Ans: IT investments and staff always find that they break their work timelines. This happens since the unscheduled work always takes priority over the work that is planned. ITIL can help an organization stop this continuous cycle and can therefore, help employees focus on the Total Cost of Ownership (TCO) and other activities in their department.
Ans: It is the task of Change Manager. A Change Manager will plays a key role in ensuring that the projects (change initiatives) meet their objectives within timelines and said budgets by increasing employee adoption and usage. This person will focus on the people’s side of change, including changes to business processes, systems and technology, job roles and organization structures.
Ans: It is known as Post Implementation Review (PIR). PIR is an assessment and review of the complete working solution. It will be performed after a period of live running, sometimes after the project is completed.
The Post Implementation Review is used to evaluate the effectiveness of system development after the system has been in production for a specific period (usually 6 months). It is a free-form report, and not all sections are relevant or necessary to the final product. A description of the Post Implementation Review Report is always attached.
Ans: Capacity Management is responsible for ensuring that the organization is aware of new and changing technology. It is the discipline that checks and verifies that IT infrastructure is provided at the right time in the right volume at a right price with utmost efficiency.
This involves input from many areas of the business to identify what services are (or will be) required, what IT infrastructure is required to support these services, what level of Contingency will be needed, and what will be the cost of this infrastructure.
Ans: An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services. OLAs are designed to address and solve the problem of IT silos by setting forth a specific set of criteria and defining a specific set of IT services to be performed by each department.
It should be noted that the term Service Level Agreement (SLA) is used in many companies while discussing agreements between two internal groups. However, according to Information Technology Infrastructure Library (ITIL) framework for best practices, this type of internal contract should is better known as an Operational Level Agreement.
Ans: The two service management processes are- Availability Management and IT Service Continuity Management
ITIL Availability Management aims at defining, analyzing, planning, measuring and improving all aspects of the availability of IT services. Availability Management is responsible for ensuring that all IT infrastructure, processes, tools, roles, etc are appropriate for the agreed availability targets.
IT Service Continuity Management (ITSCM) aims at managing risks that could seriously impact IT services. ITSCM ensures that the IT service provider can always provide minimum agreed Service Levels, by reducing the risk from disaster events to an acceptable level and planning for the recovery of IT services. ITSCM should be designed to support Business Continuity Management.
Basically the V2 process areas have been logically grouped into a phased lifecycle approach.
In contrast to ITIL v2, ITIL v3 clearly defines the roles and responsibilities in each process and reasons the role of communication in the entire lifecycle.
Ans: Different knowledge management systems are:
Ans:
Ans: Availability % = (Available service time –downtime) / Available service time to ensure that all the IT services are available and are functioning correctly whenever customers and users want to use them in the framework of the SLAs in force.
Ans: ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including selection, implementation and management of controls, taking into consideration the organization’s information security risk environment(s).
It is designed to be used by organizations that intend to:
Ans: The PDSA Cycle is a systematic series of steps for gaining valuable learning and knowledge for the continual improvement of a product or process. Also known as the Deming Wheel, or Deming Cycle, the concept and application was first introduced to Dr. Deming by his mentor, Walter Shewhart of the famous Bell Laboratories in New York.
Ans: Information security policies are the documented business and technical rules for protecting an organization from information security risk faced by its business and technical infrastructure. These written policy documents provide a high-level description of the various controls, which the organization will use to manage its information security risks.
The information security policy documents are also considered to be a formal declaration of management’s intent to protect its information asset from relevant risks. In specific cases, the policies are supported by information security procedures that identify key activities required to implement relevant information security policies.
Ans: Balanced scorecard is a strategic planning and management system that is used extensively in business and industry, government, and nonprofit organizations worldwide to align business activities to the vision and strategy of the organization, improve internal and external communications, and monitor organization performance against strategic goals.
Ans: Service requests are a formal request submitted by a user for some type of service, software, or hardware. A Service request generally refers to something the user wants and/or needs but does not already have, such as a printer or laptop. Service requests often involve items that are already approved. For instance, if it is a company policy that all employees get access to the cloud-based CRM system, and someone from the marketing department sends a service request for access to the CRM, this does not need any additional approval. The IT help desk can simply fulfill this request.
Ans: CMDB contains contents that are intended to hold a collection of IT assets commonly referred to as configuration items (CI) as well as descriptive relationships between such assets. When populated, the repository becomes a means of understanding how critical assets such as information systems are composed, what are their upstream sources or dependencies, and what are their downstream targets.
Ans: According to modern portfolio theory, there is a trade-off between risk and return. All other factors being equal, if a particular investment incurs a higher risk of financial loss for prospective investors, those investors must be able to expect a higher return in order to be attracted to the higher risk.
In majority of cases, even though there is no promise of higher returns on risky assets, so the higher risk just tends to scare off potential investors, keeping the returns on a given investment low. The only investments that can really try to promise higher returns for higher risk are bonds, and even then the higher returns won’t be generated if the issuing organization goes default.
Ans:
End-User: An end user or end customer directly receives the service or employs the product. End users are not the only customers as there may be intermediate entities like purchasing departments, whose expectations or needs must be carried forward through a series of service contracts or requirement definitions.
Customer: A customer may or may not have the ability to choose between different products and suppliers. For instance- In monopoly situations like local telephone and cable television services, there are scenarios when end users do not make the purchasing decision. It may include Clients of social service agencies or court-appointed lawyers or employees of an organization where the purchasing department makes the choices.
Ans: IT Service Continuity is a subset of Business Continuity Planning (BCP) and encompasses IT disaster recovery planning and wider IT resilience planning. It also incorporates those elements of IT infrastructure and services that relate to communications such as (voice) telephony and data communications.
It is a systematic process to prevent, predict and manage Information and Communications Technology (ICT) disruption and incidents, which have the potential to disrupt ICT services and should result in a more resilient IT service capability aligned to wider organizational requirements.
Ans: Outsourcing
Ans: Risks can come in many different forms including; financial markets, failures with IT or business projects, legal liabilities, credit risk, accidents and mistakes, natural causes and disasters as well as deliberate attacks from an adversary such as hacking.
Ans: SACM stands for Service Asset and Configuration Management. By capturing information and keeping it up to date, we help people make informed decisions at the right time. In addition, providing accurate configuration information can proactively help resolve incidents and problems much faster.
Q26. What is an OLA?
Ans: The Operational Level Agreement is an agreement between an IT service provider and another part of the same organization. This could be the development team, the support team or helpdesk
Ans: Critical Success Factor (CSF) is the term for an element that is necessary for an organization or project to achieve its mission. It is what drives the company forward through its strategy.
Q28. When would we create a Service Design Package?
Ans: An SDP is produced for each new IT service, major change, or IT service retirement.
Ans: The Service Catalogue contains a list of services that an organization provides, often to its employees or customers. For each service within the catalogue, we typically include description, timeframes or SLA for fulfilling the service, owners (who is entitled to request/view the service), costs and how to fulfil the service.
Ans: Attachment sizes for mailboxes
Ans: We use Change Management to standardize our methods and procedures for dealing with changes and thereby reducing risk and disruption. We record all changes to assets or confirmation items in the Configuration Management System. This allows us to define and agree on those changes and ensure that only people who have the appropriate authority can make changes.
Ans:
Ans:
Ans:
Ans: All of these are types of testing: