ITILv3 B Flashcards Preview

ITIL > ITILv3 B > Flashcards

Flashcards in ITILv3 B Deck (40)
Loading flashcards...
1

Input from which processes could be considered by service level management when negotiating service level agreements (SLA)?

A. All other ITIL processes
B. Capacity management and availability management only
C. Incident management and problem management only
D. Change management and release and deployment management only

A. All other ITIL processes

"Representatives of all of the other processes need to be consulted for their opinion on what targets can be realistically achieved"

2

Which one of the following statements about a standard change is INCORRECT?

A. They are pre-authorized by change management
B. They follow a procedure or work instruction
C. They are low risk
D. They must be implemented as soon as possible

D. They must be implemented as soon as possible

Standard changes would not normally need to be implemented as soon as was possible, whereas emergency changes would.

3

Which of the following statements about the service desk are CORRECT?
1. It provides a single point of contact between the service provider and users
2. It manages incidents and service requests
3. It is a service management process
4. Service desk staff try to restore service as quickly as possible

A. All of the above
B. 1, 2, and 4 only
C. 2 and 4 only
D. 2 and 3 only

B. 1, 2, and 4 only

The service desk is a function and not a process.

4

Which of the following statements about functions are CORRECT?
1. They include tools
2. They are groups that use resources to carry out one or more activities
3. One person or group may perform multiple functions
4. They are most costly to implement compared to processes

A. 1, 2, and 3 only
B. 1, 2, and 4 only
C. All of the above
D. None of the above

A. 1, 2, and 3 only

Functions are not described as being more costly than processes and this would depend on the function or process being considered.

5

Which one of the following is the BEST description of the activities carried out by facilities management?

A. The management of IT services that are viewed as "utilities", such as printers or network access
B. Advice and guidance to IT operations on methodology and tools for managing IT services
C. Management of the physical IT environment such as a data center or computer room
D. The procurement and maintenance of tools that are used by IT operations staff to maintain the infrastructure

C. Management of the physical IT environment such as a data center or computer room

"Facilities management refers to the management of the physical IT environment, typically a data center or computer rooms"

6

Which process would assist with the identification and resolution of any incidents and problems associated with service or component performance?

A. Capacity management
B. Supplier management
C. Technology management
D. Change management

A. Capacity management

Performance issues are within the scope of capacity management.

7

Which one of the following statements about the known error database (KEDB) is MOST correct?

A. The KEDB is the same database as the service knowledge management system (SKMS)
B. The KEDB should be used during the incident diagnosis phase to try to speed up the resolution process
C. Care should be taken to avoid duplication of records in the KEDB. This can be done by giving access to as many technicians as possible to create new records
D. Access to the KEDB should be limited to the service desk

B. The KEDB should be used during the incident diagnosis phase to try to speed up the resolution process

A-The KEDB is part of the SKMS, NOT the same thing.
B-Is correct
C-Duplication should be avoided by by RESTRICTING access
D-Yes, the service desk should use it but they are NOT the only ones

8

Which of the following statements about key performance indicators (KPIs) are metrics are CORRECT?
1. Service metrics measure the end-to-end service
2. Each KPI should relate to a critical success factor
3. Metrics can be used to identify improvement opportunities
4. KPIs can be both qualitative and quantitative

A. 1 only
B. 2 and 3 only
C. 1, 2 and 4 only
D. All of the above

D. All of the above

Each statement is a summary of the book content.

9

Which one of the following maintains relationships between all service components?

A. The capacity plan
B. The definitive media library
C. The configuration management system
D. A service level agreement

C. The configuration management system

The configuration management system (CMS) is responsible via its various data sources (CMDBs, etc) for maintaining these relationships.

10

Should a customer's request for a new service ALWAYS be fulfilled?

A. Yes-if they are an external customer as they are paying for the service
B. No-if they are an internal customer as they are not always paying for the service
C. No-it is the responsibility of the service provider to carry out due diligence before requests are fulfilled
D. Yes-the service provider should ensure that all requests for new services are fulfilled

C. No-it is the responsibility of the service provider to carry out due diligence before requests are fulfilled

The service provider should ensure due diligence is carried out against the customer's requirements, irrespective of whether they are internal or external customers.

