ITILv3 B Flashcards
Input from which processes could be considered by service level management when negotiating service level agreements (SLA)?
A. All other ITIL processes
B. Capacity management and availability management only
C. Incident management and problem management only
D. Change management and release and deployment management only
A. All other ITIL processes
“Representatives of all of the other processes need to be consulted for their opinion on what targets can be realistically achieved”
Which one of the following statements about a standard change is INCORRECT?
A. They are pre-authorized by change management
B. They follow a procedure or work instruction
C. They are low risk
D. They must be implemented as soon as possible
D. They must be implemented as soon as possible
Standard changes would not normally need to be implemented as soon as was possible, whereas emergency changes would.
Which of the following statements about the service desk are CORRECT?
- It provides a single point of contact between the service provider and users
- It manages incidents and service requests
- It is a service management process
- Service desk staff try to restore service as quickly as possible
A. All of the above
B. 1, 2, and 4 only
C. 2 and 4 only
D. 2 and 3 only
B. 1, 2, and 4 only
The service desk is a function and not a process.
Which of the following statements about functions are CORRECT?
- They include tools
- They are groups that use resources to carry out one or more activities
- One person or group may perform multiple functions
- They are most costly to implement compared to processes
A. 1, 2, and 3 only
B. 1, 2, and 4 only
C. All of the above
D. None of the above
A. 1, 2, and 3 only
Functions are not described as being more costly than processes and this would depend on the function or process being considered.
Which one of the following is the BEST description of the activities carried out by facilities management?
A. The management of IT services that are viewed as “utilities”, such as printers or network access
B. Advice and guidance to IT operations on methodology and tools for managing IT services
C. Management of the physical IT environment such as a data center or computer room
D. The procurement and maintenance of tools that are used by IT operations staff to maintain the infrastructure
C. Management of the physical IT environment such as a data center or computer room
“Facilities management refers to the management of the physical IT environment, typically a data center or computer rooms”
Which process would assist with the identification and resolution of any incidents and problems associated with service or component performance?
A. Capacity management
B. Supplier management
C. Technology management
D. Change management
A. Capacity management
Performance issues are within the scope of capacity management.
Which one of the following statements about the known error database (KEDB) is MOST correct?
A. The KEDB is the same database as the service knowledge management system (SKMS)
B. The KEDB should be used during the incident diagnosis phase to try to speed up the resolution process
C. Care should be taken to avoid duplication of records in the KEDB. This can be done by giving access to as many technicians as possible to create new records
D. Access to the KEDB should be limited to the service desk
B. The KEDB should be used during the incident diagnosis phase to try to speed up the resolution process
A-The KEDB is part of the SKMS, NOT the same thing.
B-Is correct
C-Duplication should be avoided by by RESTRICTING access
D-Yes, the service desk should use it but they are NOT the only ones
Which of the following statements about key performance indicators (KPIs) are metrics are CORRECT?
- Service metrics measure the end-to-end service
- Each KPI should relate to a critical success factor
- Metrics can be used to identify improvement opportunities
- KPIs can be both qualitative and quantitative
A. 1 only
B. 2 and 3 only
C. 1, 2 and 4 only
D. All of the above
D. All of the above
Each statement is a summary of the book content.
Which one of the following maintains relationships between all service components?
A. The capacity plan
B. The definitive media library
C. The configuration management system
D. A service level agreement
C. The configuration management system
The configuration management system (CMS) is responsible via its various data sources (CMDBs, etc) for maintaining these relationships.
Should a customer’s request for a new service ALWAYS be fulfilled?
A. Yes-if they are an external customer as they are paying for the service
B. No-if they are an internal customer as they are not always paying for the service
C. No-it is the responsibility of the service provider to carry out due diligence before requests are fulfilled
D. Yes-the service provider should ensure that all requests for new services are fulfilled
C. No-it is the responsibility of the service provider to carry out due diligence before requests are fulfilled
The service provider should ensure due diligence is carried out against the customer’s requirements, irrespective of whether they are internal or external customers.
Which of the following statements is/are CORRECT?
- Problem management can support the service desk by providing known errors to speed up incident resolution
- Problem management is the only source of information to service level management about the impact of changes
A. 1 only
B. 2 only
C. Both of the above
D. Neither of the above
A. 1 only
Problem management is the source of known errors but change and service asset and configuration management are likely to be other sources of information about the impact of changes.
A failure has occurred on a system and is detected by a monitoring tool. This system supports a live IT service. When should an incident be raised?
A. Only when users notice the failure
B. An incident should be raised if the technicians have seen this before and have a workaround
C. Only if the failure results in a service level being breached
D. Immediately, to limit or prevent impact on users
D. Immediately, to limit or prevent impact on users
A-There do not need to be discernable impacts to the user for an incident to be raised.
