Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ServiceNow CIS-SM Certified Implementation Specialist - Service Mapping Exam Practice Test

Page: 1 / 11
Total 106 questions

Certified Implementation Specialist - Service Mapping Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A defined relationship between two Configuration Items (CIs), such as Runs on, Depends On, or Contains is called a what?

Options:

A.

CI Attribute

B.

Application to Application Relationship

C.

Relationship Type

D.

CI Dependency

Question 2

How many ServiceNow instances can one MID Server connect to?

Options:

A.

1

B.

5

C.

Up to 255

D.

Unlimited

Question 3

When using Service Mapping Pattern Designer, which one of the following is the result when using the Parse command output operation with the following command?

cat /etc/haproxy/haproxy.cfg

Options:

A.

Search for the file haproxy.cfg

B.

List all files in the haproxy.cfg directory

C.

Display lines with cat in the file haproxy.cfg

D.

Display the contents of the file haproxy.cfg

Question 4

In Service Mapping, which one of the following is used to discover the applications and outbound connections to other applications that appear on a Service map?

Options:

A.

Identification Rules

B.

Process Classifiers

C.

Patterns

D.

Metadata Rules

Question 5

In Event Management, if a Message key is not passed from an Event, which of the following Alert fields combine to populate the Message key on an Alert?

Options:

A.

Task, Description, Created

B.

Node, Type, Resource, Number

C.

Source, Number, Task

D.

Source, Node, Type, Resource

Question 6

Within the CMDB, all application CI Types/Classes are children of which parent class?

Options:

A.

Database Instance [cmdb_ci_db_instance]

B.

Software [cmdb_ci_software]

C.

Installed Software [cmdb_ci_installed_software]

D.

Application [cmdb_ci_appl]

E.

Licenses [cmdb_ci_license]

Question 7

What is the recommended approach to map a heavily containerized service in a production environment?

Options:

A.

Apply top-down discovery

B.

Leverage tag-based mapping

C.

Use a dynamic CI group

D.

Use manual application services

Question 8

From the Service Mapping service map, which one of the following best describes the difference between the options Resume discovery and Run discovery?

Options:

A.

Resume discovery continues a canceled discovery while Run discovery discovers part of the service map

B.

Resume discovery and Run discovery are functionally identical

C.

Resume discovery discovers part of the service map while Run discovery discovers the entire service map

D.

Resume discovery discovers the entire service map while Run discovery discovers part of the service map

Question 9

Which of the following are methods used to initiate discovery on a service? (Choose three.)

Options:

A.

Map multiple services suggested by Service Mapping by discovering the load balancers in an enterprise.

B.

Map multiple services by importing entry points from a CSV file.

C.

Map a single service defined by configuring an entry point.

D.

Map services suggested by the discovery of MID Servers in an enterprise.

E.

Map services based on Assets stored in the CMDB.

Question 10

In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?

Options:

A.

For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Extension Sections.

B.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run all Extension Sections for the pattern.

C.

For each pattern that supports the Entry Point Type, run all the Identification Sections that finish successfully and then run each Extension Section for the pattern.

D.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run Extensions Sections until one finishes successfully.

Question 11

Cloud Dimensions has data centers, services, and servers represented in the image.

Assuming each data center contains minimum one subnet, which one of the following is the best number of MID Servers Tur Cloud Dimensions to start with?

Options:

A.

1 (one for all data centers)

B.

4 (one for each data center)

C.

5 (one for each service)

D.

46 (one for each server)

Question 12

In order for Service Mapping to successfully discover UNIX targets, which SSH credential can be granted with limited privileges to a user?

Options:

A.

RDP privileges

B.

Root privileges

C.

WMI privileges

D.

Selective sudo (or sudo equivalent) access

E.

Domain access and local administrator privileges

Question 13

In Service Mapping, when discovery is started, what is the execution strategy used to run Connection Sections?

Options:

A.

Connection Sections are executed one by one and connections will result from each successful section.

B.

Connection Sections are executed randomly and connections will result from each successful section.

C.

Connection Sections are executed one by one in the order they are listed until the first successful section.

D.

Connection Sections are executed one by one in the order they are listed with a connection created from the last successful section.

Question 14

Service Mapping provides visibility to the Operator in Agent Workspace without leaving the Workspace UI. This visibility includes what items associated with the CI? (Choose two.)

Options:

A.

Releases

B.

Problems

C.

Incidents

D.

Alerts

Question 15

When running Service Mapping discovery, which of the following represents the root cause of the error?

“Failed to access target system. Access is denied”

Options:

A.

SSO authentication error

B.

CLI permissions error

C.

