ITIL® Awareness | ITIL V3 Question and Answers

ITIL® Awareness | ITIL V3 Mock Test

In ITIL online test, we will cover these topics such as itil, itil foundation, what is itil, itil framework, itil v4, information technology infrastructure libray, itil framework, what is itil, itil processes, software itil, it service, what is itil processes, service management framework itil, itil service management, itil structure, why itil and so on.

ITIL stands for Information Technology Infrastructure Library. It is a set of proven IT processes and common practices for IT Service Management (ITSM). ITIL V2 and ITIL V3 are standards in the field of ITSM.




1
Which sub process of Capacity Management focuses on the IT Infrastructure that is used to support provision?
a. Business Capacity Management
b. Component Capacity Management
c. Service Capacity Management
d. All of the above

Answer : Component Capacity Management

2
The information security policy should include all of the following policies EXCEPT
a. A charging policy
b. A record retention policy
c. A E-mail policy
d. An asset disposal policy
Answer : A charging policy

3
What is the purpose of Service Design?
a. To define the perspective, position, plans, and patterns that a service provider needs to execute to meet an organization’s business outcomes
b. To ensure that new, modified, or retired services meet the expectations of the business as documented in the service strategy and service design stages of the lifecycle
c. To coordinate and carry out the activities and processes required to deliver and manage services at agreed levels to business users and customers
d. To plan out the services, governing practices, processes and policies required to realize the service provider’s strategy and to facilitate the introduction of services into supported environments
Answer : To plan out the services, governing practices, processes and policies required to realize the service provider’s strategy and to facilitate the introduction of services into supported environments

4
Which of the following is NOT a purpose of the Service Asset and Configuration Management (SCAM) process?
a. To determine the most appropriate release-unit level for each asset or component
b. To ensure that accurate and reliable information about assets is available when and where it is needed
c. To include details of how assets have been configured and the relationships between assets
d. To ensure that the assets required to deliver services are properly controlled
Answer : To determine the most appropriate release-unit level for each asset or component

5
Which statement about IT Operations Management is CORRECT?
a. It is responsible for ensuring that business and IT services provider strategies and plans are closely aligned
b. It is responsible for performing the daily activities needed to manage IT services and the supporting IT infrastructure
c. It is responsible for managing risks that could seriously impact IT services
d. It is responsible for allowing users to make use of IT services, data or other assets
Answer : It is responsible for performing the daily activities needed to manage IT services and the supporting IT infrastructure

6
Which statement about the scope of Access Management is CORRECT?
a. It involves the implementation of the policies from Information Security Management
b. It is applied to any facet of service management that needs to be closely managed and that can be automated
c. It allows users to make use of IT services, data, or other assets
d. It ensures that access to services is available at the times that were agreed upon
Answer : It involves the implementation of the policies from Information Security Management

7
Which stages of the ITIL framework represent the revolving lifecycle stages of the lifecycle hub-and-spoke design?
a. Service Design, Service Transition and Continual Service Improvement
b. Service Strategy, Service Operation and Continual Service Improvement
c. Service Design, Service Transition and Service Operation
d. Service Strategy, Service Design, and Service Operation
Answer : Service Design, Service Transition and Service Operation





Also Read : 5 Apps from Google that you should try


8
Which aspect of service design is reviewed to make sure that existing roles and responsibilities have the ability to support a new service?
a. Design of Service Solutions
b. Design of management information system and tools
c. Design of required processes
d. Design of measurement methods and metrics

Answer : Design of required processes

9
Your organization is in the process of developing multi-level service agreements. Which of the following is NOT a layer within a multi-layer service level agreement?
a. Customer Level
b. Corporate Level
c. Service Level
d. Strategic Level
Answer : Strategic Level

10
Which of the following is an example of the management information systems and tools aspect of Service Design?
a. Customer and User Satisfaction Survey
b. Service Catalogue
c. Financial Information and Budgets
d. Service Level Agreements
Answer : Service Catalogue

11
Which aspect of Availability is a measure of how long an IT service can perform its agreed function without interruption?
a. Maintainability
b. Reliability
c. Availability
d. Serviceability
Answer : Reliability

12
Which of the following is the BEST description of a service?
a. A structured collection of activities that are intended to achieve a specific goal
b. A way of delivering value to customers by helping to bring about results customers want to accomplish without owning the specific costs and risks
c. Any capability or resource used by a service provider to provide utility and warranty to a customer
d. Any capability or resource used by a customer to accomplish a business result
Answer : A way of delivering value to customers by helping to bring about results customers want to accomplish without owning the specific costs and risks

13
Which of the following resource can be used to indicate a breach to a service level target?
a. Authority Matrix
b. RACI Matrix
c. Pareto Chart
d. Service Level Agreement Monitoring (SLAM) chart
Answer : Service Level Agreement Monitoring (SLAM) chart

14
Which type of service change is BEST described as a pre-authorized change that is low risk, relatively common, and follows a procedure or work instruction?
a. Standard Change
b. Minor Change
c. Normal Change
d. Emergency Change
Answer : Standard Change





15
Which design feature for vital business functions (VBF) refers to an approach used to provide maximum availability of an IT service?
a. Fault Tolerance
b. Continuous Availability
c. High Availability
d. Continuous Operation
Answer : Continuous Availability

16
Which of the following is a major Service Design aspect?
a. Strategies and Strategic Plans
b. Request for Changes (RFCs) to resolve operational issues
c. Management Information System and Tools
d. Service Level Agreements (SLA)
Answer : Management Information System and Tools

17
Which of the following Service Design aspects specifically include the Service Catalogue?
a. Design of Technology and Management Architectures
b. Design of Measurement Methods and Metrics
c. Design of Management Information System and Tools
d. Design of Service Solutions
Answer : Design of Service Solutions

18
Which of the following activities are included in IT Operations Management?
a. Access Management and IT Service Continuity Management (ITSCM)
b. Application Service Provider (ASP) and Facilities Management
c. IT Service Management (ITSM) and Release and Deployment Management
d. IT Operations Control and Facilities Management
Answer : IT Operations Control and Facilities Management

19
Which of the following BEST describes an alert?
a. A design flaw or malfunction that causes a failure of one or more IT services or other configuration items (CIs)
b. A notification that a threshold has been reached, something has changed, or a failure has occurred
c. An unplanned interruption to an IT service or a reduction in the quality of an IT service
d. A change of state that has significance for the management of an IT service or other configuration item (CI)
Answer : A notification that a threshold has been reached, something has changed, or a failure has occurred

20
Which of the following is responsible for negotiating agreements between the service provider and customer, as well as ensuring that these agreements are met?
a. Supplier Management
b. Service Level Agreement (SLA)
c. Demand Management
d. Service Level Management (SLM)
Answer : Service Level Management (SLM)

21
Which of the following is the BEST description of a function?
a. A team or group of people and the tools they use to carry out one or more processes or activities
b. A structured set of activities designed to accomplish a specific objective
c. A temporary organization, with people and other assets required to achieve an objective or other outcome
d. A connection or interaction between the IT service provider and the business
Answer : A team or group of people and the tools they use to carry out one or more processes or activities

