Your company is negotiating with a new service provider for its Internet services. You have been asked to draft a service level agreement (SLA) that stipulates the required levels of service for this company. The SLA must provide the appropriate levels of service that will ensure that your company's departmental SLAs are met. What should you use to develop the draft SLA?
A. OLA
B. NDA
C. MOU
D. ISA
A
Explanation: You should use the operating level agreement (OLA) to develop the draft SLA. You need to ensure that your company's departmental SLAs are met. These are defined in an OLA.
You should not use any of the other documents to create the SLA. A non-disclosure agreement (NDA) is an agreement to not disclose any information to outside parties. A memorandum of understanding (MOU) is an agreement between two or more organizations that details a common line of action. An interconnection security agreement (ISA) is an agreement between two organizations that own and operate connected IT systems to document the technical requirements of the interconnection.
You might also like to view...
(Recursively Search a List) Write a member function searchList that recursively searches a linked list object for a specified value. The function should return a pointer to the value if it is found; otherwise, null should be returned. Use your function in a test program that creates a list of integers. The program should prompt the user for a value to locate in the list.
What will be an ideal response?
What media types can be loaded with the ProLoader class?
What will be an ideal response?
Discuss the considerations when editing a PowerPoint 2010 presentation in older versions of PowerPoint.
What will be an ideal response?
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?
a. Encryption has not been enabled. Use the Computer Management console to enable it. b. You are not using an edition of Windows that supports encryption. c. Most likely a virus has attacked the system and is disabling encryption. d. Encryption applies only to files, not folders.