Certified Implementation Specialist - Discovery (CIS - Discovery) - Mock 2

Descrição

All questions must be answered.
Flávio Tiezzi
Quiz por Flávio Tiezzi, atualizado 12 meses atrás
Flávio Tiezzi
Criado por Flávio Tiezzi 12 meses atrás
251
0

Resumo de Recurso

Questão 1

Questão
Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?
Responda
  • A notification is sent to the CI owner.
  • An associated identification rule is created automatically.
  • Each set of duplicate CIs is added to a de-duplication task.
  • The next discovery is stopped for the CI that is duplicated.

Questão 2

Questão
Which choice best describes a horizontal discovery pattern?
Responda
  • Steps that execute operations
  • Credential depot
  • Port scanning tool
  • Classifiers that execute probes

Questão 3

Questão
A config file for an application has the following three lines: Line 1: app build 1.2.3.4 version 5.14 Line 2: installation_dir=c:\opt\bin Line 3: build_type=Server. Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)
Responda
  • Get Process operation with correct Port
  • Find Matching URL operation with Target Variable
  • Parse File operation with Delimited Text parsing strategy
  • Parse File operation with Regular Expression parsing strategy

Questão 4

Questão
The following shows part of the Windows OS - Servers pattern in Pattern Designer Which of the steps above use(s) a shared library?
Responda
  • Step 26
  • Neither step
  • Step 25
  • Both Steps

Questão 5

Questão
Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?
Responda
  • install.service-now.com
  • docs.servicenow.com
  • developer.service-now.com
  • service-now.com

Questão 6

Questão
When designing steps with operations requiring variables, it is best practice to do what?
Responda
  • hard core variables
  • always use scalar variables
  • query targets for variables
  • design for a static environment

Questão 7

Questão
For what is File Based Discovery used?
Responda
  • To discover the checksum of a file and store it to track for changes
  • To discover the contents of flat files such as configuration files
  • To discover that file names conform to a defined naming standard
  • To discover file paths to recognize the signature of installed software

Questão 8

Questão
Which of the following properties define the maximum overall size for the returned payload that comes from patterns
Responda
  • cmdb.properties.payload_max_size
  • glide.discovery.payload_max
  • mid.discovery.max_payload_size
  • mid.discovery.max_pattern_payload_size

Questão 9

Questão
Based on this image, which of the following choices is true?
Responda
  • This is from a WMI query operation step.
  • There is a scalar variable labeled ‘1’.
  • This Value cannot be used in a pattern step.
  • There is a tabular variable named ‘name_details’.

Questão 10

Questão
After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)
Responda
  • Details
  • Topic
  • Pattern log link
  • CMDB CI
  • Queue
  • Source
  • Discovery schedule name

Questão 11

Questão
Which choice best represents how to modify the functionality shown in this image?
Responda
  • From a Classifier
  • From a Discovery Pattern
  • From the MID Server
  • From a Probe

Questão 12

Questão
What pattern operation allows the transfer of a file from the MID Server to a target?
Responda
  • Parse file
  • Create Connection
  • Put file
  • Manage Attachments

Questão 13

Questão
In Discovery, what table associates an IP address and a credential?
Responda
  • Credential Affinity
  • Service Affinity
  • Service CI Association
  • Tags

Questão 14

Questão
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
Responda
  • tcp to udp
  • application to application
  • mid server to target
  • host to application

Questão 15

Questão
Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)
Responda
  • JEA Properties set to True
  • MID Servers must be configured as a trusted source with DNS
  • MID Servers need to be added to the WinRM Group policy on the Servers
  • MID Server Parameters Add WinRM

Questão 16

Questão
$IfTable<_>.InstanceID For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)
Responda
  • [3]
  • [X]
  • [&]
  • [.]
  • [*]
  • []

Questão 17

Questão
What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)
Responda
  • CI Attributes
  • Operations
  • Temporary Variables
  • CMDB Dashboard

Questão 18

Questão
Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)
Responda
  • Create an Engaging User Experience
  • Build New Apps Fast
  • Manage Hybrid Clouds
  • Proactively Eliminate Service Outages

Questão 19

Questão
In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)
Responda
  • Global CI types
  • Main pattern CI type
  • Related CI types
  • All CI types

Questão 20

Questão
Which choice best describes a Functionality Definition?
Responda
  • Defines what CI identifiers to use.
  • Defines the IP addresses to discover.
  • Defines what Behavior to use from a Discovery Schedule.
  • Defines what protocols to detect from within a Behavior.

Questão 21

Questão
As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?
Responda
  • Target
  • Pattern Log
  • ECC queue
  • Discovery Log

Questão 22

Questão
Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.)
Responda
  • Switching
  • Identifying
  • Downgrading
  • Upgrading

Questão 23

Questão
Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)
Responda
  • CI attributes
  • Prefix
  • Temporary
  • Fixed
  • Global

Questão 24

Questão
Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)
Responda
  • system
  • computer_system
  • process
  • baseline

Questão 25

Questão
Which of the following executes the OSquery commands on agents to gather attribute details from a CI?
Responda
  • Agent Collector
  • Agent listener
  • ACC for Discovery
  • Check Definitions
  • Policies

Questão 26

Questão
What is the default thread count for a MID Server?
Responda
  • 5
  • 1
  • 50
  • 25

Questão 27

Questão
Which one of the following is not used in a horizontal discovery pattern?
Responda
  • Variables
  • Connectivity section
  • Operations
  • Identification section

Questão 28

Questão
CI identifiers can be viewed under which of the following?
Responda
  • Discovery Dashboard
  • CI Class Manager
  • Process Handlers
  • Processes and Classification
  • CI record

Questão 29

Questão
You should use ______ when using the SNMP Query operation.
Responda
  • the management information base (MIB) from the manufacturer of the device you are targeting.
  • the management Information Base (MIB) from the SNMP Browser in the step.
  • Scalar Variable Types
  • Multiple Variable Types.

