Which activity in the Problem Management process is responsible for generating Requests for Change (RFCs)?
A. Problem Analysis
B. Proactive Problem Management
C. Monitoring
D. Error Control
When an organization decides to control the flow of incident information within the IT organization, which ITIL process would it be putting in place?
A. Problem Management
B. Incident Management
C. Change Management
D. Availability Management
What is the term used for a fully described and approved Change that does not have to be evaluated by Change Management each time?
A. Standard Change
B. Request for Change
C. Urgent Change
D. Service Request
Software is checked for viruses before it goes into the Definitive Software Library (DSL). What ITIL process is responsible for ensuring that only virus-free software is put into the DSL?
A. Release Management
B. Application Management
C. Capacity Management
D. Configuration Management
When must a Post Implementation Review take place?
A. at the request of the person who submitted the Change request
B. in case of emergency changes
C. if another incident of the same type occurs again after a Change has been made
D. after every Change
Which activity is not the responsibility of IT Service Continuity Management?
A. analyzing risks
B. executing impact analyses of incidents related to the back-out facilities
C. drawing up back-out scenarios
D. testing back-out arrangements
Which ITIL process has the objective of helping to monitor the IT services by maintaining a logical model of the IT infrastructure and IT services?
A. Capacity Management
B. Change Management
C. Configuration Management
D. Financial Management for IT services
According to the Deming quality circle a number of steps must be performed repeatedly in order to ensure good performance. Which of the following answers specifies the correct sequence for these steps?
A. Plan - Do - Check - Act
B. Act - Check - Do - Plan
C. Do - Plan - Check - Act
D. Check - Plan - Act - Do
Which ITIL process verifies that the modifications which have been made to the IT infrastructure have been properly documented?
A. Configuration Management
B. Problem Management
C. Incident Management
D. Availability Management
Security Management includes a number of sub-processes. Which activity of Security Management leads to a security sub-clause in the Service Level Agreement (SLA)?
A. Implement
B. Maintenance
C. Plan
D. Control