ITIL itilsc-osa practice test

ITIL Service Capability Operational Support and Analysis


Question 1

Scenario
Vision Media is an international media organization, operating various lines of business including:
The organization has recently been restructured, and now is comprised of the following companies and departments:
The organization is also actively pursuing growth in the online market, and is currently holding discussions with the leading
online news provider about the possible acquisition of their company. This would increase the overall size of Vision Media by
around 15%.
The Information Technology department acts as a Shared Service Unit, providing IT Services to all of sub-companies and
departments, which complement some of the Internal Service Providers that also exist. The director of Information
Technology has realized the need to improve the quality of services offered by implementing ITIL, and has decided to do so
using a phased approach. Some of the Service Design and Service Transition processes have already been implemented,
and they are now planning the implementation of Service Operation.
While the IT director does have tentative support from the other directors and CEO, budgets for implementing the Service
Operation processes have not been finalized, and still require a business case to be formally submitted.
Refer to the exhibit.
The IT director is required to submit a business case to the board of directors of Vision Media for the implementation of
Service Operation. Which of the following responses is the BEST summary of the benefits of implementing Service
Operation (processes and functions), to be included in the business case?

  • A. As part of the ongoing Service Management initiative within Vision Media, the implementation of Service Operation is a vital element necessary to enable service quality and reduce the overall expenditure on IT. This is because Service Operation is ultimately where the designs and optimizations introduced by IT are supported, and from an IT perspective where the actual value of IT Service Management is seen. Specific benefits delivered as a result of improved Service Operation includes: Given current plans for growth of Vision Media and possible acquisitions, the implementation of Service Operation is especially important to provide processes for reactively managing a growing end user population and increased scope and complexity in IT infrastructure utilized.
  • B. As part of the ongoing Service Management initiative within Vision Media, the implementation of Service Operation is a vital element necessary to further improve service quality, and to realize the value of the previous projects already completed (refer Service Design and Service Transition projects). This is because Service Operation is ultimately where the designs and optimizations introduced by IT are executed and measured, and from a business viewpoint where the actual value of IT is seen. Specific benefits delivered as a result of improved Service Operation includes: Given current plans for growth of Vision Media and possible acquisitions, the implementation of Service Operation processes is especially important to provide cost-effective capabilities for managing a growing end user population and increased scope and complexity in IT infrastructure utilized.
  • C. As part of the ongoing Service Management initiative within Vision Media, the implementation of Service Operation is a vital element necessary to enable service quality and reduce the overall expenditure on IT. This is because Service Operation is ultimately where the designs and optimizations introduced by IT are deployed, and from a business perspective where the actual value of IT Service Management is seen. Specific benefits delivered as a result of improved Service Operation includes: Given current plans for growth of Vision Media and possible acquisitions, the implementation of Service Operation is especially important to provide processes for reactively managing a growing end user population and increased scope and complexity in IT infrastructure utilized.
  • D. As part of the ongoing Service Management initiative within Vision Media, the implementation of Service Operation is a vital element necessary to achieve service quality and support the objectives defined for the IT department. This is because Service Operation is ultimately where the designs and optimizations introduced by IT are supported, and from a business viewpoint where the actual value of IT is seen. Specific benefits delivered as a result of improved Service Operation includes: Given current plans for growth of Vision Media and possible acquisitions, the implementation of Service Operation is especially important to provide cost-effective processes for managing a growing end user population and increased scope and complexity in IT infrastructure utilized.
Answer:

B

Discussions

Question 2

Which of the following is NOT an objective of Service Operation?

