Question 1
Question
Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?
Answer
-
A notification is sent to the CI owner.
-
An associated identification rule is created automatically.
-
Each set of duplicate CIs is added to a de-duplication task.
-
The next discovery is stopped for the CI that is duplicated.
Question 2
Question
Which choice best describes a horizontal discovery pattern?
Question 3
Question
A config file for an application has the following three lines:
Line 1: app build 1.2.3.4 version 5.14
Line 2: installation_dir=c:\opt\bin
Line 3: build_type=Server.
Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)
Answer
-
Get Process operation with correct Port
-
Find Matching URL operation with Target Variable
-
Parse File operation with Delimited Text parsing strategy
-
Parse File operation with Regular Expression parsing strategy
Question 4
Question
The following shows part of the Windows OS - Servers pattern in Pattern Designer
Which of the steps above use(s) a shared library?
Answer
-
Step 26
-
Neither step
-
Step 25
-
Both Steps
Question 5
Question
Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?
Question 6
Question
When designing steps with operations requiring variables, it is best practice to do what?
Answer
-
hard core variables
-
always use scalar variables
-
query targets for variables
-
design for a static environment
Question 7
Question
For what is File Based Discovery used?
Answer
-
To discover the checksum of a file and store it to track for changes
-
To discover the contents of flat files such as configuration files
-
To discover that file names conform to a defined naming standard
-
To discover file paths to recognize the signature of installed software
Question 8
Question
Which of the following properties define the maximum overall size for the returned payload that comes from patterns
Answer
-
cmdb.properties.payload_max_size
-
glide.discovery.payload_max
-
mid.discovery.max_payload_size
-
mid.discovery.max_pattern_payload_size
Question 9
Question
Based on this image, which of the following choices is true?
Answer
-
This is from a WMI query operation step.
-
There is a scalar variable labeled ‘1’.
-
This Value cannot be used in a pattern step.
-
There is a tabular variable named ‘name_details’.
Question 10
Question
After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)
Answer
-
Details
-
Topic
-
Pattern log link
-
CMDB CI
-
Queue
-
Source
-
Discovery schedule name
Question 11
Question
Which choice best represents how to modify the functionality shown in this image?
Answer
-
From a Classifier
-
From a Discovery Pattern
-
From the MID Server
-
From a Probe
Question 12
Question
What pattern operation allows the transfer of a file from the MID Server to a target?
Answer
-
Parse file
-
Create Connection
-
Put file
-
Manage Attachments
Question 13
Question
In Discovery, what table associates an IP address and a credential?
Answer
-
Credential Affinity
-
Service Affinity
-
Service CI Association
-
Tags
Question 14
Question
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
Question 15
Question
Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)
Answer
-
JEA Properties set to True
-
MID Servers must be configured as a trusted source with DNS
-
MID Servers need to be added to the WinRM Group policy on the Servers
-
MID Server Parameters Add WinRM
Question 16
Question
$IfTable<_>.InstanceID
For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)
Question 17
Question
What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)
Answer
-
CI Attributes
-
Operations
-
Temporary Variables
-
CMDB Dashboard
Question 18
Question
Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)
Question 19
Question
In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)
Answer
-
Global CI types
-
Main pattern CI type
-
Related CI types
-
All CI types
Question 20
Question
Which choice best describes a Functionality Definition?
Answer
-
Defines what CI identifiers to use.
-
Defines the IP addresses to discover.
-
Defines what Behavior to use from a Discovery Schedule.
-
Defines what protocols to detect from within a Behavior.
Question 21
Question
As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?
Answer
-
Target
-
Pattern Log
-
ECC queue
-
Discovery Log
Question 22
Question
Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.)
Answer
-
Switching
-
Identifying
-
Downgrading
-
Upgrading
Question 23
Question
Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)
Answer
-
CI attributes
-
Prefix
-
Temporary
-
Fixed
-
Global
Question 24
Question
Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)
Answer
-
system
-
computer_system
-
process
-
baseline
Question 25
Question
Which of the following executes the OSquery commands on agents to gather attribute details from a CI?
Answer
-
Agent Collector
-
Agent listener
-
ACC for Discovery
-
Check Definitions
-
Policies
Question 26
Question
What is the default thread count for a MID Server?
Question 27
Question
Which one of the following is not used in a horizontal discovery pattern?
