ITILv3 A Flashcards Preview

ITIL > ITILv3 A > Flashcards

Flashcards in ITILv3 A Deck (40)
Loading flashcards...
1
Q

What types of changes are NOT usually included within the scope of change management?

A. Changes to a mainframe computer
B. Changes to business strategy
C. Changes to a service level agreement (SLA)
D. The retirement of a service

A

B. Changes to business strategy

A change request is a formal communication seeking an alteration to one or more configuration items (CIs). Services, SLAs and computers are examples of CIs. A business strategy is not normally a CI and would be out of scope for change management.

2
Q

Which of the following is NOT a purpose of service operation?

A. To undertake testing to ensure services are designed to meet business needs
B. To deliver and manage IT services
C. To manage the technilogy used to deliver services
D. To monitor the performance of technology and processes

A

A. To undertake testing to ensure services are designed to meet business needs

Each of these are a purpose of service operation except for option A, undertaking testing to ensure services are designed to meet business needs. Option A is part of service transition.

3
Q

What does the term IT operations control refer to?

A. Managing the technical and applications management functions
B. Overseeing the execution and monitoring of operational activities and events
C. A set of tools used to monitor and display the status of the IT infrastructure and applications
D. A Service desk monitoring the status of the infrastructure when operators are not available

A

B. Overseeing the execution and monitoring of operational activities and events

IT operations control oversees the execution and monitoring of the operational activities and events in the IT infrastructure.

4
Q

Which process is responsible for recording relationships between service components?

A. Service level management
B. Service portfolio management
C. Service asset and configuration management (SACM)
D. Incident management

A

C. Service asset and configuration management (SACM)

Part of SACM’s purpose is to maintain accurate information about assets, including the relationship between assets.

5
Q

What is the RACI model used for?

A. Documenting the roles and responsibilities of stakeholders in a process or activity
B. Defining requirements for a new service or process
C. Analysing the business impact of an incident
D. Creating a balanced scorecard showing the overall status of service management

A

A. Documenting the roles and responsibilities of stakeholders in a process or activity

RACI is a responsibility model used by ITIL to help define roles and responsibilities.

6
Q

Which of the following is the BEST description of an operational level agreement (OLA)?

A. An agreement between an IT service provider and another part of the same organization that assists in the provision of services
B. A written agreement between the IT service provider and their customer(s) defining key targets and responsibilities of both parties
C. An agreement between two service providers about the levels of service required by the customer
D. An agreement between a third party service desk and the IT customer about fix and response time

A

A. An agreement between an IT service provider and another part of the same organization that assists in the provision of services

A-is the OLA
B-is the definition of an SLA.
C-doesn’t correspond to an ITIL definition.
D-involves a third party and is a contract.

7
Q

What is the MAIN purpose of availability management?

A. To monitor and report availability of components
B. To ensure that all targets in the service level agreements (SLA) are met
C. To gaurantee availability levels for services and components
D. To ensure that service availability meets the agreed needs of the business

A

D. To ensure that service availability meets the agreed needs of the business

A-is a supporting element of availability management, not a main purpose.
B-relates to service level management. Availability management does not offer guarantees as identified in C.
D-is the main purpose of availability management:- “to ensure that the level of availability delivered in all IT services meet the agreed availability needs… of the business.”

8
Q

Which of the following does service transition provide guidance on?

  1. Introducing new services
  2. Decommissioning services
  3. Transfer of services between service providers

A. 1 and 2 only
B. 2 only
C. All of the above
D. 1 and 3 only

A

C. All of the above

All three are in scope for service transition as all three involve major change.

9
Q

Which one of the following is NOT a stage of the service lifecycle?

A. Service optimization
B. Service transition
C. Service design
D. Service strategy

A

A. Service optimization

Service optimization is the correct answer.

10
Q

Which one of the following statements about a configuration management system (CMS) is CORRECT?

A. The CMS should not contain corporate data about customers and users
B. There may be more than one CMS
C. There should not be more than one configuration management database (CMDB)
D. If an organization outsources its IT services there is still a need for a CMS

A

D. If an organization outsources its IT services there is still a need for a CMS

A-a CMS can contain corporate data about users/customers such as location or department.
B and C-there may be more than one CMDB but they will be part of a single CMS.
D-is correct as a CMS still helps to control and report on the infrastructure when IT services are outsourced.

