Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following choices are only used for the Application Pattern Type? (Choose two.)

A.

Run Order

B.

Identification Section

C.

CI Type

D.

Operating System

Full Access
Question # 5

A discovery runs against a Windows Server returning the following attribute values for the first time:

name = WindowsSN1 serial_number = 12321

A subsequent discovery is ran against a different Windows Server returning the following attribute values: name = WindowsSN2

serial_number = 12321

With only base system CI Identifiers configured, which of the following is true?

A.

A Windows Server CI is created, then updated with WindowsSN2 as the name.

B.

Two Windows Sewer CIs are created, with WindowsSN1 AND WindowsSN2 for names.

C.

Two Windows Server CIs are created, without serial_number values.

D.

A Windows Server CI is created, then updated with WindowsSN1 as the name.

Full Access
Question # 6

The CMDB contains which of the following record types? (Choose two.)

A.

Model

B.

Configuration Item (CI)

C.

Asset

D.

Relation Type

Full Access
Question # 7

When configuring the MID Server Service Settings, which of the following is not a valid MID Server name?

A.

mymidserverl

B.

mid.serverl

C.

midserverl

D.

mid serverl

Full Access
Question # 8

Which method for deleting specific CIs is not discovered in 30 days?

A.

Scheduled Job

B.

UI Policy

C.

Service Mapping

D.

Data Policy

Full Access
Question # 9

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

A.

Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.

B.

Discovery finds applications and devices on your network, Service Mapping monitors those devices.

C.

Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.

D.

Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

Full Access
Question # 10

Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?

A.

Modify the default MIB information

B.

Enable SSH as a secondary protocol

C.

Use live devices in production

D.

Use the publish manufacturer’s device MIB

Full Access
Question # 11

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Full Access
Question # 12

Which of the choices are types of temporary variables in a discovery pattern?

Choose 2 answers

A.

Scalar/List

B.

Command

C.

SQL statement

D.

Tabular/Table

Full Access
Question # 13

Which best describes Discovery schedule of type Configuration Item?

A.

Verifies Configuration Item data from the scanned IP ranges against the data in the CMDB.

B.

Creates only a list of discovered IPs in both IPv4 and IPv6 formats.

C.

Collects complete information from the scanned IP ranges and sends it to the CMDB.

D.

Directly populates records in the assets table.

Full Access
Question # 14

How do you create relationships between Cis in a horizontal pattern?

A.

By using the Create Relation/Reference operation.

B.

Relationships are created automatically for each successful connection section.

C.

Relationships cannot be created via patterns.

D.

By using the Create Connections operation.

Full Access
Question # 15

In a pattern operation, which of the following correctly calls the value of the executableDir variable from the tabular process variable?

A.

process(executableDir)

B.

"process_executableDir"

C.

$process_executableDir

D.

$process.executableDir

Full Access
Question # 16

Which choice best describes a horizontal discovery pattern?

A.

Classifiers that execute probes

B.

Steps that execute operations

C.

Credential depot

D.

Port scanning tool

Full Access
Question # 17

Which of the following best describes what may also be required when increasing the max number of threads for a MID Server?

A.

increase the amount of disk space on the MID Server host

B.

updating the acl rules for the CMDB tables in ServiceNow

C.

increasing the memory allocated to the MID Server app.

D.

increase the MID Server max payload size

Full Access
Question # 18

Which of the following MID Server Parameters cannot be modified through the platform UI?

A.

mid.ssh.session_timeout

B.

url

C.

mid.windows.management_protocol

D.

name

Full Access
Question # 19

Which choice best describes a Functionality Definition?

A.

Defines what CI identifiers to use.

B.

Defines the IP addresses to discover.

C.

Defines what Behavior to use from a Discovery Schedule.

D.

Defines what protocols to detect from within a Behavior.

Full Access
Question # 20

What is the recommended method for excluding specific software from discovery on Windows and Unix Servers?

A.

Pattom Modification

B.

Probe Modification

C.

Configuration Console

D.

Discovery Properties

Full Access
Question # 21

What are the main KPIs for CMDB Health scorecard?

Choose 3 answers

A.

Correctness

B.

Completeness

C.

Staleness

D.

Compliance

E.

Duplicates

Full Access
Question # 22

Which choice best describes a horizontal discovery pattern?

A.

Steps that execute operations

B.

Credential depot

C.

Port scanning tool

D.

Classifiers that execute probes

Full Access
Question # 23

When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?

A.

Local Admin

B.

Domain Admin

C.

MID Server User Role

D.

Log on as service

Full Access
Question # 24

Discovery finds and maps dependencies for the following types of storage devices. (Choose three.)

A.

Direct-attached storage (DAS)

B.

Network-attached storage (NAS)

C.

Storage area network (SAN)

D.

Multiple area network (MAN)

E.

Redundant Array of Independent Disks (RAID)

Full Access
Question # 25

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Full Access
Question # 26

Which choices best describe what is necessary to create a custom horizontal pattern to discover an operating system that is not discovered by the base installation patterns? (Choose two.)

A.

Select a CI Type

B.

Define Process Strategy

C.

Select Infrastructure Pattern Type

D.

Select Application Pattern Type

Full Access
Question # 27

Based on this image, which of the following statements are true? (Choose three.)

A.

Attributes from two tables populate a table with the same name as a ServiceNow CMDB table.

B.

This operation is more than likely a part of a step on a pattern set to Application Pattern Type.

C.

If a value is unmatched, it is still merged into the Target Table.

D.

For this operation to run, there must be some data in the process.executablePath variable.

E.

This is a horizontal pattern of type "infrastructure."

Full Access
Question # 28

During the Port Scan phase what could the Warning level error "No results returned from probe." mean?

A.

Process Classifier incorrectly configured

B.

Logical or physical firewall preventing connectivity

C.

Wrong credentials

D.

Incorrect Datasource Precedence

Full Access
Question # 29

File-based Discovery is triggered during the .

A.

Classify Phase

B.

Scan Phase

C.

Exploration Phase

D.

Pattern Phase

E.

Identification Phase

Full Access
Question # 30

Which of the following does the ECC Queue provide? (Choose two.)

A.

Login credentials for the MID Server host.

B.

The actual XML payload that is sent to or from an instance.

C.

A connected flow of probe and sensor activity.

D.

The process responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services.

Full Access
Question # 31

Which choice will populate the Location field for a discovered CI?

A.

Location field for a Discovery Schedule

B.

Location field for a parent CI Type

C.

Location field for a Port Probe

D.

Location report from the Discovery Dashboard

Full Access
Question # 32

In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)

A.

Global CI types

B.

Main pattern CI type

C.

Related CI types

D.

All CI types

Full Access
Question # 33

If the WMI service is not running on a host, it will prevent the discovery of which devices?

A.

Network

B.

Windows

C.

Storage

D.

Unix

Full Access