Categories:
  1. CIS-ITSM Exam Set 1
  2. CIS-ITSM Exam Set 2
  3. CIS-ITSM Practice Exam Set 3
  4. CIS-ITSM Practice Exam Set 4
  5. CIS-HR Exam Practice Set 1
  6. CIS-HR Exam Practice Set 2
  7. CIS-HRSD Exam Set 3
  8. CIS-CSM Practice Exam Set 1
  9. CIS-CSM Practice Exam Set 2
  10. CIS-CSM Practice Exam Set 3
  11. CIS-HAM Practice Exam Set 1
  12. Discovery Practice Exam
  13. Discovery Practice Exam 2

Top ServiceNow Certification Practice Exams:

  1. https://snowexpertrohit.com/child-document/servicenow-csa-set-1/
  2. https://snowexpertrohit.com/child-document/servicenow-cad-set-1/
  3. https://snowexpertrohit.com/child-document/cis-hrsd-exam-set-2/
  4. https://snowexpertrohit.com/child-document/cis-itsm-question-set-2/
  5. https://snowexpertrohit.com/child-document/cis-csm-practice-exam-set-1/
  6. https://snowexpertrohit.com/child-document/cis-ham-practice-exam-set-1

Discovery Practice Exam Set 2

Discovery 2

Leave your comments. Please let me know if you think any of the questions or answers are incorrect!

Send mail to [email protected] to continue exam.

1 / 60

Select 3 types of rules that can be discovered from Vmware which support DRS affinity rule settings

2 / 60

Which range of versions of PowerShell are supported by ServiceNow?

3 / 60

Which of the following properties allows for Slack notification of certificates that has expired?

4 / 60

Which roles are required for updating and creation of exclusion lists?

5 / 60

Select 3 licensing changes that were introduced in the Now Platform for the IT Operations Management products.

6 / 60

Which ServiceNow release has introduced the possibility of migrating probes to patterns?

7 / 60

What does a process classifier do in Discovery?

8 / 60

______ and ______ are featured in the CI Schedule Manager. (choose 2 options)

9 / 60

There can be ______ CI Identifier(s) configured per CI Class.

10 / 60

Which choice best describes how to use a Behavior for discovery?

11 / 60

Scripts deployed by ACC-V to gather information are written in ________?

12 / 60

Select 3 answers that are true about ACC-V.

13 / 60

Firewall Audits and Reporting gives ability to discover and take inventory of which 3 possible choices?

14 / 60

In the Duplicate CI Remediator, which CI is to remain as an active CI while potentially retiring or removing rest of the duplicated CIs?

15 / 60

Certificate Inventory and Management allows Discovery to automatically scan for certificates on ____ default pre-authorized ports.

16 / 60

Which property in ServiceNow Discovery defines the maximum overall payload size for the payload of results that come from patterns?

17 / 60

Given the below list of KPI:

  1. Correctness
  2. Compliance
  3. Completeness
  4. Classification

And following Metrics:

  1. A. Is not a CMDB Health KPI
  2. B. Orphan, Duplicate, Staleness
  3. C. Audit
  4. D. Required, Recommended

Which set of following pairs displays only correct matches?

18 / 60

Which of the following does ITOM Visibility use to perform initial analysis of discovered processes and suggest applications that you might want to discover?

19 / 60

What results from the absence of a reliable CMDB?

20 / 60

The MID Server needs ______ to collect vCenter events.

21 / 60

In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)

22 / 60

What is the purpose of adding indexes to Discovery tables in ITOM Visibility?

23 / 60

What does it mean if the icon next to the Version of a MID Server is yellow?

24 / 60

What is the benefit of using the Agent Client Collector for Visibility in ITOM Visibility?

25 / 60

After navigating to an Automaton Error Messages list from Discovery > Home, how are the options on the right navigation pane categorized? (Choose two.)

26 / 60

The credential alias is now supported for _________ and _________.

27 / 60

What is the purpose of the exploration phase in Discovery?

28 / 60

Identification process is the process of ______ .

29 / 60

Which of the following choices would be best practice when designing steps with operations requiring variables?

30 / 60

What is the alternative to pattern-based discovery for discovering Kubernetes clusters in ITOM Visibility?

31 / 60

What are the 4 stages of Discovery?

32 / 60

What pattern operation allows the transfer of a file from the MID Server to a target?

33 / 60

Discovery is cancelled and an error is logged if the total number of excluded IP addresses is ______ before a Discovery schedule is run.

34 / 60

What has to be enabled to make Network loopback adapters discoverable on SNMP devices using probes or patterns?

35 / 60

During the Discovery process, what determines if an Asset record is created?

36 / 60

_______ is used to enhance performance when classifying a device in ServiceNow Discovery.

37 / 60

Among the following fields ______ , ______ and ______ are editable from a Merge Table pattern operation. (choose 3 options)

38 / 60

For the below data source example Discovery sets the name attribute of a discovered Windows Server CI to "Win1". Then Altiris discovery runs and detects "Win2" for the same CI name attribute.

Data Source Precedences example:

  1. ServiceNow: Applies to = cmdb_ci_win_server, Order = 100, Active = true
  2. Altris: Applies to = cmdb_ci_win_server, Order = 300, Active = true OpenView:
  3. Applies to = cmdb_ci_win_server, Order = 200. Active = true

Which choice best describes what would happen?

39 / 60

What are process handlers used for in Discovery?

40 / 60

When is the Extension section in a horizontal pattern executed?

41 / 60

Discovery scanned 10,000 IP addresses using a single MID Server. If discovery created 10 Shazzam probes and each probe scanned 1000 IP addresses, then ________ is set to 1000.

42 / 60

Duplicated CIs have been detected during Identification and Reconciliation phase. In such a case the default action would be to ______ .

43 / 60

Which of the following choices must be installed on a MID Server to run Credential-less Discovery?

44 / 60

Why is it important to use Azure change processing in ITOM Visibility?

45 / 60

How can the Microsoft Azure alert service be configured in ITOM Visibility?

46 / 60

Amazon Web Service resource module _____ is used to specify the parameters for the AssumeRole call.

47 / 60

ACC-V is an additional option to run discovery and is alternative to ______.

48 / 60

What is the name of the default Windows directory used by all Windows probes for enhanced performance?

49 / 60

Shazzam probe performance optimization uses ______ instead of chunking for managing and distributing its workload.

50 / 60

One method for deleting specific CIs not discovered in 30 days is:

51 / 60

A new tile on Discovery home page displays the result of ______ Discovery.

52 / 60

What is the difference between legacy event-driven discovery and the new Azure change processing in ITOM Visibility?

53 / 60

Which of the below choices are the most probable results of the following image? (Choose 2)

54 / 60

What is the purpose of using running process filters in ITOM Visibility?

55 / 60

To monitor the health of your application services and make changes, you can use _____ dashboard

56 / 60

Which method is used by Discovery to determine if a Host IP is active or alive?

57 / 60

What is the purpose of the ServiceNow® ITOM Visibility application?

58 / 60

Which feature may be used to reduce noise from connections that are traffic-based?

59 / 60

_____ can be used to automatically classify and categorize discovered running processes and provide suggestions for pattern developers.

60 / 60

If you discovered at least one application service via traffic-based discovery before Quebec, which would be disabled by default in Rome?

Your score is

The average score is 70%

0%

Total Views: 1287

No responses yet

Leave a Reply

Your email address will not be published. Required fields are marked *