11
Q

What are the three sub-processes of capacity management?

A. Business capacity management, service capacity management and component capacity management
B. Supplier capacity management, service capacity management and component capacity management
C. Supplier capacity management, service capacity management and technology capacity management
D. Business capacity management, technology capacity management and component capacity management

A

A. Business capacity management, service capacity management and component capacity management

Book answer: A process owner should ensure process documentation is current and available.

12
Q

Which of the following would be stored in the definitive media library (DML)?

  1. Copies of purchased software
  2. Copies of internally defeloped software
  3. Relevant licence documentation
  4. The change schedule

A. All of the above
B. 1 and 2 only
C. 3 and 4 only
D. 1, 2 and 3 only

A

D. 1, 2 and 3 only

The DML contains master copies of all controlled software in an organization… “along with licence documents or information”. The change schedule would not be included.

13
Q

Which process is responsible for reviewing operational level agreements (OLAs) on a regular basis?

A. Supplier management
B. Service level management
C. Service portfolio management
D. Demand management

A

B. Service level management

Service level management has responsibility for negotiating and agreeing OLAs.

14
Q

Which role should ensure that process documentation is current and available?

A. The service owner
B. The chief information officer
C. Knowledge management
D. The process owner

A

D. The process owner

Book answer: A process owner should ensure process documentation is current and available.

15
Q

Which of the following does the release and deployment management process address?

  1. Defining and agreeing relesae and deployment plans
  2. Ensuring release packages can be tracked
  3. Authorizing changes to support the process

A. 1 and 2 only
B. All of the above
C. 2 and 3 only
D. 1 and 3 only

A

A. 1 and 2 only

The two correct answers (1 and 2) are included in release and deployment objectives. Option 3 is addressed by change management.

16
Q

Which of the following are characteristics of every process?

  1. It is measurable
  2. It delivers a specific result
  3. It delivers its primary results to a customer or stakeholder

A. 1 and 3 only
B. 1 and 2 only
C. 2 and 3 only
D. All of the above

A

D. All of the above

Measurability, delivery of specific results, and delivery of results to a customer or stakeholder are all characteristics of a process.

17
Q

Which of the following are ITIL characteristics that contribute to its success?

  1. It is vendor-neutral
  2. It is non-prescriptive
  3. It is best practice
  4. It is a standard

A. 3 only
B. 1, 2, and 3 only
C. All of the above
D. 2, 3 and 4 only

A

B. 1, 2, and 3 only

Option 4 is INCORRECT, ITIL is not a standard: ISO/IEC 20000 would be an example of a standard. ITIL is vendor-neutral, non-prescriptive, and provides a best practice framework.

18
Q

Who should be granted access to the information security policy?

A. Senior business managers and IT staff
B. Senior business managers, IT executives and the information security manager
C. All customers, users and IT staff
D. Information security management staff only

A

C. All customers, users and IT staff

In most cases the policies should be widely available to all customers and users and referenced in SLAs, OLAs and UCs.

19
Q

Which of the following are valid elements of a service design package (SDP)?

  1. Agreed and documented business requirements
  2. A plan for transition of the service
  3. Requirements for new or changed processes
  4. Metrics to measure the service

A. 1 only
B. 2 and 3 only
C. 1,2 and 4 only
D. All of the above

A

D. All of the above

All of the elements identified are included in the service design package passed to service transition.

20
Q

Which of the following are examples of tools that might support the service transition stage of the service lifecycle?

  1. A tool to store definitive version of software
  2. A workflow tool for managing changes
  3. An automated software distribution tool
  4. Testing and validation tools

A. 1, 3 and 4 only
B. 1, 2 and 3 only
C. All of the above
D. 2, 3 and 4 only

A

C. All of the above

1-would be used to support a DML.
2-helps change management.
3-is a release and deployment tool.
4-can help with testing and validation.
They all support service transition.
21
Q

Which of the following statements about problem management is/are CORRECT?

  1. It ensures that all resolutions or workarounds that require a change to a configuration item (CI) are submitted through change management
  2. It provides management information about the cost of resolving and preventing problems

A. 1 only
B. 2 only
C. Both of the above
D. Neither of the above

A

C. Both of the above

Book answer. They are both valid roles for problem management.

