Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ITIL-Foundation Questions and Answers

Question # 6

Which of the following should be considered when designing measurement systems, methods and metrics?

1. The services

2. The architectures

3. The configuration items

4. The processes

A.

2 and 3 only

B.

1 and 3 only

C.

2 and 4 only

D.

All of the above

Full Access
Question # 7

Which one of the following is the CORRECT set of steps for the continual service improvement approach?

A.

Devise a strategy; Design the solution; Transition into production; Operate the solution; Continually improve

B.

Where do we want to be?; How do we get there?; How do we check we arrived?; How do we keep the momentum going?

C.

Identify the required business outcomes; Plan how to achieve the outcomes; Implement the plan; Check the plan has been properly implemented; Improve the solution

D.

What is the vision?; Where are we now?; Where do we want to be?; How do we get there?; Did we get there?; How do we keep the momentum going?

Full Access
Question # 8

The consideration of value creation is a principle of which stage of the service lifecycle?

A.

Continual service improvement

B.

Service strategy

C.

Service design

D.

Service transition

Full Access
Question # 9

Which of the following would be used to communicate a high level description of a major change that involved significant cost and risk to the organization?

A.

Change proposal

B.

Change policy

C.

Service request

D.

Risk register

Full Access
Question # 10

The effective management of risk requires specific types of action. Which of the following pairs of actions would be BEST to manage risk?

A.

Training in risk management for all staff and identification of risks

B.

Identification of risk, analysis and management of the exposure to risk

C.

Control of exposure to risk and investment of capital

D.

Training of all staff and investment of capital

Full Access
Question # 11

What type of record should you raise when a problem diagnosis is complete and a workaround is available?

A.

A service object

B.

An incident

C.

A change

D.

A known error

Full Access
Question # 12

What is the result of carrying out an activity, following a process or delivering an IT service known as?

A.

Outcome

B.

Incident

C.

Change

D.

Problem

Full Access
Question # 13

In which core ITIL publication can you find detailed descriptions of service catalogue management, information security management, and supplier management?

A.

Service strategy

B.

Service design

C.

Service transition

D.

Service operation

Full Access
Question # 14

Which of the following would commonly be found in a contract underpinning an IT service?

1. Financial arrangements related to the contract

2. Description of the goods or service provided

3. Responsibilities and dependencies for both parties

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 3 only

D.

All of the above

Full Access
Question # 15

Where would you expect incident resolution targets to be documented?

A.

A service level agreement (SLA)

B.

A request for change (RFC)

C.

The service portfolio

D.

A service description

Full Access
Question # 16

Remediation planning is a key part of which process?

A.

Capacity management

B.

Change management

C.

Financial management for IT services

D.

Availability management

Full Access
Question # 17

Which formal agreement minimizes the risk of disputes that can occur between an IT service provider and an external supplier?

A.

Operational contract

B.

Underpinning contract

C.

Serviceability contract

D.

Service level contract

Full Access
Question # 18

Which one of the following is NOT a responsibility of the service transition stage of the service lifecycle?

A.

To ensure that a service can be managed and operated in accordance with constraints specified during design

B.

To design and develop capabilities for service management

C.

To provide good-quality knowledge and information about services

D.

To plan the resources required to manage a release

Full Access
Question # 19

Service transition contains detailed descriptions of which processes?

A.

Change management, service asset and configuration management, release and deployment management

B.

Change management, capacity management event management, service request management

C.

Service level management, service portfolio management, service asset and configuration management

D.

Service asset and configuration management, release and deployment management, request fulfilment

Full Access
Question # 20

Which one of the following is NOT an aim of the change management process?

A.

To ensure the impact of changes are understood

B.

To ensure that changes are recorded and evaluated

C.

To ensure that all changes to configuration items (CIs) are recorded in the configuration management system (CMS)

D.

To deliver and manage IT services at agreed levels to business users

Full Access
Question # 21

Which process is responsible for dealing with complaints, comments, and general enquiries from users?

A.

Service level management

B.

Service portfolio management

C.

Request fulfilment

D.

Demand management

Full Access
Question # 22

Which is a responsibility of a customer within the service level management process?

A.

Negotiate third party contracts

B.

Measure service availability

C.

Supply good or services

D.

Agree Service level targets

Full Access
Question # 23

Which process would ensure that utility and warranty requirements are properly addressed in service designs?

A.

Availability management

B.

Capacity management

C.

Design coordination

D.

Release management

Full Access
Question # 24

Which process is responsible for sourcing and delivering components of requested standard services?

A.

Request fulfilment

B.

Service portfolio management

C.

Service desk

D.

IT finance

Full Access
Question # 25

Which process is responsible for the availability, confidentiality and integrity of data?

