Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

ServiceNow CIS-SM Dumps

Page: 1 / 11
Total 106 questions

Certified Implementation Specialist - Service Mapping Questions and Answers

Question 1

A CI Type is also known as which one of the following?

Options:

A.

Table

B.

Discovery Pattern

C.

Service Group

D.

CI Identifier / Identification Rule

Question 2

How many ServiceNow instances can one MID Server connect to?

Options:

A.

1

B.

5

C.

Up to 255

D.

Unlimited

Question 3

The application stack is as follows: IIS Web Server with an inclusion connection to an IIS Virtual Directory, and an outbound connection from the IIS Virtual Directory to an MSSQL database.

Which describes the correct number of Discovery Pattern Identification and Connection Sections that evaluate to true when Service Mapping discovers a service with this application stack?

Options:

A.

3 Identification Sections and 2 Connection Sections

B.

2 Identification Sections and 1 Connection Section

C.

2 Identification Sections and 2 Connection Sections

D.

3 Identification Sections and 1 Connection Section

Question 4

Which file on the MID Server is configured with the customer's ServiceNow instance URL?

Options:

A.

config.xml

B.

config.json

C.

wrapper.conf

D.

server.xml

Question 5

Assuming the Apache Web Server Identification Rule (CI Identifier) is configured as shown with the following

Criterion attributes:

    Class

    Configuration file

    Version

as

Yesterday, an Apache Web Server CI was discovered as part of Service Mapping. Today, the application owner upgraded the Apache Web Server to a different version and reran discovery of the service. What will happen in the CMDB?

Options:

A.

A duplication error will occur.

B.

A new Apache Web Server CI is created.

C.

The existing Apache Web Server CI will be reconciled with the upgraded Apache Web Server CI and its version will be updated.

D.

The Apache Web Server CI will be reclassified as a Web Server CI.

Question 6

In Service Mapping, which one of the following icons represents a credential error on the Service map?

Options:

A.

Yellow triangle

B.

Generic application

C.

QUESTION NO: mark

D.

Red stop sign

Question 7

Which one of the following is true for variables defined in an Identification Section?

Options:

A.

Identification Section variables can also be used in all other Identification Sections in any pattern.

B.

Identification Section variables can also be used in Parent CI Types.

C.

Identification Section variables can also be used in all other Identification Sections in the same pattern.

D.

Identification Section variables can also be used in Connection Sections for any pattern.

E.

Identification Section variables can also be used in Connection Sections for the same pattern.

Question 8

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string?

Version 5.2.0

Options:

A.

Version (\.*)

B.

Version\s+(\d+\.\d+\.\d+)

C.

Version (\d+)

D.

Version (\d+).(\d+).(\d+)

Question 9

In Event Management, if a Message key is not passed from an Event, which of the following Alert fields combine to populate the Message key on an Alert?

Options:

A.

Task, Description, Created

B.

Node, Type, Resource, Number

C.

Source, Number, Task

D.

Source, Node, Type, Resource

Question 10

In Service Mapping, which one of the following is used to discover the applications and outbound connections to other applications that appear on a Service map?

Options:

A.

Identification Rules

B.

Process Classifiers

C.

Patterns

D.

Metadata Rules

Question 11

Cloud Dimensions has data centers, services, and servers represented in the image.

Assuming each data center contains minimum one subnet, which one of the following is the best number of MID Servers Tur Cloud Dimensions to start with?

as

Options:

A.

1 (one for all data centers)

B.

4 (one for each data center)

C.

5 (one for each service)

D.

46 (one for each server)

Question 12

In ServiceNow Discovery, which one of the following ports is used during the Port Scan phase?

Options:

A.

UDP Port 23

B.

TCP Port 136

C.

TCP Port 135

D.

UDP Port 22

Question 13

Which one of the following Identification Rule (CI Identifier) fields, when selected, determines CMDB update/inserts based on the configuration item's (CI) own attributes, without taking other CIs or relationships into consideration?

Options:

A.

Search on table

B.

Allow fallback to parent's rule

C.

Independent

D.

Application

Question 14

Which one of the following ServiceNow application KPIs would improve most as a direct result of having visibility to a service map created through Service Mapping?

Options:

A.

Problem Management: Number of Incidents per Known Problem

B.

Incident Management: Mean Time to Resolve

C.

Event Management: Signal to Noise Ratio

D.

Change Management: Number of Major Changes

Question 15

Which one of the following statements best explains the following URL: /

SaCmdManager.do?ip=198.51.100.66?

Options:

A.

The user is starting the Command Line Console and is able to send commands to the host 198.51.100.66.

B.

The user is starting the Command Line Console and explicitly directs Service Mapping to use the MID Server 198.51.100.66 to execute commands.

C.

This is not a valid URL for Service Mapping.

D.

The user is starting the Command Line Console and is able to send commands against the ServiceNow instance at 198.51.100.66.

Question 16

In order for Service Mapping to successfully discover UNIX targets, which SSH credential can be granted with limited privileges to a user?

