ITIL

Free ITIL Practise Exam

1. Which of these statements is not correct?




2. Which service lifecycle stage ensures that measurement methods will provide the required metrics for new or changed services?




3. The service desk carries out two processes. What are they?

  1. Incident management
  2. Design coordination
  3. Request fulfillment
  4. Change management



4. Which one of these statements about business relationship management(BRM) is correct?




5. Which of the following statements about Access Management are true?

  1. Access Management ensure that all requests for access are verified and authorized
  2. Access Management defines security policies




6. Which of these three areas will be used by customers to understand the value of a service

  1. Business Outcomes
  2. Customer Preferences
  3. Customer Perceptions
  4. Customer Service




7. Which of the following is NOT a recognized source for service management best practices?




8. Which one of these is NOT a SLA structure specified by ITIL?




9. According to ITIL which of the following is a key element of a service that creates value for the customer?




10. Which of the following is the MAIN objective of Problem Management?




11. Which one of these is an objective of service level management?




12. Which of the following would be stored in the definitive media library(DML)?

  1. Copies of purchased software
  2. Copies of internally developed software
  3. Relevant licence documentation
  4. The change schedule




13. Which of the following are the three main processes of Financial Management?

  1. Budgeting
  2. Costing
  3. Accounting
  4. Charging




14. Which one of the following statements about service catalog is FALSE?




15. Which of the following is NOT a type of change identified by ITIL?




16. A service owner is responsible for which of the following?




17. Which of the following are types of event monitoring?

  1. Passive
  2. Virtual
  3. Active
  4. Standard




18. Which of the following is NOT part of a service portfolio?




19. Requests must be as follows:

  1. Authorized by the CAB
  2. Authorized by the budget holder when an expense will be incurred
  3. Authorized by technical management
  4. May be preauthorized




20. Which of the following is a key factor for ITIL's success?




21. Which is the first activity of the continual service improvement(CSI) approach?




22. What is the role of the emergency change advisory board (ECAB)?




23. Which one of the following activities is part of the service level management (SLM) process?




24. Service design delivers a new service or a change to an existing service. Which of the following are included in the service design?

  1. Technology
  2. Processes
  3. Budget
  4. Policies




25. Which type of agreement is made between the service provider and internal support departments who are supplying an element of the service?




26. Who defines the value of a service?




27. Who is responsible for ensuring the right numbers of staff are assigned to the various roles within the process and that they understand what is required of them?




28. In ITIL terminology, An unplanned interruption to an IT service, a reduction in the quality of an IT service, or a failure of a CI that has not yet impacted an IT service, is the definition for which of these?




29. Which of these is NOT a recognized service type?




30. Which one of the following is NOT a type of metric described in continual service improvement(CSI)?




31. The continual service improvement approach sets out a sequence of steps to follow when instigating and implementing improvements. Which of these represents the correct sequence for the CSI approach?




32. The four key elements of service design, also known as the four P's stands for People, Processes, Products and ?




33. Availability is calculated using the formula AST – DT/AST * 100. What do the terms AST and DT refer to?




34. Service operation includes which of the following activities?




35. Which of these represents the five major aspects considered by service design in the design of quality services?




36. Who should be granted access to the information security policy




37. Which statement about the relationship between the Configuration Management System (CMS) and the Service Knowledge Management System (SKMS) is correct?




38. The acronym RACI stands for




39. Which of these statements is NOT true?




40. What does PDCA stands for in Deming Cycle