Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CIS-Discovery PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CIS-Discovery PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certified Implementation Specialist - Discovery
  • Last Update: Apr 26, 2024
  • Questions and Answers: 113
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CIS-Discovery Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CIS-Discovery Practice Exam Questions with Answers Certified Implementation Specialist - Discovery Certification

Question # 6

The following shows part of the Windows OS - Servers pattern in Pattern Designer:

CIS-Discovery question answer

Which of the steps above use(s) a shared library?

A.

Step 26

B.

Neither step

C.

Step 25

D.

Both steps

Full Access
Question # 7

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Full Access
Question # 8

What are the main KPIs for CMDB Health scorecard?

Choose 3 answers

A.

Correctness

B.

Completeness

C.

Staleness

D.

Compliance

E.

Duplicates

Full Access
Question # 9

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Full Access
Question # 10

Which of the following are contained in an extension section of a discovery pattern?

A.

Connection sections

B.

Network libraries

C.

Identification sections

D.

Shared libraries

Full Access
Question # 11

By default, which of the following are automatically available as variables for horizontal discovery patterns? (Choose two.)

A.

infrastructure_system

B.

The CI Type on the Discovery Pattern form

C.

windows_cmdb_ci

D.

computer_system

Full Access
Question # 12

Which method is used by Discovery to determine if a Host IP is active or alive?

A.

Port Scan

B.

Traceroute

C.

Ping

D.

Classification

Full Access
Question # 13

Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)

A.

Create an Engaging User Experience

B.

Build New Apps Fast

C.

Manage Hybrid Clouds

D.

Proactively Eliminate Service Outages

Full Access
Question # 14

In a pattern operation, which of the following correctly calls the value of the executableDir variable from the tabular process variable?

A.

process(executableDir)

B.

"process_executableDir"

C.

$process_executableDir

D.

$process.executableDir

Full Access
Question # 15

Which of the following related lists can assist with troubleshooting discovery from a discovery status?

Choose 3 answers

A.

Discovery Log

B.

Running Processes

C.

ECC Queue

D.

Devices

Full Access
Question # 16

File-based Discovery is triggered during the .

A.

Classify Phase

B.

Scan Phase

C.

Exploration Phase

D.

Pattern Phase

E.

Identification Phase

Full Access
Question # 17

One method for deleting specific CIs not discovered in 30 days is:

A.

Scheduled Job

B.

UI Policy

C.

Service Mapping

D.

Data Policy

Full Access
Question # 18

Which of the following must be configured to allow a MID Server to access servers using WinRM?

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Full Access
Question # 19

What do most Discovery properties start with?

A.

discovery.prop

B.

glide.discovery

C.

disco.release

D.

glide.itom

Full Access
Question # 20

Which operation is used to change from the default credentials to any other appropriate credentials in a horizontal pattern?

A.

Change credentials

B.

Change user

C.

Alternate credentials

D.

Alternate user

Full Access
Question # 21

Which of the choices provides active discovery errors with a help link for each error?

A.

Discovery Dashboard

B.

IP Address Failure Report

C.

Discovery Schedule

D.

MID Server Dashboard

Full Access
Question # 22

The deletion strategy is set to 'Mark as absent' for related Disk Cls discovered via the Linux Server pattern. If a related Disk Cl is discovered during the Linux Server discovery and then the same related Disk CI is not found the next time the Linux Server is discovered, the following will happen:

A.

The Linux Server CI Status (install_status) is set to Absent.

B.

The Disk Status CI (install_status) is set to Absent.

C.

The Disk CI Operational Status (operational_status) is set to Non-Operational.

D.

The Linux Server CI Operational Status (operational_status) is set to Non-Operational.

Full Access
Question # 23

Which of the following are the results of executing the WMI Query?

CIS-Discovery question answer

Choose 3 answers

A.

A scalar variable named 'PageFaults'.

B.

A tabular variable named 'more_process_info'.

C.

A scalar variable named 'PeakVirtualSize'.

D.

A tabular variable named 'Win32 Process'.

E.

A scalar variable named 'MaximumWorkingSetSize'.

F.

A tabular variable named 'WMI Query',

Full Access
Question # 24

What operation is shown in this image? (has image took pic)

A.

Transform Table

B.

Put File

C.

Union Table

D.

Parse Variable

Full Access
Question # 25

What does the MID Server need to collect vCenter events?

A.

vCenter Event Collector extension

B.

MID SNMP Trap Listener extension

C.

Firewall

D.

vCenter probes

Full Access
Question # 26

Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?

A.

Modify the default MIB information

B.

Enable SSH as a secondary protocol

C.

Use live devices in production

D.

Use the publish manufacturer’s device MIB

Full Access
Question # 27

What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.)

A.

CI Attributes

B.

Operations

C.

Temporary Variables

D.

CMDB Dashboard

Full Access
Question # 28

Which of the following describes the recommended permission level for credentials to discover Windows Servers?

A.

A domain user with local administrator access

B.

A userr00t access across the domain

C.

A domain administrator with sudo access

D.

A standard domain user with read access

Full Access
Question # 29

Which of the below choices are possible options under ACTION ON ALL in the Recommended Actions pane for an Automated Error Messages list within Discovery > Home?

Choose 2 answers

A.

Make Ranges

B.

View instructions

C.

Ping IP Addresses

D.

Retry Discovery

Full Access
Question # 30

Which of the below choices are the most probable results of the following image? (Choose three.)

CIS-Discovery question answer

A.

A tabular variable named ‘WMI Query’.

B.

A scalar variable named ‘MaximumWorkingSetSize’

C.

A scalar variable named ‘PageFaults’.

D.

A scalar variable named ‘PeakVirtualSize’.

E.

A tabular variable named ‘more_process_info’.

F.

A tabular variable named ‘Win32_Process’.

Full Access
Question # 31

When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?

A.

Local Admin

B.

Domain Admin

C.

MID Server User Role

D.

Log on as service

Full Access
Question # 32

A network device has both an SSH port and an SNMP port open. Discovery tries the SSH probe first and it fails. This triggers the SNMP probe, which succeeds. Discovery uses SNMP first for subsequent discoveries on that device.

What discovery functionality allows the above to happen?

A.

Classification

B.

Credential affinity

C.

MID Server affinity

D.

IP service affinity

Full Access