Answer
-
Variables
-
Connectivity section
-
Operations
-
Identification section
Question 28
Question
CI identifiers can be viewed under which of the following?
Question 29
Question
You should use ______ when using the SNMP Query operation.
Question 30
Question
What would be the relation between Application Server [cdmb_ci_app_server] table and Tomcat [cmdb_ci_app_server_tomcat] table. (choose 2 options)
Answer
-
The Tomcat extends the Application Server.
-
The Tomcat table does not extend the Application Server table.
-
The Tomcat table is a parent of the Application Server table.
-
The Tomcat table is a child of the Application Server.
Question 31
Question
In a network, a certain number of ports is required to be opened for WMI to discover a subnet of Windows Servers containing highly sensitive data. What would you do to reassure network administrator who is concerned about opening ports?
Answer
-
Create a WMI only behavior.
-
Deactivate the Shazzam probe.
-
Set WinRM as the value of the mid.windows.management_protocol parameter.
-
Create an access rule to stop WinRM.
Question 32
Question
Which of the choices below is true about parsing strategies?
Answer
-
Custom parsing strategies are available for Service Mapping only.
-
Custom parsing strategies are JavaScript files.
-
It is not possible to have a custom parsing strategy.
-
Custom parsing strategies are HTML files.
Question 33
Question
In case of a WMI Query pattern operation, the Full Statement collected Fields ______ .
Answer
-
are only available if using the Statement Accelerator.
-
are available without credentials for the target.
-
automatically populate variables in the Target Table.
-
are only available from Unix Servers.
Question 34
Question
Connect Discover option from a Discovery Schedule with its description.
Option:
1. Service
2. Serverless
3. IP addresses
4. Networks
5. Configuration items
Description:
A. Create or update CIs from devices
B. Discover services for Service Mapping
C. Scan devices without credentials
D. Discover IP Networks
E. Find CIs without running host discovery
Answer
-
1-E, 2-B, 3-A, 4-C, 5-D
-
1-B, 2-E, 3-C, 4-D, 5-A
-
1-A, 2-B, 3-C, 4-D, 5-E
-
1-A, 2-C, 3-B, 4-D, 5-E
Question 35
Question
There are duplicated Configuration Items (CIs) in CMDB. Which method should be chosen to consolidate them?
Question 36
Question
In Discovery, during the Port Scan phase an error of warning level appears: "No results returned from probe.". What could be the cause of this error?
Answer
-
Physical or logical firewall prevents connection.
-
Wrong configuration of Process Classifier.
-
Datasource Precedence is incorrect.
-
Provided credentials are incorrect.
Question 37
Question
Which devices will not be discoverable when the Windows Management Instrumentation (WMI) service is stopped?
Answer
-
Windows devices
-
Linux devices
-
Network devices
-
Storage devices
Question 38
Question
A tabular variable in a discovery pattern ______ .
Answer
-
A tabular variable is a single column.
-
has each cell as a scalar variable.
-
A tabular variable has each cell as a CI attribute.
-
A tabular variable is a single string.
Question 39
Question
In the Enhanced ADM Discovery, the ADME probe ______ .
Answer
-
The ADME probe runs every five minutes
-
The ADME probe queries the Programs directory
-
The ADME probe is activated by default
-
installs a script on host machines on which Discovery takes regular samples of active TCP connections
Question 40
Question
When troubleshooting discovery from a discovery status, which of the following lists will prove helpful? (choose 3 options)
Answer
-
Discovery Log
-
ECC Queue
-
Devices
-
Running Processes
Question 41
Question
During which of the following phases a file-based Discovery is triggered?
Answer
-
Classify
-
Exploration
-
Scan
-
Identification
-
Pattern
Question 42
Question
One of the titles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile? (choose 3 options)
Answer
-
Network
-
Schedules
-
Configuration
-
Credentials
-
Completeness
-
Correctness
Question 43
Question
In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .
Answer
-
$process.execDir
-
process_execDir
-
process(execDir)
-
$process_execDir
Question 44
Question
Discovery patterns are best described as ______ .
Answer
-
operations allowing Discovery to find CIs on your network and tables to populate the CMDB
-
operations separating data, processes, and administrative tasks into domains
-
summary providers of a schedule launched Discovery
-
a graphical representation of a discovery which includes information about each sensor and probe used
Question 45
Question
______ is the best-suited person to fill the Credentials Table during a Discovery implementation.