Itim (Unit-2)
Itim (Unit-2)
The design of the services, including all of the functional requirements, resources and
capabilities needed and agreed.
The design of Service Management systems and tools, especially the Service Portfolio, for the
management and control of services through their lifecycle.
The design of the technology architectures and management systems required to provide the
services.
The design of the processes needed to design, transition, operate and improve the services, the
architectures and the processes themselves.
The design of the measurement methods and metrics of the services, the architectures and
their constituent components and the processes.
Ans: The three main objectives that provide direction to the processes involved are:
To convert the strategic objectives defined during Service Strategy into Services and Service
Portfolios.
To use a holistic approach for design to ensure integrated end-to-end business related
functionality and quality.
To ensure consistent design standards and conventions are followed in all services and
processes being designed.
Ans: Every time a new service solution is produced, it needs to be checked against each of the other
aspects to ensure that it will integrate and interface with all of the other services in existence.
Q.31 When is a Service Design Package produced and what does it include?
Ans:
The information contained within a Service Design Package including all aspects of the service
and its requirements is used to provide guidance and structure through all of the subsequent
stages of its lifecycle.
A Service Design Package is produced for each new IT Service, major Change, or IT Service
Retirement.
Q.32 List various processes of service design. Write the goal of any five.
Ans: The processes included with the Service Design lifecycle phase are:
2. Supplier Management
o The primary goal of Supplier Management is to manage suppliers and the services they
supply, to provide seamless quality of IT service to the business and ensure that value
for money is obtained.
3. Service Catalogue Management
o The primary goal of Service Catalogue Management is to ensure that a Service
Catalogue is produced, maintained and always contains accurate information on all
operational services and those ready for deployment.
4. Capacity Management
o To ensure the current and future capacity and performance demands of the customer
regarding IT service provision are delivered for in a cost-effective manner.
5. Availability Management
o The primary goal of Availability Management is to ensure that the level of service
availability delivered in all services is matched to or exceeds the current and future
agreed needs of the business in a cost-effective manner.
o To support the overall Business Continuity Management by ensuring that the required IT
infrastructure and the IT service provision can be recovered within required and agreed
business time scales.
o To align IT security with business security and ensure that information security is
effectively managed in all service and IT Service Management activities.
Q.33 List various processes of service design. Write the goal of:
i. Service Level Management (Design) ii. Capacity Management iii. Availability Management iv. IT
Service Continuity Management v. Information Security Management vi. Supplier Management vii.
Service Catalogue Management
Ans: Refer Question No:32
Q.34 Write the factors on which the service design processes implementation is dependent.
Ans: The level to which the Service Design processes are required to be implemented will depend on
many factors, including:
Q.35 Write the goal of service level management. What are the tasks carried out by service level
management?
Ans:
Q.36 Write the goal of service level management. Explain the following terminologies
i. Service Level Agreement ii. Service catalogue iii. Underpinning contract iv. Operational level
agreement v. Service level requirement
Ans:
2. Service catalogue
3. Underpinning contract
Contract with an external supplier that supports the IT organization in their delivery of
services.
Internal agreement with another area of the same organization which supports the IT
service provider in their delivery of services.
Detailed recording of the Customer’s needs, forming the design criteria for a new or
modified service.
Q.37 With the help of a neat diagram, explain the activities of Service Level Agreements
Ans:
Q.38 What are the important factors considered when choosing the SLA structure?
Ans: The important factors to consider when choosing the SLA structure are:
o Will the SLA structure allow flexibility in the levels of service to be delivered for various
customers?
o Will the SLA structure require much duplication of effort?
o Who will sign the SLAs?
Three types of SLAs structures that are discussed within ITIL® are Service-based, Customer-
based and Multi-level or Hierarchical SLAs.
Many different factors will need to be considered when deciding which SLA structure is most
appropriate for an organization to use.
Q.39 What is Service Level Agreement? Explain the different structures of SLA.
Ans: A written agreement between a service provider and their Customers that documents agreed levels
of service for a Service.
Ans:
Q.42 With the help of a diagram, explain the roles and interfaces for Supplier Management.
Ans:
Q.43 Write the goal of Supplier management. Explain different types of supplier arrangements.
Ans:
2. Partnership or Multisourcing
o Formal arrangements where an external organization provides and manages the other
organization’s entire business process(es) or functions(s) in a low cost location.
o Common examples are accounting, payroll and call Centre operations.
Ans:
Ans:
Q.46 Why there is need of Service Catalogue management? Explain with suitable example.
