ITIL Assessment Test Flashcards Preview

ITIL > ITIL Assessment Test > Flashcards

Flashcards in ITIL Assessment Test Deck (30)
Loading flashcards...
1

What is ITIL?

A. Rules for achieving recognized IT standards
B. Good advice about how to manage IT services
C. Advice on managing projects
D. Advice on the technical requirements for infrastructure

B. Good advice about how to manage IT services

ITIL is a framework of best practice advise based on processes for the management of IT services that provide value to the business.

2

What is an IT service provider?

A. An internal IT department
B. An external outsourced IT department
C. Either an internal IT department or an external IT department
D. A business unit

C. Either an internal IT department or an external IT department

An IT service provider is the provider of IT services for the organization; it can be either internal or external.

3

Who "owns" ITIL?

A. The U.S. government
B. Microsoft
C. The U.K. government
D. The Open Group

C. The U.K. government

ITIL is owned by the U.K. government, which drew up the guidance in the late 1980s, based on best practices used by successful IT organizations. It has been periodically refreshed, with the most recent edition being released in 2011.

4

Which of these is NOT a stage in the ITIL service lifecycle?

A. Service design
B. Service implementation
C. Continual service improvement
D. Service operation

B. Service implementation

The five stages of ITIL service lifecycle are service strategy, service design, service transition, service operation, and continual service improvement.

5

The knowledge management process maintains and updates a tool used for knowledge management. What is this system called?

A. The service management tool
B. The knowledge base for service management
C. The service knowledge management system
D. The service management database

C. The service knowledge management system

The tool is called the service knowledge management system (SKMS) and is a repository for information, data, and knowledge relating to service management. This has important connections for managing information and knowledge throughout the whole service lifecycle.

6

A service must provide which of the following to deliver business value?

A. Sufficient capacity, the agreed level of security, and alignment to the organization's project management methodology
B. Sufficient capacity and the agreed level of security
C. The agreed level of security and alignment to the organization's project management methodology
D. the agreed level of security

B. Sufficient capacity and the agreed level of security

Every new or changed service must be capable of delivering the service without running out of capacity. It must also be secure enough to protect the organization's data. There is no requirement to use any particular project management methodology.

7

In the ITIL guidance on incident management, what is one of the key purposes of the incident management process?

A. the purpose of incident management is to restore normal service operation as quickly as possible
B. the purpose of incident management is to prevent incidents from occurring by identifying the root cause
C. the purpose of incident management is to prevent changes from causing incidents when a change is implemented
D. The purpose of incident management is to ensure that the service desk fulfills all requests from users

A. the purpose of incident management is to restore normal service operation as quickly as possible

The purpose of the incident management process is to restore normal service operation as quickly as possible, while minimizing the adverse impact to the business of outages in service. Normal service operation is the agreed level of service documented for the delivery of the service.

8

A service catalog contains which of the following?

A. Details of all services being developed
B. Details of all services being considered
C. Details of all services currently available to the users
D. Details of all services

C. Details of all services currently available to the users

The catalog includes services that are available to users. The services being considered or developed are in the service pipeline. Details of all services, including those being developed, the operational services, and the retired services , are in the service portfolio.

9

The predicted costs and benefits of a proposed new service are documented in which of the following documents?

A. The project plan
B. The service strategy
C. The business case
D. The improvement register

C. The business case

The business case contains the justification for a significant item of expenditure. It includes information about costs, benefits, options, issues, risks, and possible problems.

10

The agreement between an IT service provider and their customers regarding the services provided is called what?

A. Service charter
B. Service contract
C. Service level agreement
D. Service targets

C. Service level agreement

The service level agreement contains information about the service to be provided, the targets that need to be met, and the responsibilities of both customer and IT provider.

11

What is meant by the term REQUEST FULFILLMENT in the ITIL framework?

A. Request fulfillment is a means of managing the changes that users request in the IT environment
B. Request fulfillment is used to deliver non-IT-related business components to the users
C. Request fulfillment is a process for managing the requests from users to the IT department
D. Request fulfillment is the report produced on the number of password resets carried out by the IT department

C. Request fulfillment is a process for managing the requests from users to the IT department

Request fulfillment is a key operational process in the service operation stage of the service lifecycle. This process is used to ensure that requests made by users for information, advice, or standard components are handled efficiently.

12

Which of the following should be considered when drawing up a capacity plan?
1. the business plan to streamline its operations
2. The possibility of moving a business operation such as a call center overseas
3. New advances in technology
4. Plans to restructure the IT department

A. 1 and 2
B. 1, 2, and 3
C. All of the above
D. 1,3, and 4

B. 1, 2, and 3

Plans by the business to reduce its head count or number of locations would affect the capacity required. New technology may offer increased capacity at the same or lower cost. The structure of the IT department should have no effect on capacity requirements of the business.

