Pre-Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CIS-Discovery Exam Dumps - Certified Implementation Specialist - Discovery

Question # 4

Which of the following related lists can assist with troubleshooting discovery from a discovery status?

Choose 3 answers

A.

Discovery Log

B.

Running Processes

C.

ECC Queue

D.

Devices

Full Access
Question # 5

Which of the following best describes what may also be required when increasing the max number of threads for a MID Server?

A.

increase the amount of disk space on the MID Server host

B.

updating the acl rules for the CMDB tables in ServiceNow

C.

increasing the memory allocated to the MID Server app.

D.

increase the MID Server max payload size

Full Access
Question # 6

Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?

A.

Modify the default MIB information

B.

Enable SSH as a secondary protocol

C.

Use live devices in production

D.

Use the publish manufacturer’s device MIB

Full Access
Question # 7

Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?

A.

install.service-now.com

B.

docs.servicenow.com

C.

developer.service-now.com

D.

service-now.com

Full Access
Question # 8

Which choice best describes how to use a Behavior for discovery?

A.

The MID Server selection method on a Discovery Schedule.

B.

The Behavior drop-down menu on a Discovery IP Range.

C.

The Behavior drop-down menu on a Discovery Status.

D.

The Behavior checkbox on a CI.

Full Access
Question # 9

The following shows part of the Windows OS - Servers pattern in Pattern Designer:

Which of the steps above use(s) a shared library?

A.

Step 26

B.

Neither step

C.

Step 25

D.

Both steps

Full Access
Question # 10

What would you see in the Discovery pattern log that you would not see in the ECC Queue?

A.

Success or failure of the individual pattern steps

B.

Payload of CI attributes and relationships

C.

Shazzam probe payload

D.

Relationships created

Full Access
Question # 11

Which of the following can be used in the Debug Identification Section in Debug Mode for an infrastructure pattern? (Choose two.)

A.

IP

B.

AWS Endpoint

C.

PID

D.

Host Name

Full Access
Question # 12

When designing steps with operations requiring variables, it is best practice to do what?

A.

hard core variables

B.

always use scalar variables

C.

query targets for variables

D.

design for a static environment

Full Access
Question # 13

Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)

A.

system

B.

computer_system

C.

process

D.

baseline

Full Access
Question # 14

Which choice best describes a Functionality Definition?

A.

Defines what CI identifiers to use.

B.

Defines the IP addresses to discover.

C.

Defines what Behavior to use from a Discovery Schedule.

D.

Defines what protocols to detect from within a Behavior.

Full Access
Question # 15

After navigating to an Automaton Error Messages list from Discovery > Home, how are the options on the right navigation pane categorized? (Choose two.)

A.

SELECT ALL

B.

SELECT ONE

C.

ACTION ON SELECTED

D.

ACTION ON ALL

Full Access
Question # 16

A discovery runs against a Windows Server returning the following attribute values for the first time:

name = WindowsSN1 serial_number = 12321

A subsequent discovery is ran against a different Windows Server returning the following attribute values: name = WindowsSN2

serial_number = 12321

With only base system CI Identifiers configured, which of the following is true?

A.

A Windows Server CI is created, then updated with WindowsSN2 as the name.

B.

Two Windows Sewer CIs are created, with WindowsSN1 AND WindowsSN2 for names.

C.

Two Windows Server CIs are created, without serial_number values.

D.

A Windows Server CI is created, then updated with WindowsSN1 as the name.

Full Access
Question # 17

Discovery finds and maps dependencies for the following types of storage devices. (Choose three.)

A.

Direct-attached storage (DAS)

B.

Network-attached storage (NAS)

C.

Storage area network (SAN)

D.

Multiple area network (MAN)

E.

Redundant Array of Independent Disks (RAID)

Full Access
Question # 18

When is the Extension section in a horizontal pattern executed?

A.

As part of the post sensor processing script

B.

After the Identification sections

C.

As part of the port scan

D.

Before the Identification sections

Full Access
Question # 19

Which of the below choices are possible options under ACTION ON ALL in the Recommended Actions pane for an Automated Error Messages list within Discovery > Home?

Choose 2 answers

A.

Make Ranges

B.

View instructions

C.

Ping IP Addresses

D.

Retry Discovery

Full Access
Question # 20

Which choice represents the three best ways of extending Discovery?

A.

Orchestration, Classifiers, Discovery Patterns

B.

Fingerprinting, Classifiers, Discovery Patterns

C.

Orchestration, Classifiers, Probes & Sensors

D.

Classifiers, Probes & Sensors, Discovery Patterns

E.

Classifiers, Fingerprinting, Probes & Sensors

Full Access
Question # 21

Which of the following must be configured to allow a MID Server to access servers using WinRM?

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Full Access
Question # 22

Which choice best describes a horizontal discovery pattern?

A.

Steps that execute operations

B.

Credential depot

C.

Port scanning tool

D.

Classifiers that execute probes

Full Access
Question # 23

Which best describes Discovery schedule of type Configuration Item?

A.

Verifies Configuration Item data from the scanned IP ranges against the data in the CMDB.

B.

Creates only a list of discovered IPs in both IPv4 and IPv6 formats.

C.

Collects complete information from the scanned IP ranges and sends it to the CMDB.

D.

Directly populates records in the assets table.

Full Access
Question # 24

What operation is shown in this image? (has image took pic)

A.

Transform Table

B.

Put File

C.

Union Table

D.

Parse Variable

Full Access
Question # 25

If the WMI service is not running on a host, it will prevent the discovery of which devices?

A.

Network

B.

Windows

C.

Storage

D.

Unix

Full Access
Question # 26

Which of the following choices must be installed on a MID Server to run Credential-less Discovery?

A.

Credential-less Extension

B.

Nmap

C.

Advanced IP Scanner

D.

Defender

Full Access
Question # 27

The CMDB contains which of the following record types? (Choose two.)

A.

Model

B.

Configuration Item (CI)

C.

Asset

D.

Relation Type

Full Access
Question # 28

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Full Access
Question # 29

For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?

A.

Hash tag

B.

Brackets

C.

Quotes

D.

Dollar sign

Full Access
Question # 30

Which choice best describes a horizontal discovery pattern?

A.

Classifiers that execute probes

B.

Steps that execute operations

C.

Credential depot

D.

Port scanning tool

Full Access
Question # 31

What is the recommended method for excluding specific software from discovery on Windows and Unix Servers?

A.

Pattom Modification

B.

Probe Modification

C.

Configuration Console

D.

Discovery Properties

Full Access
Question # 32

During the Discovery process, what determines if an Asset record is created?

A.

CMDB

B.

Model Category

C.

Model Product

D.

ECC Queue

E.

Configuration Item

Full Access
Question # 33

What are the two main options within a Parse File operation?

A.

Discover Now and Quick Discovery

B.

Select Operating System and Method

C.

Select File and Define Parsing

D.

Match and Select File

Full Access