Applicative permissions error

D.

Windows authentication error

Question 16

Which one of the following is the baseline Identification Rule (CI Identifier) used to determine inserts or updates to all servers discovered by ServiceNow Discovery or Service Mapping?

Options:

A.

Application Rule

B.

Server Rule

C.

Hardware Rule

D.

Device Rule

Question 17

During Service Mapping discovery, which one of the following is used to uniquely identify a configuration item to determine updates or inserts into the CMDB?

Options:

A.

Identification Rules

B.

Reconciliation Rules

C.

Coalesce Values

D.

Reconciliation Keys

Question 18

To begin the configuration of tag-based services, tag values must be defined where?

Options:

A.

Tag categories

B.

Tag catalogs

C.

Tag-based service families

D.

Tag libraries

Question 19

After discovering load balancers in a customer environment, service candidates may appear on the Service Mapping Home page under which one of the following tiles?

Options:

A.

Map

B.

Fix

C.

Approve

D.

Completed

E.

Review

Question 20

Which address is required for Service Mapping to discover a Load Balancer that does not previously exist in the CMDB?

Options:

A.

Management IP address

B.

MAC address

C.

Public IP address

D.

MIB address

Question 21

In Pattern Designer, which one of the following best describes the Create Connection step?

Options:

A.

Provides information about integrations to the host

B.

Provides information about relationships between cluster members

C.

Provides information about outbound connections to other CIs

D.

Provides information about relationships between the host and installed software

Question 22

Reconciliation Rules for the Application [cmdb_ci_appl] table are configured exactly the same for both ServiceNow and SCCM data sources and the following priorities are configured:

ServiceNow Priority: 100

SCCM Priority: 200

Which of the following is true?

Choose 3 answers:

Options:

A.

Applications discovered by Altiris can be updated by SCCM

B.

Applications discovered by SCCM can be updated by Altiris

C.

Applications discovered by ServiceNow can be updated by SCCM

D.

Applications discovered by Altiris can create application CIs in the CMDB

E.

Applications discovered by SCCM can create application CIs in the CMDB

Question 23

Which one of the following best describes the definition of an Entry Point?

Options:

A.

A method by which a user interacts with a service or a CI interacts with another CI

B.

A type of communication taking place between applications

C.

A template of attributes that define a communication type between applications

D.

A Host::Hosted on relation between CIs

Question 24

Which one of the following Regular Expressions could be used to parse "San Diego" from the string "Location San Diego"?

Options:

A.

Location (\W) (\w)

B.

Location (L*)

C.

Location (\w+ \w+)

D.

Location (W)

Question 25

Which one of the following Identification Rule (CI Identifier) fields, when selected, determines CMDB update/inserts based on the configuration item's (CI) own attributes, without taking other CIs or relationships into consideration?

Options:

A.

Search on table

B.

Allow fallback to parent's rule

C.

Independent

D.

Application

Question 26

Which one of the following represents what the MID stands for in MID Server?

Options:

A.

Monitoring, Integration, and Discovery

B.

Management, Integration, and Discovery

C.

Management, Instrumentation, and Discovery

D.

Monitoring, Instrumentation, and Discovery

E.

MID is not an acronym.

Question 27

Which of the following commands does Service Mapping run on Linux-based targets that requires elevated privileges (i.e. sudo)?

Options:

A.

dir

B.

type

C.

service

D.

netstat

Question 28

During ServiceNow Discovery, which one of the following is the approximate number of host IPs that are port scanned with a Discovery Schedule configured with an IP network as shown?

180.181.0.0/16

Options:

A.

~5 million

B.

~1 million

C.

~65 thousand

D.

~500,000 thousand

Question 29

During ServiceNow Discovery, which one of the following protocols is used to extract data from printers?

Options:

A.

WMI

B.

PowerShell

C.

SSH

D.

SNMP

Question 30

In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?

Options:

A.

For each pattern that supports the Entry Point Type, run identification Sections until one finishes successfully and then run each Connection Section for the pattern.

B.

For each pattern that supports the Entry Point Type, run all the identification Sections that finish successfully and then run each Connection Section for the pattern.

C.

For each pattern that supports the Entry Point Type, run identification Sections until one finishes successfully and then run Connection Sections until one finishes successfully.

D.

For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Connection Sections.

Question 31

In the following image of the Discovery Log, the green S represents which one of the following?

Options:

A.

A library in the Connection Section of a pattern

B.

A step in the Connection Section of a pattern

C.

A step in an Identification Section of a pattern

D.

A library in an Identification Section of a pattern

Page: 1 / 11
Total 106 questions