ITIL Foundations (Chapter 4: Service Operation)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Virtual

A _____________ service desk utilizes technology to provide the appearance of a centralized service desk.

Centralized

A ________________ service desk may represent a number of individual or local service desks consolidated into a single location.

Priority

A category used to identify the relative importance of an incident, problem or change. ___________ is based on impact and urgency, and is used to identify required times for actions to be taken.

Problem

A cause of one or more Incidents. The cause is not usually known at the time a Problem Record is created. and the Problem Management Process is responsible for further investigation.

Event

A change of state that has significance for the management of a Configuration Item or IT Service. The term _________ is also used to mean an alert or notification created by any IT Service, Configuration Item or monitoring tool

Urgency

A measure of how long it will be until an incident, problem or change has a significant impact on the business. For example, a high-impact incident may have low _____________ if it will not affect the business until the end of the financial year. Impact and _____________ are used to assign priority.

Impact

A measure of the effect of an incident, problem or change on business processes. __________ is often based on how service levels will be affected. _________ and urgency are used to assign priority.

Operations Bridge

A physical location where IT Service and IT infrastructure are monitored and managed

Known Error

A problem that has a documented root cause and a workaround. _____________s are created and managed throughout their lifecylce by Problem Management. ___________s may also be identified by development or Suppliers.

Operations logs

A record of what was done, by whom, when and what the outcomes are.

Service Request

A request from a user for information, advice, a standard change, or access to an IT Service. _________________s are usually handled by a Service Desk and do not require a Request for Change (RFC) to be submitted. (e.g. request for a password)

local

A type of service desk structure where the service desk is co-located with the users it serves

Alert

A warning that a threshold has been reached, something has changed, or a failure has occurred. _______s are often created and managed.

Operational Level Agreement (OLA)

An agreement between an IT Service Provider and another part of the same organization (internal to IT)

Informational

An event that does not require any action and does not represent an exception

Warning

An event that is generated when a service or device is approcahing a threshold

Exception

An event that means a service or device is currently operating abnormally

Incident

An unplanned interruption to an IT Service or reduction in the quality of an IT Service. Failure of a Configuration Item that has not yet affected an IT Service is also considered a(n) _________

Incident Management

Coordination of IT resrouces needed to restore an IT service.

Underpinning Contract (UC)

Document that suppports the goals and targets of the SLAs

Problem Management (definition)

Finding the root cause of events and incidents

Access Management

Granting authorized users the right to use a service

Record (logging), Classify (categorization), Diagnosis, Restoration (resolution & recovery), Closure (ownership, monitoring, tracking & communications also happen throughout the cylce)

Incident Lifecycle

Request Fulfillment

Managing customer & user requests that are not the result of an incident

Mean Time to Repair (MTTR)

Mean elapsed time between detection and repair

Mean Time to Restore Service (MTRS)

Mean elapsed time between detection and restoration

MTBSI (Mean Time Between System Incidents)

Mean elapsed time between incidents

Mean Time Between Failures (MTBF)

Mean elapsed time between restoration and detection

Event Management

Monitoring events thoughout the IT Infrastructure

impact and urgency

Priority assignment is a function of ___________________

Incident management, event management, request fulfillment, problem management, access management

Processes of service operation

Workaround

Reducing or eliminating the impact of an incident or problem for which a full resolution is not yet available; for example, by restarting a failed configuration item.

Specialized

Technology can support the creation of _____________ service desk groups within an organization and allow direct routing

Service Desk

The Incident Management process is normally the responsibility of the _________________

Service Knowledge Management Systems (SKMS)

The Known Error Database is part of the ___________________

Service Knowledge Management System (SKMS)

The ___________________ stores incidents, problems and known errors as part of a "Knowledge Base." Matching an incident to the knowledge base provides a resolution or a workaroud. The __________ maintains errors in the Known Error Database (KEDB)

Service Level Agreement (SLA)

The culmination of negotiation and agreement sessions between the business and IT.

Standard Operation Procedures (SOPs)

The detailed instructions the operations staff follows in the day-to-day execution of the procedures and activities of managing the IT infrastructure. Scope extends over all devices and systems under management, and includes defined standards of performance.

Service Operation

The face of IT to the majority of the user community. Delivers and supports IT services.

Service Desk, Technical Management, Applciation Management, IT Operations Management (OATS)

The four functions of Service Operation

IT Operations Control

The function responsible for monitoring and Control of the IT Services and IT Infrastructure

Known Error Database

This database is created by Problem Management and used by Incident and Problem Management. Contains problems with known root causes and workarounds. The _________ is Part of the Service Knowledge Management system.

Informational, Warning, Exception

Three types of events

Reactive and proactive

Two aspects to problem management

Functional and Hierarchical

Types of Escalation

Follow-the-sun

Uses multiple service desk locations tied together via technology and situated in locations around the globe

incident record

Workarounds for incidents without associated problem records are documented in the __________________.

known error records

Workarounds for problems are documented in ________________.

Problem Management

_______________ creates the Known Error Database (KEDB)

Incident, Problem

_______________ management is about restoring services. _______________ management is about finding out what caused the services to fail (two terms)

Proactive

_______________ problem management essentially follows CSI's 7-step improvement process to implement corrective action

Reactive

_______________ problem management is a two-step process that consists of managing the Problem followed by managing Known Error.

Hierarchichal

_________________ escalation seeks to engage higher levels of authority. Occurs when resolution is not likely in time to avoid a service level breach.

Functional

_________________ escalation seeks to engage resources with higher levels of technical capabilities. First level to second level to third level, etc.

Known error records, Incident records

__________________ document workarounds for problems and __________________ document workarounds for Incidents that do not have an associated problem record


Set pelajaran terkait

Inflammatory Bowel Disease Med Surg Practice Questions

View Set

Unit 25 Operating a Real Estate Business in TN

View Set

CS115: Chapter 3List six relational operators.

View Set

TX Life and Health: TX Statutes and Rules Pertinent to Life Insurance Only

View Set

Fundamentals Ch 1 Introduction to Nursing PrepU

View Set

Intro to fine arts- test 2(chap 14-16)

View Set

GI Practice questions from saunders / nurse sara

View Set

Improving Sentence Structure, Part 2

View Set

Chapter 4: Implementing Firewall Technologies

View Set