Which one of the following can be used to enable patterns to search for additional attributes and modify discovery logic defined in an Identification Section without modifying the baseline pattern and potentially impacting upgrades?

Which one of the following can be used to enable patterns to search for additional attributes and modify discovery logic defined in an Identification Section without modifying the baseline pattern and potentially impacting upgrades?A . Add step(s) to the pattern’s Identification Section.B . Add step(s) to the pattern’s Connection Section.C...

March 18, 2021 No Comments READ MORE +

Which of the following reasons would a prospect consider purchasing ServiceNow Event Management? (Choose three.)

Which of the following reasons would a prospect consider purchasing ServiceNow Event Management? (Choose three.)A . Determine impacted services from a given event/alert.B . Provide software deployment capabilities to patch problem infrastructure.C . Automatically generate incidents for certain classes of alerts.D . Provide state of the art monitoring capabilities across...

March 17, 2021 No Comments READ MORE +

In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?

In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?A . The host will be deleted in the CMDB and a new host record will be created during Service Mapping discovery.B . The host will be immediately rediscovered, but...

March 17, 2021 No Comments READ MORE +

ServiceNow only needs Domain user with local admin rights to discover Windows hosts as part of a successful implementation of ServiceNow Discovery, however which of the following targets will not be discovered?

ServiceNow only needs Domain user with local admin rights to discover Windows hosts as part of a successful implementation of ServiceNow Discovery, however which of the following targets will not be discovered?A . Windows Active Directory ServersB . Windows DHCP ServersC . Windows Domain Controller ServersD . Windows DNS ServersView...

March 16, 2021 No Comments READ MORE +

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string?

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string? Location,Denver,COA . Delimiter of a comma and position 3B . Delimiter of Location, and position 2C . Delimiter of Denver and position 2D . Delimiter of a comma and...

March 16, 2021 2 Comments READ MORE +

Which one of the following represents what the MID stands for in MID Server?

Which one of the following represents what the MID stands for in MID Server?A . Monitoring, Integration, and DiscoveryB . Management, Integration, and DiscoveryC . Management, Instrumentation, and DiscoveryD . Monitoring, Instrumentation, and DiscoveryE . MID is not an acronym.View AnswerAnswer: C Explanation: Reference: https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/mid-server/concept/c_MIDServer.html

March 16, 2021 No Comments READ MORE +

What will happen in the CMDB?

Assuming the Apache Web Server Identification Rule (CI Identifier) is configured as shown with the following Criterion attributes: ✑ Class ✑ Configuration file ✑ Version Yesterday, an Apache Web Server CI was discovered as part of Service Mapping. Today, the application owner upgraded the Apache Web Server to a different...

March 15, 2021 No Comments READ MORE +

engagement?

Which one of the following is the most common risk that can negatively impact a Service Mapping engagement?A . The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance.B . MID server resource requirements are beyond capacity of...

March 14, 2021 No Comments READ MORE +

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?A . Reclassification TasksB . Identification RulesC . Datasource Precedence RulesD . Reconciliation RulesView AnswerAnswer: D Explanation: Reference:...

March 14, 2021 No Comments READ MORE +

Which one of the following best describes the definition of an Entry Point?

Which one of the following best describes the definition of an Entry Point?A . A method by which a user interacts with a service or a CI interacts with another CIB . A type of communication taking place between applicationsC . A template of attributes that define a communication type...

March 13, 2021 No Comments READ MORE +