Documente Academic
Documente Profesional
Documente Cultură
1. Which of the following is NOT a step in the Continual Service Improvement (CSI) model?
a) What is the vision?
b) Did we get there?
c) Is there budget?
d) Where are we now?
5. Which of the following statements is CORRECT about patterns of demand generated by the
customer’s business?
a) They are driven by patterns of business activity
b) It is impossible to predict how they behave
c) It is impossible to influence demand patterns
d) They are driven by the delivery schedule generated by capacity management
9. Which of the following are the three main types of metrics, as defined in Continual Service
Improvement (CSI)?
1) Process Metrics
2) Supplier Metrics
3) Service Metrics
4) Technology Metrics
5) Business Metrics
a) 1, 2 and 3
b) 2, 4 and 5
c) 1, 3 and 4
d) 1, 2 and 4
12. Which are the missing Service Operation processes from the following?
1) Incident Management
2) Problem Management
3) Access Management
4) ?
a) Event management and Request Fulfillment
b) Event Management and Service Desk
c) Facilities Management and Event Management
d) Change Management and Service Level Management
13. Which of the following identifies two Service Portfolio components within the Service Lifecycle?
a) Requirements Portfolio and Service Catalogue
b) Service Knowledge Management System and Service Catalogue
c) Service Knowledge Management System and Requirements Portfolio
d) Requirements Portfolio and Configuration Management System
14. Which of the following areas would technology help to support during the Service Design phase
of the Lifecycle?
1) Hardware and Software design
2) Environmental design
3) Process design
4) Data design
a) 1, 3 and 4 only
b) 1, 2 and 3 only
c) All of the above
d) 2, 3 and 4 only
15. Business drivers and requirements for a new service should be considered during?
a) Review of the router operating system patches
b) Review of the current capabilities of IT service delivery
c) The Post Implementation Review (PIR) of a change
d) Decommissioning legacy servers
20. Which of the following activities is Service Level Management responsible for?
a) Design the configuration management system from a business perspective
b) Create technology metrics to align with customer needs
c) Create a customer facing service catalogue
d) Train service desk on how to deal with customer complaints about service
21. When analyzing an outcome for creation of value for customers, what attributes of the service
should be considered?
a) Objectives, Metric, Desired outcome
b) Business Objectives, IT objectives, Process metrics
c) Desired outcome, Supplier metrics, IT objectives
d) People, Products, Technology
22. Setting policies and objectives is the primary concern of which of the following elements of the
Service Lifecycle?
a) Service Strategy
b) Service Strategy and Continual Service Improvement
c) Service Strategy, Service Transition and Service Operation
d) Service Strategy, Service Design, Service Transition, Service Operation and Continual Service
Improvement
23. Which of the following BEST describes the purpose of Event Management?
a) The ability to detect events, make sense of them and determine the appropriate control
action
b) The ability to implement monitoring tools
c) The ability to monitor and control the activities of technical staff
d) The ability to report on the successful delivery of services by checking the uptime of
infrastructure devices
26. If an organization is able to become more proactive in its ITSM processes, what is likely to
happen to support costs?
a) They are likely to increase gradually
b) They are likely to increase dramatically
c) They are likely to gradually reduce
d) They are likely to reduce initially and then gradually return to current level
28. Which of the following BEST describes a Local Service Desk structure?
a) A Service Desk that also provides onsite technical support to its users
b) A Service Desk where analysts only speak one language
c) A Service Desk that is situated in the same location as the users it serves
d) A Service Desk that could be in any physical location but uses telecommunications and IT
systems to make it appear that they are in the same location
29. What is the role of the Emergency Change Advisory Board (ECAB)?
a) To assist the Change Manager in ensuring that no urgent changes are made during
particularly volatile business periods
b) To assist the Change Manager in implementing emergency changes
c) To assist the Change Manager in evaluating emergency changes and to decide whether the
change should be approved
d) To assist the Change Manager in speeding up the emergency change process so that no
unacceptable delays occur.