13

An availability plan should consider the requirements for what period?

A. For the next 24 hours
B. For the next week
C. For the next month
D. For the next 12 to 18 months

D. For the next 12 to 18 months

The availability plan looks ahead to ensure that the design that is delivered meets the availability requirements when the service is delivered and for the next 12 to 18 months.

14

Which of the following is true about change management?

A. All changes, however small, must be approved by the change advisory board before implementation
B. Emergency changes are too urgent to need approval before implementation
C. Low-risk changes may be preapproved
D. The change advisory board is for technical assessment and approval of changes only

C. Low-risk changes may be preapproved

Low risk, or "standard," changes may be preapproved by the change manager and require only to be logged before being implemented; only higher-risk changes need approval before implementation. Emergency changes need to be approved by a small number of key people who make up the emergency change advisory board. The change advisory board should include business representatives and others (such as training department representatives) to ensure that all aspects of the change have been considered.

15

Which of the following is NOT a category of supplier described in ITIL?

A. Strategic
B. Operational
C. Preferred
D. Commodity

C. Preferred

ITIL describes four types of supplier

16

Who should have access to the security policy?

A. Business users
B. IT staff
C. Senior management
D. Everyone

D. Everyone

The security policy should be communicated to all users and staff.

17

Which of the following statements is FALSE?

A. Planning for a number of different disaster scenarios that could affect IT services is essential
B. Ensuring the business is able to continue operation is the responsibility of IT
C. It is impossible to plan for disasters, because there are too many different possibilities. The IT department should be ready to quickly devise a recovery plan following a disaster.
D. Continuity planning requires an understanding of the key business processes

B. Ensuring the business is able to continue operation is the responsibility of IT

Ensuring that the required IT services are available to help the business to continue operation is the responsibility of IT; it is the responsibility of the business to have a business continuity plan. IT services are only part of that plan.

18

What is the purpose of the continual service improvement (CSI) stage of the service lifecycle?

A. The CSI stage is concerned with the management of improvement across the whole service lifecycle
B. The CSI stage considers only the improvements needed for the business outputs
C. The CSI stage focuses on improving the operational processes in the service lifecycle
D. The CSI stage manages the improvements between project management and live operational services

A. The CSI stage is concerned with the management of improvement across the whole service lifecycle

The CSI stage applies across the whole of the service lifecycle and is key in the management of all improvements across all service stages.

19

What is the Deming cycle?

A. The Deming cycle is a set of questions for managing processes
B. The Deming cycle is a set of standards for quality management
C. The Deming cycle is an approach for managing quality improvement
D. The Deming cycle is concerned with the delivery of security controls

C. The Deming cycle is an approach for managing quality improvement

The Deming cycle is used to manage the ongoing quality improvement of services and processes, as part of the stage continual service improvement.

20

What is the continual service improvement (CSI) approach?

A. The CSI approach is used to manage processes in the operational environment
B. The CSI approach is focused on the delivery of quality management systems into IT
C. The CSI approach is used to manage improvement activity in line with business requirements
D. The CSI approach is focused on the introduction of projects into the operational environment

C. The CSI approach is used to manage improvement activity in line with business requirements

The CSI approach is a set of steps that can be used to manage improvement initiatives in line with the requirements of the business.

21

Which of these statements about asset management and configuration management is NOT true?

A. Asset management is concerned only with purchased items such as hardware and software
B. Asset management considers the value of items, and configuration management considers the inter-dependencies between items
C. Configuration management may include locations and documents
D. Configuration management information is held in a database called the configuration repository

D. Configuration management information is held in a database called the configuration repository

Configuration management information is held in a configuration management system (CMS), which may contain a number of federated configuration management databases (CMDBs).

22

How is the seven-step improvement process in the continual service improvement lifecycle stage used?

A. The seven-step improvement process is used to manage improvement initiatives in line with business requirements
B. the seven-step improvement process is used to gather, analyze, and present data to assist in decision making
C. The seven-step improvement process is used to format the improvement reports delivered to the business
D. The seven-step improvement process is used to manage the improvement program across the organizaiton

B. the seven-step improvement process is used to gather, analyze, and present data to assist in decision making

The seven-step improvement process is the process used as part of the CSI lifecycle stage to ensure that the correct data is gathered, analyzed, and presented to the correct audience in order to enable informed decision making.

23

The ITIL framework refers to a number of operational functions. What is meant by the term FUNCTION?

A. A function is a collection of technical infrastructure elements designed to manage an IT service
B. A function manages the requirement of controlling costs in an IT department
C. A function is used to deliver the security requirements across the service lifecycle
D. A function is a unit of the organization specialized to deliver particular processes or activities

D. A function is a unit of the organization specialized to deliver particular processes or activities

The ITIL framework identifies four different functions, which are units of the organization specialized to deliver certain processes, activities, or capabilities, An example of this is the service desk, which is used as a single point of contact for the users to IT.

