This action might not be possible to undo. Are you sure you want to continue?
a To prevent Problems and their resultant Incidents b To manage Problems throughout their lifecycle c To restore service to a user d To eliminate recurring Incidents 2. A single Release unit, or a structured set of Release units can be defined within: a The RACI Model b A Release Package c A Request Model d The Plan, Do, Check, Act (PDCA) cycle 3. What are the processes within Service Operation? a. Event Management, Incident Management, Problem Management, Request Fulfilment and Access Management b. Event Management, Incident Management, Change Management and Access Management c. Incident Management, Problem Management, Service Desk, Request Fulfilment and Event Management d. Incident Management, Service Desk, Request Fulfilment, Access Management and Event Management 4. Which process is responsible for sourcing and delivering components of requested standard services? a Request Fulfilment b Service Portfolio Management c Service Desk d IT Finance 5. Which process is responsible for controlling, recording and reporting on versions, attributes and relationships relating to components of the IT infrastructure?
Improve the solution e. Identify the required business outcomes. Where are we now?.a Service Level Management b Change Management c Incident Management d Service Asset and Configuration Management 6. How do we keep the momentum going? d. What is the vision?. Continually Improve b. Devise a strategy. 3 c. Transition into production. Where do we want to be?. How do we get there?. Did we get there?. Outside of the core publications. How do we check we arrived?. Where do we want to be?. How do we keep the momentum going? 9. Design the solution. Operate the solution. Customer perceptions and business outcomes help to define what? a The value of a service b Governance c Total Cost of Ownership (TCO) d Key Performance Indicators (KPIs) 8.How do we get there?. which part of ITIL provides guidance in adapting good practice for specific business environments? a The ITIL Complementary Guidance b The Service Support book c Pocket Guides d The Service Strategy book 7. Which of the following questions does guidance in Service Strategy help answer? . Which of these is the correct set of steps for the Continual Service Improvement Model? a. Implement the plan. Plan how to achieve the outcomes. Check the plan has been properly implemented.
How do we truly create value for our customers? a 1 only b 2 only c 3 only d All of the above 10. Which process is primarily supported by the analysis of Patterns of Business Activity (PBA)? a Availability Management b Demand Management c Financial Management d Service Level Management 11. Which of the following do Technology metrics measure? a Components b Processes c The end to end service d Customer satisfaction 12. What services should we offer and to whom? 2. covering all the services that they use b An agreement that covers one service for a single customer c An agreement that covers service specific issues in a multi-level SLA structure d An agreement that covers one service for all customers of that service . Which of the following would NOT be defined as part of every process? a Roles b Activities 4 c Responsibilities d Functions 13. Which of the following is the BEST description of a Service-based Service Level Agreement (SLA)? a An agreement with an individual customer group. How do we differentiate ourselves from competing alternatives? 3.1.
Which of the following is NOT an aim of the Change Management process? a To ensure the impact of changes are better understood b To ensure standardized methods and procedures are used for efficient and prompt handling of changes c To ensure that all changes to Service Assets and Configuration Items (CIs) are recorded in the Configuration Management System (CMS) d To deliver and manage IT services at agreed levels to business users . After the permanent solution has been implemented a 2 only b 1 only c Neither of the above d Both of the above 16.14. Which of the following layers is NOT part of this type of SLA? a Customer Level b Service Level c Corporate Level d Configuration Level 15. The "multi-level SLA" is a three layer structure. When can a Known Error record be raised? 1. At any time it would be useful to do so 2. Which of the following models would be MOST useful in helping to define an organizational structure? a RACI model b Service model c Continual Service Improvement (CSI) model d The Deming Cycle 17.
Process. Implementation of ITIL Service Management requires preparing and planning the effective and efficient use of: a People. Products. Partners. Partners 20. Process. Process. Suppliers b People. Which of the following is NOT a characteristic of a process? a Is measurable b Delivers specific results c Responds to specific events d Structures an organization 19. Partners d People. Which of the following provides the PRIMARY source of guidance on what needs to be protected by Information Security Management? a IT Management b Service Desk Manager 6 c Business Management d The Change manager . Technology. Products.18. Technology c People. Products. What is the BEST description of the purpose of Service Operation? a To decide how IT will engage with suppliers during the Service Management Lifecycle b To proactively prevent all outages to IT Services c To design and build processes that will meet business needs d To deliver and manage IT Services at agreed levels to business users and customers 21.