11

Which of the following statements is/are CORRECT?
1. Problem management can support the service desk by providing known errors to speed up incident resolution
2. Problem management is the only source of information to service level management about the impact of changes

A. 1 only
B. 2 only
C. Both of the above
D. Neither of the above

A. 1 only

Problem management is the source of known errors but change and service asset and configuration management are likely to be other sources of information about the impact of changes.

12

A failure has occurred on a system and is detected by a monitoring tool. This system supports a live IT service. When should an incident be raised?

A. Only when users notice the failure
B. An incident should be raised if the technicians have seen this before and have a workaround
C. Only if the failure results in a service level being breached
D. Immediately, to limit or prevent impact on users

D. Immediately, to limit or prevent impact on users

A-There do not need to be discernable impacts to the user for an incident to be raised.
B-even if a workaround is available it needs to be recorded to measure any on-going impact of the incident.
C-All incidents must be recorded.
D-CORRECT, in order to prevent loss of service or to restore service as soon as possible.

13

Which of the following could be considered stakeholders in a service management project?
1. Users
2. Customers
3. Suppliers
4. Functions

A. 1 and 2 only
B. 3 and 4 only
C. 2 and 4 only
D. All of the above

D. All of the above

D is the CORRECT response. Stakeholders can be both internal and external entities. An example of a function as a stakeholder could be the service desk, technical management or application management functions.

14

Which of the following activities does service asset and configuration management ensure are performed?
1. Configuration items (CIs) are identified
2. CIs are baselined
3. Changes to CIs are controlled

A. All of the above
B. 1 and 2 only
C. 1 and 3 only
D. 2 and 3 only

A. All of the above

All activities are part of the scope of service asset and configuration management.

15

Which of the following aspects of service design should be considered when designing a service solution?
1. Measurement methods and metrics
2. Management information systems and tools
3. Technology architectures
4. The processes required

A. 1 and 2 only
B. 2 and 3 only
C. 2, 3 and 4 only
D. All of the above

D. All of the above

All of these items are aspects of service design.

16

Which one of the following statements is CORRECT for ALL processes?

A. They define functions as part of their design
B. They deliver results to a customer or stakeholder
C. They are carried out by an external service provider in support of a customer
D. They are units of organizations responsible for specific outcomes

B. They deliver results to a customer or stakeholder

A-Process design would involve allocation of activities to functions but not their definition.
B-CORRECT-processes deliver results or they would not be worthwhile.
C-Not ALL processes are carried out by external providers.
D-is a description of a function.

17

Which process is primarily responsible for packaging, building, testing and deploying services?

A. Transition planning and support
B. Release and deployment management
C. Service asset and configuration management
D. Service catalog management

B. Release and deployment management

All are activities performed by release and deployment management.

18

Which one of the following is the BEST example of a workaround?

A. A technician installs a script to temporarily divert prints to an alternative printer until a permanent fix is applied.
B. A technician tries several ways to solve an incident. One of them works, although they do not know which one
C. After reporting the incident to the service desk, they user works on alternative tasks while the problem is identified and resolved
D. a device works intermittently, allowing the user to continue working at degraded levels of performance while the technician diagnoses the incident

A. A technician installs a script to temporarily divert prints to an alternative printer until a permanent fix is applied.

A-is a good example of a workaround which is not a permanent solution but which overcomes the original incident.
B-is a "lucky" incident resolution and unlikely to be repeatable.
C-does not allow the user to continue with their original task.
D-is an incident under investigation

19

Which of the following areas can be helped by technology?
1. Request management
2. Service catalog management
3. Detection and monitoring
4. Design and modeling

A. 1, 2 and 3 only
B. 1, 3 and 4 only
C. 2, 3 and 4 only
D. All of the above

D. All of the above

All four areas can be assisted by technology.

20

Which one of the following is the CORRECT list of stages in the Deming Cycle?

A. Plan, Measure, Monitor, Report
B. Plan, Check, Re-Act, Implement
C. Plan, Do, Act, Audit
D. Plan, Do, Check, Act

D. Plan, Do, Check, Act

The four key stages of the cycle are Plan, Do, Check and Act.

