1.
The network managers have excessive workloads and have no time to proactively manage the network. One of the contributing factors to these large workloads is the frequency that users contact these managers directly.
Which ITIL process would improve this situation?
Correct Answer
C. Incident Management
Explanation
Incident Management would improve this situation. Incident Management focuses on restoring normal service operations as quickly as possible after an incident occurs. By implementing effective Incident Management processes, network managers can efficiently handle user inquiries and issues, reducing the frequency of direct user contacts. This would help alleviate their excessive workloads and allow them to proactively manage the network.
2.
A new networked computer is installed to replace an existing PC. The old PC is installed as a print Server for local area network.Which process is responsible for registering this modification in the Configuration Management Database (CMDB)?
Correct Answer
B. Configuration Management
Explanation
Configuration Management is responsible for registering the modification of replacing the existing PC with a new networked computer in the Configuration Management Database (CMDB). Configuration Management is the process of identifying and documenting the configuration items (CIs) in an IT system, tracking changes made to them, and ensuring that accurate and up-to-date information is available in the CMDB. This helps in maintaining the integrity and consistency of the IT infrastructure and allows for effective management of changes and incidents.
3.
Which task is a Problem Manangement responsiblity?
Correct Answer
C. To approve all modifications made to the Known Error database
Explanation
The task of approving all modifications made to the Known Error database is a responsibility of Problem Management. Problem Management is responsible for identifying and solving the root causes of incidents and known errors. By approving modifications to the Known Error database, Problem Management ensures that the database is updated with accurate and relevant information, which helps in resolving incidents more efficiently and preventing future occurrences of known errors.
4.
Because of its increased dependency on information systems, a national realty firm decides that there must be assurance for the provision of IT services during any system interruptions. Which process should be implemented to provide this assurance?
Correct Answer
B. IT Service Continuity Management
Explanation
The process that should be implemented to provide assurance for the provision of IT services during any system interruptions is IT Service Continuity Management. This process focuses on ensuring that IT services can be recovered and restored quickly and effectively in the event of a disruption or disaster. It involves developing and maintaining plans, procedures, and arrangements to ensure the continuity of critical IT services. By implementing IT Service Continuity Management, the national realty firm can minimize the impact of system interruptions on their business operations and ensure the availability of IT services to support their operations.
5.
Which concept is not part of Financial Management for IT Services?
Correct Answer
C. Procuring
Explanation
Financial Management for IT Services involves various activities such as budgeting, charging, and pricing to ensure effective financial planning and control. However, procuring is not directly related to financial management. Procuring refers to the process of obtaining goods or services from external vendors, which falls under the domain of procurement management rather than financial management. While financial management may involve budgeting for procurement activities, the concept of procuring itself is not a part of financial management for IT services.
6.
Performance Management and resources management are parts of which process?
Correct Answer
B. Capacity management
Explanation
Performance management and resource management are both integral parts of capacity management. Capacity management is the process of ensuring that an organization has the right resources, at the right time, in the right quantity, to meet the demands of its business. It involves monitoring and managing performance to optimize resource utilization and ensure that capacity meets current and future business needs. Therefore, capacity management is the correct answer as it encompasses both performance management and resource management within its scope.
7.
What is the role of ITIL within IT Service Management?
Correct Answer
A. To provide an approach based on the best examples taken from practice
Explanation
ITIL, or the Information Technology Infrastructure Library, plays the role of providing an approach based on the best examples taken from practice within IT Service Management. It offers a set of best practices and guidelines that organizations can adopt to improve their IT service provision. By following the approach provided by ITIL, organizations can benefit from the knowledge and experience of industry experts and avoid reinventing the wheel. This approach helps organizations in effectively managing their IT services and delivering value to their customers.
8.
The Service Desk has handled 2317 calls this month.What would this include?
Correct Answer
C. Requests to IT organization for user support
Explanation
This answer suggests that the 2317 calls handled by the Service Desk this month would include requests made by users to the IT organization for user support.
9.
Which concept is part of IT Service Continuity Management?
Correct Answer
B. Vulnerability
Explanation
Vulnerability is a concept that is part of IT Service Continuity Management. IT Service Continuity Management involves identifying and managing risks to ensure that IT services can be restored and maintained in the event of a disruption. Vulnerability refers to weaknesses or flaws in a system that can be exploited by threats, potentially leading to a disruption. By understanding and addressing vulnerabilities, IT Service Continuity Management can enhance the resilience and availability of IT services.
10.
Data provided for financial administration of XYZ must only be accessible to authorized users. Security Management takes steps to ensure this. By taking these steps, which aspect of data can be ensured?
Correct Answer
D. Confidentiality
Explanation
By implementing security measures to ensure that only authorized users have access to the financial data of XYZ, the aspect of data that can be ensured is confidentiality. This means that the data will remain private and protected from unauthorized access or disclosure.
