Friday, 17 February 2012

EXAM - Availability Management


Availability Management is responsible for availability of the:
A. Services and Components
B. Services and Business Processes
C. Components and Business Processes
D. Services, Components and Business Processes
---------------
Answer: A

Availability Management is the practice of identifying levels of IT Service availability for use in Service Level Reviews with Customers.
All areas of a service must be measurable and defined within the Service Level Agreement (SLA).
To measure service availability the following areas are usually included in the SLA:
  • Agreement statistics – such as what is included within the agreed service.
  • Availability – agreed service times, response times, etc.
  • Help Desk Calls – number of incidents raised, response times, resolution times.
  • Contingency – agreed contingency details, location of documentation, contingency site, 3rd party involvement, etc.
  • Capacity – performance timings for online transactions, report production, numbers of users, etc.
  • Costing Details – charges for the service, and any penalties should service levels not be met.
Availability is usually calculated based on a model involving the Availability Ratio and techniques such as Fault Tree Analysis, and includes the following elements:
  • Serviceability – where a service is provided by a 3rd party organisation, this is the expected availability of a component.
  • Reliability – the time for which a component can be expected to perform under specific conditions without failure.
  • Recoverability – the time it should take to restore a component back to its operational state after a failure.
  • Maintainability – the ease with which a component can be maintained, which can be both remedial or preventative.
  • Resilience – the ability to withstand failure.
  • Security – the ability of components to withstand breaches of security.

Friday, 10 February 2012

EXAM - Data and capacity management process

Data used to support the capacity management process should be stored in:A. A configuration management database (CMDB)
B. A capacity database (CDB)
C. A configuration management system (CMS)
D. A capacity management information system (CMIS)
----------------
Answer: D

Capacity Management is a process used to manage information technology (IT). Its primary goal is to ensure that IT capacity meets current and future business requirements in a cost-effective manner. One common interpretation of Capacity Management is described in the ITIL framework. ITIL version 3 views capacity management as comprising three sub-processes: business capacity management, service capacity management, and component capacity management (known as resource capacity management in ITIL version 2).
As the usage of IT Services change and functionality evolves, the amount of processing power, memory etc also changes. If it is possible to understand the demands being made currently, and how they will change over time, this approach proposes that planning for IT Service growth becomes easier and less reactive. If there are spikes in, for example, processing power at a particular time of the day, it proposes analyzing what is happening at that time and make changes to maximize the existing infrastructure, for example, tune the application, or move a batch cycle to a quieter period.
These activities are intended to optimize performance and efficiency, and to plan for and justify financial investments. Capacity management is concerned with:
  • Monitoring the performance and throughput or load on a server, server farm, or property
  • Performance analysis of measurement data, including analysis of the impact of new releases on capacity
  • Performance tuning of activities to ensure the most efficient use of existing infrastructure
  • Understanding the demands on the Service and future plans for workload growth (or shrinkage)
  • Influences on demand for computing resources
  • Capacity planning – developing a plan for the Service
Capacity management interacts with the discipline of Performance Engineering, both during the requirements and design activities of building a system, and when using performance monitoring as an input for managing capacity of deployed systems.

Monday, 6 February 2012

EXAM - Identity and Rights


Identity and Rights are two major concepts involved in which one of the following processes?
A. Access Management
B. Facilities Management
C. Event Management
D. Demand Management

---------------
Answer: A

Access management is the process which grants authorized users the rights to utilize the services and at the same time prevents unauthorized access. This process is also known as identity and access management (IAM). Access management therefore deals with the following topics:
  • Access, in other words access and entry to services, data and facilities.
  • Identity, i.e. the identity of the user or technical device which requires the access. The identity must be clearly assignable to the actual person and device. Certificates are often used to ensure this is the case.
  • Rights, these are the rights or privileges which the user can exercise. Typical rights are read, write, execute, change or delete.
  • Services or service groups, these are roles that the users perform for their activities. The rights are normally assigned to these roles. The user can take on a number of roles and automatically inherits their rights on assignment to this group. This simplifies the administration and overview of the distributed rights and increases their transparency.
  • Directory service, describes a specific tool which can be used for the administration of identities, rights and roles.
Access management is in effect the execution of availability and information security management in such a way that the process enables the organization to guarantee the confidentiality, availability and integrity of the services and corporate data. As such, for example, access management ensures that a user is granted the rights in order to utilize the service. However, it is the task of availability management to ensure that this access is also always available within the agreed period. Access management is normally initiated with a service request by the service desk.

Thursday, 2 February 2012

EXAM - Workaround documentation


Where should details of a Workaround always be documented?
A. The Service Level Agreement (SLA)
B. The Problem Record
C. The Availability Management Information System
D. The IT Service Continuity Plan

---------------
Answer: B

Workaround is defined as method of avoiding an Incident or Problem, either by employing a temporary fix or technique that means a Customer is not reliant on a Configuration Item (CI) that is known to cause failure. 

By definition, workarounds are ALWAYS documented in the problem record.

Wednesday, 1 February 2012

EXAM - Problem Management objectives


Which of the following is NOT a valid objective of Problem Management?

A. To prevent Problems and their resultant Incidents
B. To manage Problems throughout their lifecycle
C. To restore service to a user
D. To eliminate recurring Incidents

-----------------------------------------------------------------------------
Answer: C

Problem management aims to resolve the root causes of incidents and thus to minimise the adverse impact of incidents and problems on business that are caused by errors within the IT infrastructure, and to prevent recurrence of incidents related to these errors. A 'problem' is an unknown underlying cause of one or more incidents, and a 'known error' is a problem that is successfully diagnosed and for which either a work-around or a permanent resolution has been identified. The CCTA (Central Computer and Telecommunications Agency) defines problems and known errors as follows
A problem is a condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident, indicative of a single error, for which the cause is unknown, but for which the impact is significant.
A known error is a condition identified by successful diagnosis of the root cause of a problem, and the subsequent development of a work-around.
Problem management differs from incident management. The principal purpose of problem management is to find and resolve the root cause of a problem and thus prevent further incidents; the purpose of incident management is to return the service to normal level as soon as possible, with smallest possible business impact.
The problem-management process is intended to reduce the number and severity of incidents and problems on the business, and report it in documentation to be available for the first-line and second line of the help desk. The proactive process identifies and resolves problems before incidents occur. Such processes include:
  • Trend analysis;
  • Targeting support action;
  • Providing information to the organisation
The error control process iteratively diagnoses known errors until they are eliminated by the successful implementation of a change under the control of the Change Management process.
The problem control process aims to handle problems in an efficient way. Problem control identifies the root cause of incidents and reports it to the service desk. Other activities are:
  • Problem identification and recording
  • Problem classification
  • Problem investigation and diagnosis
A technique for identifying the root cause of a problem is to use an Ishikawa diagram, also referred to as a cause-and-effect diagram, tree diagram, or fishbone diagram. Alternatively, a formal Root Cause Analysis method such as Apollo Root Cause Analysis can be implemented and used to identify causes and solutions. An effective root cause analysis method and/or tool will provide the most effective/efficient solutions to address problems in the Problem Management process.