ITIL Test Cards Flashcards
List the ITIL Lifecycle Processes
- Service Strategy
- Service Design
- Service Transition
- Service Operations
- Continual Serive Improvement
List the Service Strategy Processes
- Service Portfollio Management
- Financial Management for IT Services
- Demand Management (not testable)
- Business Relationship Management
List the Service Design Processes
- Design Coordination
- Service Catalog Management
- Service Level Management
- Availability Management
- Capacity Management
- IT Service Continuity Management
- Supplier Management
- Information Security Management
List the Service Transition Processes
- Asset and Configuration Management
- Change Management
- Knowledge Management
- Transition Planning & Support
- Release & Deployment Management
- Service Validation & Testing (not testable)
- Change Evaluation (not testable)
List the Service Operation Processes
- Incident Management
- Problem Management
- Request Fulfillment
- Event Management
- Access Management
List the 7-Step Improvement Process for CSI
- Identify the strategy for improvement
- Define what you will measure
- Gather the data
- Process the data
- Analyze the information & data
- Present & use the information
- Implement improvement
Utility + Warranty =
Value
An event that launches a process
Trigger
Name the Service Provider Types
- Type I - Internal Service Provider
- Type II - Shared Service Provider
- Type III - Exteral Service Provider
3 Financial Services for IT Processes
- Budgeting
- Accounting
- Charging
Business Case Structure
- Introduction
- Methods & Assumptions
- Business Impacts
- Risk & Contingencies
- Recommendations
Service Portfollio Areas
- Service Pipeline
- Service Catalog
- Retired Services
Works to minimize the impact of incidents that arises.
Incident Management
Works to eliminate the underlying causes of incidents, thus improving service performance.
Problem Management
Involved in monitoring and automation efforts to ensure that services are managed effectively.
Event Management
Works to enforce the Information Security Management policies and ensures users have access only to services they have rights or priviledges to access.
Access Management