9
ITIL TRAINING “Flash-Cards” ITIL Awareness Author’s Note :  This is a set of “flash-cards” put toether to help !ou stud! for the ITIL Certification e"a#$ The infor#ation was ta%en fro# e"istin #aterial& presentations and sa#ple tests$ 'lease use in con(unction with the attached slides$ )ope it helps*

ITIL Foundation Training Flash Cards

Embed Size (px)

DESCRIPTION

Foundation Training flash cardsi dont know this i have just uploaded this..

Citation preview

ITIL TRAINING Flash-Cards

ITIL TRAINING Flash-Cards

ITIL Awareness

Authors Note : This is a set of flash-cards put together to help you study for the ITIL Certification exam. The information was taken from existing material, presentations and sample tests. Please use in conjunction with the attached slides. Hope it helps!

::Saiki

ITIL Terms and Definitions ITIL = Best practices for IT Service Management

IT Service Management monitors the IT Service Process

Describes goals, activities, inputs and outputs of processes

Not a Standard only best practices Library of books to hold these practices

Standards will vary from organization to organization to create Best Practices

Open Approach framework that provides Guidance

Allows for significant Cost Reduction

ITIL Fundamentals deals with IT Service Management

IT Service Management aligns IT Services with the needs of the business and its customers, continuously improves the quality of IT Services and reduces the long term costs of IT Services.

IT Services are specific functions provided such as e-mail, printing, Internet, etc.

System Management configures and manages computer resources

IT INFRASTRUCTURE: All components employed to deliver IT Services (HW, SW, people, documentation and physical facilities

IT Service Management is divided into two (2) main processes SERVICE SUPPORT PROCESS and SERVICE DELIVERY PROCESS. A third division has now been created from Service Delivery called SECURITY MANAGEMENT

Each process is sub-divided further into MANAGEMENT areas

A CUSTOMER is the person paying for the IT Service

Customer Relationship Management is the process to liaison with customers

Users are the persons using the IT Service

Process Owner (WHAT) responsible for the goals and results of the process

Process Manager (HOW) responsible for the design and structure of the process

Process Operatives (WHO) responsible for conducting defined activities in the process

DEMING QUALITY CYCLE: Plan, Do, Check, Act.

SPOC = Single Point of Contact function of the Service Desk

Configuration Items (CIs) Any component subject to Change Control under the control of the CMDB

CI level: The degree of detail that defines an individual CI

CMDB = Configuration Management Database Tracks and records all CIs Relationships

Scope: The amount of CIs tracked in the CMDB

Depth: Level of decomposition that will be done from a high level CI to its lowest level component CI. (Ex. Record PCs vs. recording their components results in a deeper CMDB

Attributes: The unique details of a CI

Relationships: Describes the unique details of a CI

Baseline: A snapshot that allows for a rebuild or back-out procedure

SERVICE SUPPORT PROCESS:

Service Desk (a function not a process)

Incident Management

Problem Management

Configuration Management

Change Management

Release Management

Service Desk: is a FUNCTION not a process that acts as a SPOC to handle incidents and requests effectively and efficiently. Part of Configuration Management and is the liaison between users and the providers of the Service

Service Desk Activities: Receive and record all calls from users, initial incident assessment, monitors incidents to meet expectations, keeps users informed, and provides management information

Service Desk Models:

Local: Located with the users that it serves in only one location

Central: Supports multiple geographic locations from a single point

Virtual: May be located at multiple geographic locations, but appears to users as a single entity. All locations have access to all information 24X7 Follow the sun coverage

Service Request: MINOR requests that do NOT require investigation and where knowledge engineering (KE) is available, ex: re-setting passwords, creating e-mail account, etc. The change must be easily made under previously, well-defined, strict procedures.

CONFIGURATION MANAGEMENT: Provides a logical model of the IT Infrastructure, controls the IT Infrastructure by recording relationships and attributes in the CMDB. It is NOT Asset Management. It controls CIs, Incidents, Problems, Change and Release Management. It is responsible for planning, identification of CIs, Control of CIs, status accounting, verification and audit of the CMDB records and ensures that the CMDB is always updated

CONFIGURATION MANAGER: Has specific functions in CHANGE MANAGEMENT, which are:

Initial recording of the RFC

Updates change record every step of progress

Informs users on a regular basis

Issues new RFCs when necessary

Closes RFC and updates final record (PIR)

Incident: anything that causes or may cause interruption in service and is not a part of the operation of a service

Incident Management: Provide continuity by restoring normal services as soon as possible and accumulate meaningful information related to the incident

Impact: Degree to which services are interrupted

Urgency: How urgent normal operation must be restored

Prioritization: A value given to an incident to indicate its relative importance to other incidents. Determined by looking at impact and urgency

