Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ServiceNow CIS-SM Dumps Questions Answers

Page: 1 / 8
Total 106 questions

Certified Implementation Specialist - Service Mapping Questions and Answers

Question 1

Using Pattern Designer, when configuring the first step in an Identification Section, which one of the following is considered a good practice?

Options:

A.

Create a table for the process parameters

B.

Check if connectivity variables are defined

C.

Use a Parse file operation to extract necessary information from a configuration file

D.

Use a Match operation on the process executable or command variable

Buy Now
Question 2

In Service Mapping, which one of the following best represents the process flow of discovery?

Options:

A.

Process Detection > Application Identification > Create Outgoing Connection(s) > Impact Calculation

B.

Host Detection > Process Detection > Application Identification > Create Outgoing Connection(s)

C.

Process Detection > Host Detection > Application Identification > Create Outgoing Connection(s)

D.

Host Identification > CI Reconciliation > Application Identification > Change Record Created > Create Outgoing Connection(s)

Question 3

Within the CMDB, all application CI Types/Classes are children of which parent class?

Options:

A.

Database Instance [cmdb_ci_db_instance]

B.

Software [cmdb_ci_software]

C.

Installed Software [cmdb_ci_installed_software]

D.

Application [cmdb_ci_appl]

E.

Licenses [cmdb_ci_license]

Question 4

Given the CMDB class structure shown below, if an implementer were to extend the Server [cmdb_ci_server] table, which one of the following best describes the fields that would be inherited by the new table?

Options:

A.

All fields configured for the Server [cmdb_ci_server] table and its child classes would be inherited.

B.

All fields configured for the Server [cmdb_ci_server] table and its parent and child classes would be inherited.

C.

No fields would be inherited from any class.

D.

All fields configured for the Server [cmdb_ci_server] table and its parent classes would be inherited.

Question 5

Which one of the following best represents the breadth of types of Configuration Items (CIs) discovered by

running Service Mapping?

Options:

A.

Hardware, Installed Software, Network Gear

B.

Physical Components, Logical Components, Certificates

C.

Applications, Licenses, IP Addresses

D.

Cloud Services, Applications, CI Relationships

E.

Hardware, Licenses, CI Relationships

Question 6

From Pattern Designer under the CI Attributes section, next to the name field, the key displayed in this example represents?

Options:

A.

Tabular variable

B.

Coalesce key

C.

Criterion attribute

D.

Custom variable

Question 7

Which one of the following Linux commands can be used by a non root user to return the process ID listening on port 8080?

Options:

A.

sudo netstat -an -p TCP | grep :8080

B.

sudo netstat -anp | grep :8080

C.

netstat -anp | grep :8080

D.

netstat -an -pid * | grep :8080

Question 8

How many ServiceNow instances can one MID Server connect to?

Options:

A.

1

B.

5

C.

Up to 255

D.

Unlimited

Question 9

When using the Pattern Designer, a Regular Expression parsing strategy is available from which operation?

Options:

A.

Set variable

B.

Match

C.

Create connection

D.

Parse file

Question 10

In Service Mapping, which one of the following is used to discover the applications and outbound connections to other applications that appear on a Service map?

Options:

A.

Identification Rules

B.

Process Classifiers

C.

Patterns

D.

Metadata Rules

Question 11

Which best describes what Identification Rules are?

Options:

A.

Used to track duplicate CIs until resolved

B.

Consists of one or more identifier entries that specify the criterion attributes that uniquely identify a CI

C.

Used by the coalesce field when importing data into ServiceNow using a transform map

D.

Allows the ability to assign a priority to data sources if multiple data sources are authorized to update the same table or table attributes

Question 12

In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?

Options:

A.

For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Extension Sections.

B.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run all Extension Sections for the pattern.

C.

For each pattern that supports the Entry Point Type, run all the Identification Sections that finish successfully and then run each Extension Section for the pattern.

D.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run Extensions Sections until one finishes successfully.

Question 13

What are the roles of the Application Service Readiness Dashboard in ML-powered Service Mapping?

Choose 2 answers

Options:

A.

To clearly display the detailed mapping status of all discovered application services

B.

To list prerequisites and their readiness status for application service mapping

C.

To monitor the performance of all active scheduled jobs

D.

To configure Predictive Intelligence plugins and ADME probes

Question 14

Which of the following are created automatically when using the map option Create pattern from generic application?

Options:

A.

Discovery Pattern, CI Type/Class, Process Classifier

B.

CI Type/Class, Process Classifier, Identification Rule

C.

Process Classifier, Connection Section, Discovery Pattern

D.

Identification Rule, CI Class/Class, Identification Section

Question 15

Which one of the following ECC Queue records contains the XML payload returned from the MID Server that will be processed by the ServiceNow instance?

Options:

A.

Input, Pending

B.

Input, Ready

C.

Output, Pending

D.

Output, Ready

Question 16

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string?

Version 5.2.0

Options:

A.

Version (\.*)

B.

Version\s+(\d+\.\d+\.\d+)

C.

Version (\d+)

D.

Version (\d+).(\d+).(\d+)

Question 17

The application stack is as follows: IIS Web Server with an inclusion connection to an IIS Virtual Directory, and an outbound connection from the IIS Virtual Directory to an MSSQL database.

Which describes the correct number of Discovery Pattern Identification and Connection Sections that evaluate to true when Service Mapping discovers a service with this application stack?

