Top 20 ITIL Questions asked during an interview and their Answers
There is a great demand for ITIL certified professionals in the IT industry, with companies looking to improve their project delivery and service through the use of best practices. It is always good to get ahead of the competition by taking an ITIL certification course and improve your chances of getting a better job. However, you also need to be able to crack an interview to make that career route possible. To help you prepare better for your next ITIL interview, here are the top ITIL interview questions that are generally asked:
1. Explain simply what ITIL is and does?
ITIL is short for Information Technology Infrastructure Library. It is a set of core volumes that detail a framework of best practices for IT service management, with the emphasis on aligning IT services with the needs of any given business. It’s a systematic approach to high-quality IT service delivery, providing a common language that includes clear, specific terms.
2. What is the difference between ITIL® V3 and ITIL® 4?
ITIL 4 maintains many of the core elements available in previous versions. The latest changes from ITIL V3 to ITIL 4 help to optimize IT service management in a world that is moving from a CapEx model to OpEx one. It gives businesses the ability to be more flexible, enabling them to adapt to rapidly changing technology while aligning with—and even driving—business requirements and goals. More specifically, it works with Agile, DevOps and AI.
3. What is the ITIL Service Lifecycle Model?
The processes are:
- Service Strategy
- Service Design
- Service Transition
- Service Operation
- Continual Service Improvement
4. What is the difference between a Change Request and a Service Request?
A change request is a formal proposal to alter a particular product or system, while a service request is formally submitted by a user, and is a request for IT service access, the changing of a standard, or information or advice. Service requests include things like access to the cloud or requiring a new laptop or printer. As a rule, service requests deal with things that have already been approved of by company policy and don’t require any extra permission.
5. What Are the Direct Benefits of ITIL?
The benefits of ITIL implementation are:
- Builds a stronger alignment between IT and the business.
- Improved customer satisfaction and a higher quality of delivery of services.
- Reduced costs by implementing improved utilization of resources.
- Greater visibility of the business’ IT costs and assets.
- Better management of business risk and service disruption.
- Providing a more stable service environment, better equipped to support constant business change.
6. What is an SLA?
An SLA is a service level agreement, a contract between an external or internal service provider, and the end-user. The SLA defines the level of service expected from the service provider.
7. Name the three levels of SLA.
The three levels are:
- Customer service level agreement: Exists between the service provider and an external customer.
- Internal service level agreement: An agreement between IT and an internal customer (such as another site or department).
- Vendor service level agreement: An agreement between you and the vendor.
8. What is the PDSA Cycle, and What Are the Phases?
The PDSA stands for Plan-Do-Check-Act, and is a systematic series of steps for gaining valuable learning and knowledge for the continual improvement of a product or process. It is also known as the Deming Wheel, or Deming Cycle. The phase breakdown consists of:
- Plan: Identify and analyze the problem
- Do: Develop and test a solution to the problem
- Check: Measure how effective the developed solution handles the problem, analyze possible ways the solution could be improved
- Act: Full implementation of the perfected solution
9. What Are the Three ITIL Models Adopted by an Organization?
The models are:
- Microsoft MOF (Microsoft Operations Framework)
- Hewlett-Packard (HP ITSM Reference Model)
- IBM ( IT Process Model )
10. What’s the Difference Between an Incident, a Problem, and a Known Error?
An incident is an event that’s not part of the standard operation. A problem is an as yet unknown cause of a conflict or series of incidents, whereas a known error is a problem that’s been successfully diagnosed, and a workaround or permanent alternative has been created. The final result of a known error is an RFC (Request for a change).
11. What’s the Difference Between an End-user and a Customer?
An end-user (or end customer) is the direct recipient of the service, or uses the product. A customer may or may not be able to choose between different products or suppliers. An example of the latter would be things like court-appointed attorneys, or a monopoly situation such as an Internet or cable provider.
12. What is the Incident Management Process? Can You Provide Examples?
IcM, or Incident Management, is an area of IT Service Management (ITSM) that exists in order to restore normal service operations as soon as possible. Examples of this include a printer that doesn’t work, disk usage exceeded, or an entire system that has gone down.
