Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CIS-Discovery Questions and Answers

Question # 6

During the Port Scan phase what could the Warning level error "No results returned from probe." mean?

A.

Process Classifier incorrectly configured

B.

Logical or physical firewall preventing connectivity

C.

Wrong credentials

D.

Incorrect Datasource Precedence

Full Access
Question # 7

As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?

A.

Target

B.

Pattern Log

C.

ECC queue

D.

Discovery Log

Full Access
Question # 8

Which of the choices are types of temporary variables in a discovery pattern?

Choose 2 answers

A.

Scalar/List

B.

Command

C.

SQL statement

D.

Tabular/Table

Full Access
Question # 9

Based on this image, which of the following choices is true?

A.

This is from a WMI query operation step.

B.

There is a scalar variable labeled ‘1’.

C.

This Value cannot be used in a pattern step.

D.

There is a tabular variable named ‘name_details’.

Full Access
Question # 10

Which of the following properties define the maximum overall size for the returned payload that comes from patterns?

A.

cmdb.properties.payload_max_size

B.

glide.discovery.payload_max

C.

mid.discovery.max_payload_size

D.

mid.discovery.max_pattern_payload_size

Full Access
Question # 11

Which choice best describes the Reconciliation process?

A.

The process of reconciling a deleted Cl, if it is identified as a duplicate. The result is stored in de-duplication tasks.

B.

The process of reconciling uniquely identifying Cis. to determine if the Cl already exists in the CMDB or if it is a newly discovered Cl.

C.

The process of reconciling Cis and Cl attributes by allowing only designated authoritative data sources to write to the CMDB at the Cl table and attribute level.

D.

The process of normalizing applications, to allow the data to be used by Software Asset Management.

Full Access
Question # 12

Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)

A.

Create an Engaging User Experience

B.

Build New Apps Fast

C.

Manage Hybrid Clouds

D.

Proactively Eliminate Service Outages

Full Access
Question # 13

Which selections are necessary to create a custom horizontal pattern to discover a computer operating system?

A.

CI type

B.

Application Pattern Type

C.

Infrastructure Pattern Type

D.

Process Strategy Type

Full Access
Question # 14

On the ECC Queue, sensor records have a Queue value of ___________ and probe records have a Queue value of ___________.

A.

input, output

B.

started, ready

C.

ready, started

D.

output, input

Full Access
Question # 15

Which metrics comprise the Completeness KPI for CMDB Health?

A.

Required

B.

Overall

C.

Recommended

D.

Audit

Full Access
Question # 16

A discovery runs against a Windows Server returning the following attribute values for the first time:

name = WindowsSN1 serial_number = 12321

A subsequent discovery is ran against a different Windows Server returning the following attribute values: name = WindowsSN2

serial_number = 12321

With only base system CI Identifiers configured, which of the following is true?

A.

A Windows Server CI is created, then updated with WindowsSN2 as the name.

B.

Two Windows Sewer CIs are created, with WindowsSN1 AND WindowsSN2 for names.

C.

Two Windows Server CIs are created, without serial_number values.

D.

A Windows Server CI is created, then updated with WindowsSN1 as the name.

Full Access
Question # 17

What pattern operation allows the transfer of a file from the MID Server to a target?

A.

Parse file

B.

Create Connection

C.

Put file

D.

Manage Attachments

Full Access
Question # 18

When designing steps with operations requiring variables, it is best practice to do what?

A.

hard core variables

B.

always use scalar variables

C.

query targets for variables

D.

design for a static environment

Full Access
Question # 19

Which metrics comprise the Completeness KPI for CMDB Health? (Choose two.)

A.

Required

B.

Recommended

C.

Audit

D.

Overall

Full Access
Question # 20

Which of the following are the results of executing the WMI Query?

Choose 3 answers

A.

A scalar variable named 'PageFaults'.

B.

A tabular variable named 'more_process_info'.

C.

A scalar variable named 'PeakVirtualSize'.

