Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CIS-SM Questions and Answers

Question # 6

In the image, which one of the following best describes the lower icons?

A.

The connections from HAProxy are to other CIs that had errors during discovery.

B.

The connections from HAProxy are application clusters.

C.

The connections from HAProxy could not be identified and are marked as a Generic Application.

D.

The connections from HAProxy are marked as boundaries.

Full Access
Question # 7

Service Mapping provides visibility to the Operator in Agent Workspace without leaving the Workspace UI. This visibility includes what items associated with the CI? (Choose two.)

A.

Releases

B.

Problems

C.

Incidents

D.

Alerts

Full Access
Question # 8

The application stack is as follows: IIS Web Server with an inclusion connection to an IIS Virtual Directory, and an outbound connection from the IIS Virtual Directory to an MSSQL database.

Which describes the correct number of Discovery Pattern Identification and Connection Sections that evaluate to true when Service Mapping discovers a service with this application stack?

A.

3 Identification Sections and 2 Connection Sections

B.

2 Identification Sections and 1 Connection Section

C.

2 Identification Sections and 2 Connection Sections

D.

3 Identification Sections and 1 Connection Section

Full Access
Question # 9

Which of the following are potential benefits when implementing Service Mapping? (Choose four.)

A.

Reduced ongoing service map maintenance effort as a result of automated map updates

B.

Faster service issue resolution and reduced downtime due to better root cause analysis

C.

Improved Software Asset Management capabilities

D.

Reduction in effort to create service maps

E.

Reduction in change related incidents due to improved service visibility during change planning

F.

More accurate alerts from monitoring tools

Full Access
Question # 10

Which one of the following Regular Expressions could be used to parse "San Diego" from the string "Location San Diego"?

A.

Location (\W) (\w)

B.

Location (L*)

C.

Location (\w+ \w+)

D.

Location (W)

Full Access
Question # 11

Which one of the following Identification Rule (CI Identifier) fields, when selected, determines CMDB update/inserts based on the configuration item's (CI) own attributes, without taking other CIs or relationships into consideration?

A.

Search on table

B.

Allow fallback to parent's rule

C.

Independent

D.

Application

Full Access
Question # 12

In Event Management, which of the following rules allows for automatic task creation?

A.

Alert Management

B.

Event

C.

Task

D.

Alert Correlation

Full Access
Question # 13

To begin the configuration of tag-based services, tag values must be defined where?

A.

Tag categories

B.

Tag catalogs

C.

Tag-based service families

D.

Tag libraries

Full Access
Question # 14

Which omitted action will keep changes to a discovery pattern connection section from taking effect?

A.

Exporting the updated pattern

B.

Saving the updated connection section

C.

Publishing the updated pattern

D.

Saving the updated pattern

Full Access
Question # 15

Which one of the following statements best explains the following URL: https:// /

SaCmdManager.do?ip=198.51.100.66?

A.

The user is starting the Command Line Console and is able to send commands to the host 198.51.100.66.

B.

The user is starting the Command Line Console and explicitly directs Service Mapping to use the MID Server 198.51.100.66 to execute commands.

C.

This is not a valid URL for Service Mapping.

D.

The user is starting the Command Line Console and is able to send commands against the ServiceNow instance at 198.51.100.66.

Full Access
Question # 16

In Event Management, if a Message key is not passed from an Event, which of the following Alert fields combine to populate the Message key on an Alert?

A.

Task, Description, Created

B.

Node, Type, Resource, Number

C.

Source, Number, Task

D.

Source, Node, Type, Resource

Full Access
Question # 17

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?

A.

Reclassification Tasks

B.

Identification Rules

C.

Datasource Precedence Rules

D.

Reconciliation Rules

Full Access
Question # 18

When a Windows Server is reclassified from the Server [cmdb_ci_server] table to the Windows Server [cmdb_ci_win_server] table, which one of the following describes the process that occurred?

A.

Class Change

B.

Class Upgrade

C.

Class Switch

D.

Class Downgrade

Full Access
Question # 19

During ServiceNow Discovery, which one of the following is the approximate number of host IPs that are port scanned with a Discovery Schedule configured with an IP network as shown?