24

Event management is a key operational process in the service operation lifecycle stage. What is the purpose of event management?

A. Event management detects events that are significant for the management of the service and ensures the appropriate actions are taken
B. Event management monitors the infrastructure of the IT services and guarantees that no outages occur in peak times of business usage
C. Event management manages failures in the infrastructure and ensures that services are restored to normal working as quickly as possible
D. Event management monitors the underlying causes of failures and ensures that changes are made to prevent further failures from taking place

A. Event management detects events that are significant for the management of the service and ensures the appropriate actions are taken

Event management is the process that uses the automated monitoring capability of the infrastructure to identify significant issues that require management. It is used to ensure that proper notification of issues is received and the appropriate action taken.

25

How is the process of access management used in the service operation stage of the service lifecycle?

A. Access management is used to manage the security technology in the infrastructure
B. Access management is used to ensure the correct people are able to use the correct systems in the correct way
C. Access management is used to ensure the active directory entries are audited for accuracy
D. Access management is used to maintain security controls over the business environment

B. Access management is used to ensure the correct people are able to use the correct systems in the correct way

The process of access management ensures that access to systems and services is managed and controlled according to the security policy in place. this includes providing access to users and monitoring their actions.

26

Problem management is an important process in the service operation lifecycle stage. How does the process define a problem?

A. A problem is an incident that has become extremely serious and is causing significant business impact
B. A problem is an issue that has no solution and needs to be raised to the senior management for a decision
C. A problem is the unknown, underlying cause of one or more incidents
D. A problem is a set of incidents that have been linked together in a customer report

C. A problem is the unknown, underlying cause of one or more incidents

A problem is defined as the unknown, underlying cause of one or more incidents. Problem management is the process that investigates the root cause of incidents so that the incidents may be prevented from recurring.

27

The service operation lifecycle stage has a number of key objectives. Which of these statements best reflects the key objectives of service operation?

A. Service operation should ensure the day-to-day service is delivered according to the agreed requirements of the business
B. Service operation ensures the financial obligations of the IT department are met and reported to the business
C. Service operation should ensure the details of the IT infrastructure are captured in the service asset database
D. Service operation should agree on the strategy for delivering IT services to the business

A. Service operation should ensure the day-to-day service is delivered according to the agreed requirements of the business

Service operation ensures the day-to-day running of the services is managed according to the agreed requirements of the business. This is where the business sees the value of the services being delivered, and it is service operation that should maintain the status quo.

28

The release and deployment process covers a concept called early-life support. What is meant by early-life support?

A. Early-life support refers to the end of the project lifecycle and the management of the post-implementation project review
B. Early-life support refers to the handoff between service transition and service operation, ensuring support for the new or changed service in the initial stages of operation
C. Early-life support refers to the introduction of new processes into the operational environment, using service transition processes to ensure a complete integration of the new process
D. Early-life support refers to the step in the release and deployment process where the project team deliver the documentation of the infrastructure to the service management team

B. Early-life support refers to the handoff between service transition and service operation, ensuring support for the new or changed service in the initial stages of operation

Early-life support is the handoff that takes place between service transition and service operation, during the deployment phase of release and deployment. It ensures the support of the deployment and development teams is still available as the new or changed service is introduced to the live environment.

29

An important focus for the service lifecycle is the capture and management of knowledge relating to IT service provision. How does the process of knowledge management work in the service lifecycle?

A. Knowledge management is solely concerned with the transfer of knowledge when implementing new or changed services
B. Knowledge management is used across the lifecycle stages of continual service improvement and service operation to ensure that improvements are managed effectively
C. Knowledge management is used solely in the service operation stage of the lifecycle to ensure that operation issues are managed efficiently
D. Knowledge management is used across the whole service lifecycle to ensure that appropriate knowledge is delivered to enable informed decision making

D. Knowledge management is used across the whole service lifecycle to ensure that appropriate knowledge is delivered to enable informed decision making

Knowledge management is a process that has influence across the whole of the service lifecycle. It is used to capture and present ideas, perspectives, data, and information to all stages of the lifecycle, ensuring that the appropriate decisions can be made.

30

The service transition stage of the service lifecycle has a number of different processes. Which of these is the process most concerned with the management of the whole approach to service transition?

A. Transition management and support
B. Transition planning and support
C. Service transition release and development
D. Change management

B. Transition planning and support

Transition planning and support is a process that enable all activity taking place in the service transition lifecycle to be managed. this includes understanding the allocation of resources and resolving conflicting demands for resources.