Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CIS-SM PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CIS-SM PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certified Implementation Specialist - Service Mapping
  • Last Update: Sep 15, 2025
  • Questions and Answers: 106
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CIS-SM Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CIS-SM Practice Exam Questions with Answers Certified Implementation Specialist - Service Mapping Certification

Question # 6

In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?

A.

Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed.

B.

Identification Sections are executed randomly and the data gathered by the successful sections are merged.

C.

Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used.

D.

Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase.

Full Access
Question # 7

Which feature allows an administrator to efficiently collect multiple CIs against a single host?

A.

Discovery Schedules

B.

Quick Discovery

C.

Probe

D.

Pattern

Full Access
Question # 8

Which one of the following is the most common risk that can negatively impact a Service Mapping

engagement?

A.

The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance.

B.

MID server resource requirements are beyond capacity of the customer.

C.

Customer security team is not made aware early enough in the engagement of the credential requirements.

D.

Customer is not using Active Directory for credential authentication.

Full Access
Question # 9

Which one of the following is the output returned from the following Linux command?

ls /*.xml

A.

A list of all XML files on the file system

B.

A list of all XML files in the current directory and all subdirectories

C.

The command syntax is invalid

D.

A list of all XML files in the current directory

Full Access
Question # 10

When building a Discovery Pattern, which one of the following operations results in a termination of the Identification or Connection Section if a condition is not met?

A.

Set Parameter Value

B.

Merge Table

C.

Filter Table

D.

Match

Full Access
Question # 11

Which file on the MID Server is configured with the customer's ServiceNow instance URL?

A.

config.xml

B.

config.json

C.

wrapper.conf

D.

server.xml

Full Access
Question # 12

What are the roles of the Application Service Readiness Dashboard in ML-powered Service Mapping?

Choose 2 answers

A.

To clearly display the detailed mapping status of all discovered application services

B.

To list prerequisites and their readiness status for application service mapping

C.

To monitor the performance of all active scheduled jobs

D.

To configure Predictive Intelligence plugins and ADME probes

Full Access
Question # 13

During ServiceNow Discovery, which one of the following protocols is used to extract data from printers?

A.

WMI

B.

PowerShell

C.

SSH

D.

SNMP

Full Access
Question # 14

Which one of the following platforms is a MID Server most commonly installed on?

A.

Windows Server

B.

UNIX Server

C.

Network Device

D.

ESX Server

Full Access
Question # 15

In the following image, the 5x next to Citrix XenA represents which one of the following?

CIS-SM question answer

A.

Five errors while identifying the CI

B.

Five discovery executions on the CI

C.

Five members of a cluster

D.

Five outgoing connections from the cluster

Full Access
Question # 16

When using a Delimited Text Parsing Strategy, what delimiter and position will parse 2014 from the string?

2014/02/07-17:49:36

A.

Delimiter of space and position 1

B.

Delimiter of / and position 0

C.

Delimiter of / and position of 1

D.

Delimiter of 2014 and position 1

Full Access
Question # 17

Which one of the following represents what the MID stands for in MID Server?

A.

Monitoring, Integration, and Discovery

B.

Management, Integration, and Discovery

C.

Management, Instrumentation, and Discovery

D.

Monitoring, Instrumentation, and Discovery

E.

MID is not an acronym.

Full Access
Question # 18

The application stack is as follows: IIS Web Server with an inclusion connection to an IIS Virtual Directory, and an outbound connection from the IIS Virtual Directory to an MSSQL database.

Which describes the correct number of Discovery Pattern Identification and Connection Sections that evaluate to true when Service Mapping discovers a service with this application stack?

A.

3 Identification Sections and 2 Connection Sections

B.

2 Identification Sections and 1 Connection Section

C.

2 Identification Sections and 2 Connection Sections

D.

3 Identification Sections and 1 Connection Section

Full Access
Question # 19

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?

A.

Reclassification Tasks

B.

Identification Rules

C.

Datasource Precedence Rules

D.

Reconciliation Rules

Full Access
Question # 20

Assuming Reconciliation Rules (Reconciliation Definitions) were configured exactly the same for both Data Sources, ServiceNow and ServiceWatch, for the Application [cmdb_ci_appl] table and the following Data Source Precedence Rules are configured.

