Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ServiceNow > CIS-Service Mapping > CIS-SM

CIS-SM Certified Implementation Specialist - Service Mapping Question and Answers

Question # 4

ServiceNow only needs Domain user with local admin rights to discover Windows hosts as part of a successful implementation of ServiceNow Discovery, however which of the following targets will not be discovered?

A.

Windows Active Directory Servers

B.

Windows DHCP Servers

C.

Windows Domain Controller Servers

D.

Windows DNS Servers

Full Access
Question # 5

What describes the main feature offered by Service Mapping Plus?

A.

A suite of quick start tests that can be run to verify Service Mapping still works as expected after upgrades and deployments

B.

A collection of connection rules that are used to automatically add CIs to one or more application services

C.

Enables Kubernetes and cloud components to be added to service maps during tag-based discovery

D.

An enhanced version of mapping based on Machine Learning (Predictive Intelligence)

Full Access
Question # 6

Which one of the following best represents the output from the following Regular Expression?

([\w\d\-\.]+)

A.

Match a single character in the list between one and unlimited times.

B.

Match a single character in the list one time.

C.

Match a single character in the list between one and three times.

D.

Match a single character in the list between one and ten times.

Full Access
Question # 7

Which file on the MID Server is configured with the customer's ServiceNow instance URL?

A.

config.xml

B.

config.json

C.

wrapper.conf

D.

server.xml

Full Access
Question # 8

During ServiceNow Discovery, credentials are stored in memory in which one of the following?

A.

MID Server

B.

SNMP Agent

C.

ServiceNow Instance

D.

Collector

Full Access
Question # 9

Which one of the following best describes the process that Service Mapping uses to run a command on a target device?

A.

Service Mapping provides a task with the command that the MID Server collects, the MID Server executes the command on the target device, and returns the result to the ServiceNow instance in an XML payload.

B.

The MID Server decides what command to execute, executes the command on the target device, and returns the result to the ServiceNow instance in an XML payload.

C.

Service Mapping sends a request to the target device to execute a command, and the target device returns the result to the ServiceNow instance through the MID Server.

D.

Service Mapping sends a request to the target device to execute a command, and the target device returns the result to the ServiceNow instance.

Full Access
Question # 10

When using Pattern Designer, which one of the following best describes a variable $proxy_urls[+].host?

A.

The proxy_urls value for the first row of the host table

B.

The proxy_urls values from all rows of the host table

C.

The host field values from all rows of the proxy_urls table

D.

The host field value for the first row of the table proxy_urls

Full Access
Question # 11

In Service Mapping, what is the flow to support the discovery of a new application?

A.

Create Probes and Sensors, CI Type, Discovery Pattern

B.

Create a CI Type, Reconciliation Definition, Discovery Pattern

C.

Create CI Type, Metadata Containment Rule, Discovery Pattern

D.

Create a CI Type, CI Identifier, Discovery Pattern

Full Access
Question # 12

When resolving duplicate CIs, ServiceNow suggests a Master CI which includes which of the following criteria?

A.

Newest created CI and CI with most relationships

B.

Oldest created CI and CI with most relationships

C.

Oldest created CI and CI with least related items

D.

Newest created CI and CI with least related items

Full Access
Question # 13

Which one of the following is a public IP Address?

A.

172.20.5.9

B.

225.16.0.5

C.

192.168.100.100

D.

10.0.6.8

Full Access
Question # 14

Which is the most common risk that can negatively impact a Service Mapping engagement?

A.

The customer is not using Active Directory for credential authentication

B.

The customer external firewall only communicates on outbound port 80 and 443

C.

The customer security team is not made aware early enough in the engagement of the credential requirements

D.

The MID Server resource requirements are beyond capacity of the customer

Full Access
Question # 15

To begin the configuration of tag-based services, tag values must be defined where?

A.

Tag categories

B.

Tag catalogs

C.

Tag-based service families

D.

Tag libraries

Full Access
Question # 16

Reconciliation Rules for the Application [cmdb_ci_appl] table are configured exactly the same for both ServiceNow and SCCM data sources and the following priorities are configured:

ServiceNow Priority: 100

SCCM Priority: 200

Which of the following is true?

Choose 3 answers:

A.

Applications discovered by Altiris can be updated by SCCM

B.

Applications discovered by SCCM can be updated by Altiris

C.

Applications discovered by ServiceNow can be updated by SCCM

D.

Applications discovered by Altiris can create application CIs in the CMDB

E.

Applications discovered by SCCM can create application CIs in the CMDB

Full Access
Question # 17

In Service Mapping, which one of the following is used to discover the applications and outbound connections to other applications that appear on a Service map?

A.

Identification Rules

B.

Process Classifiers

C.

Patterns

D.

Metadata Rules

Full Access
Question # 18

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string:

Location, Denver,CO

A.

Delimiter of Denver and position 2

B.

Delimiter of Location, and position 2

C.

Delimiter of a comma and position 2

D.

Delimiter of a comma and position 3

Full Access
Question # 19

In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?

A.

Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed.

B.

Identification Sections are executed randomly and the data gathered by the successful sections are merged.

C.

Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used.

D.

Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase.

Full Access
Question # 20

In the image, which one of the following best describes the lower icons?

A.

The connections from HAProxy are to other CIs that had errors during discovery.

B.

The connections from HAProxy are application clusters.

C.

The connections from HAProxy could not be identified and are marked as a Generic Application.

D.

The connections from HAProxy are marked as boundaries.

Full Access
Question # 21

When using a Delimited Text Parsing Strategy, what delimiter and position will parse 2014 from the string?

2014/02/07-17:49:36

A.

Delimiter of space and position 1

B.

Delimiter of / and position 0

C.

Delimiter of / and position of 1

D.

Delimiter of 2014 and position 1

Full Access
Question # 22

A defined relationship between two Configuration Items (CIs), such as Runs on, Depends On, or Contains is called a what?

A.

CI Attribute

B.

Application to Application Relationship

C.

Relationship Type

D.

CI Dependency

Full Access
Question # 23

Which one of the following best represents the breadth of types of Configuration Items (CIs) discovered by

running Service Mapping?

A.

Hardware, Installed Software, Network Gear

B.

Physical Components, Logical Components, Certificates

C.

Applications, Licenses, IP Addresses

D.

Cloud Services, Applications, CI Relationships

E.

Hardware, Licenses, CI Relationships

Full Access
Question # 24

In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?

A.

For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Extension Sections.

B.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run all Extension Sections for the pattern.

C.

For each pattern that supports the Entry Point Type, run all the Identification Sections that finish successfully and then run each Extension Section for the pattern.

D.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run Extensions Sections until one finishes successfully.

Full Access
Question # 25

How many ServiceNow instances can one MID Server connect to?

A.

1

B.

5

C.

Up to 255

D.

Unlimited

Full Access
Question # 26

Which of the following are created automatically when using the map option Create pattern from generic application?

A.

Discovery Pattern, CI Type/Class, Process Classifier

B.

CI Type/Class, Process Classifier, Identification Rule

C.

Process Classifier, Connection Section, Discovery Pattern

D.

Identification Rule, CI Class/Class, Identification Section

Full Access
Question # 27

Which one of the following is the baseline Identification Rule (CI Identifier) used to determine inserts or updates to all servers discovered by ServiceNow Discovery or Service Mapping?

A.

Application Rule

B.

Server Rule

C.

Hardware Rule

D.

Device Rule

Full Access
Question # 28

Which one of the following Regular Expressions could be used to parse "San Diego" from the string "Location San Diego"?

A.

Location (\W) (\w)

B.

Location (L*)

C.

Location (\w+ \w+)

D.

Location (W)

Full Access
Question # 29

During ServiceNow Discovery, which one of the following protocols is used to extract data from printers?

A.

WMI

B.

PowerShell

C.

SSH

D.

SNMP

Full Access
Question # 30

Service Mapping provides visibility to the Operator in Agent Workspace without leaving the Workspace UI. This visibility includes what items associated with the CI? (Choose two.)

A.

Releases

B.

Problems

C.

Incidents

D.

Alerts

Full Access
Question # 31

Which one of the following can be used to enable patterns to search for additional attributes and modify discovery logic defined in an Identification Section without modifying the baseline pattern and potentially impacting upgrades?

A.

Add step(s) to the pattern’s Identification Section.

B.

Add step(s) to the pattern’s Connection Section.

C.

Add step(s) to the pattern’s Extension Section.

D.

Add step(s) to the pattern’s Update Set.

E.

Add step(s) directly to the NDL code.

Full Access