Download ITIL Service Capability Operational Support and Analysis.ITILSC-OSA.PracticeTest.2017-04-12.24q.vcex

Vendor: ITIL
Exam Code: ITILSC-OSA
Exam Name: ITIL Service Capability Operational Support and Analysis
Date: Apr 12, 2017
File Size: 4 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Scenario
NEB is a financial management company that specializes in lending money for substantial property investments. They have a large IT department that is currently using the following ITSM processes:
  • Service Level Management
  • Availability Management
  • IT Service Continuity Management
  • Information Security Management
  • Incident Management
  • Problem Management.
Each of these processes have been implemented within the planned target time and are working effectively and efficiently. Staff have adapted to the changes in a very positive manner and see the benefits of using the ITIL framework.
Last Saturday, there was a security breach. A previous member of staff, who has left the company and joined a competitor organization, has been able to gain access to several client lending files. After initial investigation, it was found that access was not terminated when the staff member left the company – this has highlighted that there are insufficient processes in place to ensure access rights are terminated when staff leave the company, change roles etc and there is ongoing investigation to see how many other previous staff still have access to the system.
The business has requested immediate recommendations from the IT Manager, as to what can be done to ensure this situation does not happen again and how best to inform clients, with reference to the security breach.
Refer to the scenario.
Which of the following options is most suitable to deal with this situation?
  1. Your first recommendation is to implement the Access Management process as soon as possible. You suggest that as the IT organization has already effectively and efficiently implemented six processes, they will be able to manage a well executed and fast implementation. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not.With regards to informing clients, you recommend that clients are not told of the situation as you feel it will be too damaging to the NEB reputation and will result in a catastrophic loss of clientele. You suggest that if clients are contacted by the competitor organization, they cannot prove that any information has been obtained via NEB files and (as there is now a plan to implement Access Management) NEB can confidently reassure clients that there is ample security and access management in place to ensure this situation could never arise.
  2. Your first recommendation is to implement the Access Management process as soon as possible. You suggest that as the IT organization has already effectively and efficiently implemented six processes, they will be able to manage a well executed and fast implementation. As Access Management is the execution of the policies laid out within the Availability and Information Security Processes, the foundations are already laid. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not. To ensure alignment between the Business and IT, there will need to be integration with the Human Resources department to ensure there are consistent communications with regards to staff identity, start and end dates etc. With regards to informing clients of the breach, you suggest that the clients affected by the breach must be informed ASAP. You recommend a formal letter is sent from senior management to reassure clients that the situation is being taken seriously and what actions are taking place to ensure this never happens again. You are aware that this could damage the company’s reputation, as security is a critical success factor, but feel that the specific clients must be informed by NEB ASAP, as there is a high risk they will be approached by the competitor organization.
  3. Your first recommendation is to implement the Access Management process as soon as possible. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not.With regards to informing clients of the breach, you suggest that only the specifically affected clients are informed of the breach, via a formal letter sent from senior management to reassure clients that the situation is being taken seriously. You suggest that the tone and focus of the letter should emphasize the following points:
    • There has been a ‘minor’ security breach fault of member of staff, who’s employment has now been terminated
    • No data has been ‘lost or changed’
    • Sufficient action has been taken to ensure this situation does not happen again and NEB would like to assure their clients that there security and continued confidence is of the highest importance.
  4. Your first recommendation is to implement the Access Management process as soon as possible. You suggest that as the IT organization has already effectively and efficiently implemented six processes, they will be able to manage a well executed and fast implementation. This process will ensure that access is provided to those who are authorized to have it and will ensure access is restricted to those who are not.With regards to informing clients of the breach, you suggest that all clients need to be informed of the breach and the action being taken to ensure this does not happen again. You are aware that this could damage the company’s reputation, but are concerned that if only the specifically affected clients are informed, word will spread and the entire client base will feel they have been kept out of the loop on such an important issue and further damage to NEB’s reputation will be felt.
Correct answer: B
Question 2
Scenario
Vericom is a leading provider of government, business and consumer telecommunication services, and is currently seeking ways in which to improve its utilization of IT services to drive growth across its’ multiple lines of business. One of the largest organizations in the United Kingdom, Vericom is comprised of the following business units:
  • Verinet (providing ADSL, cable, 3GSM, dialup and satellite services)
  • Infrastructure Services (planning, installing and maintaining the PSTN and mobile network infrastructure)
  • VericomTV (Pay TV)
  • Consumer Sales and Marketing (including 400 Vericom retail outlets)
  • Business and Government
  • Finance and Administration
  • Information Technology Services (Shared Service Unit, however some business units also have their own internal service provider)
  • Human Resources
  • Vericom Wholesale (for wholesale of Vericom infrastructure services)
Due to the extensive scope of infrastructure deployed and large employee and customer base, Vericom continues to rely on legacy systems for some critical IT services; however this is seen as a barrier to future organizational growth and scalability of services offered. The CIO of Vericom has also raised the concern that while improvements to the technology utilized is important, this also needs to be supported by quality IT Service Management practices employed by the various IT departments.