22
Q

What is the purpose of the request fulfillment process?

A. Dealing with service requests from the users
B. Making sure all requests within an IT organization are fulfilled
C. Ensure fulfillment of change requests
D. Making sure the service level agreement (SLA) is met

A

A. Dealing with service requests from the users

Request fulfillment is the process responsible for dealing with service requests from the users. All requests (B) is too wide a scope for the process. Change management looks after change requests (C). Service level management is responsible for D.

23
Q

Which statement about value creation through services is CORRECT?

A. The customer’s perception of the service is an important factor in value creation
B. The value of a service can only ever be measured in financial terms
C. Delivering service provider outcomes is important in the value of a service
D. Service provider preferences drive the value perception of a service

A

A. The customer’s perception of the service is an important factor in value creation

A-is CORRECT, customer perception is a vital element in defining how much a customer values a service.
B-is incorrect, the value of a service can be financial but other factors are also relevant.
C-is incorrect, delivering on customer outcomes is vital.
D-is incorrect, customer preferences drive value perception.

24
Q

Which one of the following statements about internal and external customers is MOST correct?

A. External customers should receive better customer service because they pay for their IT service
B. Internal customers should receive better customer service because they pay employee salaries
C. The best customer service should be given to the customer that pays the most money
D. Internal and external customers should receive the level of customer service that has been agreed

A

D. Internal and external customers should receive the level of customer service that has been agreed

D-is the correct response. Both internal and external customers should be provided with the agreed level of service, and with the same level of customer service.

25
Q

Which one of the following should IT services deliver to customers?

A. Capabilities
B. Cost
C. Risk
D. Value

A

D. Value

A service is a means of delivering value to customers. IT needs capabilities to deliver services. Cost and risk are what IT helps to manage.

26
Q

Which one of the following activities is part of the service level management (SLM) process?

A. Designing the configuratino management system from a business perspective
B. Creating technology metrics to align with customer needs
C. Monitoring service performance against service level agreements (SLAs)
D. Training service desk staff how to deal with customer complaints about service

A

C. Monitoring service performance against service level agreements (SLAs)

A-designing the CMS is a service asset and configuration management activity.
B-technology metrics are likely to be created within capacity management or other design processes.
C-is CORRECT, monitoring the SLAs and performance against them is a vital part of the service level management process.
D-training the service desk is a service desk role.

27
Q

Which of the following BEST summarizes the purpose of event management?

A. The ability to detect events, make sense of them and determine the appropriate control action
B. The ability to detect events, resore normal service as soon as possible and minimize the adverse impact on business operations
C. The ability to monitor and control the activities of technical staff
D. The ability to report on the successful delivery of services by checking the uptime of infrastructure devices

A

A. The ability to detect events, make sense of them and determine the appropriate control action

A-the ability to detect events, make sense of them and determine the appropriate control action is provided by event management.
B-includes some incident management responsibilities.
C-is a technical management task.
D-is likely to be shared between availability management and service level management.

28
Q

Which of the following should a service catalogue contain?

A. The version information of all software
B. The organizational structure of the company
C. Asset information
D. Details of all operational services

A

D. Details of all operational services

The service catalog should contain details of all operational service.

29
Q

What does “Warranty of a service” mean?

A. The service is fit for purpose
B. There will be no failures in applications and infrastructure associated with the service
C. All service-related problems are fixed free of charge for a certain period of time
D. Customers are assured of certain levels of availability, capacity, continuity and security

A

D. Customers are assured of certain levels of availability, capacity, continuity and security

A-is part of the definition of utility.
B-is unrealistic.
C-could be feasible as a warrant statement from another industry but is not the definition of warranty as used by ITIL.
D-is a good summary of warranty as defined by ITIL.

30
Q

Which is the first activity of the continual service improvement (CSI) approach?

A. Understand the business vision and objectives
B. Carry out a baseline assessment to understand the current situation
C. Agree on priorities for improvement
D. Create and verify a plan

A

A. Understand the business vision and objectives

The improvement approach begins with embracing the vision by understanding the high-level business objectives.

31
Q

Which of the following is a benefit of using an incident model?

