Certified Implementation Specialist - Discovery (CIS - Discovery) - Mock 2

Description

All questions must be answered.
Flávio Tiezzi
Quiz by Flávio Tiezzi, updated 12 months ago
Flávio Tiezzi
Created by Flávio Tiezzi almost 1 year ago
254
0

Resource summary

Question 1

Question
Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?
Answer
  • A notification is sent to the CI owner.
  • An associated identification rule is created automatically.
  • Each set of duplicate CIs is added to a de-duplication task.
  • The next discovery is stopped for the CI that is duplicated.

Question 2

Question
Which choice best describes a horizontal discovery pattern?
Answer
  • Steps that execute operations
  • Credential depot
  • Port scanning tool
  • Classifiers that execute probes

Question 3

Question
A config file for an application has the following three lines: Line 1: app build 1.2.3.4 version 5.14 Line 2: installation_dir=c:\opt\bin Line 3: build_type=Server. Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)
Answer
  • Get Process operation with correct Port
  • Find Matching URL operation with Target Variable
  • Parse File operation with Delimited Text parsing strategy
  • Parse File operation with Regular Expression parsing strategy

Question 4

Question
The following shows part of the Windows OS - Servers pattern in Pattern Designer Which of the steps above use(s) a shared library?
Answer
  • Step 26
  • Neither step
  • Step 25
  • Both Steps

Question 5

Question
Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?
Answer
  • install.service-now.com
  • docs.servicenow.com
  • developer.service-now.com
  • service-now.com

Question 6

Question
When designing steps with operations requiring variables, it is best practice to do what?
Answer
  • hard core variables
  • always use scalar variables
  • query targets for variables
  • design for a static environment

Question 7

Question
For what is File Based Discovery used?
Answer
  • To discover the checksum of a file and store it to track for changes
  • To discover the contents of flat files such as configuration files
  • To discover that file names conform to a defined naming standard
  • To discover file paths to recognize the signature of installed software

Question 8

Question
Which of the following properties define the maximum overall size for the returned payload that comes from patterns
Answer
  • cmdb.properties.payload_max_size
  • glide.discovery.payload_max
  • mid.discovery.max_payload_size
  • mid.discovery.max_pattern_payload_size

Question 9

Question
Based on this image, which of the following choices is true?
Answer
  • This is from a WMI query operation step.
  • There is a scalar variable labeled ‘1’.
  • This Value cannot be used in a pattern step.
  • There is a tabular variable named ‘name_details’.

Question 10

Question
After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)
Answer
  • Details
  • Topic
  • Pattern log link
  • CMDB CI
  • Queue
  • Source
  • Discovery schedule name

Question 11

Question
Which choice best represents how to modify the functionality shown in this image?
Answer
  • From a Classifier
  • From a Discovery Pattern
  • From the MID Server
  • From a Probe

Question 12

Question
What pattern operation allows the transfer of a file from the MID Server to a target?
Answer
  • Parse file
  • Create Connection
  • Put file
  • Manage Attachments

Question 13

Question
In Discovery, what table associates an IP address and a credential?
Answer
  • Credential Affinity
  • Service Affinity
  • Service CI Association
  • Tags

Question 14

Question
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
Answer
  • tcp to udp
  • application to application
  • mid server to target
  • host to application

Question 15

Question
Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)
Answer
  • JEA Properties set to True
  • MID Servers must be configured as a trusted source with DNS
  • MID Servers need to be added to the WinRM Group policy on the Servers
  • MID Server Parameters Add WinRM

Question 16

Question
$IfTable<_>.InstanceID For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)
Answer
  • [3]
  • [X]
  • [&]
  • [.]
  • [*]
  • []

Question 17

Question
What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)
Answer
  • CI Attributes
  • Operations
  • Temporary Variables
  • CMDB Dashboard

Question 18

Question
Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)
Answer
  • Create an Engaging User Experience
  • Build New Apps Fast
  • Manage Hybrid Clouds
  • Proactively Eliminate Service Outages

Question 19

Question
In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)
Answer
  • Global CI types
  • Main pattern CI type
  • Related CI types
  • All CI types

Question 20

Question
Which choice best describes a Functionality Definition?
Answer
  • Defines what CI identifiers to use.
  • Defines the IP addresses to discover.
  • Defines what Behavior to use from a Discovery Schedule.
  • Defines what protocols to detect from within a Behavior.

Question 21

Question
As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?
Answer
  • Target
  • Pattern Log
  • ECC queue
  • Discovery Log

Question 22

Question
Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.)
Answer
  • Switching
  • Identifying
  • Downgrading
  • Upgrading

Question 23

Question
Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)
Answer
  • CI attributes
  • Prefix
  • Temporary
  • Fixed
  • Global

Question 24

Question
Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)
Answer
  • system
  • computer_system
  • process
  • baseline

Question 25

Question
Which of the following executes the OSquery commands on agents to gather attribute details from a CI?
Answer
  • Agent Collector
  • Agent listener
  • ACC for Discovery
  • Check Definitions
  • Policies

Question 26

Question
What is the default thread count for a MID Server?
Answer
  • 5
  • 1
  • 50
  • 25

Question 27

Question
Which one of the following is not used in a horizontal discovery pattern?
Answer
  • Variables
  • Connectivity section
  • Operations
  • Identification section

Question 28

Question
CI identifiers can be viewed under which of the following?
Answer
  • Discovery Dashboard
  • CI Class Manager
  • Process Handlers
  • Processes and Classification
  • CI record

Question 29

Question
You should use ______ when using the SNMP Query operation.
Answer
  • the management information base (MIB) from the manufacturer of the device you are targeting.
  • the management Information Base (MIB) from the SNMP Browser in the step.
  • Scalar Variable Types
  • Multiple Variable Types.