The project of improving the IT Service Management practices employed by Vericom has been outsourced to external consultants who are aware of the major IT refresh that is going to be occurring over the next 24 months.
Refer to the scenario.
The Verinet business unit which provides internet services is currently facing increased competition from other Internet Service Providers seeking to entice Verinet customers away with offerings such as free VOIP (voice over internet protocol) and Naked DSL (unconditioned local loop). To combat this, Verinet wishes to develop a new marketing campaign highlighting the high quality and availability of services offered.
Before this occurs, the Service Manager within Verinet (who has previously implemented ITIL in other organizations) had recommended implementing Event Management to assist in the continued ability for providing high quality, highly available internet services to the UK population. She has been faced by some resistance, who believe that it is not required as Capacity, Availability, Incident and Problem Management have already been implemented.
Which of the following would be the BEST response to the Veritnet directors in describing the benefits of introducing Event Management to Verinet?
  1. The implementation of Event Management to complement existing ITIL processes within Verinet will have a number of significant benefits. The value to the business of implementing the process is directly seen by the following benefits:
    • Improved speed for Incident and Problem Management for identifying and analyzing the cause and potential effect
    • Improved ratio of used licenses against paid for licenses
    • Percentage re-use and redistribution of under-utilized assets and resources Improved aliment between provided maintenance and business support
    • Improvement in maintenance scheduling and management for CIs
  2. The implementation of Event Management to complement existing ITIL processes within Verinet will have a number of significant benefits. The value to the business of implementing the process is generally indirect, but would support an enhanced ability to provide high quality and high availability internet services by:
    • Providing mechanisms for the early detection of incidents and problems before they impact customers
    • Notify the appropriate staff of status changes or exceptions that so that they can respond quickly
    • Providing a basis for automated operations, increasing efficiency and allowing human resources within Verinet to be better utilized
    • Providing improved visibility as to the events and interactions that occur within the IT infrastructure
    • Providing performance and utilization information and trends that can be used for improved capacity planning and system design
  3. The implementation of Event Management to complement existing ITIL processes within Verinet will have a number of significant benefits. The value to the business of implementing the process is generally indirect, but would support an enhanced ability to provide high quality and high availability internet services by:
    • Providing mechanisms for the early detection of incidents and problems before they impact customers
    • Developing capabilities for the monitoring of critical components of the IT infrastructure for disruptions or breach of utilization thresholds
    • Automating the notification of key staff when exception events occur
    • Providing improved visibility as to the events and interactions that occur within the IT infrastructure
    • Reducing the time requirements of manual activities performed by IT staff as part of preventative maintenance.
  4. The implementation of Event Management to complement existing ITIL processes within Verinet will have a number of significant benefits. The value to the business of implementing the process is directly seen by the following benefits:
    • Reduced SLA breaches
    • Reduced times required for diagnosis and root-cause analysis of problems
    • Reducing ratio of high priority incidents
    • Reduced Mean Time to Restore (MTTR) for incidents
    • Improved availability levels
    • Improved delivery of capacity and performance, with fewer capacity related incidents.
Correct answer: B
Question 3
What is the difference between a Known Error and a Problem?
  1. The underlying cause of a Known Error is known. The underlying cause of a Problem is not known
  2. A Known Error involves an error in the IT infrastructure, A
  3. Problem does not involve such an error.
  4. A Known Error always originates from an Incident. This is not always the case with a Problem
  5. With a Problem, the relevant Configuration Items have been identified. This is not the case with a Known Error.
Correct answer: A
Question 4
Scenario
Brewster’s is a toy factory that has been in business for 30 years. The company started with a small family run shop and has grown consistently over the years. They are now supplying toy stores nationwide and are considered to be the primary supplier of children’s collectable novelty erasers.
Brewster’s IT department is relatively small (currently 15 staff) but efficient. They have recently employed an IT Manager in an attempt to improve the management of the infrastructure, as well as more effective use of resources and identification of areas for improvement.
The Brewster’s management teams do not have a lot of IT knowledge. The newly appointed IT Manager is very ITIL focused and wants to implement as many ITSM processes as is appropriate there are currently no formal processes in place. On starting with the company the IT Manager completed an internal assessment of the IT infrastructure – including staff skills analysis, and collated the results from customer satisfaction surveys completed over the last 5 years.
The main areas of concern are as follows:
Responses from customer satisfaction survey:
  • Overall a consistent satisfaction level. However, responses completed during the past 12 months show an increase in customers who were unsatisfied with call waiting times when contacting the service desk for help with online orders and requests for information.
