ITIL4 Management Practices Flashcards
A ___________ is a set of organizational resources designed for performing work or accomplishing an objective
management practice
__________ domains have been adopted and adapted for service management from general business management domains. Contains 14 practices
General management practice
____________ have been developed in service management and ITSM industries. There are 17 practices
service management practices
___________ have been adapted from technology management domains for service management purposes by expanding or shifting their focus from technology solutions to IT services. there are 3 practices
technical management practices
what are the 14 general management practices?
- architecture management
- continual improvement
- information security management
- knowledge management
- measurement and reporting
- organizational change management
- portfolio management
- project management
- relationship management
- risk management
- service financial management
- strategy management
- supplier management
- workforce and talent management
what are the 17 service management practices?
- availability management
- business analysis
- capacity and performance management
- change enablement
- incident management
- IT asset management
- monitoring and event management
- problem management
- release management
- service catalogue management
- service configuration management
- service continuity management
- service design
- service desk
- service level management
- service request management
- service validation and testing
What are the 3 technical management practices?
- deployment management
- infrastructure and platform management
- software development and management
What are the 15 practices that are highlighted for the ITIL 4 foundation exam?
- Continual improvement
- information security management
- relationship management
- supplier management
- change enablement
- incident management
- IT asset management
- monitoring and event management
- problem management
- release management
- service configuration management
- service desk
- service level management
- service request management
- deployment management
the purpose of ______________ is to protect the information needed by the organization to conduct its business
information security management
the information security management practice includes understanding and managing risks to the ____________, ____________ and ______________, and other aspects of information security such as ___________ and _______________
confidentiality, integrity, and availability of information, authentication, non-repudiation
the required security in information security management is established by means of policies, processes, behaviors, risk management and controls which must maintain a balance between _______, __________, and _________.
prevention, detection and correction
information security management is driven from the ______________ , based on governance requirements and organizational policies
most senior level in the organization
In information security management, one needs to achieve a balance between ____________ and ____________
protecting the organization from harm, allowing it to innovate
information security is critically dependent on _______________ throughout the organization
the behavior of people
information security management interacts with ______________ in the system.
every other practice
the purpose of ______________ is to establish and nurture the links between the organization and its stakeholders at strategic and tactical levels.
relationship management
_________ includes the identification, analysis, monitoring, and continual improvement of relationships with and between stakeholders.
relationship management
What are the three levels an organization can be divided into?
strategic
tactical
operational
the _________ level provides overall direction to an organization or business
strategic
the _________ level accomplishes/fulfills specific objectives linked to the overall strategic plan.
tactical
the _______ level takes care of the day-to-day tasks and activities
operational
in relationship management __________ needs and drivers are understood, and products and services are prioritized appropriately
stakeholders’
in _________, stakeholders’ satisfaction is high and a constructive relationships between the organization and stakeholders is established and maintained
relationship management
in relationship management, _______________ for new or change products and services, in alignment with desired business outcomes, are effectively established and articulated
customers’ priorities
in ___________, any stakeholder’s complaints and escalations are handled well through a sympathetic, yet formal process. Products and services facilitate value creation for the service consumers as well as for the organization.
relationship management
the purpose of _____________ is to ensure that the organization’s suppliers and their performances are managed appropriately to support the seamless provision of quality products and services.
supplier management
____________ includes creating closer, more collaborative relationships with key suppliers to uncover and realize new value and reduce the risk of failure.
supplier management
The following factors affect the evaluation and selection of __________
1. importance and value of the service to the business.
2. the risk associated with using the service
3. the cost of the service and its provision
suppliers
the following are key activities of the _____________ practice:
1. creating a single point of visibility and control to ensure consistency.
