IT Questions
IT Questions
D) Service configuration
51. Which process is responsible for sourcing and delivering components of requested standard
services?
A) Request fulfilment
B) Service portfolio management
C) Service desk
D) IT finance
52. Which one of the following is the purpose of service level management?
A) To carry out the service operations activities needed to support current IT services
B) To ensure that sufficient capacity is provided to deliver the agreed performance of services
C) To create and populate a service catalogue
D) To ensure that an agreed level of IT service is provided for all current IT services
53. When should a known error be raised?
A) Only when the root cause is found and a workaround exists
B) As soon as it becomes useful to do so
C) Only when the error in the IT Service is found
D) As soon as the major problem procedure is executed
54. Which one of the following is the BEST definition of reliability?
A) The availability of a service or component
B) The level of risk that affects a service or process
C) How long a service or configuration item (CI) can perform its function without failing
D) How quickly a service or component can be restored to normal working order
55. Which statements about best practice is MOST correct?
A) Customers are a source of best practice and will advise service providers how it should be
implemented
B) Internal experience is the only source of best practice because it is developed within the service
provider
C) ITIL is a source of best practice and is validated across a wide set of environments and
situations
D) Suppliers are a source of best practice and they will improve the services delivered by a service
Provider
56. Which term describes if a service is fit for use?
A) Serviceability
B) Utility
C) Warranty
D) Availability
57. Which one of the following is NOT an objective of problem management?
A) Minimizing the impact of incidents that cannot be prevented
B) Preventing problems and resulting incidents from happening
C) Eliminating recurring incidents
D) Restoring normal service operation as quickly as possible
58. Can service operation improve efficiency in the business operation by automating common routines?
A) No, automating common routines improves effectiveness but not efficiency
B) Yes, through automating common routines and introducing the service knowledge management
System (SKMS)
C) Yes, through automating common routines, more productive work can be carried out
D) No, automating common routines only results in preventing common problems
59. Which process analyses services that are no longer viable and when they should be retired?
A) Change management
B) Service portfolio management
C) Service level management
D) Business relationship management
60. Which one of the following generates demand for services?
A) Infrastructure trends
B) Patterns of business activity (PBA)
C) Cost of providing support
D) Service level agreements (SLA)
61. Which process is responsible to provide and maintain accurate information on all services that are
being transitioned or have been transitioned to the live environment?
A) Service portfolio management
B) Service level management
C) Service catalogue management
D) Service capacity management
62. Which one of the following do major incidents require?
A) Separate procedures
B) Less urgency
C) Longer timescales
D) Less documentation
63. Which one of the following is it the responsibility of supplier management to negotiate and agree?
A) Service level agreements (SLAs)
B) Third-party contracts
C) Third-party services
D) Operational level agreements (OLAs)
64. Which process has the objective to identify changes to the customer environment that could
potentially impact the type, level or utilization of services provided?
A) Business relationship management
B) Service level management
C) Availability management
D) Change management
65. In which core ITIL publication can you find detailed descriptions of service catalogue management,
information security management, and supplier management?
A) Service strategy
B) Service design
C) Service transition
D) Service operation
66. Which of the following are CORRECT Service Design Aspects?
1. Service Solutions for new or changed services
2. Management policies and guidelines
3. Business requirements technology and management architectures
4. Process requirements technology and management architectures
A) 1 and 2
B) 2 and 3
C) 3 and 4
D) 1 and 4
67. What is the BEST description of a change proposal?
D) Measurable targets
76. What BEST describes the value of service transition to the business?
A) It supports the creation of a catalogue of services
B) It leads to gradual and continual improvement in service quality
C) It provides quick and effective access to standard services
D) It results in higher volumes of successful change
77. What should be documented as part of every process?
A) The process owner, process policy and set of process activities
B) The service owner, service level agreement and set of process procedures
C) The policy owner, operational level agreement and set of process steps
D) The service manager, service contract and set of work instructions
78. The 'multi-level SLA' is a three-layer structure.
Which one of the following layers is NOT part of this type of SLA?
