Information Technology Infrastructure Library (ITIL) consists of a list of ITS practices that focus on aligning several IT services with organizations and businesses. This ITIL Interview Questions blog comprises a list of the frequently asked ITIL questions, along with their well-researched answers. Below is the collection of the popular ITIL interview questions that interviewers generally ask.
Basic ITIL Interview Questions For Freshers
ITIL Interview Questions for Intermediate
ITIL Interview Questions for Experienced
Scenario Based on ITIL Interview Questions
Salary Trends in ITIL
ITIL Job Trend
Job Opportunity in ITIL
Roles and Responsibilities in ITIL
Did You Know?
- According to the Axelos survey, half of the organizations feel that their ITSM capabilities are great, while the other 25% though they are getting there, the last quarter mentioned was the worst.
- In the same survey, the main obstacle to the success of ITSM capabilities is the”lack of buy-in from senior management.”
- The source and learning and development had an influence of online or video-based learning for at least 70% of the respondents.
Basic ITIL Interview Questions for Freshers
1. What is the difference between end users and customers?
End User: An end user or an end customer directly receives the service or employs the product. End users are not the only customers as there may be intermediate entities like purchasing departments, whose expectations or needs must be carried forward through a series of service contracts or requirement definitions.
Customer: A customer may or may not have the ability to choose between different products and suppliers. For instance, in monopoly situations like local telephone and cable television services, there are scenarios when end users do not make the purchasing decision. It may include clients of social service agencies, court-appointed lawyers, or employees of an organization where the purchasing department makes choices.
2. What is a service request?
A service request is a formal request submitted by a user for some types of services, software, or hardware. A service request generally refers to something the user wants and/or needs but does not already have, such as a printer or a laptop. It often involves items that are already approved. For instance, if it is a company policy that all employees get access to the cloud-based CRM system and when someone from the marketing department sends a service request for the access, then this does not need any additional approval. The IT help desk can simply fulfill this request.
3. What is ISO/IEC 27002?
ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including selection, implementation, and management of controls, taking into consideration the organization’s information security risk environment(s). It is designed to be used by organizations that intend to:
- Select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001
- Implement commonly accepted information security controls
- Develop their independent information security management guidelines
4. What are the different knowledge management systems?
Different knowledge management systems are given below.
- CMIS (Capacity Management Information System): CMIS is a collection of IT infrastructure usage, capacity, and performance information that is gathered in a consistent manner and stored in one or more databases. It is a single book of records of IT infrastructure usage, capacity, and performance data, complete with associated business, application, and service statistics. Any IT staff who needs access to capacity management data can potentially use a CMIS.
- AMIS (Availability Management Information System): It is a virtual repository of all Availability Management data, usually stored in multiple physical locations.
- KEDB (Known Error Database): A known error is a problem that has a documented root cause and a workaround. Known errors are managed throughout their life cycle by the Problem Management process. The details of each known error are recorded in a Known Error Record stored in the Known Error Database (KEDB).
- CMDB (Configuration Management Database): CMDB is a database that contains all relevant information about the components of the information system used in an organization’s IT services and the relationships between those components. CMDB provides an organized view of data and a means of examining the data from any desired perspective. Within this context, components of an information system are referred to as configuration items (CIs). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion.
- DML (Definitive Media Library): DML is a secure compound in which the definitive, authorized versions of software package configuration items (CIs) are stored and protected. It consists of one or more software libraries or file-storage areas referred to as repositories.
- SKMS (Service Knowledge Management System): ITIL Knowledge Management aims at gathering, analyzing, storing, and sharing knowledge and information within an organization. The primary purpose of Knowledge Management is to improve efficiency by reducing the need to rediscover knowledge.
Become a master of Artificial Intelligence by going through this online AI Course in Toronto!
5. What are the ITIL-based models adopted by an organization?
- MOF: Microsoft Operations Framework (MOF) is a series of 23 documents that guide IT professionals through the processes of creating, implementing, and managing efficient and cost-effective services.
- Hewlett Packard (HP ITSM Reference Model): This model is a significant tool useful in presenting and describing several management processes, inter-process relationships, and business linkages that IT needs to put in place for successful development, deployment, and support of services in the e-world.
- IBM (IT Process Model ): This is an industry template that enables you to define common business processes and services across the enterprise. The software consists of a set of business process models and service definitions to support core system renewal and integration projects.
6. What is the relation between availability percentage, availability service time, and downtime?
Availability % = (Available service time – downtime)/Available service time
It is used to ensure that all IT services are available and are functioning correctly whenever customers want to use them in the framework of SLAs in force.
Get certified from this top AI Course in Singapore now!
7. What is ITIL, and what is its primary purpose?
ITIL is defined as an Information Technology Infrastructure Library; it is primarily used to provide a set of best practices for the IT sector in terms of Service Management and is more focused on aligning the needs of the business to enhance the services.
8. What is the concept of a service desk in ITIL?
A service desk is a center of contact for users to request IT support, report incidents, and make service requests. It is the point of communication between users and IT service providers.
9. Differentiate between an incident and a problem in ITIL?
An interruption in an IT service or degradation in the performance of the IT service is called an Incident. A problem, on the other hand, is the cause of one or more incidents, and it is the identification of a root cause.
ITIL Interview Questions for Intermediate
10. How does ITIL help minimize the total cost of ownership (TCO) for IT investments?
IT investments and staff always find that they break their work schedule. This happens because the unscheduled work always takes priority over the work that is planned. ITIL can help an organization stop this continuous cycle and can, therefore, help employees focus on the total cost of ownership (TCO) and other activities in their respective departments.
11. Is there a trade-off between return and risk?
According to modern portfolio theory, there is a trade-off between risk and return. All other factors being equal, if a particular investment incurs a higher risk of financial loss for prospective investors, those investors must be able to expect a higher return in order to be attracted to the higher risk. In the majority of cases, even though there is no promise of higher returns on risky assets, the higher risk just tends to scare off potential investors, keeping the returns on a given investment low. The only investments that can really try to promise higher returns for higher risk are bonds, and even then the higher returns won’t be generated if the issuing organization goes default.
12. Which two service management processes will most likely use risk analysis and management methodology?
The two service management processes are Availability Management and IT Service Continuity Management. ITIL Availability Management aims at defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services. Availability Management is responsible for ensuring that all IT infrastructure, processes, tools, roles, etc. are appropriate for the agreed availability targets. IT Service Continuity Management (ITSCM) aims at managing risks that could seriously impact IT services. ITSCM ensures that the IT service provider can always provide the minimum agreed service levels, by reducing the risk from disaster events to an acceptable level and planning for the recovery of IT services. ITSCM should be designed to support Business Continuity Management.
Learn more about Artificial Intelligence in this AI Training in New York to get ahead in your career!
13. What type of information is stored in a CMDB?
CMDB contains contents intended to hold a collection of IT assets commonly referred to as configuration items (CI), as well as descriptive relationships between such assets. When populated, the repository becomes a means of understanding how critical assets such as information systems are composed, what their upstream sources or dependencies are, and what their downstream targets are.
Are you interested in learning Artificial Intelligence from experts? Enroll in the AI Course in Bangalore now!
14. Explain Service Portfolio, Service Catalog, and Service Pipeline.
Service Portfolio: It defines services provided by service providers across the market and all customers. The objective of ITIL Service Portfolio Management is to manage the Service Portfolio. Service Portfolio Management ensures that the service provider has the right mix of services to meet the required business outcomes at an appropriate level of investment.
Service Catalogue is a subset of Service Portfolio. Services ready to be offered to customers are listed in this catalog. An IT Service Catalog is a list of available technology resources and offerings within an organization.
Service Pipeline consists of services under development. It is a great opportunity to view the direction of a service provider’s growth as it discusses and includes the future services that are currently under development by the service provider.
15. What is the difference between ITIL v2 and v3?
- The ITIL v2 library was organized into seven core books:
(i) Service Support
(ii) Service Delivery
(iii) ICT Infrastructure Management
(iv) Planning to Implement Service Management
(v) Application Management
(vi) Business Perspective
(vii) Security Management
- On the other hand, ITIL v3 is now organized into just five books:
(i) Service Strategy
(ii) Service Design
(iii) Service Transition
(iv) Service Operation
(v) Continual Service Improvement
- Basically, the v2 process areas have been logically grouped into a phased life cycle approach
- In contrast to ITIL v2, ITIL v3 clearly defines the roles and responsibilities in each process and reasons the role of communication in the entire life cycle.
Interested in learning Artificial Intelligence? Check out the AI Training in Sydney!