11.
A computer operator notices the full storage capacity of her/his disk will soon be used.To which ITIL process must this situation be reported.
Correct Answer
D. Incident Management
Explanation
When a computer operator notices that the full storage capacity of their disk will soon be used, they should report this situation to the Incident Management process. Incident Management is responsible for handling and resolving any incidents or issues that occur in the IT infrastructure. In this case, the full storage capacity of the disk is an incident that needs to be addressed to prevent any potential disruptions or problems.
12.
The data in the Configuration Management Database (CMDB) can only be modified after permission is granted to modify the infrastructure. Which process grants such permission?
Correct Answer
A. Change Management
Explanation
Change Management is the process that grants permission to modify the data in the Configuration Management Database (CMDB). Change Management ensures that all changes to the infrastructure are properly assessed, planned, and approved before implementation. This process helps to minimize the risks associated with modifications and ensures that any changes made to the CMDB are controlled and documented.
13.
Which activity is a Release Management responsibility?
Correct Answer
B. To store the original versions of all authorized software within the organization.
Explanation
The activity of storing the original versions of all authorized software within the organization falls under the responsibility of Release Management. This is because Release Management is responsible for managing the release and deployment of software, ensuring that the correct versions are stored and available for use within the organization.
14.
For which purposes does Service Level Management use data from Service Desk's incident registration?
Correct Answer
D. To analyze, together with other data, to determine if the agreed service level is being provided.
Explanation
Service Level Management uses data from Service Desk's incident registration to analyze, along with other data, whether the agreed service level is being provided. This means that the data is used to assess the performance and quality of the IT service, and to identify any areas where improvements may be needed. By analyzing the incident data, Service Level Management can track trends, identify recurring issues, and make informed decisions on how to optimize the service and meet the agreed service level targets.
15.
Which of the following best describes a Problem?
Correct Answer
C. The unknown cause of of one or more incidents
Explanation
The correct answer describes a problem as the unknown cause of one or more incidents. A problem refers to an underlying issue that is causing incidents to occur, but the cause is not yet known. It is important to identify and resolve problems in order to prevent future incidents from happening.
16.
A User calls the service desk with the complaint that an error continually occurs when using a specific application. This causes the connection with the network to be broken. Which Itil process is responsible for tracing the cause?
Correct Answer
C. Problem Management
Explanation
Problem Management is responsible for tracing the cause of errors or incidents that occur within an IT service. It focuses on identifying and resolving the underlying causes of incidents to prevent them from recurring. In this scenario, the user is experiencing a continuous error while using a specific application, which is causing the network connection to be broken. Problem Management would be responsible for investigating and resolving this issue to ensure the application functions correctly and the network connection remains stable.
17.
A steel company is merging with a competitor. The IT departments, along with the IT infrastructure of both companies will be combined.Which process is responsible for determining the required disk and memory space required for applications running in the combined IT infrastructure?
Correct Answer
B. Capacity Management
Explanation
Capacity management is responsible for determining the required disk and memory space required for applications running in the combined IT infrastructure. This process involves monitoring and analyzing the current and future resource utilization, identifying potential bottlenecks, and making sure that the necessary capacity is available to meet the demands of the applications. With the merger of the two companies and their IT departments, capacity management becomes crucial to ensure that the combined infrastructure can handle the increased workload and effectively allocate resources to support the applications.
18.
Service Level Requirements are used in the Services Level Management process.What do these Service level Requirements represent?
Correct Answer
A. The customer's expectations and needs regarding the service
Explanation
Service Level Requirements represent the customer's expectations and needs regarding the service. These requirements outline what the customer expects from the service provider in terms of performance, availability, reliability, and other key metrics. By defining these requirements, the service provider can ensure that they are meeting the customer's expectations and delivering a satisfactory level of service. The Service Level Requirements serve as a foundation for the Service Level Agreement (SLA) between the customer and the service provider, outlining the agreed-upon service levels and targets.
19.
Which of the following is one of the responsibilities of Availability Management?
Correct Answer
D. To plan and manage the reliability and availability of IT Service
Explanation
Availability Management is responsible for planning and managing the reliability and availability of IT services. This involves ensuring that the IT services are consistently available to meet the agreed-upon service levels and that any disruptions or incidents are minimized. This responsibility includes activities such as monitoring the availability of IT services, identifying potential risks and vulnerabilities, implementing measures to prevent or mitigate these risks, and continuously improving the availability of IT services. It does not involve entering into contracts with suppliers or verifying the reliability of configuration items purchased from third parties, as those fall under other areas of IT Service Management.
20.
A serious incident has occurred. the assigned solution team is unable to resolve this incident within the agreed time. The Incident Manager is called in.Which form of escalation describes the above sequence of events?
