Why are public frameworks, such as 1TIL, attractive when compared to proprietary knowledge?
A. Proprietary knowledge may be difficult to adopt, replicate or transfer since it is often undocumented
B. Public frameworks are always cheaper to adopt
C. Public frameworks are prescriptive and tell you exactly what to do
D. Proprietary knowledge has been tested in a wide range of environments
Why is it important for service providers to understand patterns of business activity (PBA)?
A. PBA are based on organizational roles and responsibilities
B. IT service providers CANNOT schedule changes until they understand PBA
C. Demand for the services delivered by service providers are directly influenced by PBA
D. Understanding PBA is the only way to enable accurate service level reporting
A process owner has been identified with an "I" in a RACI matrix. Which one of the following would be expected of them?
A. Be accountable for the outcome of an activity
B. Perform an activity
C. Be kept up-to-date on the progress of an activity
D. Manage an activity
Which of these statements about resources and capabilities is CORRECT?
A. Resources are types of service asset and capabilities are not
B. Resources and capabilities are both types of service asset
C. Capabilities are types of service asset and resources are not
D. Neither capabilities nor resources are types of service asset
Which process will regularly anal0yse incident data to identify discernible trends?
A. Service level management
B. Problem management
C. C0hange management
D. Event management
Which of the following is an enabler of best practice?
A. Standards
B. Technology
C. Academic research
D. Internal experience
Which process is responsible for ensuring that appropriate testing takes place?
A. Knowledge management
B. Release and deployment management
C. Service asset and configuration management
D. Service level management
Which of the following is the BEST reason for categorizing incidents?
A. To establish trends for use in problem management and other IT service management (ITSM) activities
B. To ensure service levels are met and breaches of agreements are avoided
C. To enable the incident management database to be partitioned for greater efficiency
D. To identify whether the user is entitled to log an incident for this particular service
Which of the following are types of service defined in ITIL?
1.
Enabling
2.
Core
3.
Enhancing
4.
Computer
A. 1, 3 and 4 only
B. 2, 3 and 4 only
C. 1, 2 and 4 only
D. 1, 2 and 3 only
Which of the following are managed by facilities management?
1.
Hardware within a data centre or computer room
2.
Applications
3.
Power and cooling equipment
4.
Recovery sites
A. 1, 2 and 3 only
B. All of the above
C. 1, 3 and 4 only
D. 1 and 3 only
Which one of the following is the BEST description of a major incident?
A. An incident which is so complex that it requires root cause analysis before a workaround can be found
B. An incident which requires a large number of people to resolve
C. An incident logged by a senior manager
D. An incident which has a high priority or a high impact on the business
Looking for ways to improve process efficiency and cost effectiveness is a purpose of which part of the service lifecycle?
A. Service operation
B. Service transition
C. Continual service improvement
D. Service strategy
Which of the following identifies the purpose of service transition planning and support?
A. Provide overall planning for service transitions and co-ordinate the resources they require
B. Ensure that all service transitions are properly authorized
C. Provide the resources to allow all infrastructure elements of a service transition to be recorded and tracked
D. To define testing scripts to ensure service transitions are unlikely to ever fail
Remediation planning is BEST described in which of the following ways?
A. Planning how to recover the cost of a change
B. Planning the steps required to be taken if a change is unsuccessful
C. Planning how to compensate a user for a failed change
D. Planning how to advise the change requestor of a failed change
Which of the following is the BEST description of a centralized service desk?
A. The desk is co-located within or physically close to the user community it serves
B. The desk uses technology and other support tools to give the impression that multiple desk locations are in one place
C. The desk provides 24 hour global support
D. There is a single desk in one location serving the whole organization