Expected Effort: Amount of resources, time and cost needed to restore normal operation

Escalation: Mechanism to facilitate timely resolution of interruptions

Functional Escalation: Escalation within the technical arena

Hierarchical Escalation: Escalation through management

The role of SERVICE DESK in INCIDENT MANAGEMENT:

Primary role, records and updates incidents, keeps users informed and updated and is the SPOC

Owns, monitors, tracks and communicates incidents

Detection and Recording issues incident tracking number

Classification and Support categorization and prioritization based on impact and urgency

Investigation and Diagnosis analyze and attempt resolution

Resolution and Recovery

Closure confirms and records resolution with user

Problem: unknown root cause of an issue with multiple incidents

Known error: When the root cause of an incident has been determined

Work around: Temporary solution

Known error database: Database in which solutions to known errors are kept

PROBLEM MANAGEMENT: Analyzes all incidents, but does NOT investigates all incidents. Designed to reduce the adverse impact of incidents and problems on the business and to prevent recurrence of incidents related to errors within the IT Infrastructure.

Controls Problems and Errors

Assists in the handling of major incidents

Performs Root-cause analysis

Resolves problems effectively

Proactive in the prevention of problems

Completes major problem reviews

Uses lessons learned

Identify, record, classify/categorize, diagnosis/investigate, resolve/close problems

Record, categorize, develop solution, submit RFC, confirm solutions

Problem Control: Identification, recording, classification, diagnosis, resolution and closure

Error Control: Identification, recording, assessment, resolution, recording, RFC, closure

Interrelationships within Problem Management: Incident, problem, known error, RFC, closure

Change: Any action that results in the change in status of a CI

Request for Change (RFC): Details a requested change

Standard Change: Pre-approved, recurring and well known change

Minor Change: Minimal impact and requires few resources

Significant Change: Significant impact and/or requires significant resources

Major Change: Major impact and/or requires major resources typically impacts multiple parts of the organization

Urgent change: Immediate change required testing is optional

CAB Change Advisory Board: Group of IT representatives with decision authority responsible for reviewing the technical and business aspects of proposed changes (high impact RFCs)

CAB Emergency Committee: Also known as IT Emergency Committee (ITEC) - Subset of CAB in an emergency meeting to review urgent, high impact changes

Management Board: Management group that approves major changes

Forward Schedule of Changes: Schedule of approved changes

CHANGE MANAGEMENT: To minimize the occurrence of change-related incidents

Acceptance and filtering of RFCs Approve / Reject

Classification Assigns priorities based on Impact and Urgency

Change Approval Change Manager / CAB / Management Board

Change building, testing, implementation

Post implementation review Solution Confirmation

CHANGE MANAGER: Coordinates implementation of Changes (RFCs) and issues the final PIR.

Release: Collection of authorized changes that are tested and introduced into production together. Implementation of RFCs (Fixes /Enhancements)

Release Policy: Rules for release implementation

Release Unit: Portion of the IT Infrastructure normally released together (Fix-Pack for example)

Full Release: All (CIs) components updated

Delta Release: Only makes changes to certain (CIs) components

Package Release: Combination of full and delta releases, or a set of HW and/or SW release units introduced into production together Reduces frequency of changes

DSL Definitive Software Library: Secured physical library where quality controlled versions of all software CIs are stored Tracked in the CMDB DHS Definitive Hardware Store: Physical storage for hardware spare parts whih are equivalent to those currently in production RELEASE MANAGEMENT: Ensures success of large scale changes and works closely with the change manager to maintain CMDB accuracy. Interacts with CMDB and DSL Updates Configuration Management with details Functions in three distinct environments:

Development Environment: Apply release policy, plan for release, develop or buy software (confirm, plan, design, develop) Control and Test Environment: Build and configure, test release, release acceptance, plan for roll-out, communicate, train, and prepare for roll-out (build, configure, test, plan, communicate expectations) Production (Live) Environment: Distribute and install release Service Delivery Process: Service Level Management Availability Management Availability Management Capacity Management Capacity Management Continuity IT Service Continuity Management Cost Financial Management of IT Services Primary interface between Service Delivery Process and the customer negotiates with the customer Measures and reports Balances customer requirements with the capabilities and cost constrains of the provider Proactively improves IT Services within imposed cost constrains Aligns IT Services with business objectives Maintains and improves IT Service quality trough a constant cycle of agreeing, monitoring, reporting and reviewing IT achievements Produces, maintains and reviews the Service Catalog (SLA) - Service Level Agreement: Between the IT Service provider and customer that defines expectations and requirements by both parties: Customer-based: One customer, multiple services Service-based: Multiple customers, one service SLA Structures: types of SLAs that exists

