Which part of the service lifecycle is responsible for coordinating and carrying out the activities and processes required to deliver and manage services at agreed levels to business users and customers?
A. Continual Service Improvement
B. Service Transition
C. Service Design
D. Service Operation
Identity and Rights are two major concepts involved in which one of the following processes?
A. Access Management
B. Facilities Management
C. Event Management
D. Demand Management
"Planning and managing the resources required to deploy a release into production" is a purpose of which part of the Service Lifecycle?
A. Service Operation
B. Service Strategy
C. Service Transition
D. Continual Service Improvement
Which of the following statements about the Service Portfolio and Service Catalogue is the MOST CORRECT?
A. The Service Catalogue only has information about services that are live, or being prepared for deployment; the Service Portfolio only has information about services which are being considered for future development
B. The Service Catalogue has information about all services; the Service Portfolio only has information about services which are being considered for future development
C. The Service Portfolio has information about all services; the Service Catalogue only has information about services which are live, or being prepared for deployment
D. Service Catalogue and Service Portfolio are different names for the same thing
Which of the following should be available to the Service Desk?
(1)
Known Error Data
(2)
Change Schedules
(3)
Service Knowledge Management System
(4)
The output from monitoring tools
A.
1,2 and 3 only
B.
1,2 and 4 only
C.
2,3 and 4 only
D.
All of the above
There are four types of metrics that can be used to measure the capability and performance of processes. Which of the four metrics is missing from the list below?
(1)
Progress
(2)
Effectiveness
(3)
Efficiency
(4)
?
A.
Cost
B.
Conformance
C.
Compliance
D.
Capacity
What is the objective of Access Management?
A. To provide security staff for Data Centers and other buildings
B. To manage access to computer rooms and other secure locations
C. To manage access to the Service Desk
D. To manage the right to use a service or group of services
Which of these would fall outside the scope of a typical service change management process?
A. A change to a contract with a supplier
B. A firmware upgrade to a server that is only used for IT Service Continuity purposes
C. An urgent need to replace a CPU to restore a service during an incident
D. A change to a business process that depends on IT Services
Which of the following defines the level of protection in Information Security Management?
A. The IT Executive
B. The ISO27001 Standard
C. The Business
D. The Service Level Manager
Understanding the level of risk during and after change and providing confidence in the degree of compliance with governance requirements during change are both ways of adding business value through which part of the service lifecycle?
A. Service Transition
B. Risk Management
C. IT Service Continuity Management
D. Availability Management
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only ISEB exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ITILF exam preparations and ISEB certification application, do not hesitate to visit our Vcedump.com to find your solutions here.