22
Which of the following is one of the five major Service Design aspects?
a. Measurement Methods and Metrics
b. Standard Operating Procedures
c. Vital Business Function
d. Shared Service Unit
Answer : Measurement Methods and Metrics

23
What do the four P’s of Service Design represent?
a. People, Process, Principles and Profit
b. People, Process, Products, and Projects
c. People, Process, Products and Partners
d. People, Process, Principles and Partners
Answer : People, Process, Products and Partners





24
What is the purpose of Service Operation?
a. To ensure that new, modified, or retired services meet the expectations of the business as documented in the service strategy and service design stages of the lifecycle
b. To plan out the services, governing practices, processes, and policies required to realize the service provider’s strategy and to facilitate the introduction of services into supported environments
c. To define the perspective, position, plans, and patterns that a service provider needs to execute to meet an organization’s business outcomes
d. To coordinate and carry out the activities and processes required to deliver and manage services at agreed levels to business users and customers
Answer : To coordinate and carry out the activities and processes required to deliver and manage services at agreed levels to business users and customers





25
Which of the following is used to manage the lifecycle of a single change?
a. Request for Change (RFC)
b. Standard Change
c. Change Model
d. Change Record
Answer : Change Record

26
Which of the following does NOT describe Application Management?
a. It helps to decide if an application will be bought or built
b. It is the software that provides functions that are required by an IT service
c. Any department, group or team that is involved in managing and supporting operational applications can execute this function
d. It is the function that is responsible for managing applications throughout their lifecycle
Answer : It is the software that provides functions that are required by an IT service

27
Which of the following aspects of Service Management would be included in the scope of Event Management?
a. Configuration items (CIs)
b. Environmental conditions
c. Security
d. All of the above
Answer : All of the above

28
Which of the following is an interface with Incident Management from the Service Design stage of the Service lifecycle?
a. Service Level Management (SLM)
b. Access Management
c. Problem Management
d. Change Management
Answer : Service Level Management (SLM)

29
What is the purpose of Continual Service Improvement (CSI)?
a. To ensure that new, modified or retired services meet the expectations of the business as documented in the Service Strategy and Service Design stages of the lifecycle
b. To plan out the services, governing practices, processes and policies required to realize the service provider’s strategy and to facilitate the introduction of service into supported environments
c. To coordinate and carry out the activities and processes required to deliver and manage services at agreed levels to business users and customers
d. To ensure that IT services are aligned with changing business needs by identifying and implementing enhancements to IT services that support business processes
Answer : To ensure that IT services are aligned with changing business needs by identifying and implementing enhancements to IT services that support business processes

30
Which of the following statements about Serviceability is CORRECT?
a. Customers require Service Level Agreements (SLAs) containing reliability targets
b. Maintainability is the primary service target within SLAs for the business and customers availability
c. Reliability and Maintainability targets within Operational Level Agreements (OLAs) should refer to the end-to-end service
d. All of the above
Answer : Reliability and Maintainability targets within Operational Level Agreements (OLAs) should refer to the end-to-end service

31
Which of the following is MOST strategically focused on achieving service levels?
a. IT Operations Management
b. Release and Deployment Management
c. Business Relationship Management
d. Service Level Management (SLM)
Answer : Business Relationship Management





Also Read  : How to remove viruses from an Android phone


32
Which type of external stakeholder of an IT service provider is the person or group who defines and agrees to the service level targets?
a. Suppliers
b. Customers
c. Vendor
d. Users

Answer : Customers

33
Which of the following is a value that is a result of implementing good Service Transition?
a. Reduced frequency and duration of service outages
b. Allows the service provider to promptly and effectively respond to changes in the business environment
c. Improved quality of service
d. Improved control of service assets and configurations
Answer : Improved control of service assets and configurations

34
Service desks can be structured in many ways. How would a Centralized Service Desk be described?
a. Several Service Desks merged into a single location
b. A Service Desk that gives the impression that it is a single centralized Service Desk, but in fact the personnel are scattered or located in any number (or type) of geographical locations
c. A Service Desk that includes two or more geographically dispersed Service Desks and provides 24-hour follow-the-sun service
d. A Service Desk that is co-located within, or that is physically located to, the users it serves
Answer : Several Service Desks merged into a single location

35
Which step of the Continual Service Improvement (CSI) approach involves implementing IT Service Management (ITSM) processes?
a. Where are we now?
b. How do we get there?
c. Where do we want to be?
d. How do we keep the momentum going?
Answer : How do we get there?

36
What can Service Automation improve?
a. Accounting and Agreement
b. Environment and Partnership
c. Input and Output
d. Utility and Warranty
Answer : Utility and Warranty

37
Which of the following is a responsibility of the process practitioner?
a. Creating or updating records to prove that activities have been carried out correctly
b. Supplying goods or services that are required to deliver IT Services
c. Managing the lifecycle of all incidents
d. Appointing people to the required roles
Answer : Creating or updating records to prove that activities have been carried out correctly

38
Which statements about the Service Knowledge Management System (SKMS) are CORRECT?
a. Configuration data is stored in the configuration Management Database (CMDB), which is fed through the Configuration Management System (CMS) to the SKMS.
b. The CMS is part of the SKMS
c. The SKMS provides support for making informed decision and delivering services
d. All of the above
Answer : All of the above

39
Which of the following is the purpose of Change Management?
a. To ensure that changes are documented and analyzed.
b. To make effective use of overall risk by accepting potentially beneficial risks
c. To ensure that requests for change align with the business needs of the service
d. To ensure beneficial changes to be made with minimum disruption to IT Services
Answer : To ensure beneficial changes to be made with minimum disruption to IT Services

40
Which of the following is NOT an output of Service Level Management (SLM)?
a. Service Improvement Plan (SIP)
b. Update to Request for Changes (RFCs)
c. Up-to-date Service Portfolio
d. Updated requirements for Underpinning Contracts
Answer : Up-to-date Service Portfolio

41
Which of the following is NOT a characteristic of value as created through Services?
a. Value is defined by the Service Provider
b. Affordable mix of features
c. Value changes over time and circumstance
d. Achievement of objectives

Answer : Value is defined by the Service Provider

42
Which of the following contains details of current and historic usage of IT Service and Components and also includes scenarios predicting business demands?
a. Configuration Management System
b. Capacity Plan
c. Configuration Baseline
d. Charter
Answer : Capacity Plan

43
Which of the following is defined as the underlying cause of one of more unplanned interruptions to an IT Service?
a. Incident
b. Workaround
c. Problem
d. Event
Answer : Problem

44
What is the MAIN responsibility of the Service Owner?
a. Communicate process information or changes as appropriate to ensure awareness
b. Define all aspects of an IT Service and its requirements throughout each stage of its lifecycle
c. Provide the overall management of all IT Services
d. Deliver a specific IT Service
Answer : Deliver a specific IT Service





45
Which of the following is the BEST description of IT Service Management?
a. The implementation and Management of quality IT Services that meet the needs of the business
b. An approach that emphasizes the importance of coordination and control across the various functions, processes and systems necessary to manage the full lifecycle of IT Services
c. The framework of policy, processes, standards, guidelines and tools that ensures an organization can achieve its Information Security Management objectives
d. A set of specialized organizational capabilities for providing value to customers in the form of Services
Answer : The implementation and Management of quality IT Services that meet the needs of the business

