Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

ServiceNow CIS-Discovery Dumps

Certified Implementation Specialist - Discovery Questions and Answers

Question 1

For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?

Options:

A.

Hash tag

B.

Brackets

C.

Quotes

D.

Dollar sign

Question 2

In order to use Debug from the Pattern Designer, you must have what?

Options:

A.

a proxy server

B.

a discoverable CI

C.

the admin role

D.

Service Mapping installed

Question 3

Which selections are necessary to create a custom horizontal pattern to discover a computer operating system?

Options:

A.

CI type

B.

Application Pattern Type

C.

Infrastructure Pattern Type

D.

Process Strategy Type

Question 4

A network device has both an SSH port and an SNMP port open. Discovery tries the SSH probe first and it fails. This triggers the SNMP probe, which succeeds. Discovery uses SNMP first for subsequent discoveries on that device.

What discovery functionality allows the above to happen?

Options:

A.

Classification

B.

Credential affinity

C.

MID Server affinity

D.

IP service affinity

Question 5

What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)

Options:

A.

CI Attributes

B.

Operations

C.

Temporary Variables

D.

CMDB Dashboard

Question 6

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

Options:

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Question 7

A discovery runs against a Windows Server returning the following attribute values for the first time:

name = WindowsSN1 serial_number = 12321

A subsequent discovery is ran against a different Windows Server returning the following attribute values: name = WindowsSN2

serial_number = 12321

With only base system CI Identifiers configured, which of the following is true?

Options:

A.

A Windows Server CI is created, then updated with WindowsSN2 as the name.

B.

Two Windows Sewer CIs are created, with WindowsSN1 AND WindowsSN2 for names.

C.

Two Windows Server CIs are created, without serial_number values.

D.

A Windows Server CI is created, then updated with WindowsSN1 as the name.

Question 8

as

Based on the following images, which choice best describes what occurs if Discovery sets the name attribute of a discovered Windows Server CI to 'Windows1' and then Altiris discovery runs detecting 'Windows2' for the name attribute on the same CI?

Options:

A.

The name of the CI stays 'Windows1'.

B.

The name of the CI changes to 'Windows2'.

C.

The name of the CI does not populate with either discovery.

D.

The CI is not discovered because Discovery is not listed in either image.

Question 9

Which of the following related lists can assist with troubleshooting discovery from a discovery status?

Choose 3 answers

Options:

A.

Discovery Log

B.

Running Processes

C.

ECC Queue

D.

Devices

Question 10

As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?

Options:

A.

Target

B.

Pattern Log

C.

ECC queue

D.

Discovery Log

Question 11

In Discovery, what table associates an IP address and a credential?

Options:

A.

Credential Affinity

B.

Service Affinity

C.

Service CI Association

D.

Tags

Question 12

While discovering a new SNMP network device, which choice could cause the error ‘Active, couldn't classify" to occur on a Discovery Status?

Options:

A.

SNMP credentials are incorrect.

B.

SNMP only behavior is not configured.

C.

A firewall blocking the communication between the MID Server and the target device.

D.

An SNMP Classification must be updated or created for the new device.

Question 13

Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.)

Options:

A.

Tomcat does not extend the Application Server table

B.

Tomcat table extends the Application Server table

C.

Tomcat table is a child of the Application Server table

D.

Tomcat table is a parent of the Application Server table

Question 14

When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?

Options:

A.

Local Admin

B.

Domain Admin

C.

MID Server User Role

D.

Log on as service

Question 15

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

Options:

A.

Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.

B.

Discovery finds applications and devices on your network, Service Mapping monitors those devices.

C.

Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.

D.

Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

Question 16

From Pattern Designer, which horizontal pattern type is the image below showing?

Temporary Variables

►computer_system

Options:

A.

Service Mapping

B.

Infrastructure

C.

Application

D.

Computer System

Question 17

Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)

Options:

A.

Create an Engaging User Experience

B.

Build New Apps Fast

C.

Manage Hybrid Clouds

D.

Proactively Eliminate Service Outages

Question 18

After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)

Options:

A.

Details

B.

Topic

C.

