Q31. Which of the following would NOT be contained in a release policy?
A. Naming and numbering conventions
B. Entry and exit criteria of the release into testing
C. Roles and responsibilities for the release
D. The risk register for the release
Answer: D
Q32. Which process will perform risk analysis and review of all suppliers and contracts on a regular basis?
A. The service level management
B. The IT service continuity management
C. The service catalogue management
D. The supplier management
Answer: D
Q33. Which one of the following is NOT a responsibility of the service transaction stage of the service lifecycle?
A. To ensure that a service managed and operated accordance with constraints specified during design
B. To design and develop capabilities for service management
C. To provide good-quality knowledge and information about services
D. To plan the resources required to manage a release
Answer: B
Q34. The consideration of value creation is a principle of which stage of the service lifecycle?
A. Continual service improvement
B. Service strategy
C. Service design
D. Service transition
Answer: B
Q35. Which of the following areas would technology help to support during the service lifecycle?
1. Data mining and workflow
2. Measurement and reporting
3. Release and deployment
4. Process design
A. 2, 3 and 4 only
B. 1, 3 and 4 only
C. 1, 2 and 3 only
D. All of the above
Answer: D
Q36. Which one of the following activities does application management perform?
A. Defining where the vendor of an application should be located
B. Ensuring that the required functionality is available to achieve the required business outcome
C. Deciding who the vendor of the storage devices will be
D. Agreeing the service levels for the service supported by the application
Answer: B
Q37. Which one of the following is NOT an aim of the change management process?
A. To ensure the impact of changes are understood
B. To ensure that changes are recorded and evaluated
C. To ensure that all changes to configuration items (CIs) are recorded in the configuration management system (CMS)
D. To deliver and manage IT services at agreed levels to business users
Answer: D
Q38. Why are public frameworks, such as 1TIL, attractive when compared to proprietary knowledge?
A. Proprietary knowledge may be difficult to adopt, replicate or transfer since it is often undocumented
B. Public frameworks are always cheaper to adopt
C. Public frameworks are prescriptive and tell you exactly what to do
D. Proprietary knowledge has been tested in a wide range of environments
Answer: A
Q39. The multi-level SLA' is a three-layer structure. Which one of the following layers is NOT
part of this type of SLA?
A. Customer level
B. Service level
C. Corporate level
D. Configuration level
Answer: D
Q40. Which one of the following functions would be responsible for the management of a data centre?
A. Technical management
B. Service desk
C. Application management
D. Facilities management
Answer: D