Correct Answer
C. Hierarchical escalation
Explanation
Hierarchical escalation describes the above sequence of events. In this scenario, when the assigned solution team is unable to resolve the incident within the agreed time, the Incident Manager is called in. This indicates that the escalation is happening within the hierarchical structure of the organization, where the Incident Manager holds a higher position and authority compared to the solution team. The hierarchical escalation allows for a higher-level manager or authority to intervene and resolve the incident.
21.
Your network Department has made an agreement with an external organization in order to fulfill an agreement with its internal customer. Where would the agreement with the external organization be specified?
Correct Answer
D. Underpinning Contract (UC)
Explanation
The agreement with the external organization would be specified in the Underpinning Contract (UC). This contract is a formal agreement between the service provider and a third-party supplier. It outlines the terms and conditions under which the supplier will provide goods or services to support the delivery of the agreed-upon services. In this case, the external organization is providing support to fulfill the agreement with the internal customer, so the terms of their partnership would be detailed in the Underpinning Contract.
22.
An Organization has set up an Incident Management Process. In doing so, several groups were created to resolve specific incidents . These groups include:-PC Solutions Team-Network Solution Team-Service Desk-Specialist group to support the other teamsWithin an IT organization, support groups are generally categorized by levels. Select the answer that correctly categorizes the support group.
Correct Answer
C. First-line Service Desk
Second-line both Solutions Team
third-line Specialist
Explanation
The support group in this organization is categorized as follows:
- First-line: Service Desk
- Second-line: both Solution Teams
- Third-line: Specialist
The Service Desk is responsible for handling initial incidents and providing basic support. The Solution Teams, which include the PC Solutions Team and the Network Solution Team, are responsible for resolving more complex incidents. The Specialist group provides support to the other teams, indicating that they are at a higher level and handle specialized incidents.
23.
Which task is the responsibility of Configuration Management ?
Correct Answer
D. Recording the relations between Configuration Items (CI)
Explanation
Configuration Management is responsible for recording the relations between Configuration Items (CI). This involves maintaining a comprehensive record of all the components and their relationships within a system or project. This helps in tracking changes, dependencies, and versions of the CIs throughout their lifecycle. By recording these relations, Configuration Management ensures proper documentation and control over the configuration items, which is crucial for effective change management and maintaining system integrity.
24.
How does Availability Management work with Security Management?
Correct Answer
D. By implementing the measures specified by Security Management for securing the data
Explanation
Availability Management and Security Management work together by implementing the measures specified by Security Management for securing the data. This means that Availability Management ensures that the necessary measures are in place to maintain the availability of the data, while Security Management specifies the security measures that need to be implemented to protect the data. By implementing these measures, both availability and security of the data are ensured.
25.
What is the primary task of Error Control?
Correct Answer
B. To resolve Known Errors through the Change Management process
Explanation
The primary task of Error Control is to resolve Known Errors through the Change Management process. This involves identifying and addressing known errors in order to prevent them from causing further issues or disruptions. By following the Change Management process, errors can be effectively resolved and necessary changes can be implemented to prevent their recurrence.
26.
Which of the following is the role of the Definitive Software Library (DSL) in the Release Management process?
Correct Answer
A. A (pHysical) storage area for the original versions of all authorized software in use
Explanation
The role of the Definitive Software Library (DSL) in the Release Management process is to serve as a physical storage area for the original versions of all authorized software in use. This means that the DSL is responsible for keeping track of and storing the official versions of software that have been approved for use within the organization. It ensures that there is a central repository where these authorized software versions can be accessed and retrieved when needed during the release process.
27.
The management of ABC Inc. has insisted that each request for a new work station installation be handled with optimum efficiency and effectiveness.Which ITIL process is designed to achieve this desired outcome?
Correct Answer
A. Change Management
Explanation
Change Management is the ITIL process designed to achieve the desired outcome of handling each request for a new work station installation with optimum efficiency and effectiveness. Change Management ensures that all changes to the IT infrastructure are planned, approved, and implemented in a controlled manner, minimizing the impact on the organization's services and operations. By following a structured change management process, ABC Inc. can ensure that new work station installations are carried out smoothly, without causing disruptions or negative effects on the overall IT environment.
28.
Which of the following is a Configuration Baseline?
Correct Answer
D. A recorded snapshot of a product or service, to provide a basis for a configuration audit and regression
Explanation
A configuration baseline refers to a recorded snapshot of a product or service, which serves as a reference point for conducting a configuration audit and regression. This baseline allows for comparison and analysis of any changes or deviations that may occur during the configuration management process. It provides a foundation for ensuring that the product or service remains consistent and meets the desired standards throughout its lifecycle.
29.
Which question is being answered when an organization specifies its vision and business objectives.
