Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Exin > Exin-ITIL > ITIL-F

ITIL-F ITIL® Foundation Question and Answers

Question # 4

Which of the following should be considered when designing measurement systems, methods and metrics?

1. The services

2. The architectures

3. The configuration items

4. The processes

A.

2 and 3 only

B.

1 and 3 only

C.

2 and 4 only

D.

All of the above

Full Access
Question # 5

Which one of the following activities would be performed by access management?

A.

Providing physical security for staff at data centres and other buildings

B.

Managing access to computer rooms and other secure locations

C.

Managing access to the service desk

D.

Managing the rights to use a service or group of services

Full Access
Question # 6

Access management is closely related to which other process?

A.

Capacity management only

B.

3rd line support

C.

Information security management

D.

Change management

Full Access
Question # 7

Which process is responsible for sourcing and delivering components of requested standard services?

A.

Request fulfilment

B.

Service portfolio management

C.

Service desk

D.

IT finance

Full Access
Question # 8

What are the categories of events described in the ITIL service operation book?

A.

Informational, scheduled, normal

B.

Scheduled, unscheduled, emergency

C.

Informational, warning, exception

D.

Warning, reactive, proactive

Full Access
Question # 9

Which process would you MOST expect to be involved in the management of underpinning contracts?

A.

Change management

B.

Service catalogue management

C.

Supplier management

D.

Release and deployment management

Full Access
Question # 10

Which statement should NOT be part of the value proposition for Service Design?

A.

Reduced total cost of ownership

B.

Improved quality of service

C.

Improved Service alignment with business goals

D.

Better balance of technical skills to support live services

Full Access
Question # 11

Understanding what to measure and why it is being measured are key contributors to which part of the Service Lifecycle?

A.

Service Strategy

B.

Continual Service Improvement

C.

Service Operation

D.

Service Design

Full Access
Question # 12

Which one of the following is NOT part of the service design stage of the service lifecycle?

A.

Designing and maintaining all necessary service transition packages

B.

Producing quality, secure and resilient designs for new or improved services

C.

Taking service strategies and ensuring they are reflected in the service design processes and the service designs that are produced

D.

Measuring the effectiveness and efficiency of service design and the supporting processes

Full Access
Question # 13

Which one of the following provides the CORRECT list of processes within the service operation stage of the service lifecycle?

A.

Event management, incident management, problem management, request fulfilment, and access management

B.

Event management, incident management, change management, and access management

C.

Incident management, problem management, service desk, request fulfilment, and event management

D.

Incident management, service desk, request fulfilment, access management, and event management

Full Access
Question # 14

In which of the following areas would ITIL complementary guidance provide assistance?

1. Adapting best practice for specific industry sectors

2. Integrating ITIL with other operating models

A.

Both of the above

B.

Neither of the above

C.

Option 1 only

D.

Option 2 only

Full Access
Question # 15

Which process is responsible for discussing reports with customers showing whether services have met their targets?

A.

Continual service improvement

B.

Change management

C.

Service level management

D.

Availability management

Full Access
Question # 16

The remediation plan should be evaluated at what point in the change lifecycle?

A.

Before the change is approved

B.

Immediately after the change has failed and needs to be backed out

C.

After implementation but before the post implementation review

D.

After the post implementation review has identified a problem with the change

Full Access
Question # 17

Which of the following should be done when closing an incident?

1. Check the incident categorization and correct it if necessary

2. Check that the user is satisfied with the outcome

A.

1 only

B.

Both of the above

C.

2 only

D.

Neither of the above

Full Access
Question # 18

Which of the following statements BEST describes the aims of release and deployment management?

A.

To build, test and deliver the capability to provide the services specified by service design

B.

To ensure that each release package specified by service design consists of a set of related assets and service components

C.

To ensure that all changes can be tracked, tested and verified if appropriate

D.

To record and manage deviations, risks and issues related to the new or changed service

Full Access
Question # 19

Which statement about the emergency change advisory board (ECAB) is CORRECT?

A.

The ECAB considers every high priority request for change

B.

Amongst the duties of the ECAB is the review of completed emergency changes

C.

The ECAB will be used for emergency changes where there may not be time to call a full CAB

D.

The ECAB will be chaired by the IT director

Full Access
Question # 20

Which areas of service management can benefit from automation?

1. Design and modeling

2. Reporting

3. Pattern recognition and analysis

4. Detection and monitoring

A.

1, 2 and 3 only

B.

1, 3 and 4 only

C.

2, 3 and 4 only

D.

All of the above

Full Access
Question # 21

Which of the following CANNOT be provided by a tool?

A.

Knowledge

B.

Information

C.

Wisdom

D.

Data

Full Access
Question # 22

Which of the following areas would technology help to support during the service lifecycle?

1. Data mining and workflow

2. Measurement and reporting

3. Release and deployment

4. Process design

A.

2 and 3 only

B.

2 and 4 only

C.

1 and 3 only

D.

All of the above

Full Access
Question # 23

Which of the following options is a hierarchy that is used in knowledge management?

A.

Wisdom - Information - Data - Knowledge

B.

Data - Information - Knowledge - Wisdom

C.

Knowledge - Wisdom - Information - Data

D.

Information - Data - Knowledge - Wisdom

Full Access
Question # 24

Which of the following processes are performed by the service desk?