46
Which of the following describes the “R” in RACI?
a. The person or people responsible for getting the job done
b. The person who controls quality and the end results
c. The people who are sought after for information and advice
d. People who are kept up to date on progress
Answer : The person or people responsible for getting the job done

47
Continual Service Improvement (CSI) uses various types of metrics to support its activities. Which type of metric is frequently associated with application-based metrics?
a. Process metrics
b. Technology metrics
c. Service metrics
d. Improvement metrics
Answer : Technology metrics

48
Which of the following is the purpose of the Request Fulfillment process?
a. To provide users with information on service availability and the required steps to obtain them
b. To manage the lifecycle of all Service Requests from users
c. To allow users to make use of IT Services, data or other assets
d. To ensure that normal service operation is restored as quickly and the business impact is minimized
Answer : To manage the lifecycle of all Service Requests from users

49
As a category, Event are of ____________types
a. Exception
b. Informational
c. Informational and exceptions
d. None of the above
Answer : Informational and exceptions

50
In event notification, a device is interrogated by a management tool, which collects certain targeted data. This is called polling
a. True
b. False
Answer : True

51
Significance of the events can be categorized as:
a. Informational
b. Warning
c. Exception
d. All of the above
Answer : All of the above





52
For your Event Management to be effective, it should be designed during:
a. Service Strategy
b. Service Design
c. Service Operation
d. Service Transition
Answer : Service Design

53
Failed CI cannot be called as incident if service performance does not degrade
a. True
b. False
Answer : False

54
Incidents can be logged by
a. Technical Staff
b. User
c. Service Desk
d. All of the above
Answer : All of the above

55
Focus of Incident Management is on
a. Permanent resolution
b. Find the cause and fix it
c. Restore ASAP (AS early As Possible)
d. Make necessary changes in infrastructure
Answer : Restore ASAP (AS early As Possible)

56
Incident Management team is exempted to follow Change Management process because they are supposed to fix the reported issues and in the process of fixing the issues, they are required to make necessary changes
a. True
b. False
Answer : False

57
Urgency, Severity, Impact and Priority is related as
a. Urgency = Priority X Impact
b. Priority = Urgency X Impact
c. Severity = Impact X Priority
d. All are incorrect
Answer : Priority = Urgency X Impact

58
Category in Incident management and category in Problem Management should be
a. Can be different
b. Doesn’t matter
c. Same
d. They are independent
Answer : Same

59
Primary interface with Request fulfillment process is as below
a. Service Desk – Incident – Problem and Change
b. Incident – Problem – Change and Release
c. Incident – Capacity – Availability and Service Level Management (SLM)
d. Incident – Release and Configuration Management
Answer : Incident – Release and Configuration Management

60
Challenges faced by Request Fulfillment process come from which combination
a. People and Process
b. Process and Technology
c. People and Technology
d. None of the above
Answer : Process and Technology

61
As per ITIL, a ‘problem’ is defined as the case of one or more incidents
a. True
b. False
Answer : True

62
Two major processes for Problem Management are
a. Error Control and Problem Control
b. Reactive and Proactive
c. Error Control and Proactive
d. Problem Control and Reactive
Answer : Reactive and Proactive

63
Known Error database should be owned by
a. Configuration Management as part of CMDB
b. Knowledge Management as part of SKMS
c. Problem Management
d. Should be owned by Tools group or KM team
Answer : Problem Management

64
In Service Transition phase, Problem Management interacts with
a. Change Management
b. Configuration Management
c. Release and Deployment Management
d. All of the above
Answer : All of the above

65
In Service Design, Problem Management deals with
a. Supplier Management
b. Transition Planning and Support
c. Security Management
d. Capacity Management

Answer : Capacity Management

66
Access Management process is subset of the Availability Management process, whose objective is to ensure that all those authorized should have access to the documents and information:
a. True
b. False
Answer : False





Also Read  : Block ads on your Android phone with 3 simple methods


67
Service Operations team is accountable to find CI discrepancies while working on day to day basis
a. True
b. False

Answer : False

68
Service Operations team is supposed to update the CI status and details based on
a. Operations Manager’s approval
b. Configuration Manager’s approval
c. Incident Manager’s approval
d. Operations Management function
Answer : Configuration Manager’s approval

69
Monitoring is performed by Service Operations teams, involved processes are:
a. Supplier – Service Level Management (SLM) – Service Reporting
b. Event – Capacity – Availability
c. SLM – Incident – Problem
d. Change – Validation – Release
Answer : Event – Capacity – Availability

70
Technical Management function has two responsibilities
a. Build technical knowledge and deploy resources to support ITSM lifecycle
b. Custodian of technical knowledge and owners of technically competent resource pool
c. Custodian of technical knowledge and deploy resources to support ITSM lifecycle
d. None of the above
Answer : Custodian of technical knowledge and deploy resources to support ITSM lifecycle

71
Discovery tools are used to
a. Discover issues in the service line
b. Populate and verify the CMS data and to assist in license management
c. Discuss CI attributes of all the CI not live in the network
d. Establish and / or confirm the scope of the service landscape
Answer : Populate and verify the CMS data and to assist in license management

72
Critical Success factors of Service Operations are
a. Management Support
b. Business Support
c. Staffing Support
d. All of the above
Answer : All of the above

73
Effectiveness and Efficiency is the driver in every facet of the service operations, which of the following statement is true – 1. A measure of whether the objective has been achieved is called effectiveness, 2. A measure of whether right amount of resources has been used to deliver an output is called efficiency
a. Both 1 and 2 are correct
b. Both 1 and 2 are incorrect
c. Statement 1 is correct
d. Statement 2 is correct
Answer : Both 1 and 2 are correct

74
Failure of a Configuration Item not resulting in disruption of service is also called as an incident
a. True
b. False
Answer : True

75
Knowledge Base and Known Error Database is same
a. True
b. False
Answer : False

76
Which of the statements are wrong:
a. MTBF = Mean time Between Failures
b. MTTR = Mean time to Repair
c. MTTR = Mean time to Restore Service
d. MTBSI = Mean time Between System Incidents
Answer : MTTR = Mean time to Restore Service

77
Writing of an equal amount of an asset’s value each year, usually a fixed percentage of cost, is known as …….
a. Transfer cost
b. Discounted cash flow
c. Net Book Value
d. Depreciating
Answer : Depreciating





78
Utility and Warranty can be explained as Increases performance average and Reduces performance variation
a. True
b. False
Answer : True

79
Utility is explained as
a. It increases gain and it reduces pain
b. It increases gain or it reduces pain
c. It creates a balance between gain and pain
d. None of the above statement is correct explanation
Answer : It increases gain or it reduces pain

80
Four P’s of Service Strategy are
a. Perspective – Positions – Plan and Pattern
b. Product – Price – Position and Perception
c. Product – Plan – Price and Position
d. Perspective – Perception – Position and Price
Answer : Perspective – Positions – Plan and Pattern