A. It will make problems easier to identigy and diagnose
B. It means known incident types never recur
C. It provides pre-defined steps for handling particular types of incidents
D. It ensures all incidents are easy to solve

A

C. It provides pre-defined steps for handling particular types of incidents

Incident models are designed to provide reusable steps that can be used to restore service after known incident types.

32
Q

Which one of the following is the CORRECT sequence of activities for handling an incident?

A. identification, logging, categorization, prioritization, initial diagnosis, escalation, investigation and diagnosis, resolution and recovery, closure
B. prioritization, identification, logging, categorization, initial diagnosis, escalation, investigation and diagnosis, resolution and recovery, closure
C. identification, logging, initial diagnosis, categorization, prioritization, escalation, resolution and recovery, investigation and diagnosis, closure
D. identification, initial diagnosis, investigation, logging, categorization, escalation, prioritization, resolution and recovery, closure

A

A. identification, logging, categorization, prioritization, initial diagnosis, escalation, investigation and diagnosis, resolution and recovery, closure

The correct order is given in the diagram in the incident management process, and in the subsections of 4.2.5.

33
Q

Which service lifecycle stage ensures that measurement methods will provide the required metrics for new or changed services?

A. Service design
B. Service operation
C. Service strategy
D. Service delivery

A

A. Service design

Measurements and metrics should be included in the design for a new or changed service.

34
Q

Which of the following processes are concerned with managing risks to services?

  1. IT service continuity management
  2. Information security management
  3. Service catalog management

A. All of the above
B. 1 and 3 only
C. 2 and 3 only
D. 1 and 2 only

A

D. 1 and 2 only

IT service continuity management carries out risk assessment as part of defining the requirements and strategy. Information Security also needs to analyse security risks before taking action to mitigate them. Service catalog management does not carry out these assessments.

35
Q

Which one of the following is NOT a type of metric described in continual service improvement (CSI)?

A. Process metrics
B. Service metrics
C. Personnel metrics
D. Technology metrics

A

C. Personnel metrics

Personnel metrics are not one of the three types of metrics described in CSI.

36
Q

Which statement about the relationship between the configuratino management system (CMS) and the service knowledge management system (SKMS) is CORRECT?

A. The SKMS is part of the CMS
B. The CMS is part of the SKMS
C. The CMS and SKMS are the same thing
D. There is no relationship between the CMS and the SKMS

A

B. The CMS is part of the SKMS

A-is the wrong way round.
C-is incorrect as the SKMS contains more information than the CMS.
D-is incorrect as the CMS is part of the SKMS.

37
Q

What is the role of the emergency change advisory board (ECAB)?

A. To assist the change manager in ensuring that no urgent changes are made during particularly volatile business periods
B. To assist the change manager by implementing emergency changes
C. To assist the change manager in evaluating emergency changes and to decide whether they should be aurhorized
D. To assist the change manager in speeding up the emergency change process so that no unacceptable delays occur

A

C. To assist the change manager in evaluating emergency changes and to decide whether they should be authorized

The emergency change advisory board (ECAB) provides assistance in the authorization of emergency changes.

38
Q

Which of the following statements about the service desk is/are CORRECT?

  1. The service desk is a function that provides a means of communication between IT and its user for all operations
  2. The service desk should be the owner of the problem management process

A. 2 only
B. 1 only
C. Both of the above
D. Neither of the above

A

B. 1 only

The service desk should be the single point of contact for IT users on a day-by-day basis. The service desk manager may also be the incident management process owner but would not normally be the owner of the problem management.

39
Q

Which one of the following is the CORRECT list of the four Ps of service design?

A. Planning, products, position, processes
B. Planning, perspective, position, people
C. Perspective, partners, problems, people
D. People, partners, products, processes

A

D. People, partners, products, processes

Book answer: people, processes, products (services, technology and tools) and partners (suppliers, manufacturers and vendors).

40
Q

Which one of the following represents the BEST course of action to take when a problem workaround is found?

A. The problem record is closed
B. The problem record remains open and details of the workaround are documented within it
C. The problem record remains open and details of the workaround are documented on all related incident records
D. The problem record is closed and details of the workaround are documented in a request for change (RFC)

A

B. The problem record remains open and details of the workaround are documented within it

A-is incorrect, the problem record must remain open as it hasn’t yet been resolved.
B-is CORRECT to document the workaround on the problem record, not on each incident record (C), nor on an RFC (D).