  • A. Thorough testing, to ensure that services are designed to meet business needs
  • B. To deliver and support IT Services
  • C. To manage the technology used to deliver services
  • D. To monitor the performance of technology and processes
Answer:

A

Discussions

Question 3

Scenario
Brewsters is a toy factory that has been in business for 30 years. The company started with a small family run shop and has
grown consistently over the years. They are now supplying toy stores nationwide and are considered to be the primary
supplier of childrens collectable novelty erasers.
Brewsters IT department is relatively small (currently 15 staff) but efficient. They have recently employed an IT Manager in
an attempt to improve the management of the infrastructure, as well as more effective use of resources and identification of
areas for improvement.
The Brewsters management teams do not have a lot of IT knowledge. The newly appointed IT Manager is very ITIL focused
and wants to implement as many ITSM processes as is appropriate there are currently no formal processes in place. On
starting with the company the IT Manager completed an internal assessment of the IT infrastructure including staff skills
analysis, and collated the results from customer satisfaction surveys completed over the last 5 years.
The main areas of concern are as follows:
Responses from customer satisfaction survey:
Results from Staff Skills Analysis:
Results from General IT Infrastructure assessment:
Refer to Scenario
Through further investigation you identify that there is no formal means of collecting data to identify service improvement,
other than customer surveys. These are very subjective and do not give a balanced picture regarding quality of service.
Through discussions with the Continual Service Improvement Manager, you decide to start collecting a range of metrics to
help identify service improvements.
Which metrics would be relevant to Service Desk?

  • A. % of calls resolved by Service Desk Average time to identify incident Average time to escalate incident % of user updates conducted within target times Customer feedback Average Service Desk cost of handling incident
  • B. % of calls resolved by Service Desk Average time to resolve incident Average time to escalate incident % of customer updates conducted within target times Customer feedback Average Service Desk cost of handling incident
  • C. o % of calls answered by Service Desk Average time to escalate incident % of customer updates conducted within Service Desk hours Customer feedback Average cost of handling incident
  • D. % of calls answered by Service Desk Average time to resolve problems Average time to escalate problem % of customer updates conducted within Service Desk times Customer feedback Average cost of handling problem
Answer:

B

Discussions

Question 4

Scenario
Vision Media is an international media organization, operating various lines of business including:
The organization has recently been restructured, and now is comprised of the following companies and departments:
The organization is also actively pursuing growth in the online market, and is currently holding discussions with the leading
online news provider about the possible acquisition of their company. This would increase the overall size of Vision Media by
around 15%.
The Information Technology department acts as a Shared Service Unit, providing IT Services to all of sub-companies and
departments, which complement some of the Internal Service Providers that also exist. The director of Information
Technology has realized the need to improve the quality of services offered by implementing ITIL, and has decided to do so
using a phased approach. Some of the Service Design and Service Transition processes have already been implemented,
and they are now planning the implementation of Service Operation.
While the IT director does have tentative support from the other directors and CEO, budgets for implementing the Service
Operation processes have not been finalized, and still require a business case to be formally submitted.
Refer to the exhibit.
There is some confusion as to how the process of Access Management should be designed. In particular, there is debate as
to how the process should be integrated into the overall approach of IT Service Management within Vision Media. The IT
director has asked for submissions from some of her staff, describing how they think Access Management should be
designed.
Which of the following submissions describes the most appropriate way in which to design and implement Access
Management within Vision Media?

  • A. The design of a quality Access Management process will need to consider the current state of IT Service Management that exists within the IT department, as well as the organizational requirements of Vision Media in general. This will require interfaces to be created with:
  • B. The design of an efficient Access Management process will need to account for the existing IT Service Management processes already implemented within the IT department, as well as the Human Resource requirements of Vision Media in general. This will require interfaces to be created with:
  • C. It is important that the implementation of Access Management considers a number of key interfaces with existing IT Service Management processes, as well as other business processes, to ensure success and satisfaction of its defined objectives. This includes:
  • D. Access Management will need to be implemented in isolation from existing IT Service Management processes already in place at Vision Media so that its integrity can be ensured. The only exception to this is Information Security Management, which is responsible for the development and renewal of security policies, guidelines and procedures. Access Management uses these as formal inputs, which are then executed accordingly.
Answer:

