Professional Documents
Culture Documents
1. Many organization measure Availability of service based on Mean time between failures
MTBF, Mean time to restore service MTRS or User outage minutes, Number of lost
transaction, Lost business value, User Satisfaction. Older services were often designed with
very _____MTBF, more recently there has been a shift towards optimizing service design
with very _____MTRS.
A. High - Low
B. Low - High
C. High - High
D. Low – Low
2. Documenting the business requirement for the supporting service to enable the desired
improvements is one of the key activities associated with Business Analysis. Business
Requirement can be ________ (non-functional) captured as inputs from key stakeholders or
_______ (functional) which have been defined by the customer and are unique to a specific
product.
A. Utility focused – Warranty focused
B. Warranty focused – Utility focused
C. High level – General
D. Direct – Indirect
4. Change refers to the add, move, modify, improve, remove etc., the features, functionalities
of a services & service components. There’re 3 type of Change: Standard Change, Normal
change and Emergency Change.
Standard Changes are pre-approved changes that are considered relatively low risk,
are performed frequently, and follow a documented (and Change Management
approved) process. For example: _____________.
Normal Changes are the changes that have significant impact to business and needs
to be scheduled, assessed, authorized following a process: They are raised as Request
for Change (RFC), reviewed by CAB, and approved or rejected by the Change
Manager. For example: Upgrading NY RAC to Oracle 12c.
Emergency changes are the changes that are raised during the emergency
scenarios. For example: Incidents resolution.
A. Migration from one datacenter to another
B. Rebooting server
C. Resetting a password of a user system
D. Fixing security breach, server outage
7. “Event”, refers to the change of state that will have significant impact to the management
of an IT service or service component. All the incidents are events, but not all the events
are incidents. Similarly, all the alerts are triggered by events, but not all events generate
alerts. Events are of three types; informational, warning and exceptional event. Which of
the following example is NOT CORRECT for Warning Event?
A. Storage utilization reached 80%.
B. Standard transaction taking 15% longer to complete than normal.
C. A segment of the network is not responding to routine requests.
D. The collision rate on a network has increased by 15% over the past hour.
10. The service catalogue should provide tailored views and different levels of detail to
different stakeholders. Examples of views include:
The user views which provide the information of service offerings that can be
requested by user, and the details of provisioning.
The _______________ which would provide the details of service level, financial, and
the detail of service performance, which would help customer to choose the specific
service offering
The IT to IT customer views which provides the technical, security, and process
information for use in service delivery.
A. Customer View
B. Supplier View
C. Partner View
D. Technical View
11. Configuration management provides information on the Configuration Items that contribute
to each service and their relationships: how they interact, relate, and depend on each other
to create value. This includes info about dependencies between services. This high-level view
is often called a service map or service model, and forms part of the service _____________.
A. Portfolio
B. Architecture
C. Version
D. Catalogue
12. Service continuity management provides framework for building organizational resilience
with the capability of producing an effective response to _________, a sudden unplanned
event that cause great damage or serious loss such as cyber attack, public crisis, terrorism,
supply chain failure, etc. Less significant events will be dealt as part of incident management.
The distinction between _________, major incidents and incidents needs to be pre-defined,
agreed, and documented with clear threshold and triggers for calling the next tier of response
and recovery into action without unnecessary delay and risk.
A. Mistake
B. Problem
C. Disaster
D. Risk
13. Service design practice should ensure the customer’s journey from Demand through Value
Realization is as pleasant and frictionless as it can be, and deliver the best customer outcome
possible. This is achieved by focusing on _________ & _________.
A. Service Utility & Warranty
B. Cost & Risk
C. Output & Outcome
D. Customer Experience & User Experience
14. Which practice provides a single point of contact for the service provider with all of its users?
A. Incident Management
B. Business Analysis
C. Change Control
D. Service Desk
15. Which statement is NOT CORRECT about Service Level Agreement (SLA)?
A. SLA is a documented agreement between a service provider and a customer that
identifies both services required and the expected level of service.
B. SLA have to be established by understanding the nature of the business context,
business dynamics, technology environment, what makes the business successful,
insights obtained while engaging and listening to the customer’s feedback, issues,
concerns, etc.
C. SLA should be based on only single-system-based metrics such as system
availability or incident resolution times or volume metrics or percentage of uptime,
etc.
D. SLA should establish performance measurement metrics which are a truthful
reflection of the customer’s actual experience & level of satisfaction with the whole
service and complement and align towards a common objective.
16. Which following statement is CORRECT about Service Request Management?
A. Service Requests are a normal part of service delivery and a failure or degradation of
service, which are handled as incidents.
B. Since service requests are pre-define and pre-agreed as a normal part of service
delivery, they can usually be formalized with a clear, standard procedure for initiation,
approval, fulfillment and management.
C. Simple workflow like request for information, request for providing access to a folder,
etc. is not Service Request.
D. Service Request Management is dependent upon on well-designed process and
procedure which are operationalized through tracking & automation tools so that
different types of service request will have the same fulfillment workflow models.
17. How does Service Validation & Testing contribute to “Improve” of Service Value System?
A. Metrics such as escaped defects, test coverage, service performance against SLAs is
defined to lower risk and enhance CX.
B. Known errors are captured and shared with the service desk and incident
management practices to enable faster service restoration timeframes.
C. Info of service disruption are fed back into service validation & testing to increase the
effectiveness & coverage of acceptance criteria and testing activities.
D. Service validation and testing activities are closely linked to all practices.