2. maintaining supplier strategy, policy, and contract management information
3. negotiating and agreeing contracts and arrangements
4. managing relationships and contracts with internal and external suppliers
5. managing supplier performance
supplier management
in the ______ sourcing strategy, products or services are developed and/or delivered internally by the organization
insourcing
in the ________ sourcing strategy, the process of having external suppliers provide products and services that were previously provided internally
outsouring
the ________ sourcing strategy includes procurement of a product or service from one supplier
since source or partnership
the __________ sourcing strategy includes procurement of a product or service from more than one independent supplier
multi-sourcing
the purpose of _________ is to ensure accurate and reliable information about the configuration of services and the configuration items (CI) that support them are available when and where they are needed.
service configuration management
the ________ includes the understanding of how the configuration items are configured and the relationship between them.
service configuration management
a _________ is any component that needs to be managed in order to deliver an IT service.
configuration item (CI)
a ________ is a set of tools, data, and information that is used to support service configuration management.
configuration management system (CMS)
a ________ is a repository where configuration information is stored, accessed, and used.
configuration management database (CMDB)
any change to configuration items (CI) should be performed through _________.
change enablement practice
the following are the steps of the ________ process:
1. identify new CIs and add them to the CMS
2. Update configuration data when changes are deployed
3. verify that configuration records are correct
4. audit application and infrastructure to identify any that are not documented
configuration management
the purpose of _________ is to plan and manage the full life cycle of all IT assets.
IT asset management
the _____________ includes creating closer more collaborative relationships with key suppliers to uncover and realize new value and reduce the risk of failure.
IT asset management
the ___________ practice includes the following:
1. maximize value
2. control costs
3. manage risks
4. support decision making about purchase, re-use, and retirement of assets
5. meet regulatory and contractual requirements
IT asset management
_______ refers to the acquisition, operation, care and disposal of organizational assets, particularly critical infrastructure
asset management
________ is a sub-practice of asset management that is specially aimed at managing the life cycles and total costs of IT equipment and infrastructure
IT asset management
___________ is aimed at managing the acquisition, development, release, deployment, maintenance, and eventual retirement of software assets
software asset management
_____ is any valuable component that can contribute to the delivery of an IT product or service
IT Asset
IT asset management of ______ includes labelling for clear identification. their location must be tracked to help protect them from theft, damage and data leakage.
hardware assets
IT asset management for ______ includes protecting from unlawful copying, which could result in unlicensed use. The organization must ensure that license terms are adhered to
software assets
IT asset management for ________ includes assigning them to specific products or groups so that costs can be managed. contractual arrangements must be understood and adhered to
cloud-based assets
IT asset management for _________ includes assigning them to individuals who take responsibility for their care. Processes are needed to managed lost or stolen devices, and tools may be needed to erase sensitive data for them.
client assets
The purpose of _________ is to systematically observe services and service components, and record and report selected changes of state identified as events.
monitoring and event management
the _________ practice identifies and prioritizes infrastructure, services, business processes, and information security events, and establishes appropriate responses to those events, including responding to conditions that could lead to potential faults or incidents.
monitoring and event management
a ______ is any change of state that has significance for the management of a service or other configuration item (CI).
event
_____ are typically recognized through notifications created by an IT service, CI or monitoring tool
event
the _________ practice manages events throughout their lifecycles to prevent, minimize or eliminate their negative impact on the business
monitoring and event management
______ focuses on the systematic observation of services and the CIs that underpin services to detect conditions of potential significance.
monitoring
__________ should be performed in a highly automated manner and can be done actively or passively.
monitoring
_________ focuses on recording and managing those monitored changes of state that are defined by the organization as an event, determining their significance and identifying and initiating the correct control action to manage them.
event management
monitoring is necessary for _____________ to take place, but not all monitoring results in the detection of an _________.
event management, event
________ are classified into informational, warning and exceptions.
events
________ events do not require action at the time they are identified, but analyzing the data gathered from them later may uncover desirable, proactive, steps that can be beneficial to the service.
informational
_________ events allow action to be taken before any negative impact is experienced by the business.
warning
_________ events indicate that a breach to an established norm has been identified. These need to be acted upon though business impact may not yet have been experienced.
exception
the purpose of ____________ is to minimize the negative impact of incidents by restoring normal service operations as quickly as possible
incident management
a ______ is an unplanned interruption to a service or reduction in the quality of service.
incident
every incident should be ___________and _________ to ensure that it is resolved in a time that meets the expectations of the customer and user
logged (to Service Desk) and managed
incident management _____________ are agreed, documented and communicated to ensure that expectations are realistic
target resolution times
incidents are prioritized based on an agreed classification to ensure that incidents with the __________ are resolved first
highest business impact
incident management can have an enormous impact on _____________ and on how customers and users perceive the service provider
customer and user satisfaction
in incident management there should be a formal process for logging and managing __________
incidents
in _________ there may be scripts for collecting information from users during initial contact and this may lead directly to diagnosis and resolution of simple incidents.
