ServiceNow CIS - Discovery -1

 1. A MID Server reached three Windows Server machines. All of them have the same login credentials but different IP addresses:


10.100.1.11

10.100.1.22

10.100.1.33

One more Windows Server machine has been found by the MID Server but it has different login credentials and its IP address is 10.100.1.44.


Given that during discovery two different Discovery Credential records were created, one for the 10.100.1.11 server and the other for the 10.100.1.44 server.


Which scenario is the most likely for servers 10.100.1.22 and 10.100.1.33?

- Both 10.100.1.22 and 10.100.1.33 will be inaccessible by Discovery.

- Both 10.100.1.22 and 100.100.1.33 will have a credential affinity with 10.100.1.44 credentials

- Both 10.100.1.22 and 10.100.1.33 require their own credentials records.

- Both 10.100.1.22 and 10.100.1.33 will have a credential affinity with the 10.100.1.11 server credentials.


2. Choose 3 most accurate descriptions of ServiceNow Discovery.

- It identifies IP-enabled configuration items (CIs) and maps dependencies between them then creates and maintains them in  the serviceNow configuration Management Database (CMDB).

- It is an extensive platform capable of tracking and documenting all commitments between service providers, IT services, and customers.

- It allows users to create an up-to-date, accurate single system of record for IT infrastructure. Both in public clouds and on-premises.

- It is a fundamental ingredient in a solution for eliminating service outages.


3. During which of the following phases a file-based Discovery is triggered?

- Pattern

- Scan

- Identification

- Classify 

- Exploration


4. Port Probe classification priority is specified in the ______ .

- Port probes module

- Classifier

- IP services module

- Scanner field


5. In a pattern operation, to correctly call the value of the execDir variable from tabular process variable, we should use ________ .

- $process.execDir

- "process_execDir"

- $process_execDir

- process (execDir)


6. Select credentials permission level, recommended for Windows Servers discovery.

- User with root access

- Domain user with local administrator access

- User with read access

- Community string with read access


7. ______ is the best suited person to fill the Credentials Table during a Discovery implementation.

- ServiceNow Consultant

- External Partner

- ServiceNow Technical Manager

- Customer


8. During CI reclassification, which 2 of the below operations are more likely to lead to data loss?

- Identifying

- Downgrading

- Upgrading

- Switching


9. One of the tiles available in Discovery⏵Home is Errors. Which categories will be visible after selecting this tile?

Choose 3 answers.

- Schedules

- Completeness

- Configuration

- Credentials

- Correctness

- Network


10. If an operating system is not discovered by the base installation of Discovery, which 2 of the following conditions would have to be met for a custom horizontal pattern to discover the system?

- Application Pattern Type should be selected.

- Process Strategy must be defined.

- Infrastructure Pattern Type should be selected

- CI Type should be selected.

1 comment:

Featured Post

How to configure field style of any fields