(OLA) Operational Level Agreement: between the IT Services provider and an INTERNAL department that supports them

(UC) Underpinning Contract: with and EXTERNAL organization who plays a role in delivery of IT Services to the IT service providers customer

Service Level Requirements: List of specific requirements from the customer that goes into the SLA

Service Catalog: A menu of the services provided by an IT service provider

Service Improvement Program: Project undertaken by the service level management that focuses on customer satisfaction in IT service delivery

Multi-level SLA structure:

Corporate level generic issues that apply to every customer within the organization

Customer level all issues that relate to a specific customer group

Service level all issues that relate to a specific service being used by a customer

Components of a SLA:

Service Deliverables

Response times

Targets

Hours of service

Critical business periods and exceptions

Customer responsibilities

Provider responsibilities

Review dates

Results review

Availability Management: Optimize the capability of the IT infrastructure and supporting organizations to deliver a cost effective and sustained level of availability to satisfy business objectives

Deliver sustained, cost-effective services

Collect, analyze, and report availability data

Proactively develop strategies for future requirements

Determine requirements

Create a plan

Implement and monitor the plan

Monitor external suppliers against the SLA and UC

Minimizing un-availability

Implements security policies developed by Security Management

Availability: % of the service hours that a service is available

Reliability: Freedom from operational failure

Maintainability: Ability to be restored to an operational state

Corrective: Repair AFTER disruption

Preventive: Repair or maintenance to PREVENT disruption

Inspective: Prevention of disruption

Serviceability: Ability to get service when needed, even when third party is involved to provide service

Resilience: Ability for service to function even though not all components are functioning correctly

Security: Ensures that services are used by the proper people in the proper way

Confidentiality

Integrity

Availability

(AMDB) Availability Management Database: records availability data and produces performance metrics

Incident Life Cycle: as it relates to availability

DOWNTIME: Meantime to repair

UPTIME: Meantime between failures and/or meantime between system incidents

Availability is calculated against unplanned outages

Capacity Management: Ensures that IT resources meet the needs of the evolving business in a cost effective manner, understands the current capacity performance and knows the capacity status of individual components. It has overall responsibility for performance, and is focal point for IT performance and capacity issues

Business Capacity Management: Current and future needs of the business

Service Capacity Management: Monitors performance within the SLA guidelines

Resource Capacity Management: Focuses on individual resources and emerging technologies

Capacity Planning: Current and future needs of the business

Modeling: Predicts future consumption (trend analysis)

Application sizing: Estimates requirements to support new and changing applications before they are introduced into the environment

Demand Management: Arranges with users to use certain services only outside peak periods

Performance Management: Ensures the best use of current capacity is being utilized

Workload Management: Monitoring workloads

Continuity Management: Ensures that the required IT technical and service facilities can be recovered within required and agreed upon business time scales

Concerned with significant outages

Reduce the impact of disaster or major outages

Prevent loss of customer confidence

Business Continuity Management: Anticipation and preparation for disaster recovery (business function)

IT Service Continuity: Focused on continuity of IT services

Crisis: When service is unavailable for periods longer than defined in the SLA

Risk: Likelihood of business disruption and the loss from that disruption

Risk Analysis: Assets, threats, vulnerabilities

Risk Management: Countermeasures

Prevention & Protection

Recovery & Restoration

Recovery or Countermeasure options:

Do nothing (not good for critical services)

Manual back-up or workaround (minimal use of technology)

Reciprocal arrangement (organizations back each other up during emergencies)

Gradual recovery Cold Standby empty room with power to install equipment

Intermediate recovery Warm Standby 24-72 hours equipped room frequently outsourced

Immediate recovery Hot Standby 0-24 hours mirrored data equipment can be outsourced

Disaster Recovery Plan Should be tested initially, annually and each time the plan changes Invoked by senior management The biggest challenge is that this type of plan can be costly for something that may never happen IT Financial Management: Monitor and fully account for all expenditures, make costs apparent, and enable allocation of service costs by justifying proper charges to customers Direct costs: Costs related to a specific group or customer Indirect costs: Costs related to several customers Fixed costs: Costs that dont change Variable costs: Costs that do change depending on situation and/or use Capital costs: Equipment, servers, routers, etc. Operational costs: Day to day operations Cost model: Framework for recording costs of an IT service provision. Allows specific charging Budgeting & Accounting: Ensures that correct finance is available and not over-spent. Predicts costs, accounts for expenditures Charging: Recover costs from customer requires cost model Security Management: Protection of any IT function or data from unauthorized access, minimize security exposure or vulnerability, reduce impact of security breaches, and develop security policies that can be implemented by Availability Management.For References Email your facilitator