Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ServiceNow > CIS-Service Mapping > CIS-SM

CIS-SM Certified Implementation Specialist - Service Mapping Question and Answers

Question # 4

In Service Mapping, when discovery is started, what is the execution strategy used to run Connection Sections?

A.

Connection Sections are executed one by one and connections will result from each successful section.

B.

Connection Sections are executed randomly and connections will result from each successful section.

C.

Connection Sections are executed one by one in the order they are listed until the first successful section.

D.

Connection Sections are executed one by one in the order they are listed with a connection created from the last successful section.

Full Access
Question # 5

Which one of the following ServiceNow application KPIs would improve most as a direct result of having visibility to a service map created through Service Mapping?

A.

Problem Management: Number of Incidents per Known Problem

B.

Incident Management: Mean Time to Resolve

C.

Event Management: Signal to Noise Ratio

D.

Change Management: Number of Major Changes

Full Access
Question # 6

Assume an Apache Web Server Identifier Entry is configured as shown:

If the Apache Web Server Discovery Pattern has a step configured to collect the Configuration file data but NOT configured with a step to collect the Version information, what will happen when executing a Service Mapping discovery?

A.

An identification error will occur.

B.

The Apache Web Server CI will be reclassified as a Web Server CI.

C.

The Apache Web Server configuration item will be discovered successfully and either inserted or updated in the CMDB.

D.

A duplication error will occur.

Full Access
Question # 7

Which one of the following best describes the definition of an Entry Point?

A.

A method by which a user interacts with a service or a CI interacts with another CI

B.

A type of communication taking place between applications

C.

A template of attributes that define a communication type between applications

D.

A Host::Hosted on relation between CIs

Full Access
Question # 8

Which one of the following is a valid format when entering SSH Private Key credentials?

A.

PEM

B.

PGP

C.

PDP

D.

PMI

Full Access
Question # 9

When building a Discovery Pattern, which one of the following operations results in a termination of the Identification or Connection Section if a condition is not met?

A.

Set Parameter Value

B.

Merge Table

C.

Filter Table

D.

Match

Full Access