CIS-Discovery Topic 2
Question #: 38
Topic #: 1
Given a custom column named u_custom_column on table cmdb_ci_linux_server, which variable syntax should be used to populate the column in a horizontal discovery pattern using the Set Parameter Value operation?
A. $user_var_custom_column
B. $cmdb_ci_linux_server.u_custom_column.INSERT
C. $u_custom_column[1].cmdb_ci_linux_server
D. $cmdb_ci_linux_server[*].u_custom_column
Selected Answer: D
Question #: 39
Topic #: 1
What entry point type must a horizontal pattern have to execute from a process classifier?
A. A subnet entry point type.
B. HTTP(S) entry point type if the pattern is running on a web server application.
C. TCP entry point type or ALL entry point type.
D. It does not matter, it is triggered for all entry point types.
Selected Answer: C
Question #: 40
Topic #: 1
Which metrics comprise the Completeness KPI for CMDB Health? (Choose two.)
A. Required
B. Recommended
C. Audit
D. Overall
Selected Answer: AB
Question #: 41
Topic #: 1
Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)
A. Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.
B. Discovery finds applications and devices on your network, Service Mapping monitors those devices.
C. Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.
D. Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.
Selected Answer: CD
Question #: 42
Topic #: 1
What are the two main options within a Parse File operation?
A. Discover Now and Quick Discovery
B. Select Operating System and Method
C. Select File and Define Parsing
D. Match and Select File
Selected Answer: C
Question #: 43
Topic #: 1
Based on the following image, which of the following choices is also true about London Linux Servers?
A. It is a CMDB Group with Dashboard Group type.
B. It is a CMDB Group with Health Group type.
C. It is a Datacenter Group in London.
D. It is a CMDB Group with Default Group type.
Selected Answer: B
Question #: 44
Topic #: 1
For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?
A. Hash tag
B. Brackets
C. Quotes
D. Dollar sign
Selected Answer: C
Question #: 45
Topic #: 1
From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.)
A. Test
B. Table
C. Scalar
D. CI Type
Selected Answer: BC
Question #: 46
Topic #: 1
Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?
A. A notification is sent to the CI owner.
B. An associated identification rule is created automatically.
C. Each set of duplicate CIs is added to a de-duplication task.
D. The next discovery is stopped for the CI that is duplicated.
Selected Answer: C
Question #: 47
Topic #: 1
Which choice best describes a horizontal discovery pattern?
A. Steps that execute operations
B. Credential depot
C. Port scanning tool
D. Classifiers that execute probes
Selected Answer: A
Question #: 48
Topic #: 1
A config file for an application has the following three lines:
Line 1: app build 1.2.3.4 version 5.14
Line 2: installation_dir=c:\opt\bin
Line 3: build_type=Server.
Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)
A. Get Process operation with correct Port
B. Find Matching URL operation with Target Variable
C. Parse File operation with Delimited Text parsing strategy
D. Parse File operation with Regular Expression parsing strategy
Selected Answer: CD
Question #: 50
Topic #: 1
Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?
A. install.service-now.com
B. docs.servicenow.com
C. developer.service-now.com
D. service-now.com
Selected Answer: A
Question #: 51
Topic #: 1
When designing steps with operations requiring variables, it is best practice to do what?
A. hard core variables
B. always use scalar variables
C. query targets for variables
D. design for a static environment
Selected Answer: B
Question #: 52
Topic #: 1
For what is File Based Discovery used?
A. To discover the checksum of a file and store it to track for changes
B. To discover the contents of flat files such as configuration files
C. To discover that file names conform to a defined naming standard
D. To discover file paths to recognize the signature of installed software
Selected Answer: D
Question #: 53
Topic #: 1
Which of the following properties define the maximum overall size for the returned payload that comes from patterns?
A. cmdb.properties.payload_max_size
B. glide.discovery.payload_max
C. mid.discovery.max_payload_size
D. mid.discovery.max_pattern_payload_size
Selected Answer: D
Question #: 54
Topic #: 1
Based on this image, which of the following choices is true?
A. This is from a WMI query operation step.
B. There is a scalar variable labeled ‘1’.
C. This Value cannot be used in a pattern step.
D. There is a tabular variable named ‘name_details’.
Selected Answer: D
Question #: 55
Topic #: 1
Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?
A. Modify the default MIB information
B. Enable SSH as a secondary protocol
C. Use live devices in production
D. Use the publish manufacturer’s device MIB
Selected Answer: D
Question #: 56
Topic #: 1
After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.)
A. Details
B. Topic
C. Pattern log link
D. CMDB CI
E. Queue
F. Source
G. Discovery schedule name
Selected Answer: BEF
Question #: 57
Topic #: 1
Hardware Models can have a one-to-many relationship with the following:
(Choose three.)