A.

Service catalogue management

B.

Service asset and configuration management

C.

Change management

D.

Information security management

Full Access
Question # 26

Access management is closely related to which other process?

A.

Capacity management only

B.

3rd line support

C.

Information security management

D.

Change management

Full Access
Question # 27

Which one of the following is the BEST description of a relationship in service asset and configuration management?

A.

Describes the topography of the hardware

B.

Describes how the configuration items (CIs) work together to deliver the services

C.

Defines which software should be installed on a particular piece of hardware

D.

Defines how version numbers should be used in a release

Full Access
Question # 28

Which process includes business, service and component sub-processes?

A.

Capacity management

B.

Incident management

C.

Service level management

D.

Financial management

Full Access
Question # 29

Which process or function is responsible for monitoring activities and events in the IT infrastructure?

A.

Service level management

B.

IT operations management

C.

Capacity management

D.

Incident management

Full Access
Question # 30

What are customers of IT services who do NOT work in the same organization as the service provider known as?

A.

Strategic customers

B.

External customers

C.

Valued customers

D.

Internal customers

Full Access
Question # 31

Looking for ways to improve process efficiency and cost effectiveness is a purpose of which part of the service lifecycle?

A.

Service operation

B.

Service transition

C.

Continual service improvement

D.

Service strategy

Full Access
Question # 32

Which statement should NOT be part of the value proposition for Service Design?

A.

Reduced total cost of ownership

B.

Improved quality of service

C.

Improved Service alignment with business goals

D.

Better balance of technical skills to support live services

Full Access
Question # 33

Which of the following is NOT a service desk type recognized in the service operation volume of ITIL / guidance?

A.

Local

B.

Centralized

C.

Outsourced

D.

Virtual

Full Access
Question # 34

Which of the following service desk organizational structures are described in service operation?

1. Local service desk

2. Virtual service desk

3. IT help desk

4. Follow the sun

A.

1, 2 and 4 only

B.

2, 3 and 4 only

C.

1, 3 and 4 only

D.

1, 2 and 3 only

Full Access
Question # 35

Which one of the following activities does application management perform?

A.

Defining where the vendor of an application should be located

B.

Ensuring that the required functionality is available to achieve the required business outcome

C.

Deciding who the vendor of storage devices will be

D.

Agreeing the service levels for the service supported by the application

Full Access
Question # 36

Which function or process would provide staff to monitor events in an operations bridge?

A.

Technical management

B.

IT operations management

C.

Request fulfilment

D.

Applications management

Full Access
Question # 37

What is the act of transforming resources and capabilities into valuable service better known as?

A.

Service management

B.

Incident management

C.

Resource management

D.

Service support

Full Access
Question # 38

What type of services are NOT directly used by the business but are required by the service provider to deliver customer facing services?

A.

Business services

B.

Component services

C.

Supporting services

D.

Customer services

Full Access
Question # 39

What are customers of IT services who work in the same organization as the service provider known as?

A.

Strategic customers

B.

External customers

C.

Valued customers

D.

Internal customers

Full Access
Question # 40

Which of the following CANNOT be provided by a tool?

A.

Knowledge

B.

Information

C.

Wisdom

D.

Data

Full Access
Question # 41

Which of the following areas would technology help to support during the service lifecycle?

1. Data mining and workflow

2. Measurement and reporting

3. Release and deployment

4. Process design

A.

2 and 3 only

B.

2 and 4 only

C.

1 and 3 only

D.

All of the above

Full Access
Question # 42

Which areas of service management can benefit from automation?

1. Design and modeling

2. Reporting

3. Pattern recognition and analysis

4. Detection and monitoring

A.

1, 2 and 3 only

B.

1, 3 and 4 only

C.

2, 3 and 4 only

D.

All of the above

Full Access
Question # 43

Which of the following options is a hierarchy that is used in knowledge management?

A.

Wisdom - Information - Data - Knowledge

B.

Data - Information - Knowledge - Wisdom

C.

Knowledge - Wisdom - Information - Data

D.

Information - Data - Knowledge - Wisdom

Full Access
Question # 44

Which statement about the emergency change advisory board (ECAB) is CORRECT?

A.

The ECAB considers every high priority request for change

B.

Amongst the duties of the ECAB is the review of completed emergency changes

C.

The ECAB will be used for emergency changes where there may not be time to call a full CAB

D.

The ECAB will be chaired by the IT director

Full Access
Question # 45

Which one of the following would be the MOST useful in helping to define roles and responsibilities in an organizational structure?

A.

RACI model

B.

Incident model

C.

Continual service improvement (CSI) approach

D.

The Deming Cycle

Full Access