This action might not be possible to undo. Are you sure you want to continue?
a To prevent Problems and their resultant Incidents b To manage Problems throughout their lifecycle c To restore service to a user d To eliminate recurring Incidents 2. A single Release unit, or a structured set of Release units can be defined within: a The RACI Model b A Release Package c A Request Model d The Plan, Do, Check, Act (PDCA) cycle 3. What are the processes within Service Operation? a. Event Management, Incident Management, Problem Management, Request Fulfilment and Access Management b. Event Management, Incident Management, Change Management and Access Management c. Incident Management, Problem Management, Service Desk, Request Fulfilment and Event Management d. Incident Management, Service Desk, Request Fulfilment, Access Management and Event Management 4. Which process is responsible for sourcing and delivering components of requested standard services? a Request Fulfilment b Service Portfolio Management c Service Desk d IT Finance 5. Which process is responsible for controlling, recording and reporting on versions, attributes and relationships relating to components of the IT infrastructure?
Check the plan has been properly implemented. Customer perceptions and business outcomes help to define what? a The value of a service b Governance c Total Cost of Ownership (TCO) d Key Performance Indicators (KPIs) 8. Continually Improve b. Improve the solution e. Where do we want to be?. How do we check we arrived?. Plan how to achieve the outcomes. Transition into production. Devise a strategy. How do we keep the momentum going? 9. Operate the solution. 3 c. Which of these is the correct set of steps for the Continual Service Improvement Model? a. What is the vision?. Where do we want to be?. How do we keep the momentum going? d. Implement the plan.How do we get there?. Design the solution. Outside of the core publications. Where are we now?. Which of the following questions does guidance in Service Strategy help answer? . which part of ITIL provides guidance in adapting good practice for specific business environments? a The ITIL Complementary Guidance b The Service Support book c Pocket Guides d The Service Strategy book 7.a Service Level Management b Change Management c Incident Management d Service Asset and Configuration Management 6. Identify the required business outcomes. Did we get there?. How do we get there?.
Which of the following would NOT be defined as part of every process? a Roles b Activities 4 c Responsibilities d Functions 13. Which of the following is the BEST description of a Service-based Service Level Agreement (SLA)? a An agreement with an individual customer group. What services should we offer and to whom? 2.1. Which of the following do Technology metrics measure? a Components b Processes c The end to end service d Customer satisfaction 12. covering all the services that they use b An agreement that covers one service for a single customer c An agreement that covers service specific issues in a multi-level SLA structure d An agreement that covers one service for all customers of that service . How do we differentiate ourselves from competing alternatives? 3. How do we truly create value for our customers? a 1 only b 2 only c 3 only d All of the above 10. Which process is primarily supported by the analysis of Patterns of Business Activity (PBA)? a Availability Management b Demand Management c Financial Management d Service Level Management 11.
At any time it would be useful to do so 2. When can a Known Error record be raised? 1. Which of the following models would be MOST useful in helping to define an organizational structure? a RACI model b Service model c Continual Service Improvement (CSI) model d The Deming Cycle 17. The "multi-level SLA" is a three layer structure.14. Which of the following layers is NOT part of this type of SLA? a Customer Level b Service Level c Corporate Level d Configuration Level 15. After the permanent solution has been implemented a 2 only b 1 only c Neither of the above d Both of the above 16. Which of the following is NOT an aim of the Change Management process? a To ensure the impact of changes are better understood b To ensure standardized methods and procedures are used for efficient and prompt handling of changes c To ensure that all changes to Service Assets and Configuration Items (CIs) are recorded in the Configuration Management System (CMS) d To deliver and manage IT services at agreed levels to business users .
What is the BEST description of the purpose of Service Operation? a To decide how IT will engage with suppliers during the Service Management Lifecycle b To proactively prevent all outages to IT Services c To design and build processes that will meet business needs d To deliver and manage IT Services at agreed levels to business users and customers 21. Products. Which of the following provides the PRIMARY source of guidance on what needs to be protected by Information Security Management? a IT Management b Service Desk Manager 6 c Business Management d The Change manager . Products. Products. Suppliers b People. Partners.18. Technology c People. Partners d People. Process. Technology. Implementation of ITIL Service Management requires preparing and planning the effective and efficient use of: a People. Partners 20. Process. Which of the following is NOT a characteristic of a process? a Is measurable b Delivers specific results c Responds to specific events d Structures an organization 19. Process.