  • Customers added the following additional comments:
    • “Never get to speak to the same person twice when dealing with an Incident number, had to call several times to receive follow up on progress”
    • “Some of the Service Desk staff seem under qualified to deal with my questions about new applications/incidents/service requests”
Results from Staff Skills Analysis:
  • Staff, in general, have a good knowledge of IT systems and a basic understanding of the business processes and objectives. However, staff are not well informed of upcoming releases of new or changed services and not given adequate information to relay to the customers.
  • Staff added the following additional comments:
    • “Communication between Service Operation departments has become inefficient - there are meetings for the sake of meetings, but the important information we need to know to do our day to day jobs is lacking”
    • “I still don’t know what half of the people do, that work in the IT department!”
Results from General IT Infrastructure assessment:
  • Lack of event monitoring and planning
  • Lack of input from Operational Support departments into Service Design
  • Lack of skill and information sharing across the Operational Support teams with regards to Incident, Problem, Workarounds and Known Error data.
  • Little to no proactive activities being carried out.
Refer to Scenario
Which of the following options would be the most effective option to address the issues identified from the General IT Infrastructure assessment?
  1. You decide to recommend implementation of the Event Management process to formalize the event monitoring, planning and overall management. Ensure that there is resource sharing between the Service Design teams and the Operational Support teams as their input is necessary to ensure services are designed that will work efficiently in the live environment.In addition, implement the Problem Management process at the same time, to ensure there are both reactive and proactive activities taking place with regards to Problems, a knowledge bank of information including known errors, workarounds, problems and incident records is produced and maintained.
  2. You are not concerned with the lack of skill sharing between the Operational Support departments and Service Design as they are two separate entities of the Service Lifecycle with their own objectives. You are concerned, however, with the lack of skill sharing between the Operational Support teams and decide to formalize the 1st, 2nd and 3rd lines of support and recommend the adoption of a database that will incorporate all Incident records, Problem records, Known Error records, Workarounds and Event information, so that all staff can have access to and use this information.
  3. You are not concerned with the lack of skill sharing between the Operational Support departments and Service Design as they are two separate entities of the Service Lifecycle with their own objectives. You are concerned, however, with the lack of Event monitoring and planning and foresee this as being a potential major issue. You decide to recommend implementation of the Event Management process to formalize the event monitoring, planning and overall management. Ensure that there is resource sharing between the Service Design teams and the Operational Support teams as their input is necessary to ensure services are designed that will work efficiently in the live environment.
  4. Implement the Problem Management process, to ensure there are both reactive and proactive activities taking place with regards to Problems, a knowledge bank of information including known errors, workarounds, problems and incident records is produced and maintained.Once this process is established, working efficiently and staff have become more accustomed to this new way of working, use this success to recommend the implementation of the Event Management process.
Correct answer: A
Question 5
Scenario
You are the CIO of a large stock broking firm, based in Hong Kong. Recently this company has acquired two other major firms in London and New York. Total Company staff now exceeds 800 people. Each Firm currently has their own Service Desk.
  • Hong Kong has 10 SD staff to 400 employees, with 6 2nd level support staff
  • London has 3 SD staff to 140 employees with 3 2nd level support staff
  • New York has 5 SD staff to 250 employees with 5 2nd level support staff
With this new merger comes new support issues. Complaints are coming in to say that there si an imbalance with ratio of IT support staff to users, Service Desks in London and New York are having trouble knowing and supporting new systems which has resulted in users calling Hong Kong Service Desk. This has resulted in higher resolution times and an inability to get through to the service desk The Business is not happy with the current situation.
Refer to the scenario.
  1.   
  2.   
  3.   
  4.   
Correct answer: A
Question 6
Which of the following is NOT an example of a Service Request?
  1. A user calls the Service Desk to order a toner cartridge
  2. A user calls the Service Desk because they would like to change the functionality of an application.
  3. A Manager submits a request for a new employee to be given access to an application
  4. A user logs onto an internal web site to download a licensed copy of software from a list of approved options
Correct answer: B
Question 7
Scenario
Vision Media is an international media organization, operating various lines of business including:
  • Film Production
  • Television (production and delivery of their own channel in the United States VisionOne)
  • Print media (including newspapers in 15 countries)
  • Online Advertising
The organization has recently been restructured, and now is comprised of the following companies and departments:
  • Vision Films (production of movies and television shows)
  • VisionOne (television channel)
  • VisionNews (coordinates all of the sub-companies involved in the delivery of printed newspapers, as well as being the centralized source of news information for all company owned media outlets)
  • VisionNet (managing the online and internet businesses)
  • Legal Services
  • Finance and Administration
  • Human Resources
  • Information Technology
The organization is also actively pursuing growth in the online market, and is currently holding discussions with the leading online news provider about the possible acquisition of their company. This would increase the overall size of Vision Media by around 15%.
