DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

ServiceNow CIS-SM Exam Questions and Answers, Certified Implementation Specialist - Service Mapping | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
How many ServiceNow instances can one MID Server connect to?
A. Class Change
B. Class Upgrade
C. Class Switch
D. Class Downgrade
View answer
Correct Answer: A
Question #2
When running Service Mapping discovery, which of the following represents the root cause of the error? Failed to access target system. Access is denied
A. SSO authentication error
B. CLI permissions error
C. Applicative permissions error
D. Windows authentication error
View answer
Correct Answer: A
Question #3
When running Service Mapping discovery, which of the following represents the root cause of the error? “Failed to access target system. Access is denied”
A. SO authentication error
B. LI permissions error
C. pplicative permissions error
D. indows authentication error
View answer
Correct Answer: A
Question #4
Which one of the following is the most common risk that can negatively impact a Service Mapping engagement?
A. The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance
B. MID server resource requirements are beyond capacity of the customer
C. Customer security team is not made aware early enough in the engagement of the credential requirements
D. Customer is not using Active Directory for credential authentication
View answer
Correct Answer: A
Question #5
In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?
A. The host will be deleted in the CMDB and a new host record will be created during Service Mapping discovery
B. The host will be immediately rediscovered, but only the changes will be updated in the CMDB during Service Mapping discovery
C. The host will be immediately rediscovered and updated in the CMDB during Service Mapping discovery
D. The host will not be rediscovered during Service Mapping discovery
View answer
Correct Answer: B
Question #6
Which one of the following is true for variables defined in an Identification Section?
A. Identification Section variables can also be used in all other Identification Sections in any pattern
B. Identification Section variables can also be used in Connection Sections for any pattern
C. Identification Section variables can also be used in Parent CI Types
D. Identification Section variables can also be used in all other Identification Sections in the same pattern
E. Identification Section variables can also be used in Connection Sections for the same pattern
View answer
Correct Answer: D
Question #7
Which one of the following is a valid format when entering SSH Private Key credentials?
A. PEM
B. PGP
C. PDP
D. PMI
View answer
Correct Answer: A
Question #8
Which of the following reasons would a prospect consider purchasing ServiceNow Event Management? (Choose three.)
A. Determine impacted services from a given event/alert
B. Provide software deployment capabilities to patch problem infrastructure
C. Automatically generate incidents for certain classes of alerts
D. Provide state of the art monitoring capabilities across a wide array of different types of infrastructure
E. Consolidate events from disparate monitoring tools into a consolidated central system
View answer
Correct Answer: ABE
Question #9
Which of the following reasons would a prospect consider purchasing ServiceNow Event Management? (Choose three.)
A. etermine impacted services from a given event/alert
B. rovide software deployment capabilities to patch problem infrastructure
C. utomatically generate incidents for certain classes of alerts
D. rovide state of the art monitoring capabilities across a wide array of different types of infrastructure
E. onsolidate events from disparate monitoring tools into a consolidated central system
View answer
Correct Answer: ABE
Question #10
Which one of the following ECC Queue records contains the XML payload returned from the MID Server that will be processed by the ServiceNow instance?
A. nput, Pending
B. nput, Ready
C. utput, Pending
D. utput, Ready
View answer
Correct Answer: D
Question #11
Which of the following represents the skills needed that a Service Mapping administrator or implementer should have? (Choose four.)
A. Understanding of XML, Regex, Delimited text, and JSON
B. Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST
C. Scripting capabilities with respect to Unix and Windows commands
D. Intermediate or above Windows and Unix administration skills
E. Sufficient skills to build an enterprise web site
F. Understanding of relational database theory
View answer
Correct Answer: ABCD
Question #12
How many ServiceNow instances can one MID Server connect to?
A. 1
B. 5
C. Up to 255
D. Unlimited
View answer
Correct Answer: A
Question #13
Which one of the following best describes the definition of an Entry Point?
A. AA method by which a user interacts with a service or a CI interacts with another CI
B. BA type of communication taking place between applications
C. CA template of attributes that define a communication type between applications
D. DA Host::Hosted on relation between CIs
View answer
Correct Answer: A
Question #14
Which one of the following ServiceNow application KPIs would improve most as a direct result of having visibility to a service map created through Service Mapping?
A. Problem Management: Number of Incidents per Known Problem
B. Incident Management: Mean Time to Resolve
C. Event Management: Signal to Noise Ratio
D. Change Management: Number of Major Changes
View answer
Correct Answer: B
Question #15
In Service Mapping, which one of the following must be available or created in advance, in order to be able to create a Discovery Pattern?
A. rocess Classifier
B. dentification Rule
C. I Type/Table
D. pplication Service
View answer
Correct Answer: C
Question #16
In ServiceNow Discovery, which one of the following phases is the server RAM value discovered?
A. APort scan
B. BClassification
C. CClassification and Identification
D. DIdentification and Exploration
View answer
Correct Answer: C
Question #17
Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?
A. Reconciliation Rules
B. Identification Rules
C. Datasource Precedence Rules
D. Reclassification Tasks
View answer
Correct Answer: A
Question #18
Which of the following are potential benefits when implementing Service Mapping? (Choose four.)
A. Reduced ongoing service map maintenance effort as a result of automated map updates
B. Faster service issue resolution and reduced downtime due to better root cause analysis
C. Improved Software Asset Management capabilities
D. Reduction in effort to create service maps
E. Reduction in change related incidents due to improved service visibility during change planning
F. More accurate alerts from monitoring tools
View answer
Correct Answer: CDEF
Question #19
Which one of the following represents what the MID stands for in MID Server?
A. Monitoring, Integration, and Discoverycorrect
B. Management, Integration, and Discovery
C. Management, Instrumentation, and Discoverycorrect
D. Monitoring, Instrumentation, and Discoverycorrect
E. MID is not an acronym
View answer
Correct Answer: ACDE
Question #20
In Service Mapping, when an application is identified as a Generic application, which one of the following is the cause?
A. o Pattern Identification Section matches
B. o Pattern Identification and Connection Section matches
C. o Identification Rule exists
D. o Pattern Connection Section matches
View answer
Correct Answer: A
Question #21
In Service Mapping, which one of the following can be useful in determining which Patterns, Identification Sections, Connection Sections, and Steps are tried?
A. Workflow Log
B. Discovery Log
C. