Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CIS-Discovery Sample Questions Answers

Questions 4

In a pattern operation, which of the following correctly calls the value of the executableDir variable from the tabular process variable?

Options:

A.

process(executableDir)

B.

"process_executableDir"

C.

$process_executableDir

D.

$process.executableDir

Buy Now
Questions 5

Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)

Options:

A.

system

B.

computer_system

C.

process

D.

baseline

Buy Now
Questions 6

For what is File Based Discovery used?

Options:

A.

To discover the checksum of a file and store it to track for changes

B.

To discover the contents of flat files such as configuration files

C.

To discover that file names conform to a defined naming standard

D.

To discover file paths to recognize the signature of installed software

Buy Now
Questions 7

One method for deleting specific CIs not discovered in 30 days is:

Options:

A.

Scheduled Job

B.

UI Policy

C.

Service Mapping

D.

Data Policy

Buy Now
Questions 8

Which of the following does the ECC Queue provide? (Choose two.)

Options:

A.

Login credentials for the MID Server host.

B.

The actual XML payload that is sent to or from an instance.

C.

A connected flow of probe and sensor activity.

D.

The process responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services.

Buy Now
Questions 9

From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.)

Options:

A.

Test

B.

Table

C.

Scalar

D.

CI Type

Buy Now
Questions 10

Based on the image, which of the following is true?

Value $name_details[1].exec_info+"-"+$process.executableDir

Options:

A.

There is a tabular varlable named 'name_details'.

B.

This is from a WMI query operation step.

C.

There is a scalar varlable labeled '1'.

D.

This Value cannot be used in a pattem step.

Buy Now
Questions 11

Which of the below choices are the most probable results of the following image? (Choose three.)

Options:

A.

A tabular variable named ‘WMI Query’.

B.

A scalar variable named ‘MaximumWorkingSetSize’

C.

A scalar variable named ‘PageFaults’.

D.

A scalar variable named ‘PeakVirtualSize’.

E.

A tabular variable named ‘more_process_info’.

F.

A tabular variable named ‘Win32_Process’.

Buy Now
Questions 12

If the WMI service is not running on a host, it will prevent the discovery of which devices?

Options:

A.

Network

B.

Windows

C.

Storage

D.

Unix

Buy Now
Questions 13

In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)

Options:

A.

Global CI types

B.

Main pattern CI type

C.

Related CI types

D.

All CI types

Buy Now
Questions 14

Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)

Options:

A.

JEA Properties set to True

B.

MID Servers must be configured as a trusted source with DNS

C.

MID Servers need to be added to the WinRM Group policy on the Servers

D.

MID Server Parameters Add WinRM

Buy Now
Questions 15

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

Options:

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Buy Now
Questions 16

The deletion strategy is set to 'Mark as absent' for related Disk Cls discovered via the Linux Server pattern. If a related Disk Cl is discovered during the Linux Server discovery and then the same related Disk CI is not found the next time the Linux Server is discovered, the following will happen:

Options:

A.

The Linux Server CI Status (install_status) is set to Absent.

B.

The Disk Status CI (install_status) is set to Absent.

C.

The Disk CI Operational Status (operational_status) is set to Non-Operational.

D.

The Linux Server CI Operational Status (operational_status) is set to Non-Operational.

Buy Now
Questions 17

In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)

Options:

A.

tcp to udp

B.

application to application

C.

mid server to target

D.

host to application

Buy Now
Questions 18

Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?

Options:

A.

Modify the default MIB information

B.

Enable SSH as a secondary protocol

C.

Use live devices in production

D.

Use the publish manufacturer’s device MIB

Buy Now
Questions 19

Which operation is used to change from the default credentials to any other appropriate credentials in a horizontal pattern?

Options:

A.

Change credentials

B.

Change user

C.

Alternate credentials

D.

Alternate user

Buy Now
Questions 20

Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.)

Options:

A.

Create an Engaging User Experience

B.

Build New Apps Fast

C.

Manage Hybrid Clouds

D.

Proactively Eliminate Service Outages

Buy Now
Questions 21

Based on the following image, which of the following choices is also true about London Linux Servers?

Options:

A.

It is a CMDB Group with Dashboard Group type.

B.

It is a CMDB Group with Health Group type.

C.

It is a Datacenter Group in London.

D.

It is a CMDB Group with Default Group type.

Buy Now
Questions 22

Which best describes Discovery schedule of type Configuration Item?

Options:

A.

Verifies Configuration Item data from the scanned IP ranges against the data in the CMDB.

B.

Creates only a list of discovered IPs in both IPv4 and IPv6 formats.

C.

Collects complete information from the scanned IP ranges and sends it to the CMDB.

D.

Directly populates records in the assets table.

Buy Now
Questions 23

In Discovery, what table associates an IP address and a credential?

Options:

A.

Credential Affinity

B.

Service Affinity

C.

Service CI Association

D.

Tags

Buy Now
Questions 24

After navigating to an Automaton Error Messages list from Discovery > Home, how are the options on the right navigation pane categorized? (Choose two.)

Options:

A.

SELECT ALL

B.

SELECT ONE

C.

ACTION ON SELECTED

D.

ACTION ON ALL

Buy Now
Questions 25

Which of the following pattern operations query targets? (Choose two.)

Options:

A.

WMI Query

B.

Merge Table

C.

Get Process

D.

Parse Variable

Buy Now
Questions 26

Which choice represents the three best ways of extending Discovery?

Options:

A.

Orchestration, Classifiers, Discovery Patterns

B.

Fingerprinting, Classifiers, Discovery Patterns

C.

Orchestration, Classifiers, Probes & Sensors

D.

Classifiers, Probes & Sensors, Discovery Patterns

E.

Classifiers, Fingerprinting, Probes & Sensors

Buy Now
Questions 27

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

Options:

A.

Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.

B.

Discovery finds applications and devices on your network, Service Mapping monitors those devices.

C.

Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.

D.

Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

Buy Now
Questions 28

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

Options:

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Buy Now
Questions 29

When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?

Options:

A.

Local Admin

B.

Domain Admin

C.

MID Server User Role

D.

Log on as service

Buy Now
Questions 30

Which of the below choices are kinds of variables used in discovery patterns? (Choose three.)

Options:

A.

CI attributes

B.

Prefix

C.

Temporary

D.

Fixed

E.

Global

Buy Now
Questions 31

Which of the following are the results of executing the WMI Query?

Choose 3 answers

Options:

A.

A scalar variable named 'PageFaults'.

B.

A tabular variable named 'more_process_info'.

C.

A scalar variable named 'PeakVirtualSize'.

D.

A tabular variable named 'Win32 Process'.

E.

A scalar variable named 'MaximumWorkingSetSize'.

F.

A tabular variable named 'WMI Query',

Buy Now
Questions 32

Which service needs to be running on a host to detect a Windows device?

  • WMI

  • SSH

Options:

A.

WinRM

B.

CIM

Buy Now
Questions 33

When is the Extension section in a horizontal pattern executed?

Options:

A.

As part of the post sensor processing script

B.

After the Identification sections

C.

As part of the port scan

D.

Before the Identification sections

Buy Now
Exam Code: CIS-Discovery
Exam Name: Certified Implementation Specialist - Discovery
Last Update: May 4, 2024
Questions: 113
$64  $159.99
$48  $119.99
$40  $99.99
buy now CIS-Discovery