Pregunta 1
Pregunta
Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?
Respuesta
-
A notification is sent to the CI owner.
-
An associated identification rule is created automatically.
-
Each set of duplicate CIs is added to a de-duplication task.
-
The next discovery is stopped for the CI that is duplicated.
Pregunta 2
Pregunta
Which choice best describes a horizontal discovery pattern?
Pregunta 3
Pregunta
A config file for an application has the following three lines:
Line 1: app build 1.2.3.4 version 5.14
Line 2: installation_dir=c:\opt\bin
Line 3: build_type=Server.
Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)
Respuesta
-
Get Process operation with correct Port
-
Find Matching URL operation with Target Variable
-
Parse File operation with Delimited Text parsing strategy
-
Parse File operation with Regular Expression parsing strategy
Pregunta 4
Pregunta
The following shows part of the Windows OS - Servers pattern in Pattern Designer
Which of the steps above use(s) a shared library?
Respuesta
-
Step 26
-
Neither step
-
Step 25
-
Both Steps
Pregunta 5
Pregunta
Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?
Pregunta 6
Pregunta
When designing steps with operations requiring variables, it is best practice to do what?
Respuesta
-
hard core variables
-
always use scalar variables
-
query targets for variables
-
design for a static environment
Pregunta 7
Pregunta
For what is File Based Discovery used?
Respuesta
-
To discover the checksum of a file and store it to track for changes
-
To discover the contents of flat files such as configuration files
-
To discover that file names conform to a defined naming standard
-
To discover file paths to recognize the signature of installed software
Pregunta 8
Pregunta
Which of the following properties define the maximum overall size for the returned payload that comes from patterns
Respuesta
-
cmdb.properties.payload_max_size
-
glide.discovery.payload_max
-
mid.discovery.max_payload_size
-
mid.discovery.max_pattern_payload_size
Pregunta 9
Pregunta
Based on this image, which of the following choices is true?
Respuesta
-
This is from a WMI query operation step.
-
There is a scalar variable labeled ‘1’.
-
This Value cannot be used in a pattern step.
-
There is a tabular variable named ‘name_details’.
Pregunta 10
Pregunta
After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)
Respuesta
-
Details
-
Topic
-
Pattern log link
-
CMDB CI
-
Queue
-
Source
-
Discovery schedule name
Pregunta 11
Pregunta
Which choice best represents how to modify the functionality shown in this image?
Respuesta
-
From a Classifier
-
From a Discovery Pattern
-
From the MID Server
-
From a Probe
Pregunta 12
Pregunta
What pattern operation allows the transfer of a file from the MID Server to a target?
Respuesta
-
Parse file
-
Create Connection
-
Put file
-
Manage Attachments
Pregunta 13
Pregunta
In Discovery, what table associates an IP address and a credential?
Respuesta
-
Credential Affinity
-
Service Affinity
-
Service CI Association
-
Tags
Pregunta 14
Pregunta
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
Pregunta 15
Pregunta
Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)
Respuesta
-
JEA Properties set to True
-
MID Servers must be configured as a trusted source with DNS
-
MID Servers need to be added to the WinRM Group policy on the Servers
-
MID Server Parameters Add WinRM
Pregunta 16
Pregunta
$IfTable<_>.InstanceID
For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)
Pregunta 17
Pregunta
What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)
Respuesta
-
CI Attributes
-
Operations
-
Temporary Variables
-
CMDB Dashboard
Pregunta 18
Pregunta
Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)
Pregunta 19
Pregunta
In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)
Respuesta
-
Global CI types
-
Main pattern CI type
-
Related CI types
-
All CI types
Pregunta 20
Pregunta
Which choice best describes a Functionality Definition?
Respuesta
-
Defines what CI identifiers to use.
-
Defines the IP addresses to discover.
-
Defines what Behavior to use from a Discovery Schedule.
-
Defines what protocols to detect from within a Behavior.
Pregunta 21
Pregunta
As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?
Respuesta
-
Target
-
Pattern Log
-
ECC queue
-
Discovery Log
Pregunta 22
Pregunta
Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.)
Respuesta
-
Switching
-
Identifying
-
Downgrading
-
Upgrading
Pregunta 23
Pregunta
Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)
Respuesta
-
CI attributes
-
Prefix
-
Temporary
-
Fixed
-
Global
Pregunta 24
Pregunta
Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)
Respuesta
-
system
-
computer_system
-
process
-
baseline
Pregunta 25
Pregunta
Which of the following executes the OSquery commands on agents to gather attribute details from a CI?
Respuesta
-
Agent Collector
-
Agent listener
-
ACC for Discovery
-
Check Definitions
-
Policies
Pregunta 26
Pregunta
What is the default thread count for a MID Server?
Pregunta 27
Pregunta
Which one of the following is not used in a horizontal discovery pattern?
