Certified Implementation Specialist - Discovery (CIS - Discovery) - Mock 2

Descripción

All questions must be answered.
Flávio Tiezzi
Test por Flávio Tiezzi, actualizado hace 12 meses
Flávio Tiezzi
Creado por Flávio Tiezzi hace 12 meses
251
0

Resumen del Recurso

Pregunta 1

Pregunta
Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?
Respuesta
  • A notification is sent to the CI owner.
  • An associated identification rule is created automatically.
  • Each set of duplicate CIs is added to a de-duplication task.
  • The next discovery is stopped for the CI that is duplicated.

Pregunta 2

Pregunta
Which choice best describes a horizontal discovery pattern?
Respuesta
  • Steps that execute operations
  • Credential depot
  • Port scanning tool
  • Classifiers that execute probes

Pregunta 3

Pregunta
A config file for an application has the following three lines: Line 1: app build 1.2.3.4 version 5.14 Line 2: installation_dir=c:\opt\bin Line 3: build_type=Server. Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)
Respuesta
  • Get Process operation with correct Port
  • Find Matching URL operation with Target Variable
  • Parse File operation with Delimited Text parsing strategy
  • Parse File operation with Regular Expression parsing strategy

Pregunta 4

Pregunta
The following shows part of the Windows OS - Servers pattern in Pattern Designer Which of the steps above use(s) a shared library?
Respuesta
  • Step 26
  • Neither step
  • Step 25
  • Both Steps

Pregunta 5

Pregunta
Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?
Respuesta
  • install.service-now.com
  • docs.servicenow.com
  • developer.service-now.com
  • service-now.com

Pregunta 6

Pregunta
When designing steps with operations requiring variables, it is best practice to do what?
Respuesta
  • hard core variables
  • always use scalar variables
  • query targets for variables
  • design for a static environment

Pregunta 7

Pregunta
For what is File Based Discovery used?
Respuesta
  • To discover the checksum of a file and store it to track for changes
  • To discover the contents of flat files such as configuration files
  • To discover that file names conform to a defined naming standard
  • To discover file paths to recognize the signature of installed software

Pregunta 8

Pregunta
Which of the following properties define the maximum overall size for the returned payload that comes from patterns
Respuesta
  • cmdb.properties.payload_max_size
  • glide.discovery.payload_max
  • mid.discovery.max_payload_size
  • mid.discovery.max_pattern_payload_size

Pregunta 9

Pregunta
Based on this image, which of the following choices is true?
Respuesta
  • This is from a WMI query operation step.
  • There is a scalar variable labeled ‘1’.
  • This Value cannot be used in a pattern step.
  • There is a tabular variable named ‘name_details’.

Pregunta 10

Pregunta
After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)
Respuesta
  • Details
  • Topic
  • Pattern log link
  • CMDB CI
  • Queue
  • Source
  • Discovery schedule name

Pregunta 11

Pregunta
Which choice best represents how to modify the functionality shown in this image?
Respuesta
  • From a Classifier
  • From a Discovery Pattern
  • From the MID Server
  • From a Probe

Pregunta 12

Pregunta
What pattern operation allows the transfer of a file from the MID Server to a target?
Respuesta
  • Parse file
  • Create Connection
  • Put file
  • Manage Attachments

Pregunta 13

Pregunta
In Discovery, what table associates an IP address and a credential?
Respuesta
  • Credential Affinity
  • Service Affinity
  • Service CI Association
  • Tags

Pregunta 14

Pregunta
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
Respuesta
  • tcp to udp
  • application to application
  • mid server to target
  • host to application

Pregunta 15

Pregunta
Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)
Respuesta
  • JEA Properties set to True
  • MID Servers must be configured as a trusted source with DNS
  • MID Servers need to be added to the WinRM Group policy on the Servers
  • MID Server Parameters Add WinRM

Pregunta 16

Pregunta
$IfTable<_>.InstanceID For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)
Respuesta
  • [3]
  • [X]
  • [&]
  • [.]
  • [*]
  • []