13. What is ISO/IEC 27002?
ISO/IEC 27002:2013 is a code of practice that gives guidelines for organizational information security standards and information security management practices. This code includes the selection, implementation, and management of controls while taking into consideration an organization’s information security risk environment. The code recommends information security controls that address information security control objectives that come from risks to the confidentiality, integrity, and availability of information.
14. What is Change Management? Explain the Seven R’s of Change Management.
Change management is the process, tools, and techniques used to manage the people side of any change that is implemented in order to achieve the required business outcome. Change management helps individuals adopt and adapt to the changes.
- The seven R’s are:
- Who RAISED the change?
- What is the REASON for the change?
- What RETURN will the change deliver?
- What RISKS are there is we do or do not carry out the change?
- What RESOURCES will be required to perform this change?
- Who is RESPONSIBLE for this change being performed?
- What RELATIONSHIPS are there between this and other changes?
15. List the Different Knowledge Management Systems and What They Do.
The different knowledge management systems associated with ITIL are:
- CMIS (Capacity Management Information System) – A Capacity Management Information System, or CMIS, is a collection of information regarding IT infrastructure usage, capacity, and performance. The data is gathered in a consistent manner then stored in either a single or series of databases.
- AMIS (Availability Management Information System) – The AMIS is a virtual repository of all Availability Management data, and is usually stored in multiple physical locations.
- KEDB (Known Error Database) –Known Errors are managed by the Problem Management process, with the details of each known error recorded in a Known Error Record, which is in turn stored in the Known Error Database (KEDB).
- CMDB (Configuration Management Database) – A configuration management database (CMDB) is a database that holds all of the relevant information about the various components of the information system which are used in an organization’s IT services, as well as the relationships between said components. A CMDB provides an organized view of data and a means of examining that data from any perspective desired, with components of the information system referred to as configuration items (CI). A CI can be any conceivable IT component, including but not limited to items such as hardware, software, documentation, and personnel, plus any combination of the above.
- DML (Definitive Media Library) – A Definitive Media Library (DML) is a secure location where the definitive, authorized versions of software package configuration items (CIs) are stored and kept safe. A DML is made up of one or more software libraries or file-storage areas known as repositories.
- SKMS (Service Knowledge Management System) – ITIL Knowledge Management exists to gather, analyze, store, and share knowledge and information within an organization. The main purpose of Knowledge Management is to improve efficiency within an organization by decreasing the need to rediscover knowledge.
16. Discuss Common or Workaround Recovery Options.
Recovery options are classified as:
Fast recovery: This is a recovery taking place within 24 hours (hot standby).
Intermediate recovery: The service uses a portable or fixed facility, mirroring load balancing (warm standby). Recovery time is usually within three days.
Gradual recovery: Recovery is set in a matter of days, possibly even weeks, but always more than 24 hours (cold standby).
17. Explain the 4 P’s needed for ITIL Service Management.
The 4 P’s for the ITIL Service Management are:
- People: People in the IT field perform processes and procedures which are associated with ITIL Service Management.
- Processes: It involves an examination of the company’s ability to implement the processes.
- Products: Products are the tools used by IT service staff to implement the processes of ITIL.
- Partners: Every in-house or outsourced IT organization has partners that enable service to work properly.
18. What are the key responsibilities of the ITIL Service Desk?
The key responsibilities of an ITIL Service Desk are:
- Incident logging, categorization, and prioritization
- Resolving the incident
- Examining incidents
- Incident management reporting
19. What are the different stages in the Problem Management Process?
The stages in the Problem Management Process are:
- Problem Detection
- Categorize and prioritize the problem
- Investigation and Diagnosis
- Identify a workaround for the problem
- Create Known Error Record
- Resolution
- Closure of the problem
- Review
20. What is the purpose of Problem Management in ITIL?
The purpose of Problem Management in ITIL is :
- Identify potentially recurring incidents
- Prevent service disruptions
- Determine the root cause
- Meet service availability requirements
- Take steps to prevent the incident from reoccurring
- Improve staff efficiency and productivity
- Enhance user satisfaction