Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ServiceNow CIS-Discovery Certified Implementation Specialist - Discovery Exam Practice Test

Certified Implementation Specialist - Discovery Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

What are the main KPIs for CMDB Health scorecard?

Choose 3 answers

Options:

A.

Correctness

B.

Completeness

C.

Staleness

D.

Compliance

E.

Duplicates

Question 2

Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?

Options:

A.

install.service-now.com

B.

docs.servicenow.com

C.

developer.service-now.com

D.

service-now.com

Question 3

As a first step in horizontal discovery, where is the Shazzam probe input placed in a request?

Options:

A.

CC queue

B.

LOP services

C.

CO Per probes

D.

Target IP address

Question 4

Which selections are necessary to create a custom horizontal pattern to discover a computer operating system?

Options:

A.

CI type

B.

Application Pattern Type

C.

Infrastructure Pattern Type

D.

Process Strategy Type

Question 5

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

Options:

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Question 6

Which of the following best describes what may also be required when increasing the max number of threads for a MID Server?

Options:

A.

increase the amount of disk space on the MID Server host

B.

updating the acl rules for the CMDB tables in ServiceNow

C.

increasing the memory allocated to the MID Server app.

D.

increase the MID Server max payload size

Question 7

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

Options:

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Question 8

As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?

Options:

A.

Target

B.

Pattern Log

C.

ECC queue

D.

Discovery Log

Question 9

In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)

Options:

A.

tcp to udp

B.

application to application

C.

mid server to target

D.

host to application

Question 10

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

Options:

A.

Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.

B.

Discovery finds applications and devices on your network, Service Mapping monitors those devices.

C.

Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.

D.

Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

Question 11

Which of the following can be used in the Debug Identification Section in Debug Mode for an infrastructure pattern? (Choose two.)

Options:

A.

IP

B.

AWS Endpoint

C.

PID

D.

Host Name

Question 12

When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?

Options:

A.

Local Admin

B.

Domain Admin

C.

MID Server User Role

D.

Log on as service

Question 13

Which must be configured to allow a MID Server to access servers using WinRM?

Options:

A.

Add the WinRM parameter on the target servers

B.

Add a WinRM MID Server parameter

C.

Add the MID Server as a discovery source with DNS

D.

Set the JIRA Property in true

Question 14

While discovering a new SNMP network device, which choice could cause the error ‘Active, couldn't classify" to occur on a Discovery Status?

Options:

A.

SNMP credentials are incorrect.

B.

SNMP only behavior is not configured.

C.

A firewall blocking the communication between the MID Server and the target device.

D.

An SNMP Classification must be updated or created for the new device.

Question 15

Which choice best represents how to modify the functionality shown in this image?

Options:

A.

From a Classifier

B.

From a Discovery Pattern

C.

From the MID Server

D.

From a Probe

Question 16

Which of the following related lists can assist with troubleshooting discovery from a discovery status?

Choose 3 answers

Options:

A.

Discovery Log

B.

Running Processes

C.

ECC Queue

D.

Devices

Question 17

Which choice represents the three best ways of extending Discovery?

Options:

A.

Orchestration, Classifiers, Discovery Patterns

B.

Fingerprinting, Classifiers, Discovery Patterns

C.

Orchestration, Classifiers, Probes & Sensors

D.

Classifiers, Probes & Sensors, Discovery Patterns

E.

Classifiers, Fingerprinting, Probes & Sensors

Question 18

Which service needs to be running on a host to detect a Windows device?

Options:

A.

WM

B.

WinkM

C.

CM

D.

SSH

Question 19

Which choice will populate the Location field for a discovered CI?

Options:

A.

Location field for a Discovery Schedule

B.

Location field for a parent CI Type

C.

Location field for a Port Probe

D.

Location report from the Discovery Dashboard

Question 20

A Discovery Schedule contains a /24 subnet IP Range and a Shazzam batch size of 5000. How many times will a Shazzam probe be launched during discovery?

Options:

A.

1

B.

2

C.

5000

D.