The Information Technology department acts as a Shared Service Unit, providing IT Services to all of sub-companies and departments, which complement some of the Internal Service Providers that also exist. The director of Information Technology has realized the need to improve the quality of services offered by implementing ITIL, and has decided to do so using a phased approach. Some of the Service Design and Service Transition processes have already been implemented, and they are now planning the implementation of Service Operation.
While the IT director does have tentative support from the other directors and CEO, budgets for implementing the Service Operation processes have not been finalized, and still require a business case to be formally submitted.
Refer to the exhibit.
There is some confusion as to how the process of Access Management should be designed. In particular, there is debate as to how the process should be integrated into the overall approach of IT Service Management within Vision Media. The IT director has asked for submissions from some of her staff, describing how they think Access Management should be designed.
Which of the following submissions describes the most appropriate way in which to design and implement Access Management within Vision Media?
  1. The design of a quality Access Management process will need to consider the current state of IT Service Management that exists within the IT department, as well as the organizational requirements of Vision Media in general. This will require interfaces to be created with:
    • Information Security Management: Which is responsible for the development and renewal of security policies, guidelines and procedures, which are then executed by Access Management
    • Service Level Management: Which is responsible defining the customer requirements for access to IT services
    • Request Fulfillment: Access Management will often be triggered by Service Requests, taken by the Service Desk or submitted using automated and self-help mechanisms
    • Change Management: Request for Changes (RFCs) will often involve modification of access rights
    • Demand Management: Which will provide information as to the patterns of business that will generate requests for access.
    • Outside the scope of IT Service Management, some of the interfaces that will also need to be created are:
    • Human Resources: So that effective (and automated) communication exists to assist in the creation, modification, removal and audit of access rights.
    • General:
    • Direct requests from department managers
    • Requests for enabling increased access for VIP staff
  2. The design of an efficient Access Management process will need to account for the existing IT Service Management processes already implemented within the IT department, as well as the Human Resource requirements of Vision Media in general. This will require interfaces to be created with:
    • Information Security Management: Which is responsible for the development and renewal of security policies, guidelines and procedures, which are then executed by Access Management
    • Capacity Management: Which is responsible for the design of systems and infrastructure, which are in turn supported by Access Management
    • Knowledge Management: Each Knowledge base will require various levels of access to be defined and enforced.
    • Change Management: Request for Changes (RFCs) will often involve modification of access rights
    • Demand Management: Which will provide information as to the patterns of business that will generate requests for access
    • Outside the scope of IT Service Management, some of the interfaces that will also need to be created are:
    • Legal Services: So that the Legal department can verify the request for access is appropriate and lawful.
    • General:
    • Direct requests from department managers
    • Requests for enabling increased access for VIP staff
  3. It is important that the implementation of Access Management considers a number of key interfaces with existing IT Service Management processes, as well as other business processes, to ensure success and satisfaction of its defined objectives. This includes:
    • Information Security Management: Which is responsible for the development and renewal of security policies, guidelines and procedures, which are then executed by Access Management
    • Availability Management: Which is responsible for the design of security systems and infrastructure, which are in turn supported by Access Management
    • Request Fulfillment: Access Management will often be triggered by Service Requests, taken by the Service Desk or submitted using automated and self-help mechanisms
    • Change Management: Request for Changes (RFCs) will often involve modification of access rights
    • Configuration Management: Which can be used to record relationships between users and systems they can access.
    • Outside the scope of IT Service Management, some of the interfaces that will also need to be created are:
    • Human Resources: So that effective (and automated) communication exists to assist in the creation, modification, removal and audit of access rights.
    • General:
    • Direct requests from department managers
    • Requests for enabling restricted access to contractors and external suppliers
  4. Access Management will need to be implemented in isolation from existing IT Service Management processes already in place at Vision Media so that its’ integrity can be ensured. The only exception to this is Information Security Management, which is responsible for the development and renewal of security policies, guidelines and procedures. Access Management uses these as formal inputs, which are then executed accordingly.
Correct answer: C
Question 8
Which of the following BEST describes the purpose of Event Management?
  1. To detect events, make sense of them and determine the appropriate control action
  2. To monitor interactions and exceptions within the infrastructure
  3. To monitor and control the activities of technical staff
  4. To detect and escalate exceptions to normal service operation
Correct answer: A
Question 9
Functions are best described as?
  1. Self-Contained units of organizations
  2. Inter-related activities with a defined goal or output
  3. Closed loop control systems
  4. A team of IT staff who provide a single point of contact for all user communication
Correct answer: B
Question 10
Technical Management is NOT responsible for?
  1. Maintenance of the technical Infrastructure
  2. Documenting and maintaining the technical skills required to manage and support the IT Infrastructure
  3. Defining the Operational Level Agreements for the various technical teams
  4. Diagnosis of, and recovery from, technical failures
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!