Demand Management and Service Level Management 24. Demand Management and Service Level Management d. Who is responsible for defining Key Performance Indicators (KPIs) for the Change Management process? a. The Service Owner d. A document that describes to a customer how services will be operated on a day-to-day basis d. Supplier Management and Demand Management c. Reducing or eliminating the cause of an incident or problem 23. The Continual Service Improvement Manager 25.22. The Change Management process owner b. An agreement between the service provider and an external organization c. A document that describes business services to operational staff . Supplier Management and Service Level Management b. The unknown cause of one or more incidents that have an impact on an IT service d. An unplanned interruption to an IT service or a reduction in the quality of an IT service c. Which processes review Underpinning Contracts on a regular basis? a. The Change Advisory Board (CAB) c. What is the BEST description of an Operational Level Agreement (OLA)? a. Supplier Management. Which of the following is the BEST definition of an event? a. An agreement between the service provider and another part of the same organization b. Any detectable or discernible occurrence that has significance for the management of the IT infrastructure b.
How to prevent recurrence 4. Which of the following is NOT an example of Self-Help capabilities? a Requirement to always call the Service Desk for service requests 7 b Web front-end c Menu-driven range of self help and service requests d A direct interface into the back-end process-handling software 27. 2 and 4 only d All of the above 28. Which of the following statements about Incident reporting and logging is CORRECT? a Incidents can only be reported by users. Things that were done correctly 2.26. since they are the only people who know when a service has been disrupted b Incidents can be reported by anyone who detects a disruption or potential disruption to normal service. What is the BEST description of a Major Incident? a An Incident that is so complex that it requires root cause analysis before a workaround can be found b An Incident which requires a large number of people to resolve c An Incident logged by a senior manager d An Incident which has a high priority or high impact on the business 29. Which of the following would a Major Problem Review examine? 1. This includes technical staff c All calls to the Service Desk must be logged as Incidents to assist in reporting Service Desk activity d Incidents reported by technical staff must be logged as Problems because technical staff manage infrastructure devices not services . Those things that were done incorrectly 3. What could be done better in the future a 1 only b 2 and 3 only c 1.
Release and Deployment Management d To plan and manage the capacity and resource requirements to manage a release 32. Planning technology refresh and software upgrades a 1.30. Providing first-line investigation and diagnosis 3. Which of the following is NOT a purpose of Service Transition? a To ensure that a service can be managed. and 3 only b All of the above c 1. operated and supported b To provide training and certification in project management c To provide quality knowledge of Change. Logging details of incidents and service requests 2. Diagnosing the root cause of problems a All of the above b 1. 2. Information Security Management and Supplier Management? a Service Strategy 9 b Service Design c Service Transition d Service Operation . Restoring service 4. 2 and 3 only c 2 and 4 only d 3 and 4 only 31. 2 and 4 only d 3 and 4 only 33. Assessing the impact and cause of incidents and problems 2. Assessing the impact of proposed changes 3. Planning and design of new or changed services 4. Which of the following will benefit from the use of a configuration model? 1. In which core publication can you find detailed descriptions of Service Catalogue Management. Which of these activities would commonly be performed by a Service Desk? 8 1.
The ECAB will be chaired by the IT Director 35. 2 only 36. Applications Management d. Plan c. To manage the right to use a service or group of services 10 38. Do d. 1 only d. Which statement about the Emergency Change Advisory Board (ECAB) is CORRECT? a. Facilities Management c. Risk assessment 2. None of the above b. Which of the following functions would be responsible for management of a data centre? a. Amongst the duties of the ECAB is the review of completed emergency changes c. Technical Management b.34. The ECAB will be used for emergency changes where there may not be time to call a full CAB d. Act b. Service Desk . To provide security staff for Data Centers and other buildings b. Coordinate 37. Which of the following activities is NOT a part of the Deming Cycle? a. Testing of resilience mechanisms a. Both of the above c. Which of the following Availability Management activities are considered to be proactive as opposed to reactive? 1. The ECAB considers every high priority Request for Change b. To manage access to computer rooms and other secure locations c. To manage access to the Service Desk d. What is the objective of Access Management? a.
2 and 3 only d. Exception d. None of the above 40. Reactive.39. Scheduled. Scheduled. Warning. Warning. 1 and 2 only b. Marketing information 2. Emergency c. Informational. Informational. 1 and 3 only c. Responsibilities and dependencies a. Which of the following would commonly be in a contract underpinning an IT service? 1. What are the categories of event described in the ITIL Service Operation book? a. Normal b. Unscheduled. Contract description and scope 3. Proactive Answers:1 C 11 A 21 C 31 B 2 B 12 D 22 A 32 B 3 A 13 D 23 A 33 B 4 A 14 D 24 A 34 C 5 D 15 B 25 A 35 B 6 A 16 A 26 A 36 D 7 A 17 D 27 D 37 D 8 D 18 D 28 D 38 B 9 D 19 C 29 B 39 C 10 B 20 D 30 B 40 C .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.