Options:

A.

RDP privileges

B.

Root privileges

C.

WMI privileges

D.

Selective sudo (or sudo equivalent) access

E.

Domain access and local administrator privileges

Question 17

In the image, which one of the following best describes the lower icons?

as

Options:

A.

The connections from HAProxy are to other CIs that had errors during discovery.

B.

The connections from HAProxy are application clusters.

C.

The connections from HAProxy could not be identified and are marked as a Generic Application.

D.

The connections from HAProxy are marked as boundaries.

Question 18

Which one of the following best represents the output from the following Regular Expression?

([\w\d\-\.]+)

Options:

A.

Match a single character in the list between one and unlimited times.

B.

Match a single character in the list one time.

C.

Match a single character in the list between one and three times.

D.

Match a single character in the list between one and ten times.

Question 19

When using a Delimited Text Parsing Strategy, what delimiter and position will parse 2014 from the string?

2014/02/07-17:49:36

Options:

A.

Delimiter of space and position 1

B.

Delimiter of / and position 0

C.

Delimiter of / and position of 1

D.

Delimiter of 2014 and position 1

Question 20

Which one of the following best represents the breadth of types of Configuration Items (CIs) discovered by

running Service Mapping?

Options:

A.

Hardware, Installed Software, Network Gear

B.

Physical Components, Logical Components, Certificates

C.

Applications, Licenses, IP Addresses

D.

Cloud Services, Applications, CI Relationships

E.

Hardware, Licenses, CI Relationships

Question 21

Which of the following are benefits a service map can bring during an Incident resolution? (Choose three.)

Options:

A.

Quickly identifies any recent incidents that occurred on components of the impacted service.

B.

Narrows down possible affected components when a service is impacted.

C.

Helps reduce the number of unplanned changes in a customer environment.

D.

Helps pinpoint code errors after a faulty application is identified.

E.

Quickly identifies any recent changes performed on components of the impacted service.

Question 22

Which best describes what Identification Rules are?

Options:

A.

Used to track duplicate CIs until resolved

B.

Consists of one or more identifier entries that specify the criterion attributes that uniquely identify a CI

C.

Used by the coalesce field when importing data into ServiceNow using a transform map

D.

Allows the ability to assign a priority to data sources if multiple data sources are authorized to update the same table or table attributes

Question 23

In Service Mapping, which one of the following is true if host discovery fails on the entry point configuration item?

Options:

A.

Service Mapping will stop until the discovery of the host is successful

B.

Service Mapping will continue to discover just the applications comprising the service

C.

Service Mapping will continue to discover just the connections comprising the service

D.

Service Mapping will continue to discover applications and connections comprising the service

Question 24

Which is the most common risk that can negatively impact a Service Mapping engagement?

Options:

A.

The customer is not using Active Directory for credential authentication

B.

The customer external firewall only communicates on outbound port 80 and 443

C.

The customer security team is not made aware early enough in the engagement of the credential requirements

D.

The MID Server resource requirements are beyond capacity of the customer

Question 25

When configuring SNMP credentials, which of the following is true?

Choose 2 answers

Options:

A.

SNMP v1/2/3 is supported

B.

SNMP Read Only account is required

C.

SNMP Read/Write account is required

D.

Only SNMP v1/2 is supported

Question 26

Which one of the following Linux commands can be used by a non root user to return the process ID listening on port 8080?

Options:

A.

sudo netstat -an -p TCP | grep :8080

B.

sudo netstat -anp | grep :8080

C.

netstat -anp | grep :8080

D.

netstat -an -pid * | grep :8080

Question 27

To begin the configuration of tag-based services, tag values must be defined where?

Options:

A.

Tag categories

B.

Tag catalogs

C.

Tag-based service families

D.

Tag libraries

Question 28

Using Pattern Designer, when configuring the first step in an Identification Section, which one of the following is considered a good practice?

Options:

A.

Create a table for the process parameters

B.

Check if connectivity variables are defined

C.

Use a Parse file operation to extract necessary information from a configuration file

D.

Use a Match operation on the process executable or command variable

Question 29

During Service Mapping discovery, which one of the following is used to uniquely identify a configuration item to determine updates or inserts into the CMDB?

Options:

A.

Identification Rules

B.

Reconciliation Rules

C.

Coalesce Values

D.

Reconciliation Keys

Question 30

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string:

Location, Denver,CO

Options:

A.

Delimiter of Denver and position 2

B.

Delimiter of Location, and position 2

C.

Delimiter of a comma and position 2

D.

Delimiter of a comma and position 3

Question 31

What describes the main feature offered by Service Mapping Plus?

Options:

A.

A suite of quick start tests that can be run to verify Service Mapping still works as expected after upgrades and deployments

B.

A collection of connection rules that are used to automatically add CIs to one or more application services

C.

Enables Kubernetes and cloud components to be added to service maps during tag-based discovery

D.

An enhanced version of mapping based on Machine Learning (Predictive Intelligence)

Page: 1 / 11
Total 106 questions