81
Financial Management is responsible for
a. Budgeting
b. Accounting
c. Charging
d. All of the above
Answer : All of the above

82
Analyzing Pattern of Business Activity is responsibility of
a. Demand Management
b. Service Level Management
c. Service Portfolio Management
d. Capacity Management
Answer : Demand Management

83
Service Portfolio categorizes the risk in to following categories
a. Grow the business
b. Run the business
c. Transform the business
d. All of the Above
Answer : All of the Above

84
Outcome of existing Service Portfolio analysis leads to
a. Retain and Replace
b. Rationalize and Refactor
c. Renew and Retire
d. All of the Above
Answer : All of the Above

85
Service Portfolio is sum of
a. Service Pipeline and Service Catalogue
b. Service Design and Service Strategy
c. Service Catalogue and Service Design
d. None of the above
Answer : Service Pipeline and Service Catalogue





86
Which of the following statements about the Service Owner is INCORRECT?
a. Carries out the day-to-day monitoring and operation of the service they own
b. Contributes to continual improvement affecting the service they own
c. Is a stakeholder in all of the IT processes which support the service they own
d. Is accountable for a specific service within an organization
Answer : Is accountable for a specific service within an organization

87
Demand Management is about
a. Understanding the Pattern of Business Activity (PBA)
b. Influencing demand
c. Both of them
d. None of the above
Answer : Both of them

88
Continual Service Improvement expect all Service Managers to identify and differentiate between two basic role:
a. Productions Vs Operations
b. Productions Vs Project
c. Operations Vs Project
d. None of the above
Answer : Productions Vs Project

89
Core Objective of Service Improvement should be:
a. Increasing Efficiency
b. Maximizing Effectiveness
c. Optimizing cost of services and underlying ITSM process
d. All the above
Answer : All the above

90
Improvement cannot be achieved without clear and unambiguous accountabilities
a. True
b. False
Answer : True

91
In Continual Service Improvement (CSI), Deming cycle is critical at following points
a. Implementation of CSI
b. Application of CSI to services and service management process
c. Both of the above
d. None of the above
Answer : Both of the above

92
Your measurement framework should address following as, basic reason to monitor and measure
a. Validate, direct, intervene and justify
b. Verify, improve, review and update
c. Review, improve, verify and validate
d. Validate, review, improve and measure
Answer : Validate, direct, intervene and justify

93
ITIL is compliant to following ISO models:
a. ISO20000
b. ISO27000
c. ISO19770
d. None of the above
Answer : None of the above

94
To Support Continual Service Improvement (CSI) activities, organization needs to collect following types of metrics
a. Technology, Process and Service
b. People, Process and Technology
c. People, Process and Partner
d. Service, Technology and People
Answer : Technology, Process and Service

95
Service Reporting is responsibility of
a. Service Reporting Process
b. Service Level Management
c. Both of the above
d. None
Answer : Both of the above





Also Read : The Best Free Android Games in 2019


96
What are various cost involved in Continual Service Improvement (CSI) implementation
a. Labor Cost and expertise cost
b. Tooling cost and training cost
c. Both of the above
d. None of the above

Answer : Both of the above

97
Which of the following do Technology Metrics measure?
a. Components
b. Processes
c. The end to end service
d. Customer Satisfaction
Answer : Components

98
Which of the following do Service Metrics measure?
a. Processes and functions
b. Maturity and cost
c. The end to end service
d. Infrastructure availability
Answer : The end to end service

99
Which of these is the correct set of steps for the Continual Service Improvement Model?
a. Devise a strategy; Design the Solution; Transition into Production; Operate the Solution; Continually Improve
b. Where do we want to be?; How do we get there?; How do we check we arrived?; How do we keep the momentum going?
c. Identify the required business outcomes; Plan how to achieve the outcomes; Implement the plan; Check the plan has been properly implemented; Improve the solution
d. What is the vision?; Where are we now?; Where do we want to be?; How do we get there?; Did we get there?; How do we keep the momentum going?
Answer : What is the vision?; Where are we now?; Where do we want to be?; How do we get there?; Did we get there?; How do we keep the momentum going?

100
An organization has undertaken the first two steps in the 7-Step Improvement Process, and has found a large gap between what it believes it SHOULD measure, and what it IS ABLE TO measure. The organization is in the process of drafting SLAs. What is the BEST way of dealing with this limited measurement capability in the short to medium term?
a. SLAs should include targets based on what should be measured; Monitoring capabilities will then be gradually enhanced to allow the necessary monitoring and reporting to be introduced
b. Work on the SLAs should be suspended until adequate monitoring capabilities are available to support the required targets
c. SLAs should include targets based on what can currently be measured; SLA targets should be gradually enhanced as increased monitoring capability becomes available
d. Operational Level Agreements (OLAs) and UCs should be examined, and targets should be included in the SLA to match those in the OLAs/UCs
Answer : SLAs should include targets based on what should be measured; Monitoring capabilities will then be gradually enhanced to allow the necessary monitoring and reporting to be introduced

101
An important beginning point for highlighting Continual Service Improvement is perform:
a. Baseline
b. Process Audit
c. Process Assessment
d. Statistical Analysis
Answer : Baseline

102
Continual Service Improvement is expected to identify faults or weaknesses in which of the following Lifecycle phases?
a. All phases of the Service Lifecycle
b. All phases of the Lifecycle, except Service Strategy
c. All phases of the Lifecycle, except CSI
d. Service Design, Service Transition and Service Operation only
Answer : All phases of the Service Lifecycle

103
Which of the following is NOT an aim of the Change Management process?
a. To ensure the impact of changes are better understood
b. To ensure standardized methods and procedures are used for efficient and prompt handling of changes
c. To ensure that all changes to Service Assets and Configuration Items (CIs) are recorded in the Configuration Management System (CMS)
d. To deliver and manage IT services at agreed levels to business users
Answer : To deliver and manage IT services at agreed levels to business users

104
Identify the processes covered as part of Service Transition?
a. Change Management, Service Asset and Configuration Management, Release and Deployment Management
b. Change Management, Capacity Management, Event Management, Service Request Management
c. Service Level Management, Service Portfolio Management, Service Asset and Configuration Management
d. Service Asset and Configuration Management, Release and Deployment Management, Request Fulfillment
Answer : Change Management, Service Asset and Configuration Management, Release and Deployment Management

105
Most important activity of Change Management is
a. Change Impact Assessment
b. Deploying Change
c. Managing CI during change process
d. Managing Known error
Answer : Change Impact Assessment

106
What are various types of change
a. Strategic Change
b. Tactical Change
c. Operational Change
d. All of the above
Answer : All of the above

107
MTRS is defined as
a. Mean time to restore service
b. Mean time to resolve service
c. Maximum time to resolve service
d. Maximum time to restore service
Answer : Mean time to restore service

108
Success of Change Management is measured during
a. During post release review after success of release
b. During post implementation review
c. During Change impact assessment
d. Customer Satisfaction Survey
Answer : During post implementation review

109
Ideally Change and Release Management should not be handled by same person
a. As they need to work very closely
b. Release Management is subset of Change Management
c. As there is conflict of interest
d. Both the processes can be handled by same person
Answer : As there is conflict of interest





