulation requires government agencies and other organizations that operate systems on behalf of government agencies to create an incident response plan?

Ans :  FISMA (Federal Information Security Management Act of 2002)

2. You are working as a cybersecurity analyst in a Security Operations Center. You received an alert from your SIEM that a workstation might be infected with a piece of malware. Which phase of the incident response lifecycle would you be in when this occurs?

Ans : Detection and Analysis

3. Which of the following NIST Special Publications is titled as the Computer Security Incident Handling Guide?

Ans :  SP 800-61

4. Which of these is included in a policy?

Ans : objectives

5. Which of these is included in a plan?

Ans : measurements and metrics

6. Which of these is included in a procedure?

Ans : forms

7. Which structure would allow an organization to hire a managed security service provider (MSSP) to conduct their 24/7 monitoring but would still rely on the organization’s own employees to conduct an incident response if a serious breach was detected?

Ans :  a partially outsourced model

8. Which role is responsible for the overall success or failure of the technical portions of an incident response?

Ans : team leader

9. Which incident response team member is primarily focused on the creation of an event timeline to show what occurred leading up to the incident?

Ans: forensic analyst

10. Which organization type require an incident responder to send an information request through their manager prior to sending it to an analyst in the human resources department?

Ans :  a vertical organization

11. One of your incident response team members is planning to attend the BlackHat information security conference next month and wants to exchange some of the lessons learned from your organization’s latest incident response efforts with a forensic analyst they know at another company. Which type of coordinating relationship best describes this information exchange?

Ans : team to team

12. Which of these is not considered an indicator that could be used during your technical analysis?

Ans : news articles about an incident

13. Which of these is a consideration when asking contract personnel to come in after working hours for an incident, but is not a major consideration when dealing with your own organizational employees?

Ans : incurring additional labor coverages and costs

14. Which type of technical resource could be used to identify if a Windows system file has been modified?

Ans : cryptographic hash

15. Which of these is not considered a method of preventing future incidents?

Ans : Remove a Remote Access Trojan from the organization’s server.

16. Which attack vector would be used to properly categorize a password spraying attack?

Ans :  attrition-based

17. Which type of indicator of compromise would best represent the vulnerability and exploit data contained within the Common Vulnerabilities and Exposures database?

Ans : public information

18. Which of these is a prioritization category that is used to measure the effect on the confidentiality, integrity, or availability of an organization’s network or servers?

Ans : information impact

19. Which containment strategy involves disconnecting an infected host from the network to prevent the spread of malware?

Ans : isolation

20. Based on the order of volatility, which type of evidence should be collected first?

Ans : swap files

21. Which of these is not considered a recovery action during an incident response?

Ans : Collect evidence from the affected system.

22. When creating your evidence retention policy, which factor would prevent you from retaining data and evidence for an indefinite amount of time?

Ans :  the size of the organization’s budget for data retention

23. What is the most important thing to do during a "Lessons Learned" workshop to get valuable feedback from everyone?

Ans : Avoid assigning blame to anyone.

24. Which of these is not a typical measure or metric collected by the incident handling and incident response team?

Ans : average salary of your incident responders


Saturday, May 4, 2024

Service Management Question and Answers

 1. A company is delivering 'Platform (X)' as service of the customer . Who should define the platform as provisioning process and interface protocols?
a. Platform team lead
b. Service manager
c. Service delivery manager
d. Service manager in consultation with consumers, Platform team lead, and service delivery manager.         

2.  What best explains relationship between incident management and change management?
a. Failed changes cause incidents and failed incident lead to changes
b. Incidents may be caused due to changes and changes may be raised to solve incidents  
c. Changes must be cause incidents and changes must be raised to resolve incidents
d. There is no relationship between incident and changes.

3.  What are the characterisitcs of facts when determining root cause ?
a. Facts should be non tamperable
        b. Facts are visisble
c. Both Option 1 and Option 2    
d. Facts can vary based on individual thinking

4.  Under which type of policy does the statement belong to "technology service owner review the root cause for problem record" ?
a. Entitlement policy
b. Organization policy   
c. Escalation and communication protocol
d. Emotional quotient

5. When evaluating the root cause, we need to ensure that the quality of the root cause should contain 
a. At least task control failures
b. Mandatory Organization control failures
c. At least reason for component failures   
d. At least management control failures

6.  One of the significant challenges observed during the deployment phase of change is 
a. Better alignment of IT service to actual business needs     
b. Lack of ownership of impacted service
c. Lack of visibility of communication of changes
d. Time spent in getting changes approved.

