Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ITIL ITIL-4-Foundation Practice Exam with Questions & Answers | Set: 2

Questions 16

What is the purpose of the 'information security management1 practice?

Options:
A.

To ensure that accurate and reliable information about the configuration of services is available when and where it is needed

B.

To observe services and service components

C.

To protect the information needed by the organization to conduct its business

D.

To plan and manage the full lifecycle of all IT assets

Questions 17

Which practice has a purpose that includes ensuring that risks have been properly assessed?

Options:
A.

Service configuration management

B.

Problem management

C.

Service level management

D.

Change control

Questions 18

Which is a purpose of the 'engage' value chain activity?

Options:
A.

Meeting expectations for quality, costs and time-to-market

B.

Ensuring the continual improvement of services

C.

Ensuring that the organization's vision is understood

D.

Providing transparency and good relationships

Questions 19

Identify the missing words in the following sentence.

The management of information security incidents usually requires [?].

Options:
A.

Immediate escalation

B.

Specialist teams

C.

A separate process

D.

Third party support

Questions 20

How does information about problems and known errors contribute to 'incident management'?

Options:
A.

It enables the reassessment of known erros

B.

It enables quick and efficient diagnosis of incidents

C.

It removes the need for collaboration during incident resolution

D.

It removes the need for regular customer updates

Questions 21

When should a full risk assessment and authorization be carried out for a standard change?

Options:
A.

Each time the standard change is implemented

B.

When the procedure for the standard change is created

C.

At least once a year

D.

When an emergency change is requested

Questions 22

Which TWO statements about the 'service request management' practice are CORRECT?

1. Service requests are part of normal service delivery

2. Complaints can be handled as service requests

3. Service requests result from a failure in service

4. Normal changes should be handled as service requests

Options:
A.

3 and 4

B.

2 and 3

C.

1 and 4

D.

1 and 2

Questions 23

When should the effectiveness of a problem workaround be assessed?

Options:
A.

Whenever the workaround is used

B.

Whenever the problem is resolved

C.

Whenever the workaround becomes a known error

D.

Whenever the problem is prioritized

Questions 24

How should the workflow for a new service request be designed?

Options:
A.

Use a single workflow for all types of service request

B.

Leverage existing workflows whenever possible

C.

Use different workflows for each type of service request

D.

Avoid workflows for simple service requests

Questions 25

Identify the missing word in the following sentence.

The use of [?] should support, not replace what is observed, when using the 'start where you are1 guiding principle.

Options:
A.

plans

B.

measurement

C.

process

D.

tools

Questions 26

Which ITIL practice has a purpose that includes reducing the likelihood of incidents?

Options:
A.

Change control

B.

Continual improvement

C.

Problem management

D.

Service desk

Questions 27

Which stakeholders co-create value in a service relationship?

Options:
A.

Investor and consumer

B.

Investor and supplier

C.

Consumer and provider

D.

Provider and supplier

Questions 28

Which practice owns and manages issues, queries and requests from users?

Options:
A.

Service desk

B.

Problem management

C.

Incident management

D.

Change control

Questions 29

Which describes a set of defined steps for implementing improvements?

Options:
A.

The ‘improve’ value chain activity

B.

The ‘continual improvement register’

C.

The ‘continual improvement model’

D.

The ‘engage’ value chain activity

Questions 30

Which is a purpose of the 'service desk' practice?

Options:
A.

To reduce the likelihood and impact of incidents by identifying actual and potential causes of incidents

B.

To capture demand for incident resolution and service requests

C.

To set clear business-based targets for service performance

D.

To maximize the number of successful IT changes by ensuring risks are properly assessed