110
Change Impact Assessment is done based on
a. Technical Impact Assessment
b. Business Impact Assessment
c. Financial impact assessment
d. All of the above
Answer : All of the above

111
Key activities in Service Asset and Configuration Management process is
a. Planning – Identification – Control – Status Accounting – Verification and Audit
b. Plan – Inform – Control –Account – Verify
c. Prepare – Identify – Control – Status Accounting – Validation and Verification
d. Planning – Identification – Control – Status Accounting – Validation and Verification
Answer : Planning – Identification – Control – Status Accounting – Verification and Audit

112
Which statement correctly describes the difference between Asset Management and Configuration Management?
a. Asset Management only deals with what is owned; Configuration Management deals with everything in the infrastructure
b. Asset Management is a superset of Configuration Management because it includes non-IT assets such as chairs and tables
c. Asset Management deals with the financial aspects of Configuration Items (CIs); Configuration Management only deals with the technical details of the infrastructure
d. Configuration Management goes much further than Asset Management because it also specifies the relationships between assets
Answer : Configuration Management goes much further than Asset Management because it also specifies the relationships between assets





113
Which of the following is NOT a part of the Release Process?
a. Moving software from the DML to the Development Environment
b. Moving software from the DML to the Live Environment
c. Moving software from the development to the Test Environment
d. Moving software from the live environment to the DML
Answer : Moving software from the live environment to the DML

114
Items of Information stored in the CMDB relating to a specific CI are known as?
a. Components
b. Features
c. Attributes
d. Characteristics
Answer : Attributes

115
Which process is accountable to manage DML and definitive spares
a. SACM
b. SPM
c. SLM
d. CSI
Answer : SACM

116
DML is foundation for
a. Release Management
b. Configuration Management
c. Change Management
d. Problem Management
Answer : Release Management

117
Which of the following statements is CORRECT?
a. The Configuration Management System is part of the Known Error Data Base
b. The Service Knowledge Management System is part of the Configuration Management System
c. The Configuration Management System is part of the Service Knowledge Management system
d. The Configuration Management System is part of the Configuration Management Database
Answer : The Configuration Management System is part of the Service Knowledge Management system

118
In ITIL service lifecycle configuration levels and baseline points are represented by
a. Numbered Triangles
b. Sequenced square
c. 7 step improvement model
d. DMAIC methodology
Answer : Numbered Triangles

119
To define and control the components of services and infrastructure and maintain accurate configuration information on the historical, planned and current state of the services and infrastructure is objective of
a. SACM
b. SLM
c. CSI
d. Change Management
Answer : SACM

120
Various release and deployment approach can be explained as
a. Big bang vs Phased
b. Push and pull
c. Automated vs manual
d. All of the above
Answer : All of the above

121
Release Window is same as Change Window
a. True
b. False
Answer : True

122
Release planning starts as soon as
a. Change is logged
b. Change is approved
c. Release management receives specific input to start the release planning
d. When all the required CI is available
Answer : Change is approved

123
Back-out plan is built and approved by
a. Release Management
b. Change Management
c. Both of them
d. None of them
Answer : None of them

124
The addition, modification or removal of an authorized, planned or supported service or service component and its associated documentation is a definition of what?
a. A Service Change
b. A Release request
c. A Change Request
d. A Configuration Control
Answer : A Service Change

125
Release Management should update KEDB for all error which is released during deployment
a. True
b. False
Answer : True

126
Service Validation and testing process is responsible for
a. Validation and testing of new or changed services
b. Validation and testing of existing services
c. Validation and testing of all CI
d. Validation and testing of release unit
Answer : Validation and testing of new or changed services

127
Transition management is all about
a. Communication management
b. Stakeholder management
c. Both of the above
d. None of the above
Answer : Both of the above

128
Transition is defined as a change in state, corresponding to a movement of an IT service or other configuration item from lifecycle to another
a. True
b. False
Answer : True

129
It is important for the operation of a given application that the version of the software installed on each of the computers on the network is the same. Which process is responsible for this?
a. Change Management
b. Configuration Management
c. Network Management
d. Release Management
Answer : Release Management

130
Which of the following is a value that is a result of implementing best practices for Service Operation?
a. Meet the goals of the organization’s security policy
b. Improved quality of Service
c. Makes sure that IT Services stay aligned to business requirements
d. Improved control of Service Assets and Configurations
Answer : Meet the goals of the organization’s security policy





131
Which Service Design aspect would benefit the MOST by using a RACI model?
a. Design of Service Transitions
b. Design of measurement methods and metrics
c. Design of Technology and Management Architectures
d. Design of process required
Answer : Design of process required

132
Which statement about Business Relationship Management (BRM) is NOT correct?
a. The purpose of BRM is to identify the customer’s needs including Warranty and Utility
b. One of the purposes of BRM is to negotiate warranty terms with the customer
c. BRM focuses on the Services provided to the customer
d. BRM uses Customer Satisfaction as the primary measure of Successfully delivering the Service or Services
Answer : One of the purposes of BRM is to negotiate warranty terms with the customer

133
Which ITIL process aims to trace business-critical services for which supplementary emergency measures must be taken?
a. Problem Management
b. Availability Management
c. Capacity Management
d. IT Service Continuity Management
Answer : IT Service Continuity Management

134
What is the criterion used by Change Management in determining the category for a Request for Change?
a. Impact
b. Urgency
c. Priority
d. Content
Answer : Impact

135
Which of the following best describes ‘Reliability’?
a. The ability of a CI to remain functional under given conditions
b. The ability of a CI to be retained in, or restored to, an operational state
c. The combination of confidentiality, integrity and maintainability
d. The ability of a service to remain functional even though some components have failed
Answer : The ability of a CI to remain functional under given conditions

136
Which of the following lists best describes the key attributes needed by Service Desk Staff?
a. Logical; Methodical; Tenacious; Forthright; Analytical
b. Well Presented; Technical Specialist; Numerate; Good Interpersonal Skills
c. Business Aware; Articulate; Methodical; Tolerant; Good Interpersonal Skills
d. Good Interpersonal Skills; Tenacious; Technically Astute; Firm
Answer : Business Aware; Articulate; Methodical; Tolerant; Good Interpersonal Skills

137
What is the use of additional technical expertise in the Incident Management process called?
a. Incident Classification
b. Problem Analysis
c. Functional Escalation
d. Resolution and recovery of the incident
Answer : Functional Escalation

138
Consider the following statements: 1. A service level agreement is a written agreement between the service provider and the customers. 2. Negotiation of service levels must involve the customers of the services involved 3. Underpinning contracts must be capable of supporting targets agreed in SLA’s. Which of the above are correct?
a. 1 & 3 only
b. None
c. All
d. 1 & 2 only
Answer : All

139
The name given to the document which outlines the responsibilities between internal functional areas with respect to assisting in the provision of an IT Service to the Customer/s is?
a. Underpinning Contract
b. Service Level Agreement
c. Operational Level Agreement
d. Service Level Requirements
Answer : Operational Level Agreement

140
Which ITIL process manager requires a report specifying the duration of an interruption of a Configuration Item?
a. Availability Manager
b. Incident Manager
c. Problem Manager
d. Service Level Manager
Answer : Availability Manager