39. What is the CORRECT order of the first four activities in the 7 Step Improvement Process?
a) Define what you should measure, define what you can measure, gather data and process
data
b) Gather data, process data, analyze data and present data
c) What is the vision, where are we now, what do we want to be, how do we get there?
d) Gather data, process data, define what you should measure and define what you can
measure
40. Which of the following statements is CORRECT for all processes?
a) They define activities, roles, responsibilities, functions and metrics
b) They create value for stakeholders
c) They are carried out by a Service Provider in support of a Customer
d) They are units of organizations responsible for specific outcomes
Exercise 2:
1. The ITIL V3 core is best described as?
a) An Operations Lifecycle
b) An IT Management Lifecycle
c) A Service Lifecycle
d) An Infrastructure Lifecycle
3. Which of the following Roles is responsible for identifying opportunities for improvement?
1) Service Owner
2) Continual Service Improvement (CSI) Manager
3) Process Owner
a) 1 and 2 only
b) 1 and 3 only
c) All of the above
d) 2 and 3 only
4. Learning and improvement is the primary concern of which of the following elements of the
Service Lifecycle?
a) Service Strategy, Service Design, Service Transition, Service Operation and Continual Service
Improvement
b) Service Strategy, Service Transition and Service Operation
c) Service Operation and Continual Service Improvement
d) Continual Service Improvement
5. Which of the following is the most appropriate approach to carrying out Service Operations?
a) The internal IT view is most important as Service Operations has to monitor and manage the
infrastructure
b) Service Operations should maintain a balance between an internal IT view and an external
business view
c) The external business view is most important as Service Operations is the place where value
is realized and the customer obtains the benefit of the services
d) IT Operations does not take an internal or external view as they execute processes defined
by Service Design
6. Which of the following statements about the Service Desk are CORRECT?
1) The Service Desk is a function that provides a means of communication between IT and its
users for all operational issues
2) The Service Desk is always the owner of the Incident Management process
a) 2 only
b) 1 only
c) All of the above
d) None of the above
8. In which core publication can you find detailed descriptions of the following?
1) Service Portfolio Management
2) Demand Management
3) Financial Management
a) Service Operations
b) Service Strategy
c) Service Transition
d) Continual Service Improvement
9. Which of the following statements BEST describes the role of Communication during Service
Operation?
a) Communication is defined as part of all processes and is executed in Service Operation
b) Communication is a separate process that needs to be defined and executed with Service
Operation
c) Good communication is essential for successful Service Operation, just as it is for any other
phase of the Lifecycle
d) Communication is more important in Service Operation than in any other stage of the
Service Lifecycle
12. Which of the following is NOT an advantage of organizing Continual Service Improvement (CSI)
using the RACI model?
a) Facilitates clear communication and workflow practice across all parties involved in the CSI
program
b) Clarifies the roles and responsibilities of individual in the CSI program which could otherwise
be overlapping and confusing
c) Identifies where internal Service Level Agreements (SLAs) can be established to implement
CSI
d) Provides a clear focus for matching the CSI processes to financial planning
13. Which of the following are objectives of the Release and Deployment Management process?
1) To ensure there are clear release and deployment plans
2) To ensure that skills and knowledge are transferred to operations and support staff
3) To ensure there is minimal unpredicted impact on production services
4) To provide cost justifiable IT capacity that is matched to the needs of the business
a) 1, 2 and 3 only
b) All of the above
c) 1 and 3 only
d) 1, 3 and 4 only
14. Which of the following questions is NOT answered by Service Portfolio Management?
a) How should our resources and capabilities be allocated?
b) What opportunities are there in the market?
c) Why should a customer buy these services?
d) What are the pricing or chargeback models?
15. Which of the following statements are NOT included in Access Management?
1) Verifying the identity of users requesting access to services
2) Setting the rights or privileges of systems to allow access to authorized users
3) Defining security policies for system access
4) Monitoring the availability of systems that users should have access to
a) 3 and 4 only
b) 1 and 3 only
c) 2 and 3 only
d) 1 and 2 only
16. Application Management is NOT responsible for?
a) Documenting and maintaining the technical skills required to manage and support
Applications
b) Managing applications through their lifecycle
c) Assisting in the decision to build or buy new software
d) Developing operational functionality required by the business
17. If something cannot be measured, it should not be documented within which of the following?
a) The Glossary of Terms
b) A Service Level Agreement
c) An Incident Management record
d) A Configuration Item (CI)
19. Which of the following areas would technology help to support during the Service Transition
phase of the lifecycle?
