InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How Is It Service Continuity Management (itscm) Related To Business Continuity Planning (bcp)? |
|
Answer» IT Service Continuity is a subset of Business Continuity PLANNING (BCP) and encompasses IT disaster RECOVERY planning and wider IT resilience planning. It ALSO incorporates those elements of IT infrastructure and services that relate to communications such as (voice) telephony and data communications. IT Service Continuity is a subset of Business Continuity Planning (BCP) and encompasses IT disaster recovery planning and wider IT resilience planning. It also incorporates those elements of IT infrastructure and services that relate to communications such as (voice) telephony and data communications. |
|
| 2. |
What Is The Difference Between End-users And Customers? |
|
Answer» End-User – An end user or end customer directly receives the service or employs the product. End users are not the only customers as there may be intermediate entities like purchasing departments, whose expectations or needs must be carried forward through a series of service contracts or REQUIREMENT definitions. End-User – An end user or end customer directly receives the service or employs the product. End users are not the only customers as there may be intermediate entities like purchasing departments, whose expectations or needs must be carried forward through a series of service contracts or requirement definitions. |
|
| 3. |
Is There A Trade-off Between Return And Risk? |
|
Answer» According to modern portfolio theory, there is a trade-off between risk and return. All other factors being equal, if a particular INVESTMENT incurs a higher risk of financial loss for prospective investors, those investors must be able to expect a higher return in order to be attracted to the higher risk. According to modern portfolio theory, there is a trade-off between risk and return. All other factors being equal, if a particular investment incurs a higher risk of financial loss for prospective investors, those investors must be able to expect a higher return in order to be attracted to the higher risk. |
|
| 4. |
What Type Of Information Is Stored In A Cmdb? |
|
Answer» CMDB contains contents that are intended to hold a collection of IT assets commonly referred to as configuration ITEMS (CI) as well as DESCRIPTIVE relationships between such assets. When populated, the repository becomes a means of UNDERSTANDING how critical assets such as information systems are composed, what are their UPSTREAM sources or DEPENDENCIES, and what are their downstream targets. CMDB contains contents that are intended to hold a collection of IT assets commonly referred to as configuration items (CI) as well as descriptive relationships between such assets. When populated, the repository becomes a means of understanding how critical assets such as information systems are composed, what are their upstream sources or dependencies, and what are their downstream targets. |
|
| 5. |
What Is A Service Request? |
|
Answer» Service requests are a formal request submitted by a user for some type of service, software, or hardware. A Service request generally REFERS to something the user wants and/or NEEDS but does not already have, such as a PRINTER or laptop. Service requests often involve items that are already approved. For INSTANCE, if it is a company policy that all employees get access to the cloud-based CRM system, and someone from the marketing department sends a service request for access to the CRM, this does not need any additional APPROVAL. The IT help desk can simply fulfill this request. Service requests are a formal request submitted by a user for some type of service, software, or hardware. A Service request generally refers to something the user wants and/or needs but does not already have, such as a printer or laptop. Service requests often involve items that are already approved. For instance, if it is a company policy that all employees get access to the cloud-based CRM system, and someone from the marketing department sends a service request for access to the CRM, this does not need any additional approval. The IT help desk can simply fulfill this request. |
|
| 6. |
What Is A Balanced Scorecard? |
|
Answer» Balanced scorecard is a strategic planning and management system that is used extensively in business and INDUSTRY, government, and nonprofit ORGANIZATIONS worldwide to align business activities to the VISION and strategy of the organization, IMPROVE internal and external communications, and MONITOR organization performance against strategic goals. Balanced scorecard is a strategic planning and management system that is used extensively in business and industry, government, and nonprofit organizations worldwide to align business activities to the vision and strategy of the organization, improve internal and external communications, and monitor organization performance against strategic goals. |
|
| 7. |
What Type Of Information Is Captured In An Information Security Policy? |
|
Answer» Information security policies are the DOCUMENTED BUSINESS and technical rules for protecting an organization from information security risk faced by its business and technical infrastructure. These written policy documents provide a high-level description of the various controls, which the organization will use to manage its information security risks. Information security policies are the documented business and technical rules for protecting an organization from information security risk faced by its business and technical infrastructure. These written policy documents provide a high-level description of the various controls, which the organization will use to manage its information security risks. |
|
| 8. |
What Is Plan-do-check-act (pdsa) Cycle? |
|
Answer» The PDSA CYCLE is a systematic series of steps for gaining valuable learning and knowledge for the continual IMPROVEMENT of a product or process. Also known as the Deming WHEEL, or Deming Cycle, the concept and application was first introduced to Dr. Deming by his mentor, Walter Shewhart of the FAMOUS Bell Laboratories in New York. • Plan: Identifying and analyzing the problem. The PDSA Cycle is a systematic series of steps for gaining valuable learning and knowledge for the continual improvement of a product or process. Also known as the Deming Wheel, or Deming Cycle, the concept and application was first introduced to Dr. Deming by his mentor, Walter Shewhart of the famous Bell Laboratories in New York. • Plan: Identifying and analyzing the problem. |
|
| 9. |
What Is Iso/iec 27002? |