incident management
information about incidents should be stored in ________ in a suitable tool
incident records
the purpose of ______ is to reduce the likelihood and impact of incidents by identifying actual and potential causes of incidents and managing workarounds and known errors
problem management
a ____ is a cause or potential cause of one or more incidents
problem
a ______ is a problem that has been analyzed but has not been resolved.
known error
a _______ is a solution that reduces or eliminates the impact of an incident or problem for which a full resolution is not yet available. some reduce the likelihood of incidents.
workaround
_____ is a phase of problem management where the following happens:
1. identify and log problems
2. performing trend analysis of incident records
3. detecting duplicate and recurring issues by users, service desk, and technical support staff.
4. during major incident management, identifying a risk that an incident could occur
5. analyzing information received from suppliers and partners
6. analyzing information received from internal software developers, test teams, and project teams.
problem identification
_______ is a phase of problem management where the following occurs:
- problem analysis, documenting workaround and known errors
- problems are prioritized for analysis based on the risk that they pose and are managed as risks based on their potential impact and probability
- should consider all the contributory causes, including causes that contributed to the duration and impact of incidents, as well as those that led to the incidents occurring
- when problem cannot be resolved quickly, it is often useful to find and document a workaround for future incidents based on an understanding of the problem
problem control
___________ is a phase of problem management where the following occurs:
- management of known errors as well as identification of potential permanent solutions
- regularly re-assesses the status of known errors that have no been resolved, including overall impact on customers, availability, and cost of permanent resolutions, and effectiveness workarounds
- identification of potential permanent solutions may result in a change request for implementation of the solution
- the effectiveness of workarounds should be evaluated each time a workaround is used, as the workaround maybe improved based on the assessment.
error control
the purpose of ___________ is to maximize the number of successful IT changes by ensuring that risks have been properly assessed, authorizing changes to proceed, and managing the change schedule
change enablement
_____ is the addition, modification or removal of anything that could have a direct or indirect effect on services
change
a __________ is the person or group that authorizes a change
change authority
a _______ is a document or tool used to help plan changes, assist in communication, avoid conflicts and assign resources
change schedule
__________ focuses on changes in products and services
change enablement
____________ manages the people aspects of changes to ensure that improvements and organizational transformation initiatives are implemented successfully
organizational change management
_______ is a type of change enablement that are low-risk, pre-authorized changes that are well understood and fully documented and may be implemented without needing additional authorization.
they are often initiated as service requests, but may also be operational changes.
standard change
______ is a type of change enablement that are changes that need to be scheduled, assessed and authorized following a standard process.
normal change
in normal changes, __________ based on the type of change determine the roles for assessment and authorization.
change models
initiation of ______ is triggered by the creation of change request.
normal change
________ is a type of change enablement that are changes that must be implemented as soon as possible.
emergency change
in __________, the process for assessment and authorization is expedited to ensure that they can be implemented quickly. there also may be a separate change authority for these changes.
emergency changes
the purpose of ________ is to move new or changed hardware, software, documentation, processes or any other components to live environments.
deployment management
_______ may also be involved in deploying components to other environments for testing or staging.
deployment management
___________ works closely with release management and change enablement.
deployment management
components that are available for _______ should be maintained in one or more secure locations to ensure that they are not modified before ______.
deployment
_______ is a type of deployment where new or changed components are deployed to just one part of the production environment at a time.
phased deployment
________ is a type of deployment where new or changed components are deployed to all target locations/systems at the same time.
big bang deployment
__________ is a type of deployment where components are integrated, tested and deployed when they are needed, providing frequent opportunities for customer feedback loops
continuous delivery
______________ is a type of deployment where new or changed software is made available in a controlled repository, and users download the software to client devices whenever they choose to.