1) Data mining and workflow tools
2) Measurement and reporting systems
3) Release and Deployment technology
4) Process Design
a) 1, 2 and 3 only
b) 1, 3 and 4 only
c) 2, 3 and 4 only
d) All of the above
23. The objective of Service Asset and Configuration Management is most accurately described as?
a) To understand the performance characteristics of assets and Configuration Items (CIs) in
order to maximize their contribution to service levels
b) To manage service assets and CIs from an operational perspective
c) To ensure that assets and CIs deliver the business outcomes they were designed to achieve
d) To define and control the components of services and infrastructure and maintain accurate
configuration records
26. When planning and implementing a Continual Service Improvement (CSI) initiative, which of the
following benefits is LEAST useful in supporting a business case?
a) Reduce technology investment by $5m due to more accurate capacity and performance
modeling processes
b) Reduce support manpower demand by 30% due to automated incident and problem
management processes
c) Improve employee morale and therefore create better relationships between IT and
business units
d) Reduce Problem resolution by 50% and minimize critical system outages
27. Which of the following would NOT be stored in the Definitive Media Library (DML)?
a) Master copies of software
b) Backups of application data
c) Software licenses
d) Master copies of controlled documentation
28. The objective of the Change Management process is most accurately described as?
a) Ensuring that all changes are recorded, managed, tested and implemented in a controlled
manner
b) Ensuring that changes to IT infrastructure are managed efficiently and effectively
c) Ensuring that all changes have appropriate back-out plans in the event of failure
d) Protecting services by not allowing changes to be made
31. Which of the following statements CORRECTLY defines Insourcing and Outsourcing delivery
model options?
a) Insourcing relies on internal resources; outsourcing relies on external organization(s)
resources
b) Insourcing relies on external organization(s) resources; outsourcing relies on internal
resources
c) Insourcing relies on co-sourcing; outsourcing relies on partnerships
d) Insourcing relies on knowledge process outsourcing; outsourcing relies on application
service provisioning
32. Why should monitoring and measuring be used when trying to improve services?
a) To validate, direct, justify and intervene
b) To validate, measure, monitor and change
c) To validate, plan, act and improve
d) To validate, assign resources, purchase technology and train people
34. Which of the following is the CORRECT description of the Four P’s of Service Design?
a) A four step process for the design of effective Service Management
b) A definition of the people and products required for successful design
c) A set of questions that should be asked when reviewing design specifications
d) The four major areas that need to be considered in the design of effective Service
Management
36. Which is the first activity of the Continual Service Improvement (CSI) model?
a) Assess the current business situation
b) Understand high-level business requirements
c) Agree on priorities for improvement
d) Create and verify a plan
38. Which process reviews Operational Level Agreements (OLAs) on a regular basis?
a) Supplier Management
b) Service Level Management
c) Service Portfolio Management
d) Contract Management
39. The 7 Step Improvement Process can most accurately be described as?
a) The Seven P’s of Continual Service Improvement (CSI)
b) A service improvement methodology based on the Deming Cycle
c) A set of roles and responsibilities for managing service improvements
d) A process for defining what is to be measured, gathering the data, processing the data and
using it to take corrective action
40. The Information Security Policy should be available to which groups of people?
a) Senior business managers and all IT staff
b) Senior business managers, IT executives and the Security Manager
c) All customers, users and IT staff
d) Information Security Management staff only
Exercise 3:
1. Which of the following best means Combination of Internal & External Sourcing?
a) Internal Sourcing-.
b) External Sourcing
c) Co-Sourcing
d) Managed Services
4. The spell check module of a word-processing software package contains a number of errors. The
Development department has corrected these errors in a new version. Which process is
responsible for ensuring this updated version is tested?
a) Configuration Management
b) Incident Management
c) Problem Management
d) Release Management
5. The Plan-Do-Check-Act cycle can be used to plan and implement Service Management
Processes:
How many times should each stage of the cycle be visited?
e) There should be a single Plan and Do, and then Check and Act should be carried out multiple
times to Implement Continual Improvement
f) Each stage should be carried out once in the order Plan-Do-Check-Act
g) The entire cycle should be repeated multiple times to Implement Continual Improvement
h) There should be a single %n. then the Do-Check-Act cycle should be repeated multiple times
to Implement Continual improvement
8. Which of the following statements fully describes the aim of Release and Deployment
Management?