C

Discussions

Question 5

Scenario
Vision Media is an international media organization, operating various lines of business including:
The organization has recently been restructured, and now is comprised of the following companies and departments:
The organization is also actively pursuing growth in the online market, and is currently holding discussions with the leading
online news provider about the possible acquisition of their company. This would increase the overall size of Vision Media by
around 15%.
The Information Technology department acts as a Shared Service Unit, providing IT Services to all of sub-companies and
departments, which complement some of the Internal Service Providers that also exist. The director of Information
Technology has realized the need to improve the quality of services offered by implementing ITIL, and has decided to do so
using a phased approach. Some of the Service Design and Service Transition processes have already been implemented,
and they are now planning the implementation of Service Operation.
While the IT director does have tentative support from the other directors and CEO, budgets for implementing the Service
Operation processes have not been finalized, and still require a business case to be formally submitted.
Refer to the exhibit.
Sally Robbins, who had previously managed the IT departments Service Desk, has now been assigned the role of Incident
Manager. To assist in the implementation of the process, Sally has conducted a number of meetings with IT staff, customers,
external suppliers and other relevant stakeholders to identify their requirements. Based on these discussions, Sally has
created following impact definitions, which will be used in conjunction to the given urgency to determine the appropriate
timescales and effort applied for response and resolution to recorded incidents.

Impact Definition:
Low Impact
Medium Impact
High Impact
Major Incident
Example Incidents:
I. The IT manager of Vision Films detects that their dedicated Virtual Private Network linking them to Vision Medias
corporate IT systems has failed. This has prevented users from accessing or modifying any file, document or system
maintained by the centralized IT department of Vision Media.
II. The vice-president of the Finance and Administration department reports that her laptop keeps rebooting. She has an
important report to complete for the Chief Executive Officer.
III. The president of Vision TV is unable to stream high-definition video from a regional office. He requires the regional
offices WAN connection to be upgraded to a 14.4 M/bit wireless mobile network.
IV. A IT staff member is alerted to the failure of systems provided by Human Resources to all other departments and sub
companies to manage payments and leave for Vision Media employees (and those employed by organizations fully owned
by Vision Media)
Which of the following responses provides the correct assignment of impact to the above incidents?

  • A. I. High Impact II. Medium Impact III. Not an incident, should be a Request for Change IV. Major Incident
  • B. I. High Impact II. Low Impact III. Not an incident, should be a Request for Change IV. Major Incident
  • C. I. Major Incident II. Medium Impact III. High Impact IV. Major Incident
  • D. I. High Impact II. Low Impact III. Medium Impact IV. Major Incident
  • E. The IT manager of Vision Films detects that their dedicated Virtual Private Network linking them to Vision Medias corporate IT systems has failed. This has prevented users from accessing or modifying any file, document or system maintained by the centralized IT department of Vision Media. II. The vice-president of the Finance and Administration department reports that her laptop keeps rebooting. She has an important report to complete for the Chief Executive Officer. III. The president of Vision TV is unable to stream high-definition video from a regional office. He requires the regional offices WAN connection to be upgraded to a 14.4 M/bit wireless mobile network. IV. A IT staff member is alerted to the failure of systems provided by Human Resources to all other departments and sub companies to manage payments and leave for Vision Media employees (and those employed by organizations fully owned by Vision Media) Which of the following responses provides the correct assignment of impact to the above incidents?
Answer:

B

Discussions

Question 6

There have been multiple incidents recorded by the Service Desk. It appears that the network is congested due to multiple
connections.
What kind of actions should the Service Desk analyst take in this instance?

  • A. They should ask the Capacity Manager to expand the capacity of the network
  • B. They should ask the Problem Manager to look into the problem right away
  • C. They should ask the Security Manager to check whether too many authorizations may have been issued.
  • D. They should ask the Service Level Manager to revise the Service Level Agreements (SLA) with a decreased availability target
Answer:

B

Discussions

Question 7

Which of the following BEST describes the purpose of Event Management?

  • A. To detect events, make sense of them and determine the appropriate control action
  • B. To monitor interactions and exceptions within the infrastructure
  • C. To monitor and control the activities of technical staff
  • D. To detect and escalate exceptions to normal service operation
Answer:

A

Discussions

Question 8

The success of Service Operation phase is based on some important Critical Success Factors. From the options below,
which would be the most important for Service Operation?