180.181.0.0/16

A.

~5 million

B.

~1 million

C.

~65 thousand

D.

~500,000 thousand

Full Access
Question # 20

In ServiceNow Discovery, which one of the following phases is the server RAM value discovered?

A.

Port scan

B.

Classification

C.

Classification and Identification

D.

Identification and Exploration

Full Access
Question # 21

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string:

Location, Denver,CO

A.

Delimiter of Denver and position 2

B.

Delimiter of Location, and position 2

C.

Delimiter of a comma and position 2

D.

Delimiter of a comma and position 3

Full Access
Question # 22

During Service Mapping discovery, which one of the following is used to uniquely identify a configuration item to determine updates or inserts into the CMDB?

A.

Identification Rules

B.

Reconciliation Rules

C.

Coalesce Values

D.

Reconciliation Keys

Full Access
Question # 23

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string?

Version 5.2.0

A.

Version (\.*)

B.

Version\s+(\d+\.\d+\.\d+)

C.

Version (\d+)

D.

Version (\d+).(\d+).(\d+)

Full Access
Question # 24

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string:

Version 5.2.0?

A.

Version (\d+)

B.

Version (\d+).0\d+).(\d+)

C.

Version\s+(\d+\.\d+\.\d+)

D.

Version (.\A)

Full Access
Question # 25

Given the CMDB class structure shown, which types of Configuration Items (CIs) will be included in a report run against the Server [cmdb_ci_server] table?

A.

CIs defined directly in Server [cmdb_ci_server] table and all parent classes

B.

CIs defined directly in Server [cmdb_ci_server] table and all child classes

C.

CIs defined directly in the Server [cmdb_ci_server] table

Full Access
Question # 26

You have run Service Mapping discovery against a customer service and discovered the CI in the image. The customer indicates that Apache should have an outgoing connection to Tomcat. Which one of the following could be the issue?

A.

No Connection Section is defined for Apache to Tomcat.

B.

Process is offline for Tomcat.

C.

No Tomcat CI Type is defined.

D.

No Identification Rule is defined for Tomcat.

E.

Credentials are not configured for Tomcat.

Full Access
Question # 27

In order for Service Mapping to successfully discover UNIX targets, which SSH credential can be granted with limited privileges to a user?

A.

RDP privileges

B.

Root privileges

C.

WMI privileges

D.

Selective sudo (or sudo equivalent) access

E.

Domain access and local administrator privileges

Full Access
Question # 28

When planning for a Service Mapping engagement and deploying MID Servers into a customer environment, which outbound port must be open from the customer environment to allow the MID Server(s) to communicate to the customer ServiceNow instance hosted in the ServiceNow cloud?

A.

80

B.

443

C.

636

D.

8080

E.

25

Full Access
Question # 29

In Service Mapping, which one of the following must be available or created in advance, in order to be able to create a Discovery Pattern?

A.

Process Classifier

B.

Identification Rule

C.

CI Type/Table

D.

Application Service

Full Access
Question # 30

Assuming the Apache Web Server Identification Rule (CI Identifier) is configured as shown with the following

Criterion attributes:

    Class

    Configuration file

    Version

Yesterday, an Apache Web Server CI was discovered as part of Service Mapping. Today, the application owner upgraded the Apache Web Server to a different version and reran discovery of the service. What will happen in the CMDB?

A.

A duplication error will occur.

B.

A new Apache Web Server CI is created.

C.

The existing Apache Web Server CI will be reconciled with the upgraded Apache Web Server CI and its version will be updated.

D.

The Apache Web Server CI will be reclassified as a Web Server CI.

Full Access
Question # 31

Which represents the skills needed that a Service Mapping administrator or implementer should have?

Choose 4 answers

A.

Understanding of relational database theory

B.

Understanding of XML, Regex, Delimited text, and JSON

C.

Intermediate or above Windows and Unix administration skills

D.

Scripting capabilities with respect to Unix and Windows commands

E.

Sufficient skills to build an enterprise website

F.

Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST

Full Access