CIS-SM question answer

Which one of the following is true?

A.

If an Application CI is discovered with a Data Source, ServiceNow, then if the same Application CI is discovered by the Data Source, Altiris, an update will be allowed.

B.

If an Application CI is discovered with a Data Source, ServiceWatch, then if the same Application CI is discovered by the Data Source, ServiceNow, an update will be allowed.

C.

If an Application CI is discovered with a Data Source, ServiceNow, then if the same Application CI is discovered by the Data Source, ServiceWatch, an update will be allowed.

D.

If an Application CI is discovered with a Data Source, ServiceWatch, then if the same Application CI is discovered by the Data Source, Altiris, an update will be allowed.

Full Access
Question # 21

In the image, which one of the following best describes the lower icons?

CIS-SM question answer

A.

The connections from HAProxy are to other CIs that had errors during discovery.

B.

The connections from HAProxy are application clusters.

C.

The connections from HAProxy could not be identified and are marked as a Generic Application.

D.

The connections from HAProxy are marked as boundaries.

Full Access
Question # 22

Which one of the following is true for variables defined in an Identification Section?

A.

Identification Section variables can also be used in all other Identification Sections in any pattern.

B.

Identification Section variables can also be used in Parent CI Types.

C.

Identification Section variables can also be used in all other Identification Sections in the same pattern.

D.

Identification Section variables can also be used in Connection Sections for any pattern.

E.

Identification Section variables can also be used in Connection Sections for the same pattern.

Full Access
Question # 23

During Service Mapping discovery, which one of the following is used to uniquely identify a configuration item to determine updates or inserts into the CMDB?

A.

Identification Rules

B.

Reconciliation Rules

C.

Coalesce Values

D.

Reconciliation Keys

Full Access
Question # 24

Given the CMDB class structure shown, which types of Configuration Items (CIs) will be included in a report run against the Server [cmdb_ci_server] table?

CIS-SM question answer

A.

CIs defined directly in Server [cmdb_ci_server] table and all parent classes

B.

CIs defined directly in Server [cmdb_ci_server] table and all child classes

C.

CIs defined directly in the Server [cmdb_ci_server] table

Full Access
Question # 25

In ServiceNow Discovery, which one of the following phases is the server RAM value discovered?

A.

Port scan

B.

Classification

C.

Classification and Identification

D.

Identification and Exploration

Full Access
Question # 26

Which one of the following describes when the MID Server config.xml file is read and used?

A.

Config.xml file updated and saved

B.

Config.xml file created and saved

C.

MID Server application stop

D.

MID Server application start

Full Access
Question # 27

In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?

A.

The host will be deleted in the CMDB and a new host record will be created during Service Mapping discovery.

B.

The host will be immediately rediscovered, but only the changes will be updated in the CMDB during Service Mapping discovery.

C.

The host will be immediately rediscovered and updated in the CMDB during Service Mapping discovery.

D.

The host will not be rediscovered during Service Mapping discovery.

Full Access
Question # 28

What component does Apache Tomcat represent in the following top-down topology?

Cisco ACE ? Apache Tomcat cluster ? JBoss cluster ? Oracle database

A.

Authentication provider

B.

The function of the Apache Tomcat in this example is not conclusive

C.

Monitoring server

D.

Web server

Full Access
Question # 29

Using Pattern Designer, when configuring the first step in an Identification Section, which one of the following is considered a good practice?

A.

Create a table for the process parameters

B.

Check if connectivity variables are defined

C.

Use a Parse file operation to extract necessary information from a configuration file

D.

Use a Match operation on the process executable or command variable

Full Access
Question # 30

In Service Mapping, which one of the following must be available or created in advance, in order to be able to create a Discovery Pattern?

A.

Process Classifier

B.

Identification Rule

C.

CI Type/Table

D.

Application Service

Full Access
Question # 31

Within the CMDB, all application CI Types/Classes are children of which parent class?

A.

Database Instance [cmdb_ci_db_instance]

B.

Software [cmdb_ci_software]

C.

Installed Software [cmdb_ci_installed_software]

D.

Application [cmdb_ci_appl]

E.

Licenses [cmdb_ci_license]

Full Access