  • A. Management support for using phase Business support to ensure users use Service Desk as little as possible Champions to drive process usage Staffing and retention of Service Desk Service management usage Suitable tools especially Incident Management Measurement and reporting of capacity
  • B. Management support for setting up phase Business support to ensure users call Service Desk Champions to lead process implementation Staffing and retention of Service Desk Service management training Suitable tools Measurement and reporting of usage
  • C. Management support for setting up SD Business support to ensure users call Service Desk Champions to lead Service Support Staffing and retention of Service Desk Service management understanding Suitable tools especially Service Desk Measurement and reporting
  • D. Management support for setting up phase Business support to ensure users use Service Desk Champions to lead process implementation Staffing and retention of Service Desk Service management training Suitable tools especially Service Desk Measurement and reporting
Answer:

D

Discussions

Question 9

Scenario
NEB is a financial management company that specializes in lending money for substantial property investments. They have
a large IT department that is currently using the following ITSM processes:
Each of these processes have been implemented within the planned target time and are working effectively and efficiently.
Staff have adapted to the changes in a very positive manner and see the benefits of using the ITIL framework.
Last Saturday, there was a security breach. A previous member of staff, who has left the company and joined a competitor
organization, has been able to gain access to several client lending files. After initial investigation, it was found that access
was not terminated when the staff member left the company this has highlighted that there are insufficient processes in
place to ensure access rights are terminated when staff leave the company, change roles etc and there is ongoing
investigation to see how many other previous staff still have access to the system.
The business has requested immediate recommendations from the IT Manager, as to what can be done to ensure this
situation does not happen again and how best to inform clients, with reference to the security breach.
Refer to the scenario.
Which of the following options is most suitable to deal with this situation?

  • A. Your first recommendation is to implement the Access Management process as soon as possible. You suggest that as the IT organization has already effectively and efficiently implemented six processes, they will be able to manage a well executed and fast implementation. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not. With regards to informing clients, you recommend that clients are not told of the situation as you feel it will be too damaging to the NEB reputation and will result in a catastrophic loss of clientele. You suggest that if clients are contacted by the competitor organization, they cannot prove that any information has been obtained via NEB files and (as there is now a plan to implement Access Management) NEB can confidently reassure clients that there is ample security and access management in place to ensure this situation could never arise.
  • B. Your first recommendation is to implement the Access Management process as soon as possible. You suggest that as the IT organization has already effectively and efficiently implemented six processes, they will be able to manage a well executed and fast implementation. As Access Management is the execution of the policies laid out within the Availability and Information Security Processes, the foundations are already laid. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not. To ensure alignment between the Business and IT, there will need to be integration with the Human Resources department to ensure there are consistent communications with regards to staff identity, start and end dates etc. With regards to informing clients of the breach, you suggest that the clients affected by the breach must be informed ASAP. You recommend a formal letter is sent from senior management to reassure clients that the situation is being taken seriously and what actions are taking place to ensure this never happens again. You are aware that this could damage the companys reputation, as security is a critical success factor, but feel that the specific clients must be informed by NEB ASAP, as there is a high risk they will be approached by the competitor organization.
  • C. Your first recommendation is to implement the Access Management process as soon as possible. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not. With regards to informing clients of the breach, you suggest that only the specifically affected clients are informed of the breach, via a formal letter sent from senior management to reassure clients that the situation is being taken seriously. You suggest that the tone and focus of the letter should emphasize the following points:
  • D. Your first recommendation is to implement the Access Management process as soon as possible. You suggest that as the IT organization has already effectively and efficiently implemented six processes, they will be able to manage a well executed and fast implementation. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not. With regards to informing clients of the breach, you suggest that all clients need to be informed of the breach and the action being taken to ensure this does not happen again. You are aware that this could damage the companys reputation, but are concerned that if only the specifically affected clients are informed, word will spread and the entire client base will feel they have been kept out of the loop on such an important issue and further damage to NEBs reputation will be felt.
Answer:

B

Discussions

Question 10

Technical Management is NOT responsible for?

  • A. Maintenance of the technical Infrastructure
  • B. Documenting and maintaining the technical skills required to manage and support the IT Infrastructure
  • C. Defining the Operational Level Agreements for the various technical teams
  • D. Diagnosis of, and recovery from, technical failures
Answer:

C

Discussions
To page 2