141
The Ishikawa Diagram or Cause & Effect Analysis (Fishbone) is a technique employed by which ITIL Discipline?
a. Capacity Management
b. Incident Management
c. Availability Management
d. Problem Management
Answer : Problem Management





142
Typically a Help Desk, Service Desk & Call Centre all provide the same level of service. They are just different names referring to the single point of contact
a. True
b. False
Answer : True

143
Which of the following is the BEST description of remediation?
a. Defines repeatable way of dealing with a particular category of change
b. Supports the assessment, prioritization, authorization and scheduling of changes
c. Involves the actions taken to recover after a failed change or release
d. Specifies a regular, agreed time when changes or releases may be implemented with minimal impact on services
Answer : Involves the actions taken to recover after a failed change or release

144
Which of the following influences the scope of the initial Service Design?
a. Functional Requirements
b. Overall Design Constraints
c. Business Benefits
d. All of the above
Answer : All of the above

145
Which of the following BEST describes an outcome?
a. A means of delivering value to customers by facilitating the results customers want to achieve without the ownership of specific costs and risks
b. Something that is measured and reported to help manage a process, IT Service or activity
c. A measure of what is achieved or delivered by a system, person, team, process or IT Service
d. The result of carrying out an activity, following a process or delivering an IT Service
Answer : The result of carrying out an activity, following a process or delivering an IT Service

146
Which of the following is NOT an objective of Service Portfolio Management (SPM)?
a. Providing a clear service provision model that conveys how service assets are used to supply services
b. To record and trace each of the service’s investment throughout the Service Lifecycle
c. To study the viability of the current services and determine when they need to be retired
d. To control the services offered to its customers
Answer : Providing a clear service provision model that conveys how service assets are used to supply services

147
Which of the following statements about Service Automation is CORRECT?
a. It negatively affects the classification of elements such as Configuration Items (CIs) and incidents
b. It prevents IT service information from being updated in the Service Catalogue.
c. It is used to improve the RACI model
d. It is known to improve the Utility and Warranty of services
Answer : It is known to improve the Utility and Warranty of services

148
Which type of metric is used by Continual Service Improvement (CSI) and tracks the performance of end-to-end services?
a. Improvement Metrics
b. Service Metrics
c. Process Metrics
d. Technology Metrics
Answer : Service Metrics

149
Ensuring that policies and strategy are actually implemented is an example of which of the following?
a. Governance
b. Business case
c. Confidentiality
d. Control perspective
Answer : Governance

150
Which of the following is NOT a value that is a result of implementing best practices for Continual Service Improvement?
a. Improved control of Service Assets and Configurations
b. Steady and ongoing improvements in service quality
c. Recognized opportunities to increase the value of organizational structures and capabilities
d. Ensures that IT services stay aligned to the requirements of the business
Answer : Improved control of Service Assets and Configurations

151
Which of the following terms means an unplanned interruption to an IT Service reduction in the quality of an IT Service
a. Change
b. Incident
c. Impact
d. Problem
Answer : Incident

152
Which of the following is the BEST description of Service Management?
a. A set of specialized organizational capabilities for providing value to customers in the form of services
b. An approach that emphasizes the importance of coordination and control across the various functions, processes and systems necessary to manage the full lifecycle of IT Services
c. The functionality offered by a product or service to meet a particular need
d. An assurance that a product or service will meet the agreed requirements
Answer : A set of specialized organizational capabilities for providing value to customers in the form of services

153
What is the responsibility of Application Management?
a. Manage information about IT infrastructure available on a network and corresponding user access rights
b. Provide IT Services using applications running at the service provider’s premises
c. Administer applications throughout their lifecycle
d. Track and report the value and ownership of assets throughout their lifecycle
Answer : Administer applications throughout their lifecycle

154
Who usually chairs the Change Advisory Board (CAB)?
a. IT Service Continuity Management (ITSM) staff
b. Business Relationship Manager (BRM)
c. Problem Manager
d. Change Manager
Answer : Change Manager





155
Which of the following is used as a reference point for later comparison in the Continual Service Improvement stage of the Service Lifecycle?
a. Asset
b. Baseline
c. Build
d. Configuration Item (CI)
Answer : Baseline

156
Which Service Design aspect considers Key Performance Indicators (KPIs) to help ensure that the efficiency, effectiveness and cost effectiveness of IT Services are all managed?
a. Technology and Management Architectures.
b. Processes required
c. Measurement methods and metrics
d. Service Solutions
Answer : Measurement methods and metrics

157
Which function is responsible for providing technical skills in support of IT Services and Management of the IT infrastructure?
a. Technical Management
b. Service Management
c. Business Service Management
d. Service Level Management
Answer : Technical Management

158
Which of the following is the single point of contact for IT users on a day-by-day basis?
a. Service Desk
b. IT Operations
c. Process Manager
d. Incident Manager
Answer : Service Desk

159
Which of the following items need to be documented in a Pattern of Business Activity (PBA) profile?
a. Marketing plans, Attributes, Requirements and Sales Forecasts
b. Business Plans Classification, Sales Forecasts and Service Asset Requirements
c. Classification, Attributes, Requirements and Service Asset Requirements
d. Marketing Forecasts, Business Plans, Production Plans and new Product Launch Plans
Answer : Classification, Attributes, Requirements and Service Asset Requirements

160
Which of the following determines the effect that a loss of service would have on a business and when (during a given time period) the loss of service is most harmful?
a. Business Capacity Management
b. Business Case
c. Business Perspective
d. Business Impact Analysis
Answer : Business Impact Analysis

161
Which of the following statements about the process owner is CORRECT?
a. Is a part responsible for supplying goods or service that are required to deliver IT Services
b. Is responsible for ensuring that a process is fit for purpose
c. Is responsible for operational management of a process
d. Is a process that is responsible for managing the lifecycle of all Incidents
Answer : Is responsible for ensuring that a process is fit for purpose

162
Which of the following is a responsibility of the process practitioner?
a. Managing the lifecycle of all incidents
b. Creating or updating records to prove that activities have been carried out correctly
c. Supplying goods or services that are required to deliver IT Services
d. Appointing people to the required roles
Answer : Creating or updating records to prove that activities have been carried out correctly

163
Which of the following is responsible for keeping accurate information for the organization’s services in transition to a live environment?
a. Availability Management
b. Asset Management
c. Service Level Management (SLM)
d. Service Catalogue Management
Answer : Service Catalogue Management

164
To what does the term Standard Change refer?
a. A pre-authorized change that is low risk, relatively common and follows a procedure or work instruction
b. A change that has to be applied as soon as possible
c. A change that follows the defined steps of the Change Management process
d. The addition, modification or removal of anything that could have an effect on IT Services
Answer : A pre-authorized change that is low risk, relatively common and follows a procedure or work instruction

165
In the context of service operations managing day to day activities, which of the following statement is true – 1. Functions are logical concept covering people and technology to perform tasks from a defined process on an ongoing basis, 2. Departments are the formal organization formed to perform task from predefined process on an ongoing basis
a. Statement 1 is correct
b. Statement 2 is correct
c. Statements 1 and 2 are correct
d. Statements 1 and 2 are incorrect
Answer : Statements 1 and 2 are correct