1. Capacity management

2. Request fulfilment

3. Demand management

4. Incident management

A.

All of the above

B.

3 and 4 only

C.

2 and 4 only

D.

2 only

Full Access
Question # 25

A process owner has been identified with an "I" in a RACI matrix.

Which one of the following would be expected of them?

A.

Be accountable for the outcome of an activity

B.

Perform an activity

C.

Be kept up-to-date on the progress of an activity

D.

Manage an activity

Full Access
Question # 26

Which role is responsible for carrying out the activities of a process?

A.

Process owner

B.

Change manager

C.

Service manager

D.

Process practitioner

Full Access
Question # 27

How many people should be accountable for a process as defined in the RACI model

A.

As many as necessary to complete the activity

B.

Only one - the process owner

C.

Two - the process owner and the process enactor

D.

Only one - the process architect

Full Access
Question # 28

Which of the following activities would be performed by a process manager?

1. Monitoring and reporting on process performance

2. Identifying improvement opportunities

3. Appointing people to required roles

A.

All of the above

B.

1 and 3 only

C.

1 and 2 only

D.

2 and 3 only

Full Access
Question # 29

How many people should be accountable for a process as defined in the RACI model?

A.

As many as necessary to complete the activity

B.

Only one - the process owner

C.

Two - the process owner and the process enactor

D.

Only one - the process architect

Full Access
Question # 30

Where should all master copies of controlled software and documentation be stored?

A.

In the definitive software library

B.

In the definitive media library

C.

In the definitive security library

D.

In the definitive production library

Full Access
Question # 31

Which is the correct combination of items that makes up an IT service?

A.

Customers, providers and documents

B.

Information technology, people and processes

C.

Information technology, networks and people

D.

People, process and customers

Full Access
Question # 32

Which ITIL process is used to restore normal service operation as quickly as possible?

A.

Service level management

B.

Incident management

C.

Problem management

D.

Availability management

Full Access
Question # 33

Which process has the following objective 'Establish new or changed services into supported

environments within the predicted cost, time and resource estimates'?

A.

Service strategy

B.

Service transition planning and support

C.

Service level management

D.

Change management

Full Access
Question # 34

What is the primary focus of business capacity management?

A.

Management, control and prediction of the performance, utilization and capacity of individual

elements of IT technology

B.

Review of all capacity supplier agreements and underpinning contracts with supplier management

C.

Management, control and prediction of the end-to-end performance and capacity of the live,

operational IT services

D.

Future business requirements for IT services are quantified, designed, planned and implemented in a

timely fashion

Full Access
Question # 35

Which is the correct definition of a customer facing service?

A.

One which directly supports the business processes of customers

B.

A service that cannot be allowed to fail

C.

One which is not covered by a service level agreement

D.

A service not directly used by the business

Full Access
Question # 36

Which of the following are classed as stakeholders in service management?

1. Customers

2. Users

3. Suppliers

A.

All of the above

B.

1 and 3 only

C.

1 and 2 only

D.

2 and 3 only

Full Access
Question # 37

Which of the following are reasons why ITIL is successful?

1. ITIL is vendor neutral

2. It does not prescribe actions

3. ITIL represents best practice

A.

All of the above

B.

1 and 3 only

C.

1 and 2 only

D.

2 and 3 only

Full Access
Question # 38

What would you call the groups of people who have an interest in the activities, targets, resources and deliverables from service management?

A.

Employers

B.

Stakeholders

C.

Regulators

D.

Accreditors

Full Access
Question # 39

Which of the following is the best definition of service management?

A.

The ability to keep services highly available to meet the business needs

B.

A set of specialized organizational capabilities for providing value to customers in the form of services

C.

A complete set of all the documentation required to deliver world class services to customers

D.

An internationally recognized methodology to provide valuable services to customers

Full Access
Question # 40

What is the BEST description of an operational level agreement (OLA)?

A.

An agreement between the service provider and another part of the same organization

B.

An agreement between the service provider and an external organization

C.

A document that describes to a customer how services will be operated on a day-to-day basis

D.

A document that describes business services to operational staff

Full Access
Question # 41

Which of the following statements about standard changes are CORRECT?

1. The approach is pre-authorized

2. The risk is usually low and well understood

3. Details of the change will be recorded

4. Some standard changes will be triggered by the request fulfillment process

A.

1 only

B.

2 and 3 only

C.

1, 2 and 4 only

D.

All of the above

Full Access
Question # 42

Which of the following BEST describes a problem?

A.

An issue reported by a user

B.

The cause of two or more incidents

C.

A serious incident which has a critical impact to the business

D.

The cause of one or more incidents

Full Access
Question # 43

Check, Act and Plan are three of the stages of the Deming Cycle. Which is the fourth?

A.

Do

B.

Perform

C.

Implement

D.

Measure

Full Access
Question # 44

What is the result of carrying out an activity, following a process or delivering an IT service known as?

A.

Outcome

B.

Incident

C.

Change

D.

Problem

Full Access
Question # 45

The design of IT services requires the effective and efficient use of “the four Ps”. What are these four Ps?

A.

People, process, partners, performance

B.

Performance, process, products, plans

C.

People, process, products, partners

D.

People, products, plans, partners

Full Access