Which process aims to prevent incidents resulting from changes to the IT infrastructure?
A. Availability Management
B. Change Management
C. Incident Management
D. Problem Management
The Service Desk of supplier X continuous receives the same incident report. This concerns the latest version of a client-server application. The problem no longer occurs if the former version is re- installed. Because the cause of the incident has still not been traced, the supplier decides to advise the customers to temporarily install the old version, if the problem occurs. What is this advice an example of?
A. Known Error
B. Problem
C. Workaround
D. Request for Change
What is the objective of the Security Management process?
A. to manage information security effectively for critical services only
B. to manage information security effectively for IT staff
C. to manage information security effectively relating to the financial administration of service activities
D. to manage information security effectively within all service activities
Problem Management is responsible for carrying out trend analysis of Incident volumes and types. What is the reason for this?
A. to be able to charge to the correct users of the service
B. to be able to provide reports to management
C. to prevent repetitive occurrence of Incidents
D. to provide input to the Capacity Database
What must be included in a well defined Process structure?
A. expected results
B. functions
C. statistical support
D. timelines
What is known as a temporary solution that enables the user to continue working?
A. Known Error
B. Request For Change (RFC)
C. Service Request
D. Workaround
In recent months at a transport company with 1500 desktops, dozens of requests have been received for expansion of the internal memory because its size has proven to be insufficient. Which process should have prevented this from happening?
A. Capacity Management
B. Service Level Management
C. Configuration Management
D. Availability Management
Which process includes the responsibility of recovering the service as quickly as possible?
A. Availability Management
B. IT Service Continuity Management
C. Incident management
D. Problem Management
Which process or function is responsible for supplying first-line support and assistance in daily use of IT services'?
A. Availability Management
B. Incident Management
C. Service Desk
D. Service Level Management
What are the key contents of an IT Service Management system?
A. A documented organizational and operational structure
B. A software system for the ticket
C. A software system to monitor the key performance indicators (KPIs)
D. Systematic processes for ticket recording and follow-up only
Staff should be trained in relevant aspects of Service Management. What information with respect to training should be maintained?
A. A chronological training record for each individual
B. A record of all future training courses for each employee
C. An overview of all personal details per employee
D. An overview of all possible training modules that match with competences
Which statement below is not a purpose of Supplier Management procedures?
A. That business transactions between all parties are recorded
B. That information on the performance of all suppliers can be observed and acted upon
C. That it is made clear that the supplier cannot subcontract part of the delivered services to the ServiceProvider
D. That the suppliers understand their obligation to the Service Provider
What is required for an implementation of IT Service Management to be successful?
A. A top-down approach whereby the management of the organization strongly and visibly enforces theimplementation
B. Buy-in specifically from the levels in the organization which will be operationally involved in IT ServiceManagement activities
C. The appointment of a specialist department responsible for the development of the process structures
D. The involvement and commitment of personnel at all levels in the organization from operational staff to topmanagement
Which statement with regard to Information Security Management is true?
A. Information Security Management to specifically focus on managing Information Security effective within allinformation systems.
B. Management with appropriate authority shall approve an Information Security policy.
C. Security Incidents need to be reported and recorded immediately in line with the Problem Managementprocedure.
D. Security Incidents shall only be reported and recorded if they affect more than one user
One of the activities required for effective planning, coordination and evaluation of requested changes is assessing the impact and required resources. Which process or function is responsible for this activity?
A. Change Management
B. Configuration Management
C. Release Management
D. Service Desk