Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ServiceNow CIS-Discovery Certified Implementation Specialist - Discovery Exam Practice Test

Certified Implementation Specialist - Discovery Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?

Options:

A.

install.service-now.com

B.

docs.servicenow.com

C.

developer.service-now.com

D.

service-now.com

Question 2

When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?

Options:

A.

Local Admin

B.

Domain Admin

C.

MID Server User Role

D.

Log on as service

Question 3

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

Options:

A.

Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.

B.

Discovery finds applications and devices on your network, Service Mapping monitors those devices.

C.

Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.

D.

Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

Question 4

As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?

Options:

A.

Target

B.

Pattern Log

C.

ECC queue

D.

Discovery Log

Question 5

File-based Discovery is triggered during the .

Options:

A.

Classify Phase

B.

Scan Phase

C.

Exploration Phase

D.

Pattern Phase

E.

Identification Phase

Question 6

From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.)

Options:

A.

Test

B.

Table

C.

Scalar

D.

CI Type

Question 7

If the WMI service is not running on a host, it will prevent the discovery of which devices?

Options:

A.

Network

B.

Windows

C.

Storage

D.

Unix

Question 8

Which of the below choices are needed for Quick Discovery? (Choose two.)

Options:

A.

MID Server

B.

Discovery Schedule

C.

PID

D.

Target IP

Question 9

Which of the following describes the recommended permission level for credentials to discover Windows Servers?

Options:

A.

A domain user with local administrator access

B.

A userr00t access across the domain

C.

A domain administrator with sudo access

D.

A standard domain user with read access

Question 10

What does the MID Server need to collect vCenter events?

Options:

A.

vCenter Event Collector extension

B.

MID SNMP Trap Listener extension

C.

Firewall

D.

vCenter probes

Question 11

With multiple CI data sources, which choice is the best for determining which source can update a CI attribute?

Options:

A.

Business Rules

B.

Data Certification

C.

Transform Maps

D.

Reconciliation Rules

Question 12

Which of the choices are types of temporary variables in a discovery pattern?

Choose 2 answers

Options:

A.

Scalar/List

B.

Command

C.

SQL statement

D.

Tabular/Table

Question 13

Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)

Options:

A.

CI attributes

B.

Prefix

C.

Temporary

D.

Fixed

E.

Global

Question 14

What pattern operation allows the transfer of a file from the MID Server to a target?

Options:

A.

Parse file

B.

Create Connection

C.

Put file

D.

Manage Attachments

Question 15

During the Discovery process, what determines if an Asset record is created?

Options:

A.

CMDB

B.

Model Category

C.

Model Product

D.

ECC Queue

E.

Configuration Item

Question 16

In Discovery, what table associates an IP address and a credential?

Options:

A.

Credential Affinity

B.

Service Affinity

C.

Service CI Association

D.

Tags

Question 17

Which choice best describes how to use a Behavior for discovery?

Options:

A.

The MID Server selection method on a Discovery Schedule.

B.

The Behavior drop-down menu on a Discovery IP Range.

C.

The Behavior drop-down menu on a Discovery Status.

D.

The Behavior checkbox on a CI.

Question 18

Based on this image, which of the following choices is true?

Options:

A.

This is from a WMI query operation step.

B.

There is a scalar variable labeled ‘1’.

C.

This Value cannot be used in a pattern step.

D.

There is a tabular variable named ‘name_details’.

Question 19

What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)

Options:

A.

CI Attributes

B.

Operations

C.

Temporary Variables

D.

CMDB Dashboard

Question 20

Which of the following best describes what may also be required when increasing the max number of threads for a MID Server?

Options:

A.

increase the amount of disk space on the MID Server host

B.

updating the acl rules for the CMDB tables in ServiceNow

C.

increasing the memory allocated to the MID Server app.

D.

increase the MID Server max payload size

Question 21

Which of the below choices are possible options under ACTION ON ALL in the Recommended Actions pane for an Automated Error Messages list within Discovery > Home?

Choose 2 answers

Options:

A.

Make Ranges

B.

View instructions

C.

Ping IP Addresses

D.

Retry Discovery

Question 22

Which metrics comprise the Completeness KPI for CMDB Health? (Choose two.)

Options:

A.

Required

B.

Recommended

C.

Audit

D.

Overall

Question 23

What role is needed by the MID Server's user account to interact with a ServiceNow instance?

Options:

A.

mid_server

B.

discovery_admin

C.

sm_mid

D.

mid_discovery

Question 24

Which of the below choices are benefits of Tracked Configuration Files? (Choose two.)

Options:

A.

Content version comparison

B.

Files tracked as CIs

C.

Unwanted files removed from target

D.

No credentials needed

Question 25

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

Options:

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Question 26

By default, which of the following are automatically available as variables for horizontal discovery patterns? (Choose two.)

Options:

A.

infrastructure_system

B.

The CI Type on the Discovery Pattern form

C.

windows_cmdb_ci

D.

computer_system

Question 27

For what is File Based Discovery used?

Options:

A.

To discover the checksum of a file and store it to track for changes

B.

To discover the contents of flat files such as configuration files

C.

To discover that file names conform to a defined naming standard

D.

To discover file paths to recognize the signature of installed software

Question 28

Which method for deleting specific CIs is not discovered in 30 days?

Options:

A.

Scheduled Job

B.

UI Policy

C.

Service Mapping

D.

Data Policy

Question 29

Which of the following must be configured to allow a MID Server to access servers using WinRM?

Options:

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Question 30

Which choice best describes a horizontal discovery pattern?

Options:

A.

Classifiers that execute probes

B.

Steps that execute operations

C.

Credential depot

D.

Port scanning tool

Question 31

Which choice will populate the Location field for a discovered CI?

Options:

A.

Location field for a Discovery Schedule

B.

Location field for a parent CI Type

C.

Location field for a Port Probe

D.

Location report from the Discovery Dashboard

Question 32

What is the default thread count for a MID Server?

Options:

A.

5

B.

1

C.

50

D.

25

Question 33

What entry point type must a horizontal pattern have to execute from a process classifier?

Options:

A.

A subnet entry point type.

B.

HTTP(S) entry point type if the pattern is running on a web server application.

C.

TCP entry point type or ALL entry point type.

D.

It does not matter, it is triggered for all entry point types.