Pregunta 17

Pregunta
What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)
Respuesta
  • CI Attributes
  • Operations
  • Temporary Variables
  • CMDB Dashboard

Pregunta 18

Pregunta
Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)
Respuesta
  • Create an Engaging User Experience
  • Build New Apps Fast
  • Manage Hybrid Clouds
  • Proactively Eliminate Service Outages

Pregunta 19

Pregunta
In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)
Respuesta
  • Global CI types
  • Main pattern CI type
  • Related CI types
  • All CI types

Pregunta 20

Pregunta
Which choice best describes a Functionality Definition?
Respuesta
  • Defines what CI identifiers to use.
  • Defines the IP addresses to discover.
  • Defines what Behavior to use from a Discovery Schedule.
  • Defines what protocols to detect from within a Behavior.

Pregunta 21

Pregunta
As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?
Respuesta
  • Target
  • Pattern Log
  • ECC queue
  • Discovery Log

Pregunta 22

Pregunta
Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.)
Respuesta
  • Switching
  • Identifying
  • Downgrading
  • Upgrading

Pregunta 23

Pregunta
Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)
Respuesta
  • CI attributes
  • Prefix
  • Temporary
  • Fixed
  • Global

Pregunta 24

Pregunta
Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)
Respuesta
  • system
  • computer_system
  • process
  • baseline

Pregunta 25

Pregunta
Which of the following executes the OSquery commands on agents to gather attribute details from a CI?
Respuesta
  • Agent Collector
  • Agent listener
  • ACC for Discovery
  • Check Definitions
  • Policies

Pregunta 26

Pregunta
What is the default thread count for a MID Server?
Respuesta
  • 5
  • 1
  • 50
  • 25

Pregunta 27

Pregunta
Which one of the following is not used in a horizontal discovery pattern?
Respuesta
  • Variables
  • Connectivity section
  • Operations
  • Identification section

Pregunta 28

Pregunta
CI identifiers can be viewed under which of the following?
Respuesta
  • Discovery Dashboard
  • CI Class Manager
  • Process Handlers
  • Processes and Classification
  • CI record

Pregunta 29

Pregunta
You should use ______ when using the SNMP Query operation.
Respuesta
  • the management information base (MIB) from the manufacturer of the device you are targeting.
  • the management Information Base (MIB) from the SNMP Browser in the step.
  • Scalar Variable Types
  • Multiple Variable Types.

Pregunta 30

Pregunta
What would be the relation between Application Server [cdmb_ci_app_server] table and Tomcat [cmdb_ci_app_server_tomcat] table. (choose 2 options)
Respuesta
  • The Tomcat extends the Application Server.
  • The Tomcat table does not extend the Application Server table.
  • The Tomcat table is a parent of the Application Server table.
  • The Tomcat table is a child of the Application Server.

Pregunta 31

Pregunta
In a network, a certain number of ports is required to be opened for WMI to discover a subnet of Windows Servers containing highly sensitive data. What would you do to reassure network administrator who is concerned about opening ports?
Respuesta
  • Create a WMI only behavior.
  • Deactivate the Shazzam probe.
  • Set WinRM as the value of the mid.windows.management_protocol parameter.
  • Create an access rule to stop WinRM.

Pregunta 32

Pregunta
Which of the choices below is true about parsing strategies?
Respuesta
  • Custom parsing strategies are available for Service Mapping only.
  • Custom parsing strategies are JavaScript files.
  • It is not possible to have a custom parsing strategy.
  • Custom parsing strategies are HTML files.

Pregunta 33

Pregunta
In case of a WMI Query pattern operation, the Full Statement collected Fields ______ .
Respuesta
  • are only available if using the Statement Accelerator.
  • are available without credentials for the target.
  • automatically populate variables in the Target Table.
  • are only available from Unix Servers.