The Change Advisory Board (CAB) c. Demand Management and Service Level Management d. Which processes review Underpinning Contracts on a regular basis? a. A document that describes business services to operational staff . Who is responsible for defining Key Performance Indicators (KPIs) for the Change Management process? a. Reducing or eliminating the cause of an incident or problem 23. Which of the following is the BEST definition of an event? a.22. The Continual Service Improvement Manager 25. The Change Management process owner b. An agreement between the service provider and an external organization c. A document that describes to a customer how services will be operated on a day-to-day basis d. An agreement between the service provider and another part of the same organization b. Any detectable or discernible occurrence that has significance for the management of the IT infrastructure b. What is the BEST description of an Operational Level Agreement (OLA)? a. Supplier Management. Supplier Management and Demand Management c. Supplier Management and Service Level Management b. The Service Owner d. Demand Management and Service Level Management 24. The unknown cause of one or more incidents that have an impact on an IT service d. An unplanned interruption to an IT service or a reduction in the quality of an IT service c.
Which of the following is NOT an example of Self-Help capabilities? a Requirement to always call the Service Desk for service requests 7 b Web front-end c Menu-driven range of self help and service requests d A direct interface into the back-end process-handling software 27. since they are the only people who know when a service has been disrupted b Incidents can be reported by anyone who detects a disruption or potential disruption to normal service. Things that were done correctly 2.26. This includes technical staff c All calls to the Service Desk must be logged as Incidents to assist in reporting Service Desk activity d Incidents reported by technical staff must be logged as Problems because technical staff manage infrastructure devices not services . Which of the following would a Major Problem Review examine? 1. What could be done better in the future a 1 only b 2 and 3 only c 1. Which of the following statements about Incident reporting and logging is CORRECT? a Incidents can only be reported by users. 2 and 4 only d All of the above 28. Those things that were done incorrectly 3. How to prevent recurrence 4. What is the BEST description of a Major Incident? a An Incident that is so complex that it requires root cause analysis before a workaround can be found b An Incident which requires a large number of people to resolve c An Incident logged by a senior manager d An Incident which has a high priority or high impact on the business 29.
Information Security Management and Supplier Management? a Service Strategy 9 b Service Design c Service Transition d Service Operation . 2 and 3 only c 2 and 4 only d 3 and 4 only 31. Which of these activities would commonly be performed by a Service Desk? 8 1. Which of the following will benefit from the use of a configuration model? 1. In which core publication can you find detailed descriptions of Service Catalogue Management. and 3 only b All of the above c 1. Release and Deployment Management d To plan and manage the capacity and resource requirements to manage a release 32. 2. Which of the following is NOT a purpose of Service Transition? a To ensure that a service can be managed. Planning and design of new or changed services 4. Planning technology refresh and software upgrades a 1.30. Diagnosing the root cause of problems a All of the above b 1. operated and supported b To provide training and certification in project management c To provide quality knowledge of Change. Restoring service 4. 2 and 4 only d 3 and 4 only 33. Providing first-line investigation and diagnosis 3. Assessing the impact of proposed changes 3. Logging details of incidents and service requests 2. Assessing the impact and cause of incidents and problems 2.
2 only 36. Do d. Which statement about the Emergency Change Advisory Board (ECAB) is CORRECT? a. None of the above b. Facilities Management c. To provide security staff for Data Centers and other buildings b. Act b. What is the objective of Access Management? a.34. Testing of resilience mechanisms a. To manage access to computer rooms and other secure locations c. Which of the following activities is NOT a part of the Deming Cycle? a. Applications Management d. The ECAB will be used for emergency changes where there may not be time to call a full CAB d. Service Desk . 1 only d. The ECAB will be chaired by the IT Director 35. Amongst the duties of the ECAB is the review of completed emergency changes c. Technical Management b. Which of the following Availability Management activities are considered to be proactive as opposed to reactive? 1. Which of the following functions would be responsible for management of a data centre? a. To manage access to the Service Desk d. To manage the right to use a service or group of services 10 38. Coordinate 37. Risk assessment 2. Plan c. Both of the above c. The ECAB considers every high priority Request for Change b.
What are the categories of event described in the ITIL Service Operation book? a. Exception d. Warning. 2 and 3 only d.39. Unscheduled. 1 and 3 only c. Reactive. Informational. Responsibilities and dependencies a. Proactive Answers:1 C 11 A 21 C 31 B 2 B 12 D 22 A 32 B 3 A 13 D 23 A 33 B 4 A 14 D 24 A 34 C 5 D 15 B 25 A 35 B 6 A 16 A 26 A 36 D 7 A 17 D 27 D 37 D 8 D 18 D 28 D 38 B 9 D 19 C 29 B 39 C 10 B 20 D 30 B 40 C . Scheduled. Informational. Marketing information 2. None of the above 40. Which of the following would commonly be in a contract underpinning an IT service? 1. 1 and 2 only b. Warning. Normal b. Emergency c. Contract description and scope 3. Scheduled.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.