a) To build, test and deliver the capability to provide the services specified by Service Design
and that will accomplish the stakeholders’ requirements and deliver the Intended objectives
b) To ensure that each release package specified by Service Design consists of a set of related
assets and service components that are compatible with each other
c) To ensure that all release and deployment packages can be tracked, installed, tested,
verified, and/or uninstalled or backed out if appropriate
d) To record and manage deviations, risks, and issues related to the new or changed service
11. Which ITIL process has the objective of helping to monitor the IT services by maintaining a
logical model of the IT infrastructure and IT services?
a) Capacity Management
b) Change Management
c) Configuration Management
d) Financial Management for IT services
12. The Design Manager Is responsible for the overall coordination and deployment of quality
solution designs for services and processes. Which of the following are NOT responsibilities
included in this role?
a) Produce and maintain all necessary Service Transition Packages
b) B. Produce quality, secure and resilient designs for new or improved services, technology
architecture, processes or measurement systems that meet all the agreed current and
future IT requirements of the organization
c) C. Take the overall Service Strategies and ensure they are reflected in the Service Design
process and the service designs that are produced
d) D. Measuring the effectiveness and efficiency of the Service Design and supporting
processes
13. Of which ITIL process are Reliability, Serviceability and Maintainability components?
a) IT Service Continuity Management
b) Service Level Management
c) Problem Management
d) Availability Management
15. What aspects would you not expect to see in a Service Level report designed for the customer?
a) The average utilization level of the Service Desk
b) The level of availability realized and the time not available per period
c) The percentage of incidents that was resolved within the target
d) The successful and reverted Changes during a specific period
18. Which of the following is the correct set of steps for the Continual Service improvement (CSI)
Model?
a) Devise a strategy; Design the solution; Transition into production; Operate the Solution;
continually improve
b) Where do we want to be?; How do we get there?; How do we check we arrived; How do we
keep the momentum going?
c) Identifies the required business outcomes; Plan how to achieve the outcomes; Implement
the plan; Check the plan has been properly implemented; improve the solution
d) What is the vision?; Where are we now?; Where do we want to be?; How do we get there?;
Did we get there?; How do we keep the momentum going?
20. A user reports a PC problem to the Service Desk. A Service Desk representative determines that
the PC is defective and indicates that according to the services catalogue, the PC will be replaced
within three hours. Which ITIL process is responsible for having this user's PC replaced within
three hours?
a) Availability Management
b) Change Management
c) Configuration Management
d) Service Level Management
22. Information is regularly exchanged between Problem Management and Change Management.
What information is this?
a) Known Errors from Problem Management, on the basis of which Change Management can
generate Requests for Change (RFCs)
b) RFCs resulting from Known Errors
c) RFCs from the users that Problem Management passes on to Change Management
d) RFCs from the Service Desk that Problem Management passes on to Change Management
24. Where are activities documented with the aim of improving an IT service?
a) Service Catalogue
b) Service Improvement Program
c) Service Level Agreement (SLA)
d) Service Quality Plan (SQP)
26. In IT Service Continuity Management various precautionary measures are taken, for example
using an emergency power provision.
Which of the following ITIL processes could also initiate this kind of measure?
a) Availability Management
b) Capacity management
c) Change Management
d) Incident Management
28. Which ITIL process manager requires a report specifying the duration of an interruption of a
Configuration Item?
a) Availability Manager
b) Incident Manager
c) Problem Manager
d) Service Level Manager
29. Which of the following steps from the continual improvement Model is missing?
1) What is the vision?
2) Where are we now?
3) Where do we want to be?
4) How do we get there?
5) Did we get there?
6) ?
a) What is the ROI
b) How much did it cost?
c) How do we keep the momentum going?
d) What is the VOI?
30. Which of the following best describes the goal of Information Security Management Process?
a) To align IT security with business security and ensure that information security is effectively
managed in all service and Service Management activities’.
b) To ensure that that the information security risks are appropriately managed and enterprise
information resources are used responsibly.
c) To provide a focus for all aspects of IT security and manage all IT security activities.
d) To provide the strategic direction for security activities and ensures objectives are achieved
31. Which of the following statements about Supplier and Contract Database (SCD) are correct?
1) A database or structured Document used to manage Supplier Contracts throughout their
Lifecycle.
2) The SCD contains key Attributes of all Contracts with Suppliers
3) It’s never part of the Service Knowledge Management System.
