ITIL Quiz Flashcards
1
Q
- What is ITIL?
A. Rules for achieving recognized IT standards
B. Good advice about how to manage IT services
C. Advice on managing projects
D. Advice on the technical requirements for infrastructure
A
- B. ITIL is a framework of best practice advice based on processes for the
management of IT services that provide value to the business.
2
Q
2. What is an IT service provider? A. An internal IT department B. An external outsourced IT department C. Either an internal IT department or an external IT department D. A business unit database
A
- C. An IT service provider is the provider of IT services for the organization; it can be either
internal or external. More information regarding this can be found in Chapter 1.
3
Q
3. Who “owns” ITIL? A. The U.S. government B. Microsoft C. The U.K. government D. The Open Group
A
- C. ITIL is owned by the U.K. government, which drew up the guidance in the late 1980s,
based on best practices used by successful IT organizations. It has been periodically
refreshed, with the most recent edition being released in 2011. More information regarding
this can be found in Chapter 1.
4
Q
4. Which of these is not a stage in the ITIL service lifecycle? A. Service design B. Service implementation C. Continual service improvement D. Service operation
A
- B. The fi ve stages of the ITIL service lifecycle are service strategy, service design, service
transition, service operation, and continual service improvement. More information
regarding this can be found in Chapter 1.
5
Q
- The knowledge management process maintains and updates a tool used for knowledge
management. What is this system called?
A. The service management tool
B. The knowledge base for service management
C. The service knowledge management system
D. The service management
A
- C. The tool is called the service knowledge management system (SKMS) and is a repository
for information, data, and knowledge relating to service management. This has important
connections for managing information and knowledge throughout the whole service lifecycle.
More information can be found on the SKMS in Chapter 9.
.
6
Q
- A service must provide which of the following to deliver business value?
A. Sufficient capacity, the agreed level of security, and alignment to the
organization’s project management methodology
B. Sufficient capacity and the agreed level of security
C. The agreed level of security and alignment to the organization’s project management
methodology
D. The agreed level of security
A
- B. Every new or changed service must be capable of delivering the service without running
out of capacity. It must also be secure enough to protect the organization’s data. There is
no requirement to use any particular project management methodology. More information
regarding this can be found in Chapter 1.
7
Q
- In the ITIL guidance on incident management, what is one of the key purposes of the
incident management process?
A. The purpose of incident management is to restore normal service operation as quickly
as possible.
B. The purpose of incident management is to prevent incidents from occurring by
identifying the root cause.
C. The purpose of incident management is to prevent changes from causing incidents
when a change is implemented.
D. The purpose of incident management is to ensure that the service desk fulfills all
requests from users.
A
- A. The purpose of the incident management process is to restore normal service operation
as quickly as possible, while minimizing the adverse impact to the business of outages in
service. Normal service operation is the agreed level of service documented for the delivery
of the service. More information can be found on the incident management process in
Chapter 11.
8
Q
- A service catalog contains which of the following?
A. Details of all services being developed
B. Details of all services being considered
C. Details of all services currently available to the users
D. Details of all services
A
- C. The catalog includes services that are available to users. The services being considered or
developed are in the service pipeline. Details of all services, including those being developed,
the operational services, and the retired services, are in the service portfolio. More information
regarding this can be found in Chapter 6.
9
Q
9. The predicted costs and benefits of a proposed new service are documented in which of the following documents? A. The project plan B. The service strategy C. The business case D. The improvement register
A
- C. The business case contains the justifi cation for a signifi cant item of expenditure. It
includes information about costs, benefi ts, options, issues, risks, and possible problems.
More information regarding this can be found in Chapter 2.
10
Q
10. The agreement between an IT service provider and their customers regarding the services provided is called what? A. Service charter B. Service contract C. Service level agreement D. Service targets
A
- C. The service level agreement contains information about the service to be provided, the
targets that need to be met, and the responsibilities of both customer and IT provider. More
information regarding this can be found in Chapter 5.
11
Q
- What is meant by the term request fulfillment in the ITIL framework?
A. Request fulfillment is a means of managing the changes that users request in the
IT environment.
B. Request fulfillment is used to deliver non-IT-related business components to the users.
C. Request fulfillment is a process for managing the requests from users to the
IT department.
D. Request fulfillment is the report produced on the number of password resets carried
out by the IT department.
A
- C. Request fulfi llment is a key operational process in the service operation stage of the
service lifecycle. This process is used to ensure that requests made by users for information,
advice, or standard components are handled effi ciently. More information on request fulfi llment
can be found in Chapter 12
12
Q
- Which of the following should be considered when drawing up a capacity plan?
- The business plan to streamline its operations
- The possibility of moving a business operation such as a call center overseas
- New advances in technology
- Plans to restructure the IT department
A. 1 and 2
B. 1, 2, and 3
C. All of the above
D. 1, 3, and 4
A
- B. Plans by the business to reduce its head count or number of locations would affect the
capacity required. New technology may offer increased capacity at the same or lower cost.
