ITIL Quiz Flashcards

1
Q
  1. What is ITIL?
    A. Rules for achieving recognized IT standards
    B. Good advice about how to manage IT services
    C. Advice on managing projects
    D. Advice on the technical requirements for infrastructure
A
  1. B. ITIL is a framework of best practice advice based on processes for the
    management of IT services that provide value to the business.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. What is an IT service provider?
A. An internal IT department
B. An external outsourced IT department
C. Either an internal IT department or an external IT department
D. A business unit
database
A
  1. C. An IT service provider is the provider of IT services for the organization; it can be either
    internal or external. More information regarding this can be found in Chapter 1.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. Who “owns” ITIL?
A. The U.S. government
B. Microsoft
C. The U.K. government
D. The Open Group
A
  1. C. ITIL is owned by the U.K. government, which drew up the guidance in the late 1980s,
    based on best practices used by successful IT organizations. It has been periodically
    refreshed, with the most recent edition being released in 2011. More information regarding
    this can be found in Chapter 1.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4. Which of these is not a stage in the ITIL service lifecycle?
A. Service design
B. Service implementation
C. Continual service improvement
D. Service operation
A
  1. B. The fi ve stages of the ITIL service lifecycle are service strategy, service design, service
    transition, service operation, and continual service improvement. More information
    regarding this can be found in Chapter 1.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. The knowledge management process maintains and updates a tool used for knowledge
    management. What is this system called?
    A. The service management tool
    B. The knowledge base for service management
    C. The service knowledge management system
    D. The service management
A
  1. C. The tool is called the service knowledge management system (SKMS) and is a repository
    for information, data, and knowledge relating to service management. This has important
    connections for managing information and knowledge throughout the whole service lifecycle.
    More information can be found on the SKMS in Chapter 9.
    .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A service must provide which of the following to deliver business value?
    A. Sufficient capacity, the agreed level of security, and alignment to the
    organization’s project management methodology
    B. Sufficient capacity and the agreed level of security
    C. The agreed level of security and alignment to the organization’s project management
    methodology
    D. The agreed level of security
A
  1. B. Every new or changed service must be capable of delivering the service without running
    out of capacity. It must also be secure enough to protect the organization’s data. There is
    no requirement to use any particular project management methodology. More information
    regarding this can be found in Chapter 1.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. In the ITIL guidance on incident management, what is one of the key purposes of the
    incident management process?
    A. The purpose of incident management is to restore normal service operation as quickly
    as possible.
    B. The purpose of incident management is to prevent incidents from occurring by
    identifying the root cause.
    C. The purpose of incident management is to prevent changes from causing incidents
    when a change is implemented.
    D. The purpose of incident management is to ensure that the service desk fulfills all
    requests from users.
A
  1. A. The purpose of the incident management process is to restore normal service operation
    as quickly as possible, while minimizing the adverse impact to the business of outages in
    service. Normal service operation is the agreed level of service documented for the delivery
    of the service. More information can be found on the incident management process in
    Chapter 11.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A service catalog contains which of the following?
    A. Details of all services being developed
    B. Details of all services being considered
    C. Details of all services currently available to the users
    D. Details of all services
A
  1. C. The catalog includes services that are available to users. The services being considered or
    developed are in the service pipeline. Details of all services, including those being developed,
    the operational services, and the retired services, are in the service portfolio. More information
    regarding this can be found in Chapter 6.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. The predicted costs and benefits of a proposed new service are documented in which of the
following documents?
A. The project plan
B. The service strategy
C. The business case
D. The improvement register
A
  1. C. The business case contains the justifi cation for a signifi cant item of expenditure. It
    includes information about costs, benefi ts, options, issues, risks, and possible problems.
    More information regarding this can be found in Chapter 2.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. The agreement between an IT service provider and their customers regarding the services
provided is called what?