D.

A tabular variable named 'Win32 Process'.

E.

A scalar variable named 'MaximumWorkingSetSize'.

F.

A tabular variable named 'WMI Query',

Full Access
Question # 21

Which service needs to be running on a host to detect a Windows device?

A.

WM

B.

WinkM

C.

CM

D.

SSH

Full Access
Question # 22

Which of the following must be configured to allow a MID Server to access servers using WinRM?

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Full Access
Question # 23

Which of the following fields are editable from a Merge Table pattern operation?

Choose 3 answers

A.

Target Table

B.

Second Table

C.

Primary Table

D.

First Table

Full Access
Question # 24

A Discovery Schedule contains a /24 subnet IP Range and a Shazzam batch size of 5000. How many times will a Shazzam probe be launched during discovery?

A.

1

B.

2

C.

5000

D.

254

Full Access
Question # 25

With multiple CI data sources, which choice is the best for determining which source can update a CI attribute?

A.

Business Rules

B.

Data Certification

C.

Transform Maps

D.

Reconciliation Rules

Full Access
Question # 26

After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)

A.

Details

B.

Topic

C.

Pattern log link

D.

CMDB CI

E.

Queue

F.

Source

G.

Discovery schedule name

Full Access
Question # 27

Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)

A.

JEA Properties set to True

B.

MID Servers must be configured as a trusted source with DNS

C.

MID Servers need to be added to the WinRM Group policy on the Servers

D.

MID Server Parameters Add WinRM

Full Access
Question # 28

What would you see in the Discovery pattern log that you would not see in the ECC Queue?

A.

Success or failure of the individual pattern steps

B.

Payload of CI attributes and relationships

C.

Shazzam probe payload

D.

Relationships created

Full Access
Question # 29

From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.)

A.

Test

B.

Table

C.

Scalar

D.

CI Type

Full Access
Question # 30

Which choice represents the three best ways of extending Discovery?

A.

Orchestration, Classifiers, Discovery Patterns

B.

Fingerprinting, Classifiers, Discovery Patterns

C.

Orchestration, Classifiers, Probes & Sensors

D.

Classifiers, Probes & Sensors, Discovery Patterns

E.

Classifiers, Fingerprinting, Probes & Sensors

Full Access
Question # 31

What is the advantage of Discovery Range Sets?

A.

Range Sets provide flexibility in management and identification of known networks for simplicity of administration.

B.

Range Sets are the only way to have more than one IP Range defined within a Discovery Schedule.

C.

Range Sets show the number of IPs in a subnet.

D.

All the necessary Range Sets are installed in the base installation of Discovery.

Full Access
Question # 32

What are the two main options within a Parse File operation?

A.

Discover Now and Quick Discovery

B.

Select Operating System and Method

C.

Select File and Define Parsing

D.

Match and Select File

Full Access
Question # 33

Which choice best describes a horizontal discovery pattern?

A.

Steps that execute operations

B.

Credential depot

C.

Port scanning tool

D.

Classifiers that execute probes

Full Access
Question # 34

CI identifiers can be viewed under which of the following?

A.

Discovery Dashboard

B.

CI Class Manager

C.

Process Handlers

D.

Processes and Classification

E.

CI record

Full Access
Question # 35

What is the recommended method of consolidating duplicate CIs?

A.

Duplicate CI Remediator

B.

Event CI Remediation

C.

Ignore Duplicate CI

D.

Manual CI Remediation

Full Access
Question # 36

What entry point type must a horizontal pattern have to execute from a process classifier?

A.

A subnet entry point type.

B.

HTTP(S) entry point type if the pattern is running on a web server application.

C.

TCP entry point type or ALL entry point type.

D.

It does not matter, it is triggered for all entry point types.

Full Access
Question # 37

When is the Extension section in a horizontal pattern executed?

A.

As part of the post sensor processing script

B.

After the Identification sections

C.

As part of the port scan

D.

Before the Identification sections

Full Access