166
Building stable service operations with good balance between internal and external focus required a long term planning. The balance referred in statement refers to
a. Stability Vs Responsiveness
b. Internal Vs External
c. Demand Vs Supply
d. Top down Vs bottoms up
Answer : Stability Vs Responsiveness

167
Service Operation tries to create balance between
a. Cost Vs Quality
b. Reactive Vs Proactive
c. Internal Vs External Focus
d. All of the above
Answer : All of the above

168
In an organization, the purchasing department has relocated internally – not just the people, but also their IT resources. A Service Desk employee has been commissioned to relocate this department’s workstations. In which ITIL process is this employee now playing a role?
a. Configuration Management
b. Problem Management
c. Change Management
d. Incident Management
Answer : Change Management

169
Which ITIL process or which ITIL department has responsibilities that include distributing information to users?
a. Change Management
b. Customer Relationship Management
c. Incident Management
d. Service Desk
Answer : Service Desk

170
Which statement best describes the role of the Service Desk?
a. The primary task of the Service Desk is to investigate problems
b. The Service Desk functions as the first contact for the customer
c. The Service Desk ensures that the telephone is always manned
d. The Service Desk ensures that the agreed IT service is available
Answer : The Service Desk functions as the first contact for the customer

171
Which activity in the Problem Management process is responsible for generating Requests for Change (RFCs)?
a. Problem Analysis
b. Error Control
c. Proactive Problem Management
d. Monitoring
Answer : Error Control





172
What does Mean Time To Repair (MTTR) mean?
a. Average downtime of a service
b. Average uptime of a service
c. Average time of the breakdown-free period within a measured period
d. Average time between two consecutive incidents
Answer : Average downtime of a service

173
Where are the statuses of changes recorded?
a. in the Known Error database
b. in the Definitive Software Library (DSL)
c. in the Change database
d. in the Configuration Management Database (CMDB)
Answer : in the Configuration Management Database (CMDB)

174
What is a request to replace something within the IT infrastructure called?
a. Replacement Request
b. Request for Change
c. Service Request
d. Request for Release
Answer : Request for Change

175
Which subject should be one of the standard items on the agenda of a meeting of the Change Advisory Board (CAB)?
a. Reports from Service Level Management
b. Ongoing or concluded Changes
c. The registration of Changes
d. The wishes of customers to implement Changes
Answer : Ongoing or concluded Changes

176
Which ITIL process is responsible for creating the cost agreements for extra support of the Service Desk?
a. Service Level Management
b. Incident Management
c. Availability Management
d. Financial Management for IT Services
Answer : Service Level Management

177
For which of the following activities of Configuration Management are audits regularly implemented?
a. Status monitoring
b. Planning
c. Identification
d. Verification
Answer : Verification

178
Release Management has distributed a defective Release. As a result, monthly invoicing has come to a standstill. This has very radical consequences for the business and has been reported as an incident. According to ITIL best practices, what should happen next?
a. Change Management will start a Post Implementation Review (PIR)
b. Service Level Management will start a Service Improvement Program (SIP)
c. Problem Management will submit a Request for Change (RFC)
d. Release Management will implement the back-out plan
Answer : Release Management will implement the back-out plan

179
According to the Deming quality circle a number of steps must be performed repeatedly in order to ensure good performance. Which of the following answers specifies the correct sequence for these steps?
a. Check – Plan – Act – Do
b. Act – Check – Do – Plan
c. Do – Plan – Check – Act
d. Plan – Do – Check – Act
Answer : Plan – Do – Check – Act

180
The Deming quality circle is a model for control based on quality. Which step in this model must be taken first?
a. Adjustment
b. Implementation
c. Planning
d. Measurement
Answer : Planning


Also Read : Hide conversations on Facebook Messenger and WhatsApp






181
Information is regularly exchanged between Problem Management and Change Management. What information is this?
a. RFCs from the users that Problem Management passes on to Change Management
b. RFCs from the Service Desk that Problem Management passes on to Change Management
c. Known Errors from Problem Management, on the basis of which Change Management can generate Requests for Change (RFCs)
d. RFCs resulting from Known Errors

Answer : RFCs resulting from Known Errors

182
Which status is a problem assigned once its cause has been identified?
a. Incident
b. Known Error
c. Request for Change (RFC)
d. Work-around
Answer : Known Error

183
What is the term used for a situation derived from a series of incidents with the same characteristics?
a. Service Call
b. Problem
c. Change Request
d. Known Error
Answer : Problem

184
What is the first step when registering an incident?
a. Perform matching
b. Assign an incident number
c. Determine the priority
d. Record the incident data
Answer : Assign an incident number

185
Changes are divided into categories. What criterion defines a category for a change?
a. The consequences of the change such as limited, substantial, significant, etc
b. The sequence in which the change is made
c. The speed with which the change is made
d. The Request for Change number that the change is assigned
Answer : The consequences of the change such as limited, substantial, significant, etc

186
Which data, for a new Configuration item (CI), is recorded in the Configuration Management Database (CMDB)?
a. The Request for Change number for the Configuration Item
b. Repairs to the Configuration Item
c. The impact of the Configuration Item
d. The relationship to other Configuration Items
Answer : The relationship to other Configuration Items

187
When is a Known Error identified?
a. When the incident has been sent to Problem Management
b. When the problem is known
c. When the problem has been resolved
d. When the cause of the problem is known
Answer : When the cause of the problem is known

188
User reports a PC problem to the Service Desk. A Service Desk representative determines that the PC is defective and indicates that according to the services catalogue, the PC will be replaced within three hours. Which ITIL process is responsible for having this user’s PC replaced within three hours?
a. Availability Management
b. Change Management
c. Service Level Management
d. Configuration Management
Answer : Change Management

189
Which ITIL process is responsible for analyzing risks and counter measures?
a. Capacity Management
b. Service Desk
c. Problem Management
d. IT Service Continuity Management
Answer : IT Service Continuity Management

190
Which aspects are described in a Service Level Agreement (SLA)?
a. The costs and expected revenue of the services offered
b. The technological developments that can affect the services offered
c. The quality, expressed in quantity and costs, of the services offered
d. The company strategy
Answer : The quality, expressed in quantity and costs, of the services offered

191
In the Service Level Management Process, what happens during the activity called “monitoring”?
a. Guarding agreements with the customer
b. Acquiring customers
c. Identifying the needs of customers
d. Guarding negotiations with the customer
Answer : Guarding agreements with the customer

192
Consider the following statements- 1: An SLA is a contract drawn up by the IT department which states what the customer may and may not do with his computer, 2: A Service Catalogue describes concisely and specifically the IT services that the IT department can offer a customer. Which of these statements is correct?
a. Both
b. Neither
c. Only the first
d. Only the second
Answer : Only the second

193
Consider the following statements- 1: A change in the IT infrastructure is always the result of a change of a Service Level, 2: A Service Level Agreement (SLA) exhibits many similarities to a procedure for drawing up a Request for Change (RFC). Are these statements correct?
a. Both
b. Neither
c. Only the first
d. Only the second
Answer : Neither