Pattern log link

D.

CMDB CI

E.

Queue

F.

Source

G.

Discovery schedule name

Question 19

Which of the following are the results of executing the WMI Query?

as

Choose 3 answers

Options:

A.

A scalar variable named 'PageFaults'.

B.

A tabular variable named 'more_process_info'.

C.

A scalar variable named 'PeakVirtualSize'.

D.

A tabular variable named 'Win32 Process'.

E.

A scalar variable named 'MaximumWorkingSetSize'.

F.

A tabular variable named 'WMI Query',

Question 20

Which of the following choices must be installed on a MID Server to run Credential-less Discovery?

Options:

A.

Credential-less Extension

B.

Nmap

C.

Advanced IP Scanner

D.

Defender

Question 21

For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging value?

Options:

A.

Quotes

B.

Brackets

C.

Dollar sign

D.

Hash tag

Question 22

In a discovery pattern, which types are available with C Attributes in the Pattern Designer?

Options:

A.

Related CI types

B.

Main pattern CI type

C.

Global CI types

D.

All CI types

Question 23

If the WMI service is not running on a host, it will prevent the discovery of which devices?

Options:

A.

Network

B.

Windows

C.

Storage

D.

Unix

Question 24

Which of the following properties define the maximum overall size for the returned payload that comes from patterns?

Options:

A.

cmdb.properties.payload_max_size

B.

glide.discovery.payload_max

C.

mid.discovery.max_payload_size

D.

mid.discovery.max_pattern_payload_size

Question 25

Which choice best describes a horizontal discovery pattern?

Options:

A.

Steps that execute operations

B.

Credential depot

C.

Port scanning tool

D.

Classifiers that execute probes

Question 26

Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)

Options:

A.

CI attributes

B.

Prefix

C.

Temporary

D.

Fixed

E.

Global

Question 27

The following shows part of the Windows OS - Servers pattern in Pattern Designer:

as

Which of the steps above use(s) a shared library?

Options:

A.

Step 26

B.

Neither step

C.

Step 25

D.

Both steps

Question 28

Which service needs to be running on a host to detect a Windows device?

    WMI

    SSH

Options:

A.

WinRM

B.

CIM

Question 29

Which of the following must be configured to allow a MID Server to access servers using WinRM?

Options:

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Question 30

Which of the below choices are the most probable results of the following image? (Choose three.)

as

Options:

A.

A tabular variable named ‘WMI Query’.

B.

A scalar variable named ‘MaximumWorkingSetSize’

C.

A scalar variable named ‘PageFaults’.

D.

A scalar variable named ‘PeakVirtualSize’.

E.

A tabular variable named ‘more_process_info’.

F.

A tabular variable named ‘Win32_Process’.

Question 31

Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?

Options:

A.

install.service-now.com

B.

docs.servicenow.com

C.

developer.service-now.com

D.

service-now.com

Question 32

Which operation is used to change from the default credentials to any other appropriate credentials in a horizontal pattern?

Options:

A.

Change credentials

B.

Change user

C.

Alternate credentials

D.

Alternate user

Question 33

What are the main KPIs for CMDB Health scorecard?

Choose 3 answers

Options:

A.

Correctness

B.

Completeness

C.

Staleness

D.

Compliance

E.

Duplicates

Question 34

Which of the below choices are needed for Quick Discovery? (Choose two.)

Options:

A.

MID Server

B.

Discovery Schedule

C.

PID

D.

Target IP

Question 35

When designing steps with operations requiring variables, it is best practice to do what?

Options:

A.

hard core variables

B.

always use scalar variables

C.

query targets for variables

D.

design for a static environment

Question 36

Which choice best describes a Functionality Definition?

Options:

A.

Defines what CI identifiers to use.

B.

Defines the IP addresses to discover.

C.

Defines what Behavior to use from a Discovery Schedule.

D.

Defines what protocols to detect from within a Behavior.

Question 37

SNMP Credentials require which of the following?

Options:

A.

write community strings

B.

usernames

C.

read community strings

D.

port 135 access

Page: 1 / 13
Total 125 questions