pull deployment
the purpose of ________ is to make new and changed services and features available for use
release management
_____ is a version of a service or other configuration item, or a collection of configuration items, that is made available for use
release
_______ specifies the exact combination of of new and changed components to be made available, and the timing for their release
release plan
______ documents the timing of the release. this should be negotiated and agreed with customers and other stakeholders
release schedule
________ enables learning and improvement following a release and helps ensure that the customers are satisfied
release post-implementation review
the purpose of ______ is to support the agreed quality of a service by handling all pre-defined, user-initiated service requests (by service desk) in an effective and user-friendly manner
service request management
a ______ is a request from a user or user’s authorized representative that initiates a service action which has been agreed as a normal part of service delivery.
service request
the purpose of ________ is to capture demand for incident resolution and service requests
service desk
the ________ should also serve as the entry point and single point of contact for the service provider with all of its users
service desk
________ provides a clear path for users to report issues , queries, a request and have them acknowledged, classified, owned and actioned
service desk
the _______ should be the empathetic and informed link between the service provider and its users
service desk
a key aspect of a good _________ is its practical understanding of the wider organization, the business processes and the users
service desk
in the case of escalations, support and development teams need to work in close collaboration with the ______ to present and deliver a “joined up” approach to users and customers
service desk
_________ is defined by the following:
1. intelligent telephone systems, incorporating computer-telephony integration, IVR, and automatic call distribution.
2. workflow systems for routing and escalation
3. workforce management and resource planning systems
4. a knowledge base
5. call recording and quality control
6. remote access tools
7. dashboard and monitoring tools
8. configuration management systems
service desk channels access
________ is defined by sophisticated supporting technology with complex routing and escalation features and can be cloud based for better access and availability.
requirement of the virtual service desk
the key skill of ________ is the ability to fully understand and diagnose a specific incident in terms of business priority and to take appropriate action to get this resolved, using available skills, knowledge, people and processes
service desk staff training and competency requirements
the purpose of _______ is to set clear business-based targets for service performance, so that the delivery of a service can be properly assessed, monitored, and managed against these targets
service level management
the practice of __________ involves the definition, documentation and active management of service levels.
service level management
service level management requires _______ on the whole service and not simply its constituent parts
pragmatic focus
service level management provides the ________ of the organizations services
end-to-end visibility
the following are skills and competencies for __________:
- relationship management
- business liaison
- business analysis
- commercial/supplier management
service level management
the following are characteristics of what?
- establishes a shared view of the services and target service levels with customers
- ensures that the org meets the defined service levels through the collection, analysis, storage and reporting of the relevant metrics for the identified services.
- performs service reviews to ensure that the current set of services continues to meet the needs of the organization and its customers
- captures and reports on service issues, including performance against defined service levels
service level management
a __________ is a documented agreement between a service provider and a customer that identifies both services required and the expected levels of service.
service level agreement
what are all of the following key requirements for?
- must be related to a defined ‘service’ in the service catalogue
- should relate to defined outcomes and not simply operational metrics
- should reflect an ‘agreement’ – engagement and discussion between the service provider and the service consumer
- must be written in a simple and easy way to understand and use for all parties
successful SLAs
service level management involves collating and analyzing information from which 4 sources?
- customer engagement
- customer feedback
- operational metrics
- business metrics
________ involves initial listening, discovery and information capture on which to base metrics, measurements and ongoing process discussions
customer engagement
________ is ideally gathered from a number of sources like surveys, key business-related measures, etc.
customer feedback
________ are the low-level indicators of various operational activities and may include system availability, incident response and fix times, change and request processing time, and system response times.
operational metrics
_______ can be any business activity that is deemed to be useful or valuable to the customer and used as a means of gauging the success of a service
business metrics
the purpose of _________ is to align the organization’s practices and services with changing business needs through the ongoing identification and improvement of services, service components, practices, or any element involved in the efficient and effective management of products and services.
continual improvement
the highest levels of the organization need to take responsibility for embedding _______ into the way that people think and work
continual improvement
the _________ is integral to the development and maintenance of every other practice as well as to the complete lifecycle of all services and indeed the SVS itself
continual improvement practice
the ______ is a database or structured document used to track and manage improvement ideas from identification through to final action
continual improvement register (CIR)
in ________ it is a good idea to select a few key methods that are appropriate to the types of improvements the organization typically handles and cultivate those methods
continual improvement