FREE ISO 20000 Certification Configuration Management Questions and Answers

0%

Change Management is aided by configuration management via:

Correct! Wrong!

The core practice of mapping infrastructure to applications and business processes improves the efficiency of change management.
When implementing changes or upgrades, it enables enterprises to make knowledgeable decisions, manage risks, and guarantee the stability and integrity of their IT infrastructure.

Failure to link the Configuration Management process with the Change Management process will result in failure.

Correct! Wrong!

The effectiveness of both the Configuration Management and Change Management procedures, as well as the overall IT service management architecture, depends on effective integration between them.
Together, the procedures of configuration management and change management ensure the quality, consistency, and integrity of configuration data and efficiently manage changes inside an organization's IT infrastructure.

What of the following is true?

Correct! Wrong!

The discipline of "configuration management" in IT service management entails keeping track of the configuration items (CIs) that make up an organization's IT infrastructure.
Hardware, software, documentation, and other elements that are necessary for providing IT services can all be found in CIs.
Maintaining correct and current information about these CIs and their connections is made easier with the aid of configuration management. Relationships in Configuration Management define how various CIs are connected and dependent on one another within the IT environment, hence the statement "Relationships represent dependencies between CIs and are maintained according to policy" is accurate. These connections shed light on how modifications to one CI may affect other CIs and services.

Blocking hazardous content with filtering tools like Next Generation (NG) Firewalls or Unified Threat Management (UTM)

Correct! Wrong!

Information/URL filtering capabilities are used to limit users' access to particular websites or types of information that are regarded dangerous or unsuitable when blocking hazardous content with filtering devices like Unified Threat Management (UTM) or Next-Generation (NG) Firewalls.
According to specified regulations, these appliances examine the content and URLs of online traffic to decide whether it should be allowed or denied.

What function do the Policy Documents play in the Configuration Management process?

Correct! Wrong!

By offering guidelines and instructions for managing Configuration Items (CIs) and the data associated with them in the Configuration Management Database (CMDB), Policy Documents play a critical role in the Configuration Management process.

Which of the subsequent is not often kept in the CMDB?

Correct! Wrong!

An organization's configuration items (CIs), which comprise hardware, software, services, and other elements of the IT infrastructure, are kept in a central repository called a configuration management database (CMDB).
The CMDB aids in managing and monitoring these CIs, their properties, connections, and modifications over time.

Which of the subsequent statements is true?

Correct! Wrong!

The Configuration Manager deems controlled data elements essential.
The Policy Document for the category must be followed, and these fields must meet certain requirements.
They are essential to the tracking, administration, and reporting of CIs.

The CMDB is one of the several file formats that may be exported from any Service Desk view.
Which of the following doesn't qualify as a file type that the Service Desk export feature can handle?

Correct! Wrong!

To export different views, data, and information from the system to other file formats for additional analysis, reporting, or sharing, use the Service Desk export functionality.
However, Service Desk does not normally enable exporting files in XHTML (Extensible Hypertext Markup Language).
Similar to HTML but with stronger grammar requirements, XHTML is a markup language used to create web pages.

Support for Incident Management through Configuration Management includes:

Correct! Wrong!

By supplying the relevant data and context for doing root cause analysis, identifying related modifications, and assessing the effect of incidents, configuration management assists incident management.
Collaboration between the two practices aids in reducing service interruptions and effectively ensuring the return to regular operations.

Certificates allow for safe connectivity and authentication

Correct! Wrong!

Digital certificates are used in network management and cybersecurity to provide authentication and secure connectivity.
Authenticity, integrity, and confidentiality of data sent via networks are primarily ensured by certificates.
They are essential in establishing a secure channel for data transfer and confirming the identities of the parties involved in a connection.

A "Uses/Used By" relationship is used across programs, while a "Dependent Upon/Provides to" relationship is used within the same application.

Correct! Wrong!

The dependency between two components in the same application is demonstrated using a Dependent Upon/Provides to relationship.
For instance, a component that offers a connection to a database can be dependent on a component that controls the database.
The dependency between two components in various applications is demonstrated using a Uses/Used By relationship.
For instance, a web service may be used by one application to obtain data from another application that also uses the web service.

Authors and owners of the Policy Documents are members of the Configuration Item Owner role.

Correct! Wrong!

The claim that the Policy Documents are created by and belong to the Configuration Item Owner position is untrue.
Usually, these crucial papers are created, maintained, and owned by the Configuration Manager or a function closely related to it.

What DOESN'T a high-level CI accomplish?

Correct! Wrong!

Using a high-level CI can help to simplify the management and execution of work orders when executing work that calls for several instances of a certain CI type.
It is simpler to track and manage the work being done across these linked instances when numerous distinct CI instances are grouped under a high-level CI.
This can apply to tasks like updating or performing maintenance on a collection of related CIs.

Which of the following is NOT a part of what configuration management accomplishes to achieve its objective?

Correct! Wrong!

establishing connections between various Configuration Item versions in order to comprehend their interdependence and effects on one another.

Anyone who develops, provides, or supports a configuration item in the specified IT environment is the CI _________.

Correct! Wrong!

"Owner" refers to someone who owns, creates, supplies, or supports a configuration item (CI) within the defined IT environment.
The CI owner is responsible for effectively managing, maintaining, and updating the CI as needed.
This position is critical for effective Configuration Management because it ensures that all CIs are correctly accounted for and that their properties, relationships, and changes are managed in accordance with specified policies and practices.

True or False: The CMDB can be used for a variety of tasks, but its main goal is to give the other Service Management processes accurate and timely data.

Correct! Wrong!

The Configuration Management Database (CMDB) is a central repository for all configuration items (CIs) inside an organization's IT system.
While the CMDB can fulfill a number of functions, its primary aim is to deliver accurate and timely data to support other IT Service Management (ITSM) processes and operations.
The CMDB's primary function is to keep a complete and up-to-date record of all CIs, including their attributes, relationships, and dependencies.

Lifetime Ad-Free Access @ $4.99

$4.99

Premium Tests $49/mo
FREE June-2024