254

Question 21

File-based Discovery is triggered during the.

Options:

A.

Classify Phase

B.

Scan Phase

C.

Exploration Phase

D.

Pattern Phase

E.

Identification Phase

Question 22

In IT environments, what is the purpose of horizontal discovery?

Options:

A.

A method to map application dependencies

B.

A way to visualize network traffic

C.

A strategy for managing user access

D.

A technique for discovering devices

Question 23

Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)

Options:

A.

JEA Properties set to True

B.

MID Servers must be configured as a trusted source with DNS

C.

MID Servers need to be added to the WinRM Group policy on the Servers

D.

MID Server Parameters Add WinRM

Question 24

Which of the below choices are possible options under ACTION ON ALL in the Recommended Actions pane for an Automated Error Messages list within Discovery > Home?

Choose 2 answers

Options:

A.

Make Ranges

B.

View instructions

C.

Ping IP Addresses

D.

Retry Discovery

Question 25

Which one of the following is not used in a horizontal discovery pattern?

Options:

A.

Variables

B.

Connectivity section

C.

Operations

D.

Identification section

Question 26

For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)

$IfTable<_>.InstanceID

Options:

A.

[3]

B.

[X]

C.

[&]

D.

[.]

E.

[*]

F.

[]

Question 27

Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)

Options:

A.

CI attributes

B.

Prefix

C.

Temporary

D.

Fixed

E.

Global

Question 28

Which of the following fields are editable from a Merge Table pattern operation?

Choose 3 answers

Options:

A.

Target Table

B.

Second Table

C.

Primary Table

D.

First Table

Question 29

CI identifiers can be viewed under which of the following?

Options:

A.

Discovery Dashboard

B.

CI Class Manager

C.

Process Handlers

D.

Processes and Classification

E.

CI record

Question 30

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

Options:

A.

The next discovery is stopped for the CI that is duplicated.

B.

Each set of duplicate CIs is added to a de-duplication task.

C.

A notification is sent to the CI owner.

D.

An association identification rule is created automatically.

Question 31

Which of the following choices explain differences between Service Mapping and Discovery?

Options:

A.

Discovery addresses inventory-related use cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

B.

Discovery finds applications and devices on your network; Service Mapping monitors those devices.

C.

Discovery requires agent installation to find hardware devices; Service Mapping requires agents for software.

D.

Discovery utilizes IP address ranges for initial discovery; Service Mapping uses entry points.

Question 32

Which of the following MID Server Parameters cannot be modified through the platform UI?

Options:

A.

mid.ssh.session_timeout

B.

url

C.

mid.windows.management_protocol

D.

name

Question 33

With multiple CI data sources, which choice is the best for determining which source can update a CI attribute?

Options:

A.

Business Rules

B.

Data Certification

C.

Transform Maps

D.

Reconciliation Rules

Question 34

What entry point type must a horizontal pattern have to execute from a process classifier?

Options:

A.

A subnet entry point type.

B.

HTTP(S) entry point type if the pattern is running on a web server application.

C.

TCP entry point type or ALL entry point type.

D.

It does not matter, it is triggered for all entry point types.

Question 35

Which choice best describes the Reconciliation process?

Options:

A.

The process of reconciling a deleted Cl, if it is identified as a duplicate. The result is stored in de-duplication tasks.

B.

The process of reconciling uniquely identifying Cis. to determine if the Cl already exists in the CMDB or if it is a newly discovered Cl.

C.

The process of reconciling Cis and Cl attributes by allowing only designated authoritative data sources to write to the CMDB at the Cl table and attribute level.

D.

The process of normalizing applications, to allow the data to be used by Software Asset Management.

Question 36

What is the recommended method for excluding specific software from discovery on Windows and Unix Servers?

Options:

A.

Pattom Modification

B.

Probe Modification

C.

Configuration Console

D.

Discovery Properties

Question 37

In a discovery pattern, which types are available with C Attributes in the Pattern Designer?

Options:

A.

Related CI types

B.

Main pattern CI type

C.

Global CI types

D.

All CI types