Respuesta
-
Variables
-
Connectivity section
-
Operations
-
Identification section
Pregunta 28
Pregunta
CI identifiers can be viewed under which of the following?
Pregunta 29
Pregunta
You should use ______ when using the SNMP Query operation.
Pregunta 30
Pregunta
What would be the relation between Application Server [cdmb_ci_app_server] table and Tomcat [cmdb_ci_app_server_tomcat] table. (choose 2 options)
Respuesta
-
The Tomcat extends the Application Server.
-
The Tomcat table does not extend the Application Server table.
-
The Tomcat table is a parent of the Application Server table.
-
The Tomcat table is a child of the Application Server.
Pregunta 31
Pregunta
In a network, a certain number of ports is required to be opened for WMI to discover a subnet of Windows Servers containing highly sensitive data. What would you do to reassure network administrator who is concerned about opening ports?
Respuesta
-
Create a WMI only behavior.
-
Deactivate the Shazzam probe.
-
Set WinRM as the value of the mid.windows.management_protocol parameter.
-
Create an access rule to stop WinRM.
Pregunta 32
Pregunta
Which of the choices below is true about parsing strategies?
Respuesta
-
Custom parsing strategies are available for Service Mapping only.
-
Custom parsing strategies are JavaScript files.
-
It is not possible to have a custom parsing strategy.
-
Custom parsing strategies are HTML files.
Pregunta 33
Pregunta
In case of a WMI Query pattern operation, the Full Statement collected Fields ______ .
Respuesta
-
are only available if using the Statement Accelerator.
-
are available without credentials for the target.
-
automatically populate variables in the Target Table.
-
are only available from Unix Servers.
Pregunta 34
Pregunta
Connect Discover option from a Discovery Schedule with its description.
Option:
1. Service
2. Serverless
3. IP addresses
4. Networks
5. Configuration items
Description:
A. Create or update CIs from devices
B. Discover services for Service Mapping
C. Scan devices without credentials
D. Discover IP Networks
E. Find CIs without running host discovery
Respuesta
-
1-E, 2-B, 3-A, 4-C, 5-D
-
1-B, 2-E, 3-C, 4-D, 5-A
-
1-A, 2-B, 3-C, 4-D, 5-E
-
1-A, 2-C, 3-B, 4-D, 5-E
Pregunta 35
Pregunta
There are duplicated Configuration Items (CIs) in CMDB. Which method should be chosen to consolidate them?
Pregunta 36
Pregunta
In Discovery, during the Port Scan phase an error of warning level appears: "No results returned from probe.". What could be the cause of this error?
Respuesta
-
Physical or logical firewall prevents connection.
-
Wrong configuration of Process Classifier.
-
Datasource Precedence is incorrect.
-
Provided credentials are incorrect.
Pregunta 37
Pregunta
Which devices will not be discoverable when the Windows Management Instrumentation (WMI) service is stopped?
Respuesta
-
Windows devices
-
Linux devices
-
Network devices
-
Storage devices
Pregunta 38
Pregunta
A tabular variable in a discovery pattern ______ .
Respuesta
-
A tabular variable is a single column.
-
has each cell as a scalar variable.
-
A tabular variable has each cell as a CI attribute.
-
A tabular variable is a single string.
Pregunta 39
Pregunta
In the Enhanced ADM Discovery, the ADME probe ______ .
Respuesta
-
The ADME probe runs every five minutes
-
The ADME probe queries the Programs directory
-
The ADME probe is activated by default
-
installs a script on host machines on which Discovery takes regular samples of active TCP connections
Pregunta 40
Pregunta
When troubleshooting discovery from a discovery status, which of the following lists will prove helpful? (choose 3 options)
Respuesta
-
Discovery Log
-
ECC Queue
-
Devices
-
Running Processes
Pregunta 41
Pregunta
During which of the following phases a file-based Discovery is triggered?
Respuesta
-
Classify
-
Exploration
-
Scan
-
Identification
-
Pattern
Pregunta 42
Pregunta
One of the titles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile? (choose 3 options)
Respuesta
-
Network
-
Schedules
-
Configuration
-
Credentials
-
Completeness
-
Correctness
Pregunta 43
Pregunta
In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .
Respuesta
-
$process.execDir
-
process_execDir
-
process(execDir)
-
$process_execDir
Pregunta 44
Pregunta
Discovery patterns are best described as ______ .
Respuesta
-
operations allowing Discovery to find CIs on your network and tables to populate the CMDB
-
operations separating data, processes, and administrative tasks into domains
-
summary providers of a schedule launched Discovery
-
a graphical representation of a discovery which includes information about each sensor and probe used
Pregunta 45
Pregunta
______ is the best-suited person to fill the Credentials Table during a Discovery implementation.