A. Service charter
B. Service contract
C. Service level agreement
D. Service targets
A
  1. C. The service level agreement contains information about the service to be provided, the
    targets that need to be met, and the responsibilities of both customer and IT provider. More
    information regarding this can be found in Chapter 5.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is meant by the term request fulfillment in the ITIL framework?
    A. Request fulfillment is a means of managing the changes that users request in the
    IT environment.
    B. Request fulfillment is used to deliver non-IT-related business components to the users.
    C. Request fulfillment is a process for managing the requests from users to the
    IT department.
    D. Request fulfillment is the report produced on the number of password resets carried
    out by the IT department.
A
  1. C. Request fulfi llment is a key operational process in the service operation stage of the
    service lifecycle. This process is used to ensure that requests made by users for information,
    advice, or standard components are handled effi ciently. More information on request fulfi llment
    can be found in Chapter 12
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following should be considered when drawing up a capacity plan?
  2. The business plan to streamline its operations
  3. The possibility of moving a business operation such as a call center overseas
  4. New advances in technology
  5. Plans to restructure the IT department
    A. 1 and 2
    B. 1, 2, and 3
    C. All of the above
    D. 1, 3, and 4
A
  1. B. Plans by the business to reduce its head count or number of locations would affect the
    capacity required. New technology may offer increased capacity at the same or lower cost.
    The structure of the IT department should have no effect on capacity requirements of the
    business. More information regarding this can be found in Chapter 6.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
13. An availability plan should consider the requirements for what period?
A. For the next 24 hours
B. For the next week
C. For the next month
D. For the next 12 to 18 months
A
  1. D. The availability plan looks ahead to ensure that the design that is delivered meets the
    availability requirements when the service is delivered and for the next 12 to 18 months.
    More information regarding this can be found in Chapter 6.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following is true about change management?
    A. All changes, however small, must be approved by the change advisory board before
    implementation.
    B. Emergency changes are too urgent to need approval before implementation.
    C. Low-risk changes may be preapproved.
    D. The change advisory board is for technical assessment and approval of changes only.
A
  1. C. Low risk, or “standard,” changes may be preapproved by the change manager and
    require only to be logged before being implemented; only higher-risk changes need approval
    before implementation. Emergency changes need to be approved by a small number of key
    people who make up the emergency change advisory board. The change advisory board
    should include business representatives and others (such as training department representatives)
    to ensure that all aspects of the change have been considered. More information
    regarding this can be found in Chapter 8.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
15. Which of the following is not a category of supplier described in ITIL?
A. Strategic
B. Operational
C. Preferred
D. Commodity
A
  1. C. ITIL describes four types of supplier.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
16. Who should have access to the security policy?
A. Business users
B. IT staff
C. Senior management
D. Everyone
A
  1. D. The security policy should be communicated to all users and staff. More information
    can be found on information security management in Chapter 6.
17
Q
  1. Which of the following statements is false?
    A. Planning for a number of different disaster scenarios that could affect IT services is
    essential.
    B. Ensuring the business is able to continue operation is the responsibility of IT.
    C. It is impossible to plan for disasters, because there are too many different possibilities.
    The IT department should be ready to quickly devise a recovery plan following a
    disaster.
    D. Continuity planning requires an understanding of the key business processes.
A
  1. B. Ensuring that the required IT services are available to help the business to continue
    operation is the responsibility of IT; it is the responsibility of the business to have a business
    continuity plan. IT services are only part of that plan. More information can be found on
    IT service continuity management in Chapter 6.
18
Q
  1. What is the purpose of the continual service improvement (CSI) stage of the service
    lifecycle?
    A. The CSI stage is concerned with the management of improvement across the whole
    service lifecycle.
    B. The CSI stage considers only the improvements needed for the business outputs.
    C. The CSI stage focuses on improving the operational processes in the service lifecycle.
    D. The CSI stage manages the improvements between project management and live
    operational services.
A
  1. A. The CSI stage applies across the whole of the service lifecycle and is key in the management
    of all improvements across all service stages. More information on CSI can be found
    in Chapter 13.
