Section 3 Flashcards
Which ITIL management practice adds value to the business by ensuring that services are published in a consistent manner during a service, resource, or other type of transition?
A)Deployment management
B)Service validation and testing
C)Change Enablement/Control
D)Service Configuration Management
A)Deployment management
Which group of skilled people provides the technical skills and resources required for Deployment management?
A)Technical Management
B)Application Management
C)Service level management
D)Service desk
A)Technical Management
Which of the following is NOT one of the 17 service management practices created in ITSM industries and service management?
A)Monitoring and event management
B)Business analysis
C)Service validation and testing
D)Service continuity management
E)Architecture management
F)Release management
E)Architecture management
Which of the following tasks is NOT the responsibility of Information security management?
A)granting authorized users’ rights
B)verifying information availability
C)verifying a user’s identity
D)denying unauthorized users’ rights
B)verifying information availability
Which of the following events is an example of a service request?
A)A new application needs to be installed on a computer.
B)A network cable is unplugged, causing several computers to be disconnected from the network.
C)A server is not functioning properly.
D)An incorrect password is used.
A)A new application needs to be installed on a computer.
Which key Service design role is responsible for ensuring that the levels of service quality are agreed on and met?
A)Security Manager
B)Service Level Manager
C)Service design Manager
D)Supplier Manage
B)Service Level Manager
Which ITIL management practice is concerned with minimizing the impact of an incident?
A)Change Enablement/Control
B)Problem management
C)Monitoring and event Management
D)Incident management
D)Incident management
Which IT management practice provides a list of services available and instructions on how to obtain these services?
A)Service request management
B)Incident management
C)Monitoring and Event Management
D)Problem management
A)Service request management
What is the standard whereby a change becomes part of the Service request management practice?
A)Cost is high; risk is low.
B)Cost and risk are high.
C)Cost is low; risk is high.
D)Cost and risk are low.
D)Cost and risk are low.
Which of the following is a valid reason for monitoring and measuring services?
To validate
To direct
To justify
To intervene
A)1, 2, and 3
B)1 and 2
C)All of these reasons
D)1, 2, and 4
C)All of these reasons
Which ITIL management practice uses a management tool or agent to indicate when an abnormal operation, such as an incorrect password, has occurred?
A)Service request management
B)Monitoring and event management
C)Incident management
D)Problem management
B)Monitoring and event management
What is the primary use of the Definitive Media Library (DML)?
A)to store the lifecycle and details of an incident
B)to store and protect all authorized versions of software and documentation
C)to manage applications throughout their lifecycle
D)to store information about all existing IT services, including the services that are ready and available for deployment
B)to store and protect all authorized versions of software and documentation
Which of the following is NOT one of the three technical management practices modified and adapted from technology management domains by focusing on IT services?
A)Software development and management
B)Release management
C)Infrastructure and platform management
D)Deployment and management
B)Release management
Which entity contains information on configuration items (CIs) and their relationships?
A)Service portfolio
B)Service Knowledge management System (SKMS)
C)Configuration Management System (CMS)
D)Service catalogue
C)Configuration Management System (CMS)
The central element in the SVS is the __________, an operating model which outlines the key activities required to respond to demands and facilitate value realization through the creation and management of products and services.
A)Service value chain
B)Continual improvement model
C)Service value stream
D)Service management mode
A)Service value chain
Which of the following statements is NOT true about a standard change?
A)The risk of the change is high.
B)The change tasks are tested and documented.
C)A defined trigger occurs that causes the change.
D)The change is pre-authorized.
E)The change’s budget is predetermined or controlled by the requestor
A)The risk of the change is high.