7. Which of the following is not valid change type ?
a. Normal Change
b. Random Change     
c. Emergency Change
d. Standard Change

8. Which of the following artefacts should be considered FIRST during any process practice or procedure definition?
a. Education and communication protocols
b. Service level agreements
c. Criteria and Interface protocols
d. RACI and work flows 

9. Which of the following questions and should be asked first when starting to resolve a incident ?
a. What is the priority of the incident 
b. Who are the impacted users
c. What is the start time of the incident
d. What is the impact 

10. Too many problems has been closed as "root cause not found". What is the best course of action to be taken and by whom?
a. Tower Lead - review vendor contract agreement
b. Problem manager - have a review with team.
c. Team member - under go training on problem management techniques training
d. Service delivery manager - understand the risk of problems with unknown root cause in the environment

11. A large number of problems piled up in a Company queue pending RCA completion. Most of them are awaiting customer response for more than 90 days. What should be your approach?
a. As they are vendor dependent, we do not lose on SLA credit. Ignore them.
b. As the incident have not reoccured for 90 days, take a blanket approval from customer to close all incidents at once.
c. Request customer to corodinate with vendor as vendor owns the contract.
d. SDM creates a technology and operations risk register and evaluates the risk of the open problem records with the customer.    

12. Which of the following parameters is NOT a factor for evaluating risk of change ?
a. Capability of team deploying the change
b. Frequency of change
c. Deployment mehtodology adapted  
d. Components undergoing change

13. Similar password reset requests are taking 40 minutes to 8 hours to resolve for a customer. The SLA for such requests is 16 hours, What approach should the service manager take?
a. Determine and address the root cause of the variation.  
b. Do nothing as SLAs are not impacted
c. Establish standard operating procedure for password reset
d. Automate password reset task as it is routine task  

14. Team lead found that too many problems has been closed  by this team as "root cause not found". Upon the enquiry he understood that old problem records that are being closed as root cause not found becuase his team does not have bandwidth to perform root cause. As team lead what should he do ?
a. Inform tower lead not to close problem record.
b. Seek advise from the problem manager - have review with the team. 
c. Convey the information to customer on behalf of his team.
d. Connect with service delivery manager - understand the risk of problems with unknown root cause in the environment.

15. New team members are joining the project. Who should take care of training them on the customer specific operational processes. ?
a. module/ tower leads
b. service management team.
c. project management office of the account.
d. customer

16. The resolving team is complaining about delays from earlier teams in routing incidents. As a result they are unable to resolve incident in a timely manner.What would be your advise as a consultant ?
a. Create audit log entries for activites performed and generate reports on audit log timestamp.
b. Give resolver teams SLA credit   
c. Site the limitations of the tools and live with the problems
d. requests teams to create a new incident each time the issue escalted to new technical team.

17. Which of the following must be dominant attitude of support staff when resolving incidents ?
a. Control bound decision making   
b. Risk based decision making
c. Fact based decision making
d. Time bound decision making

18. A KEDB Record and SOP document were created after major incident to guide the team in future. if similar case re-occured. The team successfully followed the SOP 40 similar instamces however on one instance was missed which lead an outage of 24 hours. Should we perform the root cause ?
a. No it is a single instance, ignore it.
b. Yes, understand what caused the SOP execution failure.  
c. Yes, redocument the known error.
d. No, as the known error is already documented.

19. To facilitate early releases, quality standards can be reduced to save time. Choose the correct option?
a. Products must be delivered to highest quality hence there should not be any compromise on quality.
b. We need to ensure that products are launched as per the commited dates and hence quality can be compromised.
c. Risk must be thoroughly evaluated and balanced business risk decision must be taken in alignment with business objectives 
d. Deploy the changes and incases of any issues immediately redeployed the tested code after 5 days.

20. what is the first step of continual process improvement ?
a. Develop plan for improvement.
b. Review process guides
c. Confirm what is the vision.
d. Assess where you are.    

21. VIP user to make changes to the live network firewall. How should support team proceed for with the change?
a. Raise a change record and follow complete approval process before implementing the network firewall change
b. Raise a change request for the purpose of documentation only.
c. Change request need not to be raised.
d. As the request is from the VIP user, implement the request without approval process.

22. Some of the adhoc tasks performed by the change manager are ?
a. Identifying the change process improvement
b. Publishing change notifications during the deployment. 
c. Hosting CAB meetings
d. Identifying the standard changes.

23. What should be the default practise for "failed changes" in an ideal world ?
a. Retain for fix later
b. Rollback full change
c. Fix forward
d. Rollback failed components     

24. Where detailed design of process specific service level agreement (SLA) should be documented ?
a. In respective process guide reference and understandable  
b. service level management process guide
c. in document as said by customer

25. What is the bare minimum requirements to be considered while defining a process ?
a. SOX
b. GDPR   
c. Law of Land 
d. ITIL best practices

Friday, May 3, 2024

Transition Management Question and Answers

1)  Transition sets the benchmark by which the client provider relationship is initially measured.

     True

     False

2)  Successful transitions result in better business outcomes only for the Enterprise (Customer) and not to the provider in the long run.

     False

     True

3)  Well-executed transition enables customers to unlock value from outsourcing initiative in quickest possible time.

     True

     False

4)  Transition does not estimate the costs, timing, resources and risks associated with a service.

    True 

    False

5)  Transition is new or changed service that satisfies the needs of the customer.

     True

     False

6)  A hostile transition in IT can be defined as when you take over knowledge from another external provider and then in a second step, the responsibility to deliver the work is transferred to us.

     True

     False

7) Which of the below statement defines the Knowledge Acquisition phase of the Transition?