16. Who decides the categorization of a proposed change within an ITIL Change Management process?
It is the task of the Change Manager. A Change Manager plays a key role in ensuring that the projects (change initiatives) meet their objectives within timelines and the said budgets by increasing employee adoption and usage. This person will focus on the people-side changes, including changes that happen to business processes, systems and technologies, job roles, and organization structures.
Learn more about Artificial Intelligence in this insightful AI blog!
ITIL Interview Questions for Experienced
17. What is a plan-do-check-act (PDSA) cycle?
The PDSA cycle is a systematic series of steps for gaining valuable learning and knowledge for the continual improvement of a product or process. Also known as the Deming Wheel or Deming Cycle, the concept and application of the PDSA cycle was first introduced to Dr. Deming by his mentor, Walter Shewhart of the famous Bell Laboratories in New York.
the four phases of the plan-do-check-act cycle are as follows:
- Plan: Identifying and analyzing the problem
- Do: Developing and testing a potential solution
- Check: Measuring how effective the test solution was and analyzing whether it could be improved in any way
- Act: Implementing the improved solution fully
If you want to learn Artificial Intelligence in-depth, check out this AI tutorial!
18. What type of information is captured in an information security policy?
Information security policies are the documented business and technical rules for protecting an organization from information security risks faced by its business and technical infrastructure. These written policy documents provide a high-level description of various controls, which the organization will use to manage its information security risks.
The information security policy documents are also considered to be a formal declaration of the management’s intent to protect its information assets from relevant risks. In specific cases, the policies are supported by information security procedures that identify key activities required to implement relevant information security policies.
19. What is a balanced scorecard?
A balanced scorecard is a strategic planning and management system that is used extensively in business, government, and nonprofit organizations worldwide to align business activities to the vision and strategy of an organization, improve internal and external communications, and monitor the organization’s performance against its strategic goals.
Learn all AI concepts through the AI Course in Hyderabad to take your career to a whole new level!
20. Suppose a Service Level Manager requires confirmation regarding the time (say, within 10 seconds) taken by the internal Service Desk to answer a certain percentage of calls. In what document would the Service Desk’s agreement to this requirement be recorded?
The Operational-level Agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or a set of services. OLAs are designed to address and solve the problem of IT silos by setting forth a specific set of criteria and defining a specific set of IT services to be performed by each department. It should be noted that the term ‘Service Level Agreement’ (SLA) is used in many companies while discussing the agreements between two internal groups. However, according to the Information Technology Infrastructure Library (ITIL) framework for best practices, this type of internal contracts is better known as Operational-level Agreement.
21. Which ITIL process should ensure that the organization is aware of new and changing technologies?
Capacity Management is responsible for ensuring that the organization is aware of new and changing technologies. It is the discipline that checks and verifies that IT infrastructure is provided at the right time in the right volume at the right price, with utmost efficiency. This requires inputs from many areas of the business to identify what services are (or will be) required, what IT infrastructure is needed to support these services, what level of contingency will be needed, and what the cost of this infrastructure will be.
Go through the AI Course in London to get a clear understanding of Artificial Intelligence!
22. How is IT Service Continuity Management (ITSCM) related to Business Continuity Planning (BCP)?
IT Service Continuity is a subset of Business Continuity Planning (BCP) and encompasses both IT disaster recovery planning and wider IT resilience planning. It also incorporates those elements of IT infrastructure and services that relate to (voice) telephonic and data communications. It is a systematic process to prevent, predict, and manage Information and Communications Technology (ICT) disruption and incidents, which have the potential to disrupt ICT services, and it should result in a more resilient IT service capability aligned to wider organizational requirements.
If you have any doubts or queries related to Artificial Intelligence, get them clarified from the AI experts on our AI Community!
23. After a change has been implemented, an evaluation is performed. What is this evaluation called?
It is known as Post-implementation Review (PIR). PIR is an assessment and review of the complete working solution. It will be performed after a period of live running, sometimes after the project is completed. The Post-implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a specific period of time (usually 6 months). It is a free-form report, and not all sections of it are relevant or necessary to the final product. A description of the Post-implementation Review report is always produced.
Scenario Based on ITIL Interview Questions
24. Assume you have been appointed as the new IT service manager in a renowned company, along with adopting the ITIL implementation. Outline the steps you would take to initiate ITIL.
In such a scenario, I would approach it with the below plan:
- Assessment and planning: After conducting a thorough assessment of the prevalent IT service management process, including strengths, weaknesses, opportunities, and threats, I would involve the stakeholders in the planning process to ensure buy-in and support. Develop a plan consisting of outlined goals, timelines, resources, requirements, and key performance indicators (KPIs) for measuring success.