194
The performance of the network in a large computer centre is monitored 24 hours a day. This produces data for which processes?
a. Change Management, Financial Management and Service Level Management
b. Financial Management, Service Desk and Problem Management
c. Availability Management, Capacity Management and Change Management
d. Availability Management, Capacity Management and Problem Management
Answer : Availability Management, Capacity Management and Problem Management

195
When can the building, testing and implementation of a change begin?
a. If it is urgent, as soon as the Request for Change has been classified
b. As soon as there is a back-out plan for the change
c. As soon as the impact analysis has been discussed by the members of the Change Advisory Board
d. As soon as the Request for Change has been formally authorized
Answer : As soon as the Request for Change has been formally authorized

196
Which of the concepts below belongs to IT Service Continuity Management?
a. Maintainability
b. Resilience
c. Vulnerability
d. Serviceability
Answer : Vulnerability

197
A major change to an existing service is to be designed and built and the issue of what Configuration Management is responsible for has been raised. For which of the following activities does Configuration Management NOT have a responsibility?
a. Controlling the completeness and correctness of all data about the software modules
b. Naming and recording data about software modules
c. Quality assurance of the software modules
d. Registering and monitoring the status of the software modules
Answer : Quality assurance of the software modules

198
When must a Post Implementation Review take place?
a. In case of emergency changes
b. If another incident of the same type occurs again after a Change has been made
c. After every Change
d. At the request of the person who submitted the Change request
Answer : After every Change





199
Which activity is not the responsibility of IT Service Continuity Management?
a. Executing impact analyses of incidents related to the back-out facilities
b. Testing back-out arrangements
c. Drawing up back-out scenarios
d. Analyzing risks
Answer : Executing impact analyses of incidents related to the back-out facilities

200
When is a back-out plan invoked?
a. When it is found that something went wrong when implementing a Change
b. When it is found that something went wrong when testing a Change
c. When it is found that something went wrong when building a Change
d. When it is found that something went wrong when scheduling resources
Answer : When it is found that something went wrong when implementing a Change

201
The management of ABC Inc. has insisted that each request for a new workstation installation be handled with optimum efficiency and effectiveness. Which ITIL process is designed to achieve this desired outcome?
a. Change Management
b. Customer Liaison
c. Problem Management
d. Service Level Management
Answer : Change Management

202
Which of the examples below is NOT an example of a configuration item?
a. A user manual
b. A company’s organization chart
c. A systems update procedure
d. A unique identification code
Answer : A unique identification code

203
Which ITIL process provides change proposals in order to eliminate structural errors?
a. Availability Management
b. Problem Management
c. Security Management
d. IT Service Continuity Management
Answer : Problem Management

204
Nitin calls the Service Desk and reports that the system is slow. He asks whether he can be given another PC like his colleague’s, which is much faster. Which term is applicable to this situation?
a. Problem
b. Incident
c. Request for Change
d. Classification
Answer : Request for Change

205
The cash registers in a supermarket experience network disruptions daily between 4 p.m. and 6 p.m. Which ITIL process is responsible for solving these difficulties on a structural basis?
a. Availability Management
b. Capacity Management
c. Incident Management
d. Problem Management
Answer : Problem Management

206
Which of the following describes the basic concept of Integrity in the Security Management process?
a. The capacity to verify the correctness of the data
b. The correctness of the data
c. Protection of the data against unauthorized access and use
d. Access to the data at any moment
Answer : Protection of the data against unauthorized access and use

207
What is meant by the ‘Urgency’ of an incident?
a. The degree to which the incident gives rise to a deviation from the normal service level
b. The time needed by IT Services to resolve the incident
c. The relative importance of the incidents when handling them
d. The degree to which the solution of an incident tolerates delay
Answer : The degree to which the solution of an incident tolerates delay

208
What is the key activity of processes defined in Service Strategy
a. How robust business cases will be created to secure strategic investment in service assets and service management capabilities
b. What services are running
c. How to measure and develop SLA’s
d. None of the above
Answer : How robust business cases will be created to secure strategic investment in service assets and service management capabilities

209
Which of the following is a benefit of using ITIL?
a. That the users can influence the IT organization providing the IT services
b. That the quality and the costs of the IT services can be controlled more efficiently
c. That the organization around the IT services can be set up faster
d. That it is finally possible to charge for IT services
Answer : That the quality and the costs of the IT services can be controlled more efficiently

210
An organization plans on implementing a new network operating system. Before the actual implementation takes place, the plan of approach for achieving the implementation is discussed. Under whose leadership is this discussion held?
a. The Service Level Manager
b. The Network Manager
c. The Change Manager
d. The Service Manager
Answer : The Change Manager

211
The activity that aims to identify the potential damage or loss to an organization resulting from disruption to critical business processes is:
a. Business Impact Analysis
b. Component Failure Impact Analysis
c. Root Cause Analysis
d. Service Outage Analysis
Answer : Business Impact Analysis

212
The data in the Configuration Management Database (CMDB) can only be modified after permission is granted to modify the infrastructure. Which process grants such permission?
a. Incident Management
b. Service Level Management
c. Change Management
d. Configuration Management
Answer : Change Management

213
Your Network Department has made an agreement with an external organization in order to fulfill an agreement with its internal customer. Where would the agreement with the external organization be specified?
a. Service Level Requirement (SLR)
b. Underpinning Contract (UC)
c. Operational Level Agreement (OLA)
d. Service Level Agreement (SLA)
Answer : Underpinning Contract (UC)

214
What is the difference between Asset Management and Configuration Management?
a. Asset Management deals with the financial aspects of Configuration Items
b. Configuration Management goes much further than Asset Management, because it also specifies the relations between the assets
c. Asset Management only deals with what you own; Configuration Management deals with everything in your infrastructure
d. Asset Management is a superset of Configuration Management, as it includes non-it assets such as chairs and tables
Answer : Configuration Management goes much further than Asset Management, because it also specifies the relations between the assets

215
The Service Level Manager requires confirmation that the internal Service Desk can answer Customer calls within 10 seconds. In which document might the Service Desk’s agreement to this requirement be recorded?
a. Internal Specification Sheet
b. Operational Level Agreement
c. Service Level Agreement
d. An underpinning third party contract
Answer : Operational Level Agreement

216
The sequence of dealing with problems must be based on…
a. The category to which the problem belongs
b. The impact of the problem
c. The priority of the problem
d. The urgency of the problem
Answer : The priority of the problem

217
Release management staff do not carry out ;
a. The planning of rollouts of hardware and software
b. The distribution of software applications to remote locations
c. The testing of software to eradicate errors
d. The release and implementation of software into the live environment
Answer : The testing of software to eradicate errors

218
Which of the following statements about the Service Catalogue is correct?
a. It is necessary in order to draw up an SLA
b. It describes only those services that are also included in the Service Level Agreement (SLA)
c. It can be used instead of an SLA
d. It describes all services that can be supplied by the IT management organization
Answer : It describes all services that can be supplied by the IT management organization




 

Also Read : 5 Dangerous Signs You Are Addicted To Facebook