Correct Answer
C. Where do we want to be?
Explanation
When an organization specifies its vision and business objectives, it is answering the question "Where do we want to be?" This question focuses on the desired future state or destination that the organization aims to achieve. By clearly defining their vision and business objectives, the organization sets a direction and establishes the goals they want to accomplish. This helps guide decision-making, strategy development, and resource allocation within the organization to ensure alignment and progress towards the desired future state.
30.
How does Problem Management support the Service Desk activities?
Correct Answer
D. It makes information on a know error available to the Services desk
Explanation
Problem Management supports the Service Desk activities by making information on a known error available to the Service Desk. This helps the Service Desk to quickly identify and resolve similar incidents in the future, reducing the impact on users and minimizing downtime. By providing the Service Desk with knowledge about known errors, Problem Management enables them to effectively communicate the resolution to the user, improving customer satisfaction. Additionally, studying all incidents resolved by the Service Desk is a function of Incident Management, not Problem Management.
31.
Which of the following is a confirguation item (CI)
Correct Answer
B. Documentation
Explanation
Documentation is considered a configuration item (CI) because it is an essential component of the configuration management process. Documentation, such as user manuals, design specifications, and system requirements, provides a record of the configuration items and their relationships within a system. It helps in identifying and managing changes, tracking the history of the system, and ensuring that the system can be reproduced or restored if needed. Therefore, documentation is a crucial CI that contributes to the overall configuration management and control of a system.
32.
What is the primary task of error control?
Correct Answer
B. To resolve Known Errors through the Change Management process
Explanation
The primary task of error control is to resolve Known Errors through the Change Management process. This means that error control is responsible for identifying and addressing any known errors that occur within a system or process. By utilizing the Change Management process, error control can implement changes and fixes to resolve these errors and prevent them from reoccurring in the future.
33.
Which ITIL process is associated with Post Implementation Review
Correct Answer
C. Problem Management
Explanation
Post Implementation Review (PIR) is a process that evaluates the success of a project or change after it has been implemented. It involves analyzing the outcomes, identifying any issues or problems that occurred, and determining how to prevent them in the future. Problem Management, as an ITIL process, focuses on identifying and resolving the root causes of incidents and problems. Therefore, it is associated with conducting a PIR to identify any problems that may have arisen during the implementation of a project or change.
34.
When processing a Request for Change (RFC), the Change Manager initiates a number of activities.Which action is required if this involves a complex change?
Correct Answer
C. The Change Manager presents the change to the Change Advisory Board
Explanation
When processing a Request for Change (RFC) that involves a complex change, the Change Manager presents the change to the Change Advisory Board. The Change Advisory Board is a group of stakeholders who are responsible for assessing and approving changes in the organization. This is necessary for complex changes because they often have a higher impact and require input and approval from various departments or teams. The Change Advisory Board evaluates the change, considers its potential impact, and makes a decision on whether to approve or reject it.
35.
What is the difference between Asset Management and Configuration Management?
Correct Answer
D. Configuration Management goes much further than Asset Management, because it also specifies the relations between assets.
Explanation
The correct answer explains that Configuration Management goes beyond Asset Management by specifying the relationships between assets. While Asset Management focuses on what you own and deals with the financial aspects of configuration items, Configuration Management encompasses everything in your infrastructure and includes the technical details as well as the relationships between assets. Therefore, the correct answer accurately describes the difference between Asset Management and Configuration Management.
36.
Which ITIL process uses Mean Time Between Failures (MTBF)
Correct Answer
A. Availability management
Explanation
Availability management is the ITIL process that uses Mean Time Between Failures (MTBF). MTBF is a measure of the average time between failures of a system or component. Availability management focuses on ensuring that IT services are available to users as agreed upon in the service level agreements. By using MTBF, availability management can analyze the reliability of systems and components and identify areas for improvement to minimize downtime and maximize availability.
37.
Which Concept is part of the Change Management?
Correct Answer
A. Post implementation review
Explanation
A post-implementation review is a concept that is part of change management. After a change or project has been implemented, a post-implementation review is conducted to evaluate its success and effectiveness. It involves assessing the outcomes, identifying any issues or challenges faced during the implementation, and determining if the desired objectives were achieved. This review helps in identifying lessons learned, making improvements, and ensuring that future changes are better planned and executed.
38.
How does IT Service Management contribute to quality of IT service provision?
Correct Answer
D. By planning, implementing and managing a coherent set of processes for providing IT services
Explanation
IT Service Management contributes to the quality of IT service provision by planning, implementing, and managing a coherent set of processes for providing IT services. This ensures that there is a systematic approach in place to deliver high-quality services to internal and external customers. By following well-defined processes, IT organizations can effectively manage resources, identify and resolve issues, and continuously improve service delivery. This approach helps in enhancing the overall quality of IT services and meeting the expectations of customers.