4) Maintaining it is responsibility of Supplier management process
a) 1 & 2 only
b) 1, 2 & 3
c) 1, 2 & 4
d) All of above
32. Which of the following will complete the Four P's of Service Design?
1) Perspectives
2) Positioning
3) Plan
4) ???
a) People
b) Product
c) Patterns
d) Partners
34. Which of the following statements is true about the term Event?
a) A change of state which has significance for the management of a Configuration Item or IT
service.
b) The term Event is also used to mean an Alert or notification created by any IT Service,
configuration Item or Monitoring tool.
c) Events typically require IT Operations personnel to take actions, and often lead to Incidents
being logged
d) All of above
35. Which of the following is the best description of the contents of the Definitive Media Library
(DML)?
a) Copies of all software versions that are needed
b) Copies of all live software programs
c) Authorized versions of all software used on the infrastructure
d) Software awaiting user acceptance testing
39. How can an organization determine the effectiveness of the Service Level Management process?
a) By checking contracts with suppliers
b) By measuring customer satisfaction
c) By defining service levels
d) By reporting on all incidents
2. The ITIL life-cycle phase that provides guidance for the development and improvement of
capabilities for introducing new and changed services into supported environments is:
a) Service Strategy d. Service Operation
b) Service Design e. CSI
c) Service Transition
3. The ITIL life-cycle phase that describes best practice for managing services in supported
environments is:
a) Service Strategy d. Service Operation
b) Service Design e. CSI
c) Service Transition
12. Which of the following statements is INCORRECT about the scope of Service Strategy?
a) Defining a strategy whereby a service provider will deliver services to meet a customer’s
business outcomes
b) Defining a strategy for how to operate services
c) Defining a strategy for how to manage services
d) None of the above
13. Which of the following statements is CORRECT about the Utility of a service?
a) Refers to those aspects of a service that contribute to tasks associated with achieving
outcomes
b) Represents any attribute of a service that removes, or reduces the effect of, constraints on
the performance of a task
c) Determine whether a service is able to meet its required outcomes, or is ‘fit for purpose’
d) All of the above
15. Value is defined not only strictly in terms of the customer’s business outcomes; it is also highly
dependent on Customers’ preferences and:
a) Customer’s perceptions
b) Customer’s budget
c) Customer’s needs
d) Customer’s business volume
21. Which of the following is not a process in the Service Design phase?
a) Supplier Management
b) Service Level Management
c) Service Portfolio Management
d) Information Security Management
24. An agreement between an IT service provider and another part of the same organization that
assists with the provision of services is called:
a) SLA
b) OLA
c) UC
d) None of the above
25. A written agreement between an IT service provider and the IT customer(s), defining the key
service targets and responsibilities of both parties is called:
a) SLA
b) OLA
c) UC
d) None of the above
26. The sourcing option in which a formal arrangements between two or more organizations to
work together to design, develop, transition, maintain, operate and/or support IT service(s) is
known as:
a) Co-sourcing
b) Partnership
c) Business Process Sourcing
d) Multi-vendor Sourcing
28. An agreement with an individual customer group, covering all the services they use is known as:
a) Service-based SLA
b) Group-based SLA
c) All-services Covered SLA
d) Customer-based SLA
29. The ability of a service, component or CI to perform its agreed function when required is known
as:
a) Availability
b) Maintainability
c) Reliability
d) Serviceability
31. The supplier category that includes relationships involving significant commercial activity and
business interaction is known as:
a) Strategic
b) Tactical
c) Operational
d) Commodity
33. Which of the following is not a process in the Service Transition phase?
a) Release and Deployment Management
b) Change Management
c) Information Management
d) Service Asset and Configuration Management
34. Which of the following is in the scope of the Service Transition phase?
a) Release planning, building, testing, evaluation and deployment
b) Design and development of capabilities for transitioning new and changed services into
supported environments
c) Retiring services and transferring services between service providers
d) All of the above
38. A set of predefined steps that should be taken to handle a particular type of change in an agreed
way is known as:
a) Standard Change
b) Change Model
c) Normal Change
d) Change Procedure
2. The following is NOT a phase in the Release and Deployment Management process:
a) Release and deployment planning
b) Release build and test
c) Deployment
d) Validation and Testing
9. The single point of contact for users when there is a service disruption or for service requests is:
a) Service Desk
b) Technical Management Team
c) Service Manger
d) Help Desk
11. Which of the following is within the scope of the Service Desk function:
a) Logging all relevant incident/service request details, allocating categorization and
prioritization codes
b) Providing first-line investigation and diagnosis
c) Communication with users
d) All of the above
12. The groups, departments or teams that provide technical expertise and overall management of
the IT Infrastructure is grouped under a function called:
a) Service Desk
b) Technical Management
c) Application Management
d) IT Operation Management
13. A notification that a threshold has been reached, something has changed, or a failure has
occurred is known as:
a) Informational Event
b) Exception Event
c) Alert
d) Warning Event
14. An event that is generated when a service or device is approaching a threshold is called:
a) Informational Event
b) Exception Event
c) Alert
d) Warning Event
15. Notifying appropriate IT managers about incidents of a serious nature is known as:
a) Functional escalation
b) Management escalation
c) Hierarchic escalation
d) Emergency escalation
17. Which of the following is CORRECT about the scope of the Problem Management process:
a) Diagnose the root cause of incidents and determine the resolution to those problems
b) Maintain information about problems and the appropriate workarounds and resolutions
c) Identify and solve problems and known errors before further incidents related to them can
occur again All of the above
d) All of the above
20. Which of the following is not within the scope of the CSI phase :
a) Continual improvement of all aspects of the IT service and the service assets that support
them
b) The continual alignment of the service portfolio with the current and future business needs
c) The maturity and capability of the organization, management, processes and people utilized
by the services
d) All of the above
21. The first four letters in the word DEMING stands for:
a) Design, Enhance, Manage, Improve
b) Design, Evaluate, Manage, Improve
c) Design, Evaluate, Manage, Innovate
d) None of the above
23. The CSI register should be held and regarded as part of the:
a) CMS
b) CMBD
c) SKMS
d) CSI Log
28. What types of changes are NOT usually included within the scope of service Change
Management?
a) Changes to a mainframe computer
b) Changes to business strategy
c) Changes to a Service Level Agreement (SLA)
d) The retirement of a service
31. Which process is responsible for recording relationships between service components?
a) Service Level Management
b) Service Portfolio Management
c) Service Asset and Configuration Management
d) Incident Management
33. What is a service delivered between two business units in the same organization known as?
a) Strategic service
b) Delivered service
c) Internal service
d) External service
34. What is the act of transforming resources and capabilities into valuable service better known
as?
a) Service management
b) Incident management
c) Resource management
d) Service support
35. Which of the following is the BEST description of an Operational Level Agreement (OLA)?
a) An agreement between an IT service provider and another part of the same organization
that assists in the provision of services
b) A written agreement between the IT service provider and their customer(s) defining key
targets and responsibilities of both parties
c) An agreement between two service providers about the levels of service required by the
customer
d) An agreement between a 3rd party Service Desk and the IT customer about fix and response
times
37. Which of the following does Service Transition provide guidance on?
1) Moving new and changed services into production
2) Testing and Validation
3) Transfer of services to or from an external service provider
a) 1 and 2 only
b) 2 only
c) All of the above
d) 1 and 3 only
38. Learning and Improvement is the PRIMARY concern of which of the following phases of the
Service Lifecycle?
a) Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service
Improvement
b) Service Strategy, Service Transition, and Service Operation
c) Service Operation and Continual Service Improvement
d) Continual Service Improvement
39. Which of the following is an activity of the Service Asset and Configuration Management
process?
a) Account for all the financial assets of the organization
b) Specify the relevant attributes of each Configuration Item (CI)
c) Design service models to justify ITIL implementations
d) Implement ITIL across the organization
40. A service design package (SDP) would normally be produced for which of the following?
1) A new IT service
2) A major change to an IT service
3) An emergency change to an IT service
4) An IT service retirement
a) 2,3 and 4 only
b) 1,2 and 4 only
c) 1,3 and 4 only
d) all of the above
Exercise 6:
1. Which of the following statements about the service owner is incorrect?
a) Carries out the day-to-day monitoring and operation of the service they own
b) Contributes to continual improvement affecting the service they own
c) Is a stakeholder in all of the It processes which support the service they own
d) Is accountable for a specific service within an organization
3. Which of the following would be stored in the Definitive Media Library (DML)?
1) Copies of purchased software
2) Copies of internally developed software
3) Relevant license documentation
4) The Change Schedule
a) All of the above
b) 1 and 2 only
c) 3 and 4 only
d) 1, 2 and 3 only
4. Which process is responsible for reviewing Operational Level Agreements (OLAs) on a regular
basis?
