1. CIS-ITSM Exam Set 1
  2. CIS-ITSM Exam Set 2
  3. CIS-ITSM Practice Exam Set 3
  4. CIS-ITSM Practice Exam Set 4
  5. CIS-HR Exam Practice Set 1
  6. CIS-HR Exam Practice Set 2
  7. CIS-HRSD Exam Set 3
  8. CIS-CSM Practice Exam Set 1
  9. CIS-CSM Practice Exam Set 2
  10. CIS-CSM Practice Exam Set 3
  11. CIS-HAM Practice Exam Set 1
  12. Discovery Practice Exam
  13. Discovery Practice Exam 2

Top ServiceNow Certification Practice Exams:

  1. https://snowexpertrohit.com/child-document/servicenow-csa-set-1/
  2. https://snowexpertrohit.com/child-document/servicenow-cad-set-1/
  3. https://snowexpertrohit.com/child-document/cis-hrsd-exam-set-2/
  4. https://snowexpertrohit.com/child-document/cis-itsm-question-set-2/
  5. https://snowexpertrohit.com/child-document/cis-csm-practice-exam-set-1/
  6. https://snowexpertrohit.com/child-document/cis-ham-practice-exam-set-1

Discovery Practice Exam Set

Discovery

Leave your comments. Please let me know if you think any of the questions or answers are incorrect!

Send mail to [email protected] to continue exam.

1 / 78

Which of the below choices is NOT a valid variable in a pattern operation?

2 / 78

Both SNMP and SSH ports are open on a network device. When Discovery tried the SSH probe first, it failed. That triggered the SNMP probe, which was successful. Which of the below Discovery functionalities allows that to happen if Discovery uses SNMP first for subsequent discoveries on that device?

3 / 78

Which of the below is NOT a level of the IT Operations Management (ITOM) Product Suite?

4 / 78

Which 3 of the following choices are possible CI relationships in CMDB Health dashboard. (choose 3 options)

5 / 78

To launch any pattern, it is required to have ______ and ______ . (choose 2 options)

6 / 78

There are duplicated Configuration Items (CIs) in CMDB. Which method should be chosen to consolidate them?

7 / 78

Select credentials permission level, recommended for Windows Servers discovery.

8 / 78

Which devices will not be discoverable when the Windows Management Instrumentation (WMI) service is stopped?

9 / 78

To interact with a ServiceNow instance a ______ role for the MID Server's user account is required.

10 / 78

What are the Queue values on the ECC Queue sensor and probe records?

11 / 78

In the Identification and Reconciliation API, ______ is mandatory when using createOrUpdateCI.

12 / 78

What is the default thread count for a MID Server?

13 / 78

Select 2 metrics included in the CMDB Completeness Scorecard for CMDB Health dashboard? (choose 2 options)

14 / 78

What would be the relation between Application Server [cdmb_ci_app_server] table and Tomcat [cmdb_ci_app_server_tomcat] table. (choose 2 options)

15 / 78

How are relationships created between Configuration Items (CIs) in a horizontal pattern?

16 / 78

Which of the choices below is true about parsing strategies?

17 / 78

______ is the best-suited person to fill the Credentials Table during a Discovery implementation.

18 / 78

All ______ , ______ and ______ can be allowed from the MID Server Initial Selection Criteria. (choose 3 options)

19 / 78

You should use ______ when using the SNMP Query operation.

20 / 78

For which 3 types of storage can Discovery find and map dependencies? (choose 3 options)

21 / 78

Extension section of a discovery pattern contains ______ .

22 / 78

During which of the following phases a file-based Discovery is triggered?

23 / 78

If an operating system is not discovered by the base installation of Discovery, which 2 of the following conditions would have to be met for a custom horizontal pattern to discover the system?

24 / 78

The following is displayed while discovering a new network device on a Discovery Status: "Active, couldn't classify". What could cause this error?

25 / 78

Choose 2 of the listed pattern operations that query targets. (choose 2 options)

26 / 78

In case of a WMI Query pattern operation, the Full Statement collected Fields ______ .

27 / 78

To populate variables with two different parsing methods in Parse Variable pattern operation it is necessary to have ______ .

28 / 78

Launching of the Horizontal Pattern probe is dictated by the ______ related list on a classifier

29 / 78

What would be the best practice if we want to create a pattern to discover a custom application whose port communicates with a different server?

30 / 78

Horizontal discovery pattern does not use ______ .

31 / 78

______ and ______ are only used for the Application Pattern Type. (choose 2 options)

32 / 78

Connect Discover option from a Discovery Schedule with its description.

Option:

  1. 1. Service
  2. 2. Serverless
  3. 3. IP addresses
  4. 4. Networks
  5. 5. Configuration items

Description:

  1. A. Create or update CIs from devices
  2. B. Discover services for Service Mapping
  3. C. Scan devices without credentials
  4. D. Discover IP Networks
  5. E. Find CIs without running host discovery

33 / 78

In Discovery, during the Port Scan phase an error of warning level appears: "No results returned from probe.". What could be the cause of this error?

34 / 78

Match ECC Queue fields with their respective descriptions.