- Education training: Organizing training sessions and educating the employees regarding ITIL would be the most important part of the plan for adopting ITIL services.
- Establishing Governance Structure: Define roles and responsibilities for the IT service team, including the appointment of a new advisory board (CAB).
- Configuration Management Database (CMDB): Establish CMBD to centralize and manage information about relations and configuration items (CI).
- Communication and Change Management: Communicate a comprehensive plan to keep stakeholders informed during the ITIL implementation process, including the objectives and progress.
- Develop, maintain, and monitor the performance for the ITIL process against KPIs.
- Conduct periodic reviews and audits for ITIL processes to ensure compliance.
25. How would you organize and handle the issues related to frequent incidents related to service disruptions in an organization? Develop an implementation plan to resolve the issue through ITIL.
To effectively handle issues related to service disruptions, it becomes crucial to develop and implement ITIL. The aim then becomes to minimize the impact of incidents on business operations.
- Ensure a centralized logging system to capture and categorize incident reports; define criteria for incident prioritization based on impact urgency. Ensure the logging of incidents with accurate details and information, including the effect, service, and user details.
- Ensure a trained team to handle incoming issues correctly. This team shall keep a regular check on different groups with issues to note how bad they are through diagnostic tools.
- Define standard incident resolution procedures and prioritize their execution based on the severity of the issue faced.
- Establish a clear communication path both for escalations and resolution in due time. Maintain proactive communication with stakeholders, including affected users.
- Ensure documentation of Incident closed and actions taken, analyze the root causes and lessons learned.
- Incident resolution and review analysis should be conducted regularly to identify trends and recurring issues with the areas for improvement.
- Incident management integration with other ITIL processes with the concerned stakeholders and cross-functional incident managers.
26. How would you manage as a change manager if your company is having a software update in the IT infrastructure? Describe a plan according to ITIL guidelines.
As a change manager, to follow ITIL steps,I would:
- Gather details about the software update and involve stakeholders to elaborate on its purpose and features that affect the business and the IT infrastructure.
- Conduct a thorough impact assessment to evaluate the risks related to the software update.
- Establish a formal committee to review the management of the software update, consisting of submission, renewal, approval, and implementation of the software.
- Work with a prominent communication plan to resolve the issues without any mismanagement, and then conduct the process. Address and inform changes both to the stakeholders and the concerned employees with a proactive plan to ensure smooth execution.
- Develop and execute a thorough testing and deployment plan, along with regular checks in the process, to avoid lags in performance.
- Keep regular post-update checks and ensure detailed logging according to the ITIL implementation.
Salary Trends in ITIL
The demand for ITIL professionals has been rising, and the average has been noted to be 9,60,000 LPA in India.
According to Ambitionbox, the salary trends have been as follows:
Experience: 0 – 9 years
|Senior-Level: 15 – 17LPA
According to ZipRecruiter, the salaries for ITIL professionals in the US are as high as $154,500 and as low as $44,500.
Experience: 0 – 9 years
ITIL Job Trend
- Global Demand: According to LinkedIn, there are a total of 2000+ ITIL jobs in the United States.
- Regional Trends: According to LinkedIn, there are more than 13,000+ jobs in India that have been reported till 2024.
Job Opportunity in ITIL
|ITIL Continual Service Improvement
|Is responsible for continual efforts within the IT organization that enhances service quality, efficiency, and cost-effectiveness.
|ITIL service Owner/Manager
|Responsible for providing the frontline support service for requests and incidents.
|ITIL Process Owner
|Responsible for ITIL processes like incident management, change management, problem management.
Roles and Responsibilities in ITIL
As per TCS, the role of ITIL Continual Service Improvement (SCI) has the following responsibilities:
- Act as ITIL expert for the analysis and development of existing processes, procedures, and methods.
- Manage the current knowledge management practices as well as design new knowledge distribution policies.
- Establish and maintain strong and productive relations with key stakeholders.
- Utilize the knowledge base resources and design modules for staff and clients to help them access the knowledge management tools.
I hope this set of ITIL interview questions will help you prepare for your interviews. Best of luck!
Looking to start your career or even elevate your skills in the field of ITIL? If you want to deep dive into more ITIL interview questions, feel free to join Intellipaat’s Vibrant Community.