Question 30

Question
What would be the relation between Application Server [cdmb_ci_app_server] table and Tomcat [cmdb_ci_app_server_tomcat] table. (choose 2 options)
Answer
  • The Tomcat extends the Application Server.
  • The Tomcat table does not extend the Application Server table.
  • The Tomcat table is a parent of the Application Server table.
  • The Tomcat table is a child of the Application Server.

Question 31

Question
In a network, a certain number of ports is required to be opened for WMI to discover a subnet of Windows Servers containing highly sensitive data. What would you do to reassure network administrator who is concerned about opening ports?
Answer
  • Create a WMI only behavior.
  • Deactivate the Shazzam probe.
  • Set WinRM as the value of the mid.windows.management_protocol parameter.
  • Create an access rule to stop WinRM.

Question 32

Question
Which of the choices below is true about parsing strategies?
Answer
  • Custom parsing strategies are available for Service Mapping only.
  • Custom parsing strategies are JavaScript files.
  • It is not possible to have a custom parsing strategy.
  • Custom parsing strategies are HTML files.

Question 33

Question
In case of a WMI Query pattern operation, the Full Statement collected Fields ______ .
Answer
  • are only available if using the Statement Accelerator.
  • are available without credentials for the target.
  • automatically populate variables in the Target Table.
  • are only available from Unix Servers.

Question 34

Question
Connect Discover option from a Discovery Schedule with its description. Option: 1. Service 2. Serverless 3. IP addresses 4. Networks 5. Configuration items Description: A. Create or update CIs from devices B. Discover services for Service Mapping C. Scan devices without credentials D. Discover IP Networks E. Find CIs without running host discovery
Answer
  • 1-E, 2-B, 3-A, 4-C, 5-D
  • 1-B, 2-E, 3-C, 4-D, 5-A
  • 1-A, 2-B, 3-C, 4-D, 5-E
  • 1-A, 2-C, 3-B, 4-D, 5-E

Question 35

Question
There are duplicated Configuration Items (CIs) in CMDB. Which method should be chosen to consolidate them?
Answer
  • It should be solved with Duplicate Cl Remediator.
  • Manual CI Remediation.
  • Event CI Remediation.
  • Ignoring duplicate CIs.

Question 36

Question
In Discovery, during the Port Scan phase an error of warning level appears: "No results returned from probe.". What could be the cause of this error?
Answer
  • Physical or logical firewall prevents connection.
  • Wrong configuration of Process Classifier.
  • Datasource Precedence is incorrect.
  • Provided credentials are incorrect.

Question 37

Question
Which devices will not be discoverable when the Windows Management Instrumentation (WMI) service is stopped?
Answer
  • Windows devices
  • Linux devices
  • Network devices
  • Storage devices

Question 38

Question
A tabular variable in a discovery pattern ______ .
Answer
  • A tabular variable is a single column.
  • has each cell as a scalar variable.
  • A tabular variable has each cell as a CI attribute.
  • A tabular variable is a single string.

Question 39

Question
In the Enhanced ADM Discovery, the ADME probe ______ .
Answer
  • The ADME probe runs every five minutes
  • The ADME probe queries the Programs directory
  • The ADME probe is activated by default
  • installs a script on host machines on which Discovery takes regular samples of active TCP connections

Question 40

Question
When troubleshooting discovery from a discovery status, which of the following lists will prove helpful? (choose 3 options)
Answer
  • Discovery Log
  • ECC Queue
  • Devices
  • Running Processes

Question 41

Question
During which of the following phases a file-based Discovery is triggered?
Answer
  • Classify
  • Exploration
  • Scan
  • Identification
  • Pattern

Question 42

Question
One of the titles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile? (choose 3 options)
Answer
  • Network
  • Schedules
  • Configuration
  • Credentials
  • Completeness
  • Correctness

Question 43

Question
In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .
Answer
  • $process.execDir
  • process_execDir
  • process(execDir)
  • $process_execDir

Question 44

Question
Discovery patterns are best described as ______ .
Answer
  • operations allowing Discovery to find CIs on your network and tables to populate the CMDB
  • operations separating data, processes, and administrative tasks into domains
  • summary providers of a schedule launched Discovery
  • a graphical representation of a discovery which includes information about each sensor and probe used

Question 45

Question
______ is the best-suited person to fill the Credentials Table during a Discovery implementation.
Answer
  • Customer
  • ServiceNow Consultant
  • ServiceNow Technical Manager
  • External Partner
Show full summary Hide full summary

Similar

Application Developer (CAD)
Juliana Viana Dos Santos
ServiceNow Fundamentals - Orlando Version
Rolando Sanchez
ServiceNow CAD (Certified Application Developer)
Matheus Uta
SysAdmin ServiceNow Madrid
Rolando Sanchez
IB Economics: International Trade
Han Zhang
Characters in Lord of the Flies
lowri_luxton
An Inspector Calls: Eric Birling
Rattan Bhorjee
Biology - the digestive system
Oliviax
AS Biology Unit 1
lilli.atkin
An Timpeallacht (Foclóir)
Sarah Egan
2PR101 1.test - 7. část
Nikola Truong