Pregunta 34

Pregunta
Connect Discover option from a Discovery Schedule with its description. Option: 1. Service 2. Serverless 3. IP addresses 4. Networks 5. Configuration items Description: A. Create or update CIs from devices B. Discover services for Service Mapping C. Scan devices without credentials D. Discover IP Networks E. Find CIs without running host discovery
Respuesta
  • 1-E, 2-B, 3-A, 4-C, 5-D
  • 1-B, 2-E, 3-C, 4-D, 5-A
  • 1-A, 2-B, 3-C, 4-D, 5-E
  • 1-A, 2-C, 3-B, 4-D, 5-E

Pregunta 35

Pregunta
There are duplicated Configuration Items (CIs) in CMDB. Which method should be chosen to consolidate them?
Respuesta
  • It should be solved with Duplicate Cl Remediator.
  • Manual CI Remediation.
  • Event CI Remediation.
  • Ignoring duplicate CIs.

Pregunta 36

Pregunta
In Discovery, during the Port Scan phase an error of warning level appears: "No results returned from probe.". What could be the cause of this error?
Respuesta
  • Physical or logical firewall prevents connection.
  • Wrong configuration of Process Classifier.
  • Datasource Precedence is incorrect.
  • Provided credentials are incorrect.

Pregunta 37

Pregunta
Which devices will not be discoverable when the Windows Management Instrumentation (WMI) service is stopped?
Respuesta
  • Windows devices
  • Linux devices
  • Network devices
  • Storage devices

Pregunta 38

Pregunta
A tabular variable in a discovery pattern ______ .
Respuesta
  • A tabular variable is a single column.
  • has each cell as a scalar variable.
  • A tabular variable has each cell as a CI attribute.
  • A tabular variable is a single string.

Pregunta 39

Pregunta
In the Enhanced ADM Discovery, the ADME probe ______ .
Respuesta
  • The ADME probe runs every five minutes
  • The ADME probe queries the Programs directory
  • The ADME probe is activated by default
  • installs a script on host machines on which Discovery takes regular samples of active TCP connections

Pregunta 40

Pregunta
When troubleshooting discovery from a discovery status, which of the following lists will prove helpful? (choose 3 options)
Respuesta
  • Discovery Log
  • ECC Queue
  • Devices
  • Running Processes

Pregunta 41

Pregunta
During which of the following phases a file-based Discovery is triggered?
Respuesta
  • Classify
  • Exploration
  • Scan
  • Identification
  • Pattern

Pregunta 42

Pregunta
One of the titles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile? (choose 3 options)
Respuesta
  • Network
  • Schedules
  • Configuration
  • Credentials
  • Completeness
  • Correctness

Pregunta 43

Pregunta
In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .
Respuesta
  • $process.execDir
  • process_execDir
  • process(execDir)
  • $process_execDir

Pregunta 44

Pregunta
Discovery patterns are best described as ______ .
Respuesta
  • operations allowing Discovery to find CIs on your network and tables to populate the CMDB
  • operations separating data, processes, and administrative tasks into domains
  • summary providers of a schedule launched Discovery
  • a graphical representation of a discovery which includes information about each sensor and probe used

Pregunta 45

Pregunta
______ is the best-suited person to fill the Credentials Table during a Discovery implementation.
Respuesta
  • Customer
  • ServiceNow Consultant
  • ServiceNow Technical Manager
  • External Partner
Mostrar resumen completo Ocultar resumen completo

Similar

Application Developer (CAD)
Juliana Viana Dos Santos
ServiceNow Fundamentals - Orlando Version
Rolando Sanchez
ServiceNow CAD (Certified Application Developer)
Matheus Uta
SysAdmin ServiceNow Madrid
Rolando Sanchez
BANDERAS de EUROPA...
JL Cadenas
BIOESTADISTICA
Ad Card
vocabulario Tema 2 INGLES
alba mateos figueroa
Mecanismos de cohesión
Diego Santos
Anatomia Aparato Reproductor Femenino
Luz MoOr
Tipos de Sociedades
Nicolas Omana
CALCULO INTEGRAL
Jazlen G.A