Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CIS-Discovery PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CIS-Discovery PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certified Implementation Specialist - Discovery
  • Last Update: Sep 12, 2025
  • Questions and Answers: 125
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CIS-Discovery Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CIS-Discovery Practice Exam Questions with Answers Certified Implementation Specialist - Discovery Certification

Question # 6

What is the recommended method of consolidating duplicate CIs?

A.

Duplicate CI Remediator

B.

Event CI Remediation

C.

Ignore Duplicate CI

D.

Manual CI Remediation

Full Access
Question # 7

For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?

A.

Hash tag

B.

Brackets

C.

Quotes

D.

Dollar sign

Full Access
Question # 8

In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)

A.

Global CI types

B.

Main pattern CI type

C.

Related CI types

D.

All CI types

Full Access
Question # 9

What are the two main options within a Parse File operation?

A.

Discover Now and Quick Discovery

B.

Select Operating System and Method

C.

Select File and Define Parsing

D.

Match and Select File

Full Access
Question # 10

Which selections are necessary to create a custom horizontal pattern to discover a computer operating system?

A.

CI type

B.

Application Pattern Type

C.

Infrastructure Pattern Type

D.

Process Strategy Type

Full Access
Question # 11

Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.)

A.

Tomcat does not extend the Application Server table

B.

Tomcat table extends the Application Server table

C.

Tomcat table is a child of the Application Server table

D.

Tomcat table is a parent of the Application Server table

Full Access
Question # 12

For what is File Based Discovery used?

A.

To discover the checksum of a file and store it to track for changes

B.

To discover the contents of flat files such as configuration files

C.

To discover that file names conform to a defined naming standard

D.

To discover file paths to recognize the signature of installed software

Full Access
Question # 13

Which of the following does the ECC Queue provide? (Choose two.)

A.

Login credentials for the MID Server host.

B.

The actual XML payload that is sent to or from an instance.

C.

A connected flow of probe and sensor activity.

D.

The process responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services.

Full Access
Question # 14

Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)

A.

JEA Properties set to True

B.

MID Servers must be configured as a trusted source with DNS

C.

MID Servers need to be added to the WinRM Group policy on the Servers

D.

MID Server Parameters Add WinRM

Full Access
Question # 15

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

A.

The next discovery is stopped for the CI that is duplicated.

B.

Each set of duplicate CIs is added to a de-duplication task.

C.

A notification is sent to the CI owner.

D.

An association identification rule is created automatically.

Full Access
Question # 16

Which choice best describes a horizontal discovery pattern?

A.

Classifiers that execute probes

B.

Steps that execute operations

C.

Credential depot

D.

Port scanning tool

Full Access
Question # 17

For the Parse Variable pattern operation, what is required to have two different parsing methods to populate variables?

A.

Two different Debug Mode sessions.

B.

A tabular and a scalar variable.

C.

Two different steps.

D.

Two different Define Parsing selections on the same step.

Full Access
Question # 18

Which of the choices are types of temporary variables in a discovery pattern?

Choose 2 answers

A.

Scalar/List

B.

Command

C.

SQL statement

D.

Tabular/Table

Full Access
Question # 19

For CMDB Health, relationships can be which of the following choices? (Choose three.)

A.

Duplicate

B.

Stale

C.

Orphan

D.

Required

E.

Recommended

Full Access
Question # 20

Which of the following best describes what may also be required when increasing the max number of threads for a MID Server?

A.

increase the amount of disk space on the MID Server host

B.

updating the acl rules for the CMDB tables in ServiceNow

C.

increasing the memory allocated to the MID Server app.

D.

increase the MID Server max payload size

Full Access
Question # 21

For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging value?

A.

Quotes

B.

Brackets

C.

Dollar sign

D.

Hash tag

Full Access
Question # 22

Which of the following choices must be installed on a MID Server to run Credential-less Discovery?

A.

Credential-less Extension

B.

Nmap

C.

Advanced IP Scanner

D.

Defender

Full Access
Question # 23

What is the default thread count for a MID Server?

A.

5

B.

1

C.

50

D.

25

Full Access
Question # 24

Which of the below choices are benefits of Tracked Configuration Files?

A.

No credentials needed

B.

Content version comparison

C.

Files tracked as CIs

D.

Unwanted files removed from target

Full Access
Question # 25

The CMDB contains which of the following record types? (Choose two.)

A.

Model

B.

Configuration Item (CI)

C.

Asset

D.

Relation Type

Full Access
Question # 26

What pattern operation allows the transfer of a file from the MID Server to a target?

A.

Parse file

B.

Create Connection

C.

Put file

D.

Manage Attachments

Full Access
Question # 27

Which of the following are contained in an extension section of a discovery pattern?

A.

Connection sections

B.

Network libraries

C.

Identification sections

D.

Shared libraries

Full Access
Question # 28

What entry point type must a horizontal pattern have to execute from a process classifier?

A.

A subnet entry point type.

B.

HTTP(S) entry point type if the pattern is running on a web server application.

C.

TCP entry point type or ALL entry point type.

D.

It does not matter, it is triggered for all entry point types.

Full Access
Question # 29

From the Discovery Status record, which of the following does a Device record contain?

A.

contains a link to the discovered Cl

B.

the contents of the discovered Cl

C.

contains a link to the discovered Asset

D.

the CMDB Health Dashboard link

Full Access
Question # 30

Which of the following can be used in the Debug Identification Section in Debug Mode for an infrastructure pattern? (Choose two.)

A.

IP

B.

AWS Endpoint

C.

PID

D.

Host Name

Full Access
Question # 31

What would you see in the Discovery pattern log that you would not see in the ECC Queue?

A.

Success or failure of the individual pattern steps

B.

Payload of CI attributes and relationships

C.

Shazzam probe payload

D.

Relationships created

Full Access
Question # 32

Which of the following must be configured to allow a MID Server to access servers using WinRM?

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Full Access
Question # 33

Which service needs to be running on a host to detect a Windows device?

    WMI

    SSH

A.

WinRM

B.

CIM

Full Access
Question # 34

Which of the following pattern operations query targets? (Choose two.)

A.

WMI Query

B.

Merge Table

C.

Get Process

D.

Parse Variable

Full Access
Question # 35

Which of the following MID Server Parameters cannot be modified through the platform UI?

A.

mid.ssh.session_timeout

B.

url

C.

mid.windows.management_protocol

D.

name

Full Access
Question # 36

With multiple CI data sources, which choice is the best for determining which source can update a CI attribute?

A.

Business Rules

B.

Data Certification

C.

Transform Maps

D.

Reconciliation Rules

Full Access
Question # 37

Which choices are necessary to launch any pattern?(Choose two.)

A.

CI Classification

B.

CI Serial Number Attribute

C.

Data Certification

D.

CI Type

Full Access