|
Answer» ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including selection, implementation and management of CONTROLS, taking into consideration the ORGANIZATION’s information security risk environment(s). • select controls within the PROCESS of implementing an Information Security Management System based on ISO/IEC 27001; ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including selection, implementation and management of controls, taking into consideration the organization’s information security risk environment(s). • select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001; |
|
| 10. |
What Is The Relation Between Availability, Availability Service Time And Downtime? |
|
Answer» Availability % = (AVAILABLE SERVICE time –downtime) / Available service time to ensure that all the IT services are available and are FUNCTIONING correctly WHENEVER customers and users want to use them in the framework of the SLAs in force. Availability % = (Available service time –downtime) / Available service time to ensure that all the IT services are available and are functioning correctly whenever customers and users want to use them in the framework of the SLAs in force. |
|
| 11. |
What Are The Itil Based Models Adopted By An Organization.? |
|
Answer» • Microsoft MOF: Microsoft OPERATIONS Framework (MOF) is a series of 23 documents that guide IT professionals through the processes of creating, implementing and managing efficient and cost-effective services. • Microsoft MOF: Microsoft Operations Framework (MOF) is a series of 23 documents that guide IT professionals through the processes of creating, implementing and managing efficient and cost-effective services. |
|
| 12. |
What Are The Different Knowledge Management Systems? |
|
Answer» Different knowledge management systems are:- • CMIS (Capacity Management information system) – A Capacity Management Information System or CMIS is a collection of IT INFRASTRUCTURE usage, capacity and performance information that is gathered in a consistent manner and stored in one or more databases. It is a single book of record for all usage, capacity, and performance data, complete with associated business, application and service statistics. Any IT staffer who NEEDS access to capacity management data can potentially use a CMIS. Different knowledge management systems are:- • CMIS (Capacity Management information system) – A Capacity Management Information System or CMIS is a collection of IT infrastructure usage, capacity and performance information that is gathered in a consistent manner and stored in one or more databases. It is a single book of record for all usage, capacity, and performance data, complete with associated business, application and service statistics. Any IT staffer who needs access to capacity management data can potentially use a CMIS. |
|
| 13. |
What Is The Difference Between Itil V3 And V2? |
|
Answer» • The ITIL v2 LIBRARY was organized in seven core books: (i) Service Support, (i) Service Strategy, Basically the V2 PROCESS areas have been logically grouped into a phased lifecycle approach • The ITIL v2 library was organized in seven core books: (i) Service Support, (i) Service Strategy, Basically the V2 process areas have been logically grouped into a phased lifecycle approach |
|
| 14. |
Explain Service Portfolio, Service Catalogue And Service Pipeline. |
|
Answer» Service portfolio – DEFINES services PROVIDED by service provider across all Market and all customers. The objective of ITIL Service Portfolio Management is to manage the service portfolio. Service Portfolio Management ensures that the service provider has the right mix of services to MEET required business outcomes at an appropriate level of investment. Service portfolio – Defines services provided by service provider across all Market and all customers. The objective of ITIL Service Portfolio Management is to manage the service portfolio. Service Portfolio Management ensures that the service provider has the right mix of services to meet required business outcomes at an appropriate level of investment. |
|
| 15. |
What Two Service Management Processes Will Most Likely Use Risk Analysis And Management Methodology? |
|
Answer» The two service management processes are- Availability Management and IT Service Continuity Management The two service management processes are- Availability Management and IT Service Continuity Management |
|
| 16. |
Suppose A Service Level Manager Requires Confirmation Wherein The Internal Service Desk Can Answer A Certain Percentage Of Calls Within 10 Seconds. In What Document Would The Service Desk’s Agreement To This Requirement Be Recorded? |
|
Answer» An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services. OLAs are designed to address and solve the problem of IT SILOS by setting forth a specific set of criteria and defining a specific set of IT services to be performed by each department. An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services. OLAs are designed to address and solve the problem of IT silos by setting forth a specific set of criteria and defining a specific set of IT services to be performed by each department. |
|
| 17. |
What Itil Process Ensures That The Organization Is Aware Of New And Changing Technology? |
|
Answer» Capacity Management is responsible for ensuring that the ORGANIZATION is aware of new and changing technology. It is the discipline that CHECKS and verifies that IT infrastructure is provided at the right TIME in the right VOLUME at a right price with utmost efficiency. Capacity Management is responsible for ensuring that the organization is aware of new and changing technology. It is the discipline that checks and verifies that IT infrastructure is provided at the right time in the right volume at a right price with utmost efficiency. |
|
| 18. |
How Does Itil Help To Reduce Costs And Minimize Total Cost Of Ownership (tco) For It Investments? |
|
Answer» IT investments and staff always find that they break their work timelines. This happens since the unscheduled work always takes PRIORITY over the work that is planned. ITIL can help an organization stop this CONTINUOUS cycle and can therefore, help EMPLOYEES focus on the TOTAL Cost of Ownership (TCO) and other activities in their DEPARTMENT. IT investments and staff always find that they break their work timelines. This happens since the unscheduled work always takes priority over the work that is planned. ITIL can help an organization stop this continuous cycle and can therefore, help employees focus on the Total Cost of Ownership (TCO) and other activities in their department. |
|