B-even if a workaround is available it needs to be recorded to measure any on-going impact of the incident.
C-All incidents must be recorded.
D-CORRECT, in order to prevent loss of service or to restore service as soon as possible.
Which of the following could be considered stakeholders in a service management project?
- Users
- Customers
- Suppliers
- Functions
A. 1 and 2 only
B. 3 and 4 only
C. 2 and 4 only
D. All of the above
D. All of the above
D is the CORRECT response. Stakeholders can be both internal and external entities. An example of a function as a stakeholder could be the service desk, technical management or application management functions.
Which of the following activities does service asset and configuration management ensure are performed?
- Configuration items (CIs) are identified
- CIs are baselined
- Changes to CIs are controlled
A. All of the above
B. 1 and 2 only
C. 1 and 3 only
D. 2 and 3 only
A. All of the above
All activities are part of the scope of service asset and configuration management.
Which of the following aspects of service design should be considered when designing a service solution?
- Measurement methods and metrics
- Management information systems and tools
- Technology architectures
- The processes required
A. 1 and 2 only
B. 2 and 3 only
C. 2, 3 and 4 only
D. All of the above
D. All of the above
All of these items are aspects of service design.
Which one of the following statements is CORRECT for ALL processes?
A. They define functions as part of their design
B. They deliver results to a customer or stakeholder
C. They are carried out by an external service provider in support of a customer
D. They are units of organizations responsible for specific outcomes
B. They deliver results to a customer or stakeholder
A-Process design would involve allocation of activities to functions but not their definition.
B-CORRECT-processes deliver results or they would not be worthwhile.
C-Not ALL processes are carried out by external providers.
D-is a description of a function.
Which process is primarily responsible for packaging, building, testing and deploying services?
A. Transition planning and support
B. Release and deployment management
C. Service asset and configuration management
D. Service catalog management
B. Release and deployment management
All are activities performed by release and deployment management.
Which one of the following is the BEST example of a workaround?
A. A technician installs a script to temporarily divert prints to an alternative printer until a permanent fix is applied.
B. A technician tries several ways to solve an incident. One of them works, although they do not know which one
C. After reporting the incident to the service desk, they user works on alternative tasks while the problem is identified and resolved
D. a device works intermittently, allowing the user to continue working at degraded levels of performance while the technician diagnoses the incident
A. A technician installs a script to temporarily divert prints to an alternative printer until a permanent fix is applied.
A-is a good example of a workaround which is not a permanent solution but which overcomes the original incident.
B-is a “lucky” incident resolution and unlikely to be repeatable.
C-does not allow the user to continue with their original task.
D-is an incident under investigation
Which of the following areas can be helped by technology?
- Request management
- Service catalog management
- Detection and monitoring
- Design and modeling
A. 1, 2 and 3 only
B. 1, 3 and 4 only
C. 2, 3 and 4 only
D. All of the above
D. All of the above
All four areas can be assisted by technology.
Which one of the following is the CORRECT list of stages in the Deming Cycle?
A. Plan, Measure, Monitor, Report
B. Plan, Check, Re-Act, Implement
C. Plan, Do, Act, Audit
D. Plan, Do, Check, Act
D. Plan, Do, Check, Act
The four key stages of the cycle are Plan, Do, Check and Act.
Which two processes will be involved the MOST in negotiating and agreeing contracts for the provision of recovery capability to support continuity plans?
A. Service level management and capacity management
B. Supplier management and service level management
C. IT service continuity management and service level management
D. IT service continuity management and supplier management
D. IT service continuity management and supplier management
ITSC provides the subject matter expertise and supplier management provides the contract negotiation and selection process. SLM also has a role in underpinning contracts but is not as significant in this respect as the other two processes.
Which one of the following is the BEST definition of an incident model?
A. The template that defines the incident logging form used for reporting incidents
B. A type of incident involving a standard (or model) type of configuration item (CI)
C. A set of pre-defined steps to be followed when dealing with a known type of incident
D. An incident that is easy to solve
C. A set of pre-defined steps to be followed when dealing with a known type of incident
C-matches the description of an incident model.
What roles are defined in the RACI model?
A. Responsible, Accountable, Consulted, Informed
B. Responsible, Achievable, Consulted, Informed
C. Realistic, Accountable, Consulted, Informed
D. Responsible, Accountable, Corrected, Informed
A. Responsible, Accountable, Consulted, Informed
Roles are Responsible, Accountable, Consulted, Informed
Which stage of the service lifecycle decides what services should be offered and to whom they will be offered?
A. Continual service improvement
B. Service operation
C. Service design
D. Service strategy
D. Service strategy
Deciding what services should be offered and to whom is an integral part of service strategy.