21

Which two processes will be involved the MOST in negotiating and agreeing contracts for the provision of recovery capability to support continuity plans?

A. Service level management and capacity management
B. Supplier management and service level management
C. IT service continuity management and service level management
D. IT service continuity management and supplier management

D. IT service continuity management and supplier management

ITSC provides the subject matter expertise and supplier management provides the contract negotiation and selection process. SLM also has a role in underpinning contracts but is not as significant in this respect as the other two processes.

22

Which one of the following is the BEST definition of an incident model?

A. The template that defines the incident logging form used for reporting incidents
B. A type of incident involving a standard (or model) type of configuration item (CI)
C. A set of pre-defined steps to be followed when dealing with a known type of incident
D. An incident that is easy to solve

C. A set of pre-defined steps to be followed when dealing with a known type of incident

C-matches the description of an incident model.

23

What roles are defined in the RACI model?

A. Responsible, Accountable, Consulted, Informed
B. Responsible, Achievable, Consulted, Informed
C. Realistic, Accountable, Consulted, Informed
D. Responsible, Accountable, Corrected, Informed

A. Responsible, Accountable, Consulted, Informed

Roles are Responsible, Accountable, Consulted, Informed

24

Which stage of the service lifecycle decides what services should be offered and to whom they will be offered?

A. Continual service improvement
B. Service operation
C. Service design
D. Service strategy

D. Service strategy

Deciding what services should be offered and to whom is an integral part of service strategy.

25

Which of the following does continual service improvement (CSI) provide guidance on?
1. How to improve process efficency and effectiveness
2. How to improve services
3. Improvement of all stages of the service lifecycle

A. 1 and 2 only
B. 1 and 3 only
C. 2 and 3 only
D. All of the above

D. All of the above

1. CSI looks for ways to improve process effectiveness and efficiency, as well as cost effectiveness.
2. CSI identifies and implements improvements to IT services
3. CSI improvement activities support each lifecycle stage: service strategy, service design, service transition, service operation, and CSI itself.

26

Which of the following is a type of service level agreement (SLA) described in the ITIL service design publication?

A. Priority-based SLA
B. Technology-based SLA
C. Location-based SLA
D. Customer-based SLA

D. Customer-based SLA

Priority-based, technology-based and location-based SLAs are not discussed in service design.

27

Which one of the following is the BEST definition of an event?

A. An occurrence where a performance threshold has been exceeded and an agreed service level has been impacted
B. A change of state that has significance for the management of an IT service
C. A known system defect that generates multiple incident reports
D. A planned meeting of customers and IT staff to announce a new service or improvement program

B. A change of state that has significance for the management of an IT service

A and C may cause an event to be generated.
B-closely matches the definition of an event in service operation.
D-is a meeting.

28

Which one of the following is the MOST appropriate stakeholder to define the value of a service?

A. Customers
B. IT Senior management
C. Financial management for IT services
D. Suppliers

A. Customers

Value is viewed as the level to which the service meets customer's expectations and therefore they make the ultimate decision on whether the service will drive value.

29

Which of the following should be treated as an incident?
1. A user is unable to access a service during service hours
2. An authorized IT staff member is unable to access a service during service hours
3. A network component fails but the user is not aware of any disruption to service
4. A user contacts the service desk about the slow performance of an application

A. All of the above
B. 1 and 4 only
C. 2 and 3 only
D. None of the above

A. All of the above

An incident is "an unplanned interruption to an IT service or reduction in the quality of an IT service... or a failure of a CI that has not yet impacted an IT service...". The inability to access an IT service as agreed is an unplanned interruption from the user's perspective.

30

Which one of the following statements about a change model is CORRECT?

A. A change model should NOT be used for emergency changes
B. A change model should be constructed when a significant change is required
C. A change model defines the steps that should be taken to handle a particular type of change
D. Escalation procedures are outside the scope of a change model

C. A change model defines the steps that should be taken to handle a particular type of change

A-a change model can be used for emergency changes.
B-change models would not routinely be created when significant changes are made.
C-is CORRECT
D-escalation procedures can be included in a change model.