A) Customer level
B) Service level
C) Corporate level
D) Configuration level
79. What is the primary focus of business capacity management?
A) Management, control and prediction of the performance, utilization and capacity of individual
elements of IT technology
B) Review of all capacity supplier agreements and underpinning contracts with supplier management
C) Management, control and prediction of the end-to-end performance and capacity of the live,
operational IT services
D) Future business requirements for IT services are quantified, designed, planned and implemented in a
timely fashion
80. Why is ITIL successful?
A) It always guarantees cost savings
B) Its practices are applicable to any IT organisation
C) It makes technology architecture easy to design
D) It can be fully implemented in 30 days
81. Which processes ensure the targets in the underpinning contracts are appropriate?
A) Design coordination and service level management
B) Supplier management and service level management
C) Service level management and availability management
D) Configuration management and service portfolio management
82. An incident is proving difficult to resolve. A technician informs their manager that more resource is
needed to restore the service.
What has taken place?
A) A functional escalation
B) A service level escalation
C) An incident resolution
D) A hierarchic escalation
83. How are groups, teams, departments and divisions classified?
A) Processes
B) Functions
C) Roles
D) Technicians
84. What is the type of notification that should be sent when a threshold has been reached, something
has changed or a failure has occurred?
A) An emergency change
B) An alert
C) An emergency event
D) A request for change
85. Which of the following BEST describes a service level agreement (SLA)?
A) A written agreement between a supplier and the IT customer(s), defining the key service targets and
responsibilities of both parties
B) A partnership developed between the IT service provider and the customer, so that a mutually
beneficial agreement is reached
C) The key service targets and responsibilities of both parties that are used to hold each party
accountable when disputes arise
D) An agreement between an IT service provider and another part of the same organization that assists
with the provision of services
86. What is the CORRECT definition of service management?
A) A set of specialised assets for transitioning services into the live operational environment
B) A set of specialised organisational capabilities for delivering value to customers in the form of
services
C) A group of events that meet the demand from customers for services that they receive
D) A group of people that manages services to fulfil the needs of users and customers
87. What should the IT service continuity process primarily support?
A) Critical IT processes
B) All the services in the service portfolio
C) Business continuity strategy
D) Mission critical services at peak business periods
88. Which function is responsible for the closure of an incident record?
A) Event management
B) The service desk
C) Either the service desk or an appropriate third party engineer
D) Any appropriate function
89. Where should all master copies of controlled software and documentation be stored?
A) In the definitive software library
B) In the definitive media library
C) In the definitive security library
D) In the definitive production library
90. How should entries in the CSI register be categorized?
A) Based on priority, urgency and impact to the business and to all its stakeholders
B) Based on small, medium or, large undertakings that can be done quickly, medium term or long term
C) Based on IT service name, cost to the business and expected outcomes to the customer
D) Based on best improvement opportunities in the organization to achieve a competitive advantage
91. Which process is responsible for managing all service requests from users?
A) Change fulfilment
B) Incident management
C) Request fulfilment
D) Event management
92. What is the BEST description of an external customer?
A) Someone who works in the same organization but in a different business unit to the service provider
Incident workarounds
Creating a problem record
Incident response times
The status of faulty Cis
A normal change
A retrospective change
A standard change
An ordinary change
103. Which formal agreement minimizes the risk of disputes that can occur between
an IT service provider and an external supplier?
A)
B)
C)
D)
Operational contract
Underpinning contract
Serviceability contract
Service level contract
104. Which process monitors and improves the performance of the service
transition stage of the service lifecycle?
A)
B)
C)
D)
B) All stakeholders
C) External IT teams
D) Internal IT teams
107. Which one of the following is a correct definition of a supplier category?
A) Strategic for suppliers of operational products or services
B) Tactical for relationship involving significant commercial activity and
business interaction
C) Operational for suppliers providing low value and/or readily available
products and services
D) Commodity for significant partnering relationship that involve senior
managers
108. ITSM concepts are often described in the context of only one of these type.
Type I, type II and type III
A)
B)
C)
D)
Service Units
Business Units
Service Providers
Customers
109. Access management is responsible for implementing policies defined in which process?
A) Service portfolio management
B) Information security management
C) Change management
D) Problem management
110. What BEST describes the value of service design to the business?
A) It supports the creation of a portfolio of quantified services
B) It reduces total cost of ownership (TCO) of services
C) It improves the control of service assets and configurations
D) It provides quick and effective access to standard services
111. Third parties responsible for supplying goods or services that are required to deliver IT services is a
description of which stakeholder?
A) External Customers
B) Suppliers
C) Operations
D) External Consultants
112. What service could include a differentiation as an excitement factor?
A) A core service
B) An enabling service
C) A packaged service
D) An enhancing service