a) Supplier Management
b) Service Level Management
c) Service Portfolio Management
d) Demand Management
6. Which of the following are aims of the Release and Deployment Management process?
1) To ensure there are clear release and deployment plans
2) To ensure there is minimal unpredicted impact on production services, operations and
support
3) To authorize changes to support the process
a) 1 and 2 only
b) All of the above
c) 2 and 3 only
d) 1 and 3 only
10. Agreeing business requirements and service levels for a new service is part of ?
a) Service Operation
b) Service Strategy
c) Service Transition
d) Service Design
11. The Information Security Policy should be available to which groups of people?
a) Senior business managers and all IT staff only
b) Senior business managers, IT executives and the Information Security Manager only
c) All customers, users and IT staff
d) Information Security Management staff only
12. Which of the following are valid elements of a Service Design Package?
1) Agreed and documented business requirements
2) A service definition for transition and operation of the service
3) Requirements for new or changed services
4) Metrics to measure the service
a) 1 only
b) 2 and 3 only
c) 1, 2 and 4 only
d) All of the above
13. Which of the following are examples of tools that might support the Service Transition phase of
the Lifecycle?
1) A tool to store definitive versions of software
2) A workflow tool for managing changes
3) An automated software distribution tool
4) Testing and validation tools
a) 1, 3 and 4 only
b) 1, 2 and 3 only
c) All of the above
d) 2, 3 and 4 only
14. Which phase of the ITIL lifecycle provides the following benefit: the total cost of ownership
(TCO) of a service can be minimized if all aspects of the service, the processes and the
technology are considered during development?
a) Service design
b) Service strategy
c) Service operation
d) Continual service improvement
15. Which one of the following functions would be responsible for the management of a data
center?
a) Technical management
b) Service desk
c) Application management
d) Facilities management
16. Which of the following statements about Problem Management is/are CORRECT?
1) It ensures that all resolutions or workarounds that require a change to a Configuration Item
(CI) are submitted through Change Management
2) It provides management information about the cost of resolving and preventing problems
a) 1 only
b) 2 only
c) Both of the above
d) Neither of the above
19. Plan, Do, Check, Act are the four stages of which quality improvement method?
a) Business Knowledge Management Framework
b) Benchmarking
c) Continual Service Improvement
d) The Deming Cycle
21. Which process is responsible for the availability, confidentiality and integrity of data?
a) Service catalogue management
b) Service asset and configuration management
c) Change management
d) Information security management
23. Which of the following activities is part of the Service Level Management (SLM) process?
a) Designing the Configuration Management system from a business perspective
b) Creating technology metrics to align with customer needs
c) Discussing service achievements with customers
d) Training Service Desk staff how to deal with customer complaints about service
27. A technician uses a pre-defined technique to restore service as the incident has been seen
before.
This is an example of which of the following?
a) A workaround
b) A standard change
c) A service capability
d) An alert
28. 41) Which stage of the change management process deals with what should be done if the
change is unsuccessful?
a) a) Remediation planning
b) b) Categorization
c) c) Prioritization
d) d) Review and close
31. Which of the following is the CORRECT sequence of activities for handling an incident?
a) Identification, Logging, Categorization, Prioritization, Initial Diagnosis, Functional Escalation,
Investigation and Diagnosis, Resolution and Recovery, Closure
b) Prioritization, Identification, Logging, Categorization, Initial Diagnosis, Functional Escalation,
Investigation and Diagnosis, Resolution and Recovery, Closure
c) Identification, Logging, Initial Diagnosis, Categorization, Prioritization, Functional Escalation,
Resolution and Recovery, Investigation and Diagnosis, Closure
d) Identification, Initial Diagnosis, Investigation, Logging, Categorization, Functional Escalation,
Prioritization, Resolution and Recovery, Closure
34. In which document would you expect to see an overview of actual service achievements against
targets?
a) Operational level agreement (OLA)
b) Capacity plan
c) Service level agreement (SLA)
d) SLA monitoring chart (SLAM)
35. Which of the following statements about communication within service operation are correct?
1) All communication must have an intended purpose or resultant action
2) Communication should not take place without a clear audience
a) 1 only
b) 2 only
c) Both of the above
d) None of the above
36. The consideration of value creation is a principle of which stage of the service lifecycle?
a) Continual service improvement
b) Service strategy
c) Service design
d) Service transition
37. Which of the following is NOT a type of metric described in Continual Service Improvement
(CSI)?