Options:

A.

3 Identification Sections and 2 Connection Sections

B.

2 Identification Sections and 1 Connection Section

C.

2 Identification Sections and 2 Connection Sections

D.

3 Identification Sections and 1 Connection Section

Question 18

A customer has recently placed check scanners in some of their branches across Europe. The scanners send the scanned images of the checks to the bank's data center through a web service that goes through an F5 load balancer. The images then go through the bank's Apache web servers and are processed by an application server named ImageSmart. Eventually, the images are stored in a cluster of Oracle databases.

The bank's tellers log into ImageSmart through a Citrix Portal and have the capability to review the checks and approve them.

Which one of the following represents most accurately how many business services and entry points are involved in this process?

Options:

A.

Two services and two entry points

B.

One service and one entry point

C.

Two services and one entry point

D.

One service and two entry points

Question 19

Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string:

Location, Denver,CO

Options:

A.

Delimiter of Denver and position 2

B.

Delimiter of Location, and position 2

C.

Delimiter of a comma and position 2

D.

Delimiter of a comma and position 3

Question 20

In the following image of the Discovery Log, the green S represents which one of the following?

Options:

A.

A library in the Connection Section of a pattern

B.

A step in the Connection Section of a pattern

C.

A step in an Identification Section of a pattern

D.

A library in an Identification Section of a pattern

Question 21

What describes the main feature offered by Service Mapping Plus?

Options:

A.

A suite of quick start tests that can be run to verify Service Mapping still works as expected after upgrades and deployments

B.

A collection of connection rules that are used to automatically add CIs to one or more application services

C.

Enables Kubernetes and cloud components to be added to service maps during tag-based discovery

D.

An enhanced version of mapping based on Machine Learning (Predictive Intelligence)

Question 22

Which represents the skills needed that a Service Mapping administrator or implementer should have?

Choose 4 answers

Options:

A.

Understanding of relational database theory

B.

Understanding of XML, Regex, Delimited text, and JSON

C.

Intermediate or above Windows and Unix administration skills

D.

Scripting capabilities with respect to Unix and Windows commands

E.

Sufficient skills to build an enterprise website

F.

Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST

Question 23

Which one of the following Identification Rule (CI Identifier) fields, when selected, determines CMDB update/inserts based on the configuration item's (CI) own attributes, without taking other CIs or relationships into consideration?

Options:

A.

Search on table

B.

Allow fallback to parent's rule

C.

Independent

D.

Application

Question 24

Which one of the following is the baseline Identification Rule (CI Identifier) used to determine inserts or updates to all servers discovered by ServiceNow Discovery or Service Mapping?

Options:

A.

Application Rule

B.

Server Rule

C.

Hardware Rule

D.

Device Rule

Question 25

Predictive Intelligence provides which one of the following benefits?

Options:

A.

Suggests which application services need pattern extensions

B.

Helps reduce noise from traffic-based connections

C.

Detects performance problems in application mapping

D.

Shows CI suggestions for Dynamic CI Groups

Question 26

Service Mapping uses which table to build tag-based maps from?

Options:

A.

Application Service [cmdb_ci_service_discovered]

B.

Application [cmdb_ci_app]

C.

Key Value [cmdb_key_value]

D.

Servers [cmdb_ci_server]

Question 27

A CI Type is also known as which one of the following?

Options:

A.

Table

B.

Discovery Pattern

C.

Service Group

D.

CI Identifier / Identification Rule

Question 28

What is the function of the Unified Map feature in the Service Mapping Workspace?

Options:

A.

To monitor the performance of application services

B.

To visually display hierarchical relationships between configuration items

C.

To automatically add traffic-based connections to maps

D.

To provide a list of unmapped servers and their classifications

Question 29

Assuming Reconciliation Rules (Reconciliation Definitions) were configured exactly the same for both Data Sources, ServiceNow and ServiceWatch, for the Application [cmdb_ci_appl] table and the following Data Source Precedence Rules are configured.

Which one of the following is true?

Options:

A.

If an Application CI is discovered with a Data Source, ServiceNow, then if the same Application CI is discovered by the Data Source, Altiris, an update will be allowed.

B.

If an Application CI is discovered with a Data Source, ServiceWatch, then if the same Application CI is discovered by the Data Source, ServiceNow, an update will be allowed.

C.

If an Application CI is discovered with a Data Source, ServiceNow, then if the same Application CI is discovered by the Data Source, ServiceWatch, an update will be allowed.

D.

If an Application CI is discovered with a Data Source, ServiceWatch, then if the same Application CI is discovered by the Data Source, Altiris, an update will be allowed.

Question 30

In Event Management, if a Message key is not passed from an Event, which of the following Alert fields combine to populate the Message key on an Alert?

Options:

A.

Task, Description, Created

B.

Node, Type, Resource, Number

C.

Source, Number, Task

D.

Source, Node, Type, Resource

Question 31

In Service Mapping, when discovery is started, what is the execution strategy used to run Connection Sections?

Options:

A.

Connection Sections are executed one by one and connections will result from each successful section.

B.

Connection Sections are executed randomly and connections will result from each successful section.

C.

Connection Sections are executed one by one in the order they are listed until the first successful section.

D.

Connection Sections are executed one by one in the order they are listed with a connection created from the last successful section.

Page: 1 / 8
Total 106 questions