A. Assets
B. Manufacturer
C. Configuration Items
D. Product owner
E. Model Categories
Selected Answer: BCE
Question #: 58
Topic #: 1
Which choice best represents how to modify the functionality shown in this image?
A. From a Classifier
B. From a Discovery Pattern
C. From the MID Server
D. From a Probe
Selected Answer: B
Question #: 59
Topic #: 1
What is the recommended method of consolidating duplicate CIs?
A. Duplicate CI Remediator
B. Event CI Remediation
C. Ignore Duplicate CI
D. Manual CI Remediation
Selected Answer: A
Question #: 60
Topic #: 1
During the Discovery process, what determines if an Asset record is created?
A. CMDB
B. Model Category
C. Model Product
D. ECC Queue
E. Configuration Item
Selected Answer: B
Question #: 61
Topic #: 1
What pattern operation allows the transfer of a file from the MID Server to a target?
A. Parse file
B. Create Connection
C. Put file
D. Manage Attachments
Selected Answer: C
Question #: 62
Topic #: 1
On the ECC Queue, sensor records have a Queue value of ___________ and probe records have a Queue value of ___________.
A. input, output
B. started, ready
C. ready, started
D. output, input
Selected Answer: A
Question #: 63
Topic #: 1
In Discovery, what table associates an IP address and a credential?
A. Credential Affinity
B. Service Affinity
C. Service CI Association
D. Tags
Selected Answer: A
Question #: 65
Topic #: 1
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
A. tcp to udp
B. application to application
C. mid server to target
D. host to application
Selected Answer: D
Question #: 66
Topic #: 1
Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)
A. JEA Properties set to True
B. MID Servers must be configured as a trusted source with DNS
C. MID Servers need to be added to the WinRM Group policy on the Servers
D. MID Server Parameters Add WinRM
Selected Answer: CD
Question #: 67
Topic #: 1
For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)
$IfTable<_>.InstanceID
A. [3] B. [X] C. [&] D. [.] E. [*] F. []
Selected Answer: AEF
Question #: 68
Topic #: 1
Which of the below choices are the most probable results of the following image? (Choose three.)
A. A tabular variable named ‘WMI Query’.
B. A scalar variable named ‘MaximumWorkingSetSize’
C. A scalar variable named ‘PageFaults’.
D. A scalar variable named ‘PeakVirtualSize’.
E. A tabular variable named ‘more_process_info’.
F. A tabular variable named ‘Win32_Process’.
Selected Answer: BCE
Question #: 69
Topic #: 1
What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)
A. CI Attributes
B. Operations
C. Temporary Variables
D. CMDB Dashboard
Selected Answer: AC
Question #: 70
Topic #: 1
Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)
A. Create an Engaging User Experience
B. Build New Apps Fast
C. Manage Hybrid Clouds
D. Proactively Eliminate Service Outages
Selected Answer: CD
Question #: 71
Topic #: 1
Which choices best describe what is necessary to create a custom horizontal pattern to discover an operating system that is not discovered by the base installation patterns? (Choose two.)
A. Select a CI Type
B. Define Process Strategy
C. Select Infrastructure Pattern Type
D. Select Application Pattern Type
Selected Answer: AD
Question #: 72
Topic #: 1
Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.)
A. Tomcat does not extend the Application Server table
B. Tomcat table extends the Application Server table
C. Tomcat table is a child of the Application Server table
D. Tomcat table is a parent of the Application Server table
Selected Answer: BC
Question #: 73
Topic #: 1
In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)
A. Global CI types
B. Main pattern CI type
C. Related CI types
D. All CI types
Selected Answer: BC
Question #: 74
Topic #: 1
Which of the below choices are benefits of Tracked Configuration Files? (Choose two.)
A. Content version comparison
B. Files tracked as CIs
C. Unwanted files removed from target
D. No credentials needed
Selected Answer: AB
Question #: 75
Topic #: 1
Which choice best describes a Functionality Definition?
A. Defines what CI identifiers to use.
B. Defines the IP addresses to discover.
C. Defines what Behavior to use from a Discovery Schedule.
D. Defines what protocols to detect from within a Behavior.
Selected Answer: D
Question #: 76
Topic #: 1
As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?
A. Target
B. Pattern Log
C. ECC queue
D. Discovery Log
Selected Answer: C
Question #: 77
Topic #: 1
Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.)
A. Switching
B. Identifying
C. Downgrading
D. Upgrading
Selected Answer: AC
Question #: 78
Topic #: 1
Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)
A. CI attributes
B. Prefix
C. Temporary
D. Fixed
E. Global
Selected Answer: ACE
Question #: 79
Topic #: 1
Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)
A. system
B. computer_system
C. process
D. baseline
Selected Answer: BC
Question #: 80
Topic #: 1
Which ECC Queue message contains the XML payload returned from the MID Server?
A. Ready
B. Output
C. Pending
D. Input
Selected Answer: D