a) Process Metrics
b) Service Metrics
c) Personnel Metrics
d) Technology Metrics
38. Which statement about the relationship between the Configuration Management System (CMS)
and the Service Knowledge Management System (SKMS) is CORRECT?
a) The SKMS is part of the CMS
b) The CMS forms part of the SKMS
c) The CMS and SKMS are the same thing
d) There is no relationship between the CMS and the SKMS
39. What is the role of the Emergency Change Advisory Board (ECAB)?
a) To assist the Change Manager in ensuring that no urgent changes are made during
particularly volatile business periods
b) To assist the Change Manager by implementing emergency changes
c) To assist the Change Manager in evaluating emergency changes and to decide whether they
should be approved
d) To assist the Change Manager in speeding up the emergency change process so that no
unacceptable delays occur
40. Which of the following statements about the Service Desk is/are CORRECT?
1) The Service Desk is a function that provides a means of communication between IT and its
users for all operational issues
2) The Service Desk should be the owner of the Problem Management process
a) 2 only
b) 1 only
c) Both of the above
d) Neither of the above
41. Which of the following are the Four Ps of Service Design?
a) Planning, Products, Position, Processes
b) Planning, Perspective, Position, People
c) Perspective, Partners, Problems, People
d) People, Partners, Products, Processes
42. Which of the following represents the BEST course of action to take when a problem
workaround is found?
a) The problem record is closed
b) The problem record remains open and details of the workaround are documented within it
c) The problem record remains open and details of the workaround are documented on all
related incident records
d) The problem record is closed and details of the workaround are documented in a Request
for Change (RFC)
1 c 1 c 1 c 1 e 1 c 1 A
2 a 2 d 2 a 2 c 2 d 2 D
3 d 3 c 3 c 3 d 3 d 3 D
4 a 4 d 4 d 4 d 4 d 4 B
5 a 5 b 5 b 5 c 5 d 5 D
6 a 6 b 6 d 6 b 6 d 6 A
7 c 7 b 7 d 7 d 7 a 7 B
8 d 8 b 8 a 8 b 8 d 8 D
9 c 9 c 9 d 9 e 9 a 9 C
10 a 10 d 10 b 10 d 10 d 10 D
11 b 11 b 11 c 11 c 11 d 11 C
12 a 12 d 12 b 12 b 12 b 12 D
13 a 13 a 13 d 13 d 13 c 13 C
14 c 14 b 14 d 14 c 14 d 14 A
15 b 15 a 15 a 15 a 15 c 15 D
16 b 16 d 16 a 16 d 16 d 16 C
17 b 17 b 17 a 17 d 17 d 17 A
18 c 18 a 18 d 18 a 18 c 18 A
19 b 19 a 19 c 19 a 19 d 19 D
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Exercise 5
20 c 20 b 20 b 20 d 20 d 20 D
Exercise 6
21 b 21 b 21 c 21 c 21 d 21 D
22 a 22 d 22 b 22 d 22 a 22 C
23 a 23 d 23 c 23 c 23 c 23 C
24 d 24 d 24 b 24 b 24 a 24 A
25 a 25 c 25 a 25 a 25 d 25 D
26 c 26 c 26 a 26 b 26 d 26 D
27 a 27 b 27 b 27 d 27 b 27 A
28 c 28 a 28 a 28 d 28 B 28 A
29 c 29 c 29 c 29 a 29 A 29 A
30 b 30 c 30 a 30 d 30 B 30 C
31 d 31 a 31 c 31 b 31 C 31 A
32 b 32 a 32 c 32 b 32 A 32 A
33 c 33 a 33 b 33 c 33 C 33 B
34 b 34 d 34 d 34 d 34 A 34 D
35 a 35 c 35 c 35 d 35 A 35 C
36 d 36 b 36 c 36 d 36 D 36 B
37 a 37 a 37 a 37 b 37 C 37 C
38 d 38 b 38 d 38 b 38 D 38 B
39 a 39 d 39 b 39 d 39 B 39 C
40 b 40 c 40 c 40 d 40 B 40 B
41 D
42 B