C846 – Practice Tests 1, WGU C846 :
Quizzes, C846 Practice Test Questions,
Business of IT – Applications – C846 (ITIL
Foundation), C846 – Business of IT
Applications, C846 Flash Cards from
Ucertify, WGU C846 : Practice Tests,
C846 – Practice Tests 2
Which of the following processes is used to involve Identity and Rights as the two major
concepts? – correct answer Access Management
Question 2 :Which of the following are part of a typical business case structure? –
correct answer Introduction
Methods
Business impacts
Risks and contingencies
Recommendations
Configuration Management process supports the other Service Management processes
by managing the service assets and Configuration Items. Which of the following are the
goals of Configuration Management? – correct answer It is used for verifying the
configuration records against the infrastructure and for correcting any exception.
It reports for all the IT assets and configurations within the organization and its services.
It is used for providing a sound basis for Incident Management, Problem Management,
Change Management, and Release Management.
Which of the following involves monitoring patterns of business activity? – correct
answer Capacity management
Patch management is – correct answer monitoring, obtaining, evaluating, testing, and
deploying software patches and updates.
Access Management – correct answer grant authorized users the right to use a service
while preventing access to non-authorized users.
Service management is – correct answer discovering a continual balance between
utilization and delivery of services.
Management would like you to create a chart to show each project team member’s work
assignment using a simple legend. What type of chart is management asking you to
create? – correct answer RACI Chart
activities of Service level management – correct answer It is used for composing a
service catalogue.
It agrees on the service provided.
It monitors the service levels.
It provides reporting on results.
It reviews service levels.
Which of the following are the activities of IT Service Continuity Management? – correct
answer It works with BCM and Service Level Management (SLM) for the purpose of
determining potential issues and recovery requirements via Business Impact Analysis.
It takes possession for an incident and behaves as the primary level of escalation.
It translates recovery requirements into infrastructure options and data storage
requirements.
Which of the following activities of Configuration Management defines the location of
storage areas and libraries that contain hardware, software, and documentation? –
correct answer Management & Planning: This activity defines the following features:
It defines the strategy, policy, scope, objectives, processes, and procedures.
It defines the roles and responsibilities of involved staff and stakeholders.
It defines the location of storage areas and libraries that contains hardware, software,
and documentation.
It defines the Configuration Management Database design.
It defines Configuration Item (CI) naming conventions.
It manages housekeeping including license management and archiving of configuration.
Identification – correct answer This activity determines the CIs that will be recorded,
their attributes, and their relationships with other CIs. Identification can take place for
the following:
Hardware and Software
Business systems
Packages
Physical databases
Feeds between databases and links
Configuration baselines
Software releases
Documentation
Control – correct answer This activity ensures that there is a recording of only
authorized and identifiable CIs from receipt to disposal so as to protect the integrity of
the CMDB. Control occurs when the CMDB is changed, including:
Registration of all new CIs and versions
Update of CI records and license control
Update regarding RFCs and Change Management
Update the CMDB when physical items are periodically checked
Status Accouning – correct answer The reporting of all the current and historical data is
related to each CI in its Lifecycle and provides information about the following:
Configuration baselines
Latest software item versions
The person who is responsible for status change
CI change/incident/problem history
Reporting – correct answer Reporting is the Process Manager’s responsibility. The
reports of Configuration Management are provided to the Service Level Manager to
communicate the feedback on service levels to the customer.
Verification and Audit – correct answer Reviews and audits are used to verify the
existence of the CIs and confirm that the CIs are correctly recorded in the CMDB. There
should be conformity between the documented baselines and the actual environment to
which the CIs are referring.
Which stage of the Change Management process is used to deal with what should be
done if the change is not successful? – correct answer Remediation planning
What is meant by the term request fulfillment in the ITIL framework? – correct answer
Request fulfillment is a process for managing the requests from users to the IT
department.
Which of the following tasks is a part of Proactive Problem Management? – correct
answer Analyzing trends
What is the continual service improvement (CSI) approach? – correct answer The CSI
approach is used to manage improvement activity in line with business requirements.
Which of the following contains information on the costs for providing services and
provides insight into the profitability of services and customers? – correct answer
Financial Analysis
Which of the following are the strategic objectives of Capacity Management? – correct
answer It determines upgrade plans in order to ensure accurate and timely
procurements.
It aligns equipment according to business need, supply, and demand.
It is used to ensure effective service level management.
Service based Service Level Agreement is used when the requirements of the IT
service vary little between customers. Which of the following contents are included in
the Service Level Agreement (SLA)? – correct answer Mutual responsibilities
Service availability
Batch turnaround times
Why should a user Automate Service Management Processes? – correct answer It
makes adjustment of capacity of automated resources easier.
It improves utility and warranty of services.
It provides a good basis for measuring and improving service processes.
It enables automated resources to better handle capacity.
Event Management, Problem Management, Access Management, and Request
Fulfillment are part of which of the following stages of the Service Lifecycle? – correct
answer Service Operation
Which one of these statements regarding the CSI approach is correct? – correct answer
The CSI approach can be applied to the improvement of all processes.
Which of the following are the basic steps of Incident Management? – correct answer
Incident detection and recording
Classification and initial support
Investigation and diagnosis
Resolution and recovery
Incident closure
Ownership, monitoring, tracking, and communication
Which of the following are the benefits of the ISO/IEC 20000-1 standard? – correct
answer -It can be used for an organization that takes services of service providers and
needs assurance that its service requirements will be fulfilled.
-It can be used for an organization that needs a consistent approach from all its service
providers.