The structure of the IT department should have no effect on capacity requirements of the
business. More information regarding this can be found in Chapter 6.
13
Q
13. An availability plan should consider the requirements for what period? A. For the next 24 hours B. For the next week C. For the next month D. For the next 12 to 18 months
A
- D. The availability plan looks ahead to ensure that the design that is delivered meets the
availability requirements when the service is delivered and for the next 12 to 18 months.
More information regarding this can be found in Chapter 6.
14
Q
- Which of the following is true about change management?
A. All changes, however small, must be approved by the change advisory board before
implementation.
B. Emergency changes are too urgent to need approval before implementation.
C. Low-risk changes may be preapproved.
D. The change advisory board is for technical assessment and approval of changes only.
A
- C. Low risk, or “standard,” changes may be preapproved by the change manager and
require only to be logged before being implemented; only higher-risk changes need approval
before implementation. Emergency changes need to be approved by a small number of key
people who make up the emergency change advisory board. The change advisory board
should include business representatives and others (such as training department representatives)
to ensure that all aspects of the change have been considered. More information
regarding this can be found in Chapter 8.
15
Q
15. Which of the following is not a category of supplier described in ITIL? A. Strategic B. Operational C. Preferred D. Commodity
A
- C. ITIL describes four types of supplier.
16
Q
16. Who should have access to the security policy? A. Business users B. IT staff C. Senior management D. Everyone
A
- D. The security policy should be communicated to all users and staff. More information
can be found on information security management in Chapter 6.
17
Q
- Which of the following statements is false?
A. Planning for a number of different disaster scenarios that could affect IT services is
essential.
B. Ensuring the business is able to continue operation is the responsibility of IT.
C. It is impossible to plan for disasters, because there are too many different possibilities.
The IT department should be ready to quickly devise a recovery plan following a
disaster.
D. Continuity planning requires an understanding of the key business processes.
A
- B. Ensuring that the required IT services are available to help the business to continue
operation is the responsibility of IT; it is the responsibility of the business to have a business
continuity plan. IT services are only part of that plan. More information can be found on
IT service continuity management in Chapter 6.
18
Q
- What is the purpose of the continual service improvement (CSI) stage of the service
lifecycle?
A. The CSI stage is concerned with the management of improvement across the whole
service lifecycle.
B. The CSI stage considers only the improvements needed for the business outputs.
C. The CSI stage focuses on improving the operational processes in the service lifecycle.
D. The CSI stage manages the improvements between project management and live
operational services.
A
- A. The CSI stage applies across the whole of the service lifecycle and is key in the management
of all improvements across all service stages. More information on CSI can be found
in Chapter 13.
19
Q
- What is the Deming cycle?
A. The Deming cycle is a set of questions for managing processes.
B. The Deming cycle is a set of standards for quality management.
C. The Deming cycle is an approach for managing quality improvement.
D. The Deming cycle is concerned with the delivery of security controls.
A
- C. The Deming cycle is used to manage the ongoing quality improvement of services and
processes, as part of the stage of continual service improvement. More information on the
Deming cycle can be found in Chapter 13.
20
Q
- What is the continual service improvement (CSI) approach?
A. The CSI approach is used to manage processes in the operational environment.
B. The CSI approach is focused on the delivery of quality management systems
into IT.
C. The CSI approach is used to manage improvement activity in line with business
requirements.
D. The CSI approach is focused on the introduction of projects into the operational
environment.
A
20 C. The CSI approach is a set of steps that can be used to manage improvement initiatives in
line with the requirements of the business. More information on the CSI approach can be
found in Chapter 13.
21
Q
- Which of these statements about asset management and configuration management
is not true?
A. Asset management is concerned only with purchased items such as hardware and
software.
B. Asset management considers the value of items, and configuration management
considers the interdependencies between items.
C. Configuration management may include locations and documents.
D. Configuration management information is held in a database called the configuration
repository.
A
- D. Confi guration management information is held in a confi guration management system
(CMS), which may contain a number of federated confi guration management databases
(CMDBs). More information regarding this can be found in Chapter 9.
22
Q
- How is the seven-step improvement process in the continual service improvement lifecycle
stage used?
A. The seven-step improvement process is used to manage improvement initiatives in line
with business requirements.
B. The seven-step improvement process is used to gather, analyze, and present data to
assist in decision making.
C. The seven-step improvement process is used to format the improvement reports
delivered to the business.
D. The seven-step improvement process is used to manage the improvement program
across the organization.
A
- B. The seven-step improvement process is the process used as part of the CSI lifecycle stage
to ensure that the correct data is gathered, analyzed, and presented to the correct audience in
order to enable informed decision making. More information on the seven-step improvement
process can be found in Chapter 13.
23
Q
- The ITIL framework refers to a number of operational functions. What is meant by the
term function?
A. A function is a collection of technical infrastructure elements designed to manage an
IT service.
B. A function manages the requirement of controlling costs in an IT department.
C. A function is used to deliver the security requirements across the service lifecycle.
D. A function is a unit of the organization specialized to deliver particular processes or
activities.