Ans:
Q.47 Write the objective and scope of Service Catalogue management.
Ans:
Q.48 Write the goal of Service Catalogue management. Explain the following
Ans:
It containing details of all the IT services delivered to the customer, together with
relationships to the business units and the business process that rely on the IT services.
This is the customer view of the Service Catalogue.
Q.49 What is the goal of capacity management? List and explain the sub-processes of capacity
management.
Ans:
3. Application Sizing: Determining the hardware or network capacity to support new or modified
applications and the predicted workload.
4. Modelling: Used to forecast the behavior of the infrastructure under certain conditions. (e.g. if the
number of users doubled, if a network link fails).
7. Capacity Planning
8. Reporting
Q.51 What is the goal of capacity management? Write the responsibilities of capacity manager.
Ans:
Q.52 What is the goal of availability management? Explain the following terminologies (any five)
iii. Availability iv. Security v. Reliability vi. Resilience vii. Maintainability viii. Serviceability ix. Vital
Business Function
Ans:
1. Availability
2. Security
Services, systems and information should be made available to the authorized users at
the authorized times.
3. Reliability
4. Resilience
5. Maintainability
The contractual arrangements made with external suppliers that document their
obligations for supporting the availability of services. Measured by Availability,
Reliability and Maintainability of IT Service and components under control of the
external suppliers.
Q.53 Explain the following terms (any six) x. Mean Time Between Failures (MTBF) or Uptime xi. Mean
Time to Restore Service (MTRS) or Downtime xii. Mean Time Between System Incidents (MTBSI)
xiii. Relationships between the above terms xiv. Detection Time xv. Diagnosis Time xvi. Repair Time
xvii. Restoration Time (MTRS) xviii. Restore Point
Ans:
Average time between the recovery from one incident and the occurrence of the next incident,
relates to the reliability of the service.
5. Detection Time
6. Diagnosis Time
Time for the service provider to respond after diagnosis completed.
7. Repair Time
Time the service provider restores the components that caused the fault.
Calculated from diagnosis to recovery time.
9. Restore Point
The point where the agreed level of service has been restored.
Q.54 What is the goal of availability management? Write the responsibility of availability
management.
Ans:
Q.55 State the metrics for evaluating the effectiveness and efficiency of Availability Management.
Ans:
i. Disaster ii. Business Continuity Management iii. Business Impact Analysis iv. Risk Assessment v.
Scope
Ans:
Strategies and actions to take place to continue Business Processes in the case of a
disaster. It is essential that the ITSCM strategy is integrated into and a subset of the
BCM strategy.
4. Risk Assessment
Evaluate Assets, threats and vulnerabilities that exist to business processes, IT services,
IT infrastructure and other assets.
5. Scope
The scope of IT Service Continuity Management considers all identified critical business
processes and IT service(s) that underpin them.
This may include IT staff members, hardware, software, essential services and utilities,
critical paper records, courier services, voice services & physical location areas e.g.
offices, data canters etc.
2. Risk Assessment:
Ans:
Q.60 Explain the following terminologies i. Counter Measures ii. Manual Workaround iii. Gradual
recovery iv. Intermediate Recovery v. Immediate Recovery vi. Reciprocal Arrangement
Ans:
1. Counter Measures
2. Manual Workaround
3. Gradual recovery
4. Intermediate Recovery
5. Immediate Recovery
Aka Hot standby (< 24hrs, usually implies 1-2 hrs to recover from a ‘Disaster).
6. Reciprocal Arrangement
Agreement with another similar sized company to share disaster recovery obligations.
Q.61 List various roles of IT service continuity management process. Write the responsibilities of
each.
Q.62 What is the goal of Information Security Management? What are the four perspectives of
Information Security Management.
Ans:
Q.63 Draw and explain the Information Security Management Matrix in performing Gap Analysis.
Ans:
Q.64 What is the goal of Information Security Management? Explain the following terminologies
i. Confidentiality ii. Integrity iii. Availability iv. Security Baseline v. Security Incident
Ans:
2. Integrity
3. Availability
The information should be accessible at any agreed time. This depends on the continuity
provided by the information processing systems.
Examples: UPS, resilient systems, Service desk hours
4. Security Baseline
The security level adopted by the IT organization for its own security and from the point
of view of good ‘due diligence’.
Possible to have multiple baselines.
Examples: Security access based employee rank/title
5. Security Incident
Any incident that may interfere with achieving the SLA security requirements;
materialization of a threat.
Examples: Security Breach or potential weakness