Fields:

  1. 1. Topic
  2. 2. Source
  3. 3. Queue
  4. 4. Payload

Descriptions:

  1. A. The IP address against which the discovery is to be run.
  2. B. The message body in XML format.
  3. C. An input/output indicator of this message.
  4. D. The probe name that the MID server ran.

35 / 78

What is necessary to use Debug form Pattern Designer?

36 / 78

The ECC Queue provides ______ . (choose 2 options)

37 / 78

Port Probe classification priority is specified in the ______ .

38 / 78

First Discovery run returns following attributes for a Windows Server:

  1. name = WinSN1
  2. serial_number = 12345

Subsequent Discovery run against a different Windows Server returns below values:

  1. name = WinSN2
  2. serial_number = 12345

Assuming that only base system Cl Identifiers are configured, select what happened.

39 / 78

The URL to the connected instance is stored in the ______ file on the MID Server host.

40 / 78

SNMP Credentials ______ .

41 / 78

Horizontal discovery pattern ______ .

42 / 78

Which special character(s) would you use to declare a constant value in the Set Parameter Value operation?

43 / 78

A Discovery Schedule with a Shazzam batch size of 5000 contains a /24 subnet IP Range. A Shazzam probe during discovery ______ .

44 / 78

What could be used for an infrastructure pattern in the Debug Identification Section in Debug Mode? (choose 2 options)

45 / 78

Disk CI is discovered during the Linux Server discovery. The next time the Linux Server is discovered, the same related Disk CI is not found. What will happen if the deletion strategy for related Disk CI is set to "Mark as absent"?

46 / 78

When troubleshooting discovery from a discovery status, which of the following lists will prove helpful? (choose 3 options)

47 / 78

Select correct statements based on data below:

  1. Operation: Merge Table
  2. First Table: $user_details
  3. Second Table: $process_information
  4. Target Table: $cmdb_ci_web_server

Merge criteria are satisfied when any of the following conditions are met:

  1. $process.executablePath contains "mongoose"
  2. Unmatched values are removed

(choose 3 options)

48 / 78

Discovery patterns are best described as ______ .

49 / 78

A tabular variable in a discovery pattern ______ .

50 / 78

What operation needs to be performed to modify credentials in a horizontal pattern from default to any other appropriate credentials?

51 / 78

Which 2 of the below record types are part of the Configuration Management Database (CMDB)? (choose 2 options)

52 / 78

The customer should always configure ______ during Discovery implementation.

53 / 78

What are the 3 benefits of using Discovery? (choose 3 options)

54 / 78

Reconciliation process is best described as the process of ______ .

55 / 78

Which of the following statements are true for the below value:

$name_details[1].exec_info+"-"+$process.executableDir

56 / 78

Active discovery errors with help links are displayed as part of the:

57 / 78

In the Enhanced ADM Discovery, the ADME probe ______ .

58 / 78

In a network, a certain number of ports is required to be opened for WMI to discover a subnet of Windows Servers containing highly sensitive data. What would you do to reassure network administrator who is concerned about opening ports?

59 / 78

The Quick Discovery process requires ______ and ______ . (choose 2 options)

60 / 78

Choose 3 most accurate descriptions of ServiceNow Discovery.

61 / 78

What would best describe a Device record?

62 / 78

Which statement is also true if CMDB Health Group List in Group Health is set to "Orlando Linux Servers”?

63 / 78

What would be the best ways to extend Discovery capabilities?

64 / 78

______ are global variables for steps in horizontal discovery patterns.

65 / 78

During CI reclassification, which 2 of the below operations are more likely to lead to data loss? (choose 2 options)

66 / 78

When using the Delimited Text parsing strategy ______ and ______ are available in a step for a Parse Variable operation. (choose 2 options)

67 / 78

Choose 2 key capabilities of a ServiceNow IT Operations Management (ITOM) Enterprise solution: (choose 2 options)

68 / 78

A horizontal pattern must have ______ to execute from a process classifier.

69 / 78

Where is the Shazzam probe placed at the beginning of horizontal discovery?

70 / 78

One of the titles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile? (choose 3 options)

71 / 78

From all options within a Parse File operation, which are the main two?

72 / 78

In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .

73 / 78

If a pattern fails during discovery, it is most likely because ______ .

74 / 78

In the horizontal discovery patterns, which 2 of the below are variables available by default? (choose 2 options)

75 / 78

Where can File-based Discovery be enabled?

76 / 78

In a horizontal discovery pattern, which variable syntax should be used to populate the custom column u_custom_col on table cmdb_ci_linux_server when using the Set Parameter Value operation?

77 / 78

A MID Server reached three Windows Server machines. All of them have the same login credentials but different IP addresses:

  1. 10.100.1.11
  2. 10.100.1.22
  3. 10.100.1.33

Given that during discovery two different Discovery Credential records were created, one for the 10.100.1.11 server and the other for the 10.100.1.44 server.

Which scenario is the most likely for servers 10.100.1.22 and 10.100.1.33?

78 / 78

It is advisable for a MID Server to have access to ______ .

Your score is

The average score is 83%

0%

No responses yet