A
- D. The ITIL framework identifi es four different functions, which are units of the organization
specialized to deliver certain processes, activities, or capabilities. An example of this is
the service desk, which is used as the single point of contact for the users to IT. More information
on functions can be found in Chapter 10.
24
Q
- Event management is a key operational process in the service operation lifecycle stage.
What is the purpose of event management?
A. Event management detects events that are significant for the management of the service
and ensures the appropriate actions are taken.
B. Event management monitors the infrastructure of the IT services and guarantees that
no outages occur in peak times of business usage.
C. Event management manages failures in the infrastructure and ensures that services are
restored to normal working as quickly as possible.
D. Event management monitors the underlying causes of failures and ensures that changes
are made to prevent further failures from taking place.
A
- A. Event management is the process that uses the automated monitoring capability of the
infrastructure to identify signifi cant issues that require management. It is used to ensure
that proper notifi cation of issues is received and the appropriate action taken. More
information on the event management process can be found in Chapter 12.
25
Q
- How is the process of access management used in the service operation stage of the service
lifecycle?
A. Access management is used to manage the security technology in the infrastructure.
B. Access management is used to ensure the correct people are able to use the correct
systems in the correct way.
C. Access management is used to ensure the active directory entries are audited for
accuracy.
D. Access management is used to maintain security controls over the business
environment.
A
- B. The process of access management ensures that access to systems and services is
managed and controlled according to the security policy in place. This includes providing
access to users and monitoring their actions. More information on access management can
be found in Chapter 12.
26
Q
- Problem management is an important process in the service operation lifecycle stage. How
does the process define a problem?
A. A problem is an incident that has become extremely serious and is causing significant
business impact.
B. A problem is an issue that has no solution and needs to be raised to the senior
management for a decision.
C. A problem is the unknown, underlying cause of one or more incidents.
D. A problem is a set of incidents that have been linked together in a customer report.
A
- C. A problem is defi ned as the unknown, underlying cause of one or more incidents.
Problem management is the process that investigates the root cause of incidents so that the
incidents may be prevented from recurring. More information on the problem management
process can be found in Chapter 11.
27
Q
- The service operation lifecycle stage has a number of key objectives. Which of these
statements best reflects the key objectives of service operation?
A. Service operation should ensure the day-to-day service is delivered according to the
agreed requirements of the business.
B. Service operation ensures the financial obligations of the IT department are met and
reported to the business.
C. Service operation should ensure the details of the IT infrastructure are captured in the
service asset database.
D. Service operation should agree on the strategy for delivering IT services to the
business.
A
- A. Service operation ensures the day-to-day running of the services is managed according
to the agreed requirements of the business. This is where the business sees the value of the
services being delivered, and it is service operation that should maintain the status quo.
More information on the service operation lifecycle stage can be found in Chapter 10.
28
Q
- The release and deployment process covers a concept called early-life support. What is
meant by early-life support?
A. Early-life support refers to the end of the project lifecycle and the management of the
post-implementation project review.
B. Early-life support refers to the handoff between service transition and service
operation, ensuring support for the new or changed service in the initial stages
of operation.
C. Early-life support refers to the introduction of new processes into the operational
environment, using service transition processes to ensure a complete integration of the
new processes.
D. Early-life support refers to the step in the release and deployment process where the
project team deliver the documentation of the infrastructure to the service management
team.
A
- B. Early-life support is the handoff that takes place between service transition and service
operation, during the deployment phase of release and deployment. It ensures the support
of the deployment and development teams is still available as the new or changed service
is introduced to the live environment. More information on release and deployment can be
found in Chapter 9.
29
Q
- An important focus for the service lifecycle is the capture and management of knowledge
relating to IT service provision. How does the process of knowledge management work in
the service lifecycle?
A. Knowledge management is solely concerned with the transfer of knowledge when
implementing new or changed services.
B. Knowledge management is used across the lifecycle stages of continual service
improvement and service operation to ensure that improvements are managed
effectively.
C. Knowledge management is used solely in the service operation stage of the lifecycle to
ensure that operation issues are managed efficiently.
D. Knowledge management is used across the whole service lifecycle to ensure that
appropriate knowledge is delivered to enable informed decision making.
A
- D. Knowledge management is a process that has infl uence across the whole of the service
lifecycle. It is used to capture and present ideas, perspectives, data, and information to all
stages of the lifecycle, ensuring that the appropriate decisions can be made. More information
on knowledge management can be found in Chapter 9.
30
Q
- The service transition stage of the service lifecycle has a number of different processes.
Which of these is the process most concerned with the management of the whole approach
to service transition?
A. Transition management and support
B. Transition planning and support
C. Service transition release and deployment
D. Change management
A
- B. Transition planning and support is a process that enables all activity taking place in the
service transition lifecycle to be managed. This includes understanding the allocation of
resources and resolving confl icting demands for resources. More information on transition
planning and support can be found in Chapter 9.