19
Q
  1. What is the Deming cycle?
    A. The Deming cycle is a set of questions for managing processes.
    B. The Deming cycle is a set of standards for quality management.
    C. The Deming cycle is an approach for managing quality improvement.
    D. The Deming cycle is concerned with the delivery of security controls.
A
  1. C. The Deming cycle is used to manage the ongoing quality improvement of services and
    processes, as part of the stage of continual service improvement. More information on the
    Deming cycle can be found in Chapter 13.
20
Q
  1. What is the continual service improvement (CSI) approach?
    A. The CSI approach is used to manage processes in the operational environment.
    B. The CSI approach is focused on the delivery of quality management systems
    into IT.
    C. The CSI approach is used to manage improvement activity in line with business
    requirements.
    D. The CSI approach is focused on the introduction of projects into the operational
    environment.
A

20 C. The CSI approach is a set of steps that can be used to manage improvement initiatives in
line with the requirements of the business. More information on the CSI approach can be
found in Chapter 13.

21
Q
  1. Which of these statements about asset management and configuration management
    is not true?
    A. Asset management is concerned only with purchased items such as hardware and
    software.
    B. Asset management considers the value of items, and configuration management
    considers the interdependencies between items.
    C. Configuration management may include locations and documents.
    D. Configuration management information is held in a database called the configuration
    repository.
A
  1. D. Confi guration management information is held in a confi guration management system
    (CMS), which may contain a number of federated confi guration management databases
    (CMDBs). More information regarding this can be found in Chapter 9.
22
Q
  1. How is the seven-step improvement process in the continual service improvement lifecycle
    stage used?
    A. The seven-step improvement process is used to manage improvement initiatives in line
    with business requirements.
    B. The seven-step improvement process is used to gather, analyze, and present data to
    assist in decision making.
    C. The seven-step improvement process is used to format the improvement reports
    delivered to the business.
    D. The seven-step improvement process is used to manage the improvement program
    across the organization.
A
  1. B. The seven-step improvement process is the process used as part of the CSI lifecycle stage
    to ensure that the correct data is gathered, analyzed, and presented to the correct audience in
    order to enable informed decision making. More information on the seven-step improvement
    process can be found in Chapter 13.
23
Q
  1. The ITIL framework refers to a number of operational functions. What is meant by the
    term function?
    A. A function is a collection of technical infrastructure elements designed to manage an
    IT service.
    B. A function manages the requirement of controlling costs in an IT department.
    C. A function is used to deliver the security requirements across the service lifecycle.
    D. A function is a unit of the organization specialized to deliver particular processes or
    activities.
A
  1. D. The ITIL framework identifi es four different functions, which are units of the organization
    specialized to deliver certain processes, activities, or capabilities. An example of this is
    the service desk, which is used as the single point of contact for the users to IT. More information
    on functions can be found in Chapter 10.
24
Q
  1. Event management is a key operational process in the service operation lifecycle stage.
    What is the purpose of event management?
    A. Event management detects events that are significant for the management of the service
    and ensures the appropriate actions are taken.
    B. Event management monitors the infrastructure of the IT services and guarantees that
    no outages occur in peak times of business usage.
    C. Event management manages failures in the infrastructure and ensures that services are
    restored to normal working as quickly as possible.
    D. Event management monitors the underlying causes of failures and ensures that changes
    are made to prevent further failures from taking place.
A
  1. A. Event management is the process that uses the automated monitoring capability of the
    infrastructure to identify signifi cant issues that require management. It is used to ensure
    that proper notifi cation of issues is received and the appropriate action taken. More
    information on the event management process can be found in Chapter 12.
25
Q
  1. How is the process of access management used in the service operation stage of the service
    lifecycle?
    A. Access management is used to manage the security technology in the infrastructure.
    B. Access management is used to ensure the correct people are able to use the correct
    systems in the correct way.