Questão 30

Questão
What would be the relation between Application Server [cdmb_ci_app_server] table and Tomcat [cmdb_ci_app_server_tomcat] table. (choose 2 options)
Responda
  • The Tomcat extends the Application Server.
  • The Tomcat table does not extend the Application Server table.
  • The Tomcat table is a parent of the Application Server table.
  • The Tomcat table is a child of the Application Server.

Questão 31

Questão
In a network, a certain number of ports is required to be opened for WMI to discover a subnet of Windows Servers containing highly sensitive data. What would you do to reassure network administrator who is concerned about opening ports?
Responda
  • Create a WMI only behavior.
  • Deactivate the Shazzam probe.
  • Set WinRM as the value of the mid.windows.management_protocol parameter.
  • Create an access rule to stop WinRM.

Questão 32

Questão
Which of the choices below is true about parsing strategies?
Responda
  • Custom parsing strategies are available for Service Mapping only.
  • Custom parsing strategies are JavaScript files.
  • It is not possible to have a custom parsing strategy.
  • Custom parsing strategies are HTML files.

Questão 33

Questão
In case of a WMI Query pattern operation, the Full Statement collected Fields ______ .
Responda
  • are only available if using the Statement Accelerator.
  • are available without credentials for the target.
  • automatically populate variables in the Target Table.
  • are only available from Unix Servers.

Questão 34

Questão
Connect Discover option from a Discovery Schedule with its description. Option: 1. Service 2. Serverless 3. IP addresses 4. Networks 5. Configuration items Description: A. Create or update CIs from devices B. Discover services for Service Mapping C. Scan devices without credentials D. Discover IP Networks E. Find CIs without running host discovery
Responda
  • 1-E, 2-B, 3-A, 4-C, 5-D
  • 1-B, 2-E, 3-C, 4-D, 5-A
  • 1-A, 2-B, 3-C, 4-D, 5-E
  • 1-A, 2-C, 3-B, 4-D, 5-E

Questão 35

Questão
There are duplicated Configuration Items (CIs) in CMDB. Which method should be chosen to consolidate them?
Responda
  • It should be solved with Duplicate Cl Remediator.
  • Manual CI Remediation.
  • Event CI Remediation.
  • Ignoring duplicate CIs.

Questão 36

Questão
In Discovery, during the Port Scan phase an error of warning level appears: "No results returned from probe.". What could be the cause of this error?
Responda
  • Physical or logical firewall prevents connection.
  • Wrong configuration of Process Classifier.
  • Datasource Precedence is incorrect.
  • Provided credentials are incorrect.

Questão 37

Questão
Which devices will not be discoverable when the Windows Management Instrumentation (WMI) service is stopped?
Responda
  • Windows devices
  • Linux devices
  • Network devices
  • Storage devices

Questão 38

Questão
A tabular variable in a discovery pattern ______ .
Responda
  • A tabular variable is a single column.
  • has each cell as a scalar variable.
  • A tabular variable has each cell as a CI attribute.
  • A tabular variable is a single string.

Questão 39

Questão
In the Enhanced ADM Discovery, the ADME probe ______ .
Responda
  • The ADME probe runs every five minutes
  • The ADME probe queries the Programs directory
  • The ADME probe is activated by default
  • installs a script on host machines on which Discovery takes regular samples of active TCP connections

Questão 40

Questão
When troubleshooting discovery from a discovery status, which of the following lists will prove helpful? (choose 3 options)
Responda
  • Discovery Log
  • ECC Queue
  • Devices
  • Running Processes

Questão 41

Questão
During which of the following phases a file-based Discovery is triggered?
Responda
  • Classify
  • Exploration
  • Scan
  • Identification
  • Pattern

Questão 42

Questão
One of the titles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile? (choose 3 options)
Responda
  • Network
  • Schedules
  • Configuration
  • Credentials
  • Completeness
  • Correctness

Questão 43

Questão
In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .
Responda
  • $process.execDir
  • process_execDir
  • process(execDir)
  • $process_execDir

Questão 44

Questão
Discovery patterns are best described as ______ .
Responda
  • operations allowing Discovery to find CIs on your network and tables to populate the CMDB
  • operations separating data, processes, and administrative tasks into domains
  • summary providers of a schedule launched Discovery
  • a graphical representation of a discovery which includes information about each sensor and probe used

Questão 45

Questão
______ is the best-suited person to fill the Credentials Table during a Discovery implementation.
Responda
  • Customer
  • ServiceNow Consultant
  • ServiceNow Technical Manager
  • External Partner

Semelhante

Application Developer (CAD)
Juliana Viana Dos Santos
ServiceNow Fundamentals - Orlando Version
Rolando Sanchez
ServiceNow CAD (Certified Application Developer)
Matheus Uta
SysAdmin ServiceNow Madrid
Rolando Sanchez
Princípios de Direito Processual do Trabalho
Anderson Lopes
Literatura - Gêneros Literários e seus Estilos
Lucas da Costa
Liderança e Gestão de Equipes
Pierre Curi
TRIGONOMETRIA
Alex Galhardo
Plano de estudos ENEM - Parte 2 *Exatas/Biológicas
sarahnjife
MAPA MENTAL
luciano.silva
SISTEMA ENDÓCRINO
STELA FAUSTINO