Understand the existing environment,process ,service scope

        Hands on experince with actual env with limited scope

        Handle the services in scope with minimal to no support

        Satbilizes the environment and try to achieve the target SLAs/KPIs

         Provide service independently to SLA and strive for continous improvement


8) Which of the below statement defines the Secondary Support of the Transition?

Understand the existing environment,process ,service scope

        Hands on experince with actual env with limited scope

        Handle the services in scope with minimal to no support

        Satbilizes the environment and try to achieve the target SLAs/KPIs

         Provide service independently to SLA and strive for continous improvement


9) Which of the below statement defines the Primary Support phase of the Transition?

Understand the existing environment,process ,service scope

        Hands on experince with actual env with limited scope

        Handle the services in scope with minimal to no support

        Satbilizes the environment and try to achieve the target SLAs/KPIs

         Provide service independently to SLA and strive for continous improvement


10) Which of the below statement defines the Stabilization phase of the Transition?

Understand the existing environment,process ,service scope

        Hands on experince with actual env with limited scope

        Handle the services in scope with minimal to no support

        Satbilizes the environment and try to achieve the target SLAs/KPIs

         Provide service independently to SLA and strive for continous improvement


11) Which of the below statement defines the Steady phase of the Transition?

 Understand the existing environment,process ,service scope

        Hands on experince with actual env with limited scope

        Handle the services in scope with minimal to no support

        Satbilizes the environment and try to achieve the target SLAs/KPIs

         Provide service independently to SLA and strive for continous improvement


12)  Which of the below tools/applications is used to create and maintain the transition plan?

  Service Acquisition Manager (SAM) &   Microsoft Project Plan (MPP )

          Microsoft Project Plan (MPP )

         Service Acquisition Manager (SAM) 

         None

13) Which of the below features are present in the SAM tool?  -- All

        I. Plan and Track the Transition

        II. Import/Export Reports

        III. Task Dependency Mapping

        IV. Milestone Alerts/Report Scheduler

14) Which of the below transition scenarios aligns with scale and complexity?

Transition from mutiple Geographies for DC

15) Which of the below tools/applications is a one-stop shop which provides the details of the past and present transitions?

Transition Program Log (TPL) 

        Contractual Commitments Risk Tracker (CCRT)

        Service Acquisition Manager (SAM)

        Microsoft Project Plan (MPP )

16)  Staff Attrition is a key element during the transition from the in-house customer team.

True

        False

17)  Personal development and team management is the responsibility of Transition Lead, Manager and Director.

True

        False

18)  Transparency to the customer helps in successful transition.

True

        False

19)  Team Building exercise within Company and Client Associates is one of the best practices during the transition.

       True

        False

20) Which of these are not the focus areas of Transition?

Automation

21) Which one of the below option is related to Rigor in Transition (RIT)?

Ensure that all exisitng operational tools and processes are transitionioned and details are documented

22) Quality gates and Acceptance criteria are not related to each other.

     False

    True

23) Toll Gates are applicable for all the phases of Transition.

True

        False

24) Which one of the below Acceptance criteria is related to Pre Secondary Support Quality gate?

RAID Log

25) What is the possible mitigation plan when there is a delay in getting the ODC and network connectivity during the transition?

    connect through alternative vpn

26) Transition Governance/Review takes place in 3 levels to achieve smooth and risk free transition.

    True

    False




Concepts

------------



 ETVX  Model and Phases -    Entry,Task, validation, exit

 Transitional plannin   (ETVX)     -- First Phase

 Knowledge Acquisition    (ETVX)  -- Second Phase

 Secondary Support   (ETVX)    Third Phase

 Primary Support    (ETVX)    Fourth Phase

 Stabilization         (ETVX)    Fifth Phase

 Steady State     (ETVX)    Fifth Phase



 The following tools and applications will be used during a transition:

Service Acquisition Manager (SAM) -- Plan and track, Reports, Import/ Export, Trackers, Acceptance Criteria and Dependecies, Task Dependecies feature, Report Scheduler 

Microsoft Project Plan (MPP ) -- Task administration, resource management, Transition scheduling and tracking , Reporting 

Phases :  startup, Initition, transition execution, closing the transition

Task administration  -- Task, summary task, milestone administration

Contractual Commitments Risk Tracker (CCRT) -- 

 Contract Commitment Tracker is a very useful asset that helps the engagements to track the commitment clauses, specified in the customer contracts, MSAs, SOWs and so on. This tracker enables the project to capture the commitment against the following parameters, apart from other additional commitments.

Transition Program Log (TPL) --  


Focus areas in transition management
Planning and Goveranance
Oboarding and resource rampup
Execution 
Trnasperancy
Process Quality 
Knowledge Quality
Risk and Issues Management
SLA Report Development
Third-Party Contracts
Delivery Readliness and OCM
Tools Integration
Security and Complaince

Transition best practices
Customer Focus
Process Focus
People Focus
Automation and Enablers

Reponsibilites and keyfactors For sucessful transitions
Transition Lead
Transition Manager
Transition Director