    C. Access management is used to ensure the active directory entries are audited for
    accuracy.
    D. Access management is used to maintain security controls over the business
    environment.
A
  1. B. The process of access management ensures that access to systems and services is
    managed and controlled according to the security policy in place. This includes providing
    access to users and monitoring their actions. More information on access management can
    be found in Chapter 12.
26
Q
  1. Problem management is an important process in the service operation lifecycle stage. How
    does the process define a problem?
    A. A problem is an incident that has become extremely serious and is causing significant
    business impact.
    B. A problem is an issue that has no solution and needs to be raised to the senior
    management for a decision.
    C. A problem is the unknown, underlying cause of one or more incidents.
    D. A problem is a set of incidents that have been linked together in a customer report.
A
  1. C. A problem is defi ned as the unknown, underlying cause of one or more incidents.
    Problem management is the process that investigates the root cause of incidents so that the
    incidents may be prevented from recurring. More information on the problem management
    process can be found in Chapter 11.
27
Q
  1. The service operation lifecycle stage has a number of key objectives. Which of these
    statements best reflects the key objectives of service operation?
    A. Service operation should ensure the day-to-day service is delivered according to the
    agreed requirements of the business.
    B. Service operation ensures the financial obligations of the IT department are met and
    reported to the business.
    C. Service operation should ensure the details of the IT infrastructure are captured in the
    service asset database.
    D. Service operation should agree on the strategy for delivering IT services to the
    business.
A
  1. A. Service operation ensures the day-to-day running of the services is managed according
    to the agreed requirements of the business. This is where the business sees the value of the
    services being delivered, and it is service operation that should maintain the status quo.
    More information on the service operation lifecycle stage can be found in Chapter 10.
28
Q
  1. The release and deployment process covers a concept called early-life support. What is
    meant by early-life support?
    A. Early-life support refers to the end of the project lifecycle and the management of the
    post-implementation project review.
    B. Early-life support refers to the handoff between service transition and service
    operation, ensuring support for the new or changed service in the initial stages
    of operation.
    C. Early-life support refers to the introduction of new processes into the operational
    environment, using service transition processes to ensure a complete integration of the
    new processes.
    D. Early-life support refers to the step in the release and deployment process where the
    project team deliver the documentation of the infrastructure to the service management
    team.
A
  1. B. Early-life support is the handoff that takes place between service transition and service
    operation, during the deployment phase of release and deployment. It ensures the support
    of the deployment and development teams is still available as the new or changed service
    is introduced to the live environment. More information on release and deployment can be
    found in Chapter 9.
29
Q
  1. An important focus for the service lifecycle is the capture and management of knowledge
    relating to IT service provision. How does the process of knowledge management work in
    the service lifecycle?
    A. Knowledge management is solely concerned with the transfer of knowledge when
    implementing new or changed services.
    B. Knowledge management is used across the lifecycle stages of continual service
    improvement and service operation to ensure that improvements are managed
    effectively.
    C. Knowledge management is used solely in the service operation stage of the lifecycle to
    ensure that operation issues are managed efficiently.
    D. Knowledge management is used across the whole service lifecycle to ensure that
    appropriate knowledge is delivered to enable informed decision making.
A
  1. D. Knowledge management is a process that has infl uence across the whole of the service
    lifecycle. It is used to capture and present ideas, perspectives, data, and information to all
    stages of the lifecycle, ensuring that the appropriate decisions can be made. More information
    on knowledge management can be found in Chapter 9.
30
Q
  1. The service transition stage of the service lifecycle has a number of different processes.
    Which of these is the process most concerned with the management of the whole approach
    to service transition?
    A. Transition management and support
    B. Transition planning and support
    C. Service transition release and deployment
    D. Change management
A
  1. B. Transition planning and support is a process that enables all activity taking place in the
    service transition lifecycle to be managed. This includes understanding the allocation of
    resources and resolving confl icting demands for resources. More information on transition
    planning and support can be found in Chapter 9.