Exam4Training

ServiceNow CIS-SM Certified Implementation Specialist – Service Mapping Online Training

Question #1

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?

  • A . Reclassification Tasks
  • B . Identification Rules
  • C . Datasource Precedence Rules
  • D . Reconciliation Rules

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/configuration-management/task/t_DefineDataSourcePrecedence.html

Question #2

To begin the configuration of tag-based services, tag values must be defined where?

  • A . Tag categories
  • B . Tag catalogs
  • C . Tag-based service families
  • D . Tag libraries

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.servicenow.com/bundle/paris-it-operations-management/page/product/service-mapping/concept/tag-based-mapping.html

Question #3

In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?

  • A . The host will be deleted in the CMDB and a new host record will be created during Service Mapping discovery.
  • B . The host will be immediately rediscovered, but only the changes will be updated in the CMDB during Service Mapping discovery.
  • C . The host will be immediately rediscovered and updated in the CMDB during Service Mapping discovery.
  • D . The host will not be rediscovered during Service Mapping discovery.

Reveal Solution Hide Solution

Correct Answer: B
Question #4

ServiceNow only needs Domain user with local admin rights to discover Windows hosts as part of a successful implementation of ServiceNow Discovery, however which of the following targets will not be discovered?

  • A . Windows Active Directory Servers
  • B . Windows DHCP Servers
  • C . Windows Domain Controller Servers
  • D . Windows DNS Servers

Reveal Solution Hide Solution

Correct Answer: D
Question #5

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string?

Location,Denver,CO

  • A . Delimiter of a comma and position 3
  • B . Delimiter of Location, and position 2
  • C . Delimiter of Denver and position 2
  • D . Delimiter of a comma and position 2

Reveal Solution Hide Solution

Correct Answer: B
Question #6

In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?

  • A . Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed.
  • B . Identification Sections are executed randomly and the data gathered by the successful sections are merged.
  • C . Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used.
  • D . Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase.

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Which of the following are benefits a service map can bring during an Incident resolution? (Choose three.)

  • A . Quickly identifies any recent incidents that occurred on components of the impacted service.
  • B . Narrows down possible affected components when a service is impacted.
  • C . Helps reduce the number of unplanned changes in a customer environment.
  • D . Helps pinpoint code errors after a faulty application is identified.
  • E . Quickly identifies any recent changes performed on components of the impacted service.

Reveal Solution Hide Solution

Correct Answer: C,D,E
Question #8

In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?

  • A . For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Extension Sections.
  • B . For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run all Extension Sections for the pattern.
  • C . For each pattern that supports the Entry Point Type, run all the Identification Sections
    that finish successfully and then run each Extension Section for the pattern.
  • D . For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run Extensions Sections until one finishes successfully.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://docs.servicenow.com/bundle/paris-it-operations-management/page/product/service-mapping/task/modify-pattern-using-extensions.htmlc

Question #9

Which one of the following is the most common risk that can negatively impact a Service Mapping

engagement?

  • A . The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance.
  • B . MID server resource requirements are beyond capacity of the customer.
  • C . Customer security team is not made aware early enough in the engagement of the credential requirements.
  • D . Customer is not using Active Directory for credential authentication.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/mid-server/concept/c_MIDServerConnectionPrerequisites.html

Question #10

Which one of the following represents what the MID stands for in MID Server?

  • A . Monitoring, Integration, and Discovery
  • B . Management, Integration, and Discovery
  • C . Management, Instrumentation, and Discovery
  • D . Monitoring, Instrumentation, and Discovery
  • E . MID is not an acronym.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/mid-server/concept/c_MIDServer.html

Question #11

Which one of the following best describes the definition of an Entry Point?

  • A . A method by which a user interacts with a service or a CI interacts with another CI
  • B . A type of communication taking place between applications
  • C . A template of attributes that define a communication type between applications
  • D . A Host::Hosted on relation between CIs

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.servicenow.com/bundle/paris-it-operations-management/page/product/service-mapping/reference/r_EntryPointsforBizSvcDef.html

Question #12

Assuming Reconciliation Rules (Reconciliation Definitions) were configured exactly the same for both Data Sources, ServiceNow and ServiceWatch, for the Application [cmdb_ci_appl] table and the following Data Source Precedence Rules are configured.

Which one of the following is true?

  • A . If an Application CI is discovered with a Data Source, ServiceNow, then if the same Application CI is discovered by the Data Source, Altiris, an update will be allowed.
  • B . If an Application CI is discovered with a Data Source, ServiceWatch, then if the same
    Application CI is discovered by the Data Source, ServiceNow, an update will be allowed.
  • C . If an Application CI is discovered with a Data Source, ServiceNow, then if the same
    Application CI is discovered by the Data Source, ServiceWatch, an update will be allowed.
  • D . If an Application CI is discovered with a Data Source, ServiceWatch, then if the same
    Application CI is discovered by the Data Source, Altiris, an update will be allowed.

Reveal Solution Hide Solution

Correct Answer: A
Question #13

Which one of the following is a public IP Address?

  • A . 172.20.5.9
  • B . 225.16.0.5
  • C . 192.168.100.100
  • D . 10.0.6.8

Reveal Solution Hide Solution

Correct Answer: C
Question #14

Which one of the following can be used to enable patterns to search for additional attributes and modify discovery logic defined in an Identification Section without modifying the baseline pattern and potentially impacting upgrades?

  • A . Add step(s) to the pattern’s Identification Section.
  • B . Add step(s) to the pattern’s Connection Section.
  • C . Add step(s) to the pattern’s Extension Section.
  • D . Add step(s) to the pattern’s Update Set.
  • E . Add step(s) directly to the NDL code.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docs.servicenow.com/bundle/paris-it-operations-management/page/product/service-mapping/task/modify-pattern-using-extensions.html

Question #15

Which of the following reasons would a prospect consider purchasing ServiceNow Event Management? (Choose three.)

  • A . Determine impacted services from a given event/alert.
  • B . Provide software deployment capabilities to patch problem infrastructure.
  • C . Automatically generate incidents for certain classes of alerts.
  • D . Provide state of the art monitoring capabilities across a wide array of different types of infrastructure.
  • E . Consolidate events from disparate monitoring tools into a consolidated central system.

Reveal Solution Hide Solution

Correct Answer: A,B,E
Question #16

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string?

Version 5.2.0

  • A . Version (.*)
  • B . Versions+(d+.d+.d+)
  • C . Version (d+)
  • D . Version (d+).(d+).(d+)

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://community.servicenow.com/community?id=community_QUESTION&sys_id=7dac1ed1db8b5494190b1ea6689619cc

Question #17

In the image, which one of the following best describes the lower icons?

  • A . The connections from HAProxy are to other CIs that had errors during discovery.
  • B . The connections from HAProxy are application clusters.
  • C . The connections from HAProxy could not be identified and are marked as a Generic Application.
  • D . The connections from HAProxy are marked as boundaries.

Reveal Solution Hide Solution

Correct Answer: A
Question #18

Assuming the Apache Web Server Identification Rule (CI Identifier) is configured as shown with the following Criterion attributes:

✑ Class

✑ Configuration file

✑ Version

Yesterday, an Apache Web Server CI was discovered as part of Service Mapping. Today, the application owner upgraded the Apache Web Server to a different version and reran discovery of the service.

What will happen in the CMDB?

  • A . A duplication error will occur.
  • B . A new Apache Web Server CI is created.
  • C . The existing Apache Web Server CI will be reconciled with the upgraded Apache Web Server CI and its version will be updated.
  • D . The Apache Web Server CI will be reclassified as a Web Server CI.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docs.servicenow.com/bundle/paris-it-operations-management/page/product/service-mapping/task/t_CreateCITypeForSM.html

Question #19

Assume an Apache Web Server Identifier Entry is configured as shown:

If the Apache Web Server Discovery Pattern has a step configured to collect the Configuration file data but NOT configured with a step to collect the Version information, what will happen when executing a Service Mapping discovery?

  • A . An identification error will occur.
  • B . The Apache Web Server CI will be reclassified as a Web Server CI.
  • C . The Apache Web Server configuration item will be discovered successfully and either
    inserted or updated in the CMDB.
  • D . A duplication error will occur.

Reveal Solution Hide Solution

Correct Answer: C
Question #20

Which one of the following Linux commands can be used by a non root user to return the process ID listening on port 8080?

  • A . sudo netstat -an -p TCP | grep :8080
  • B . sudo netstat -anp | grep :8080
  • C . netstat -anp | grep :8080
  • D . netstat -an -pid * | grep :8080

Reveal Solution Hide Solution

Correct Answer: C
C

Reference:

https://old.wiki/index.php/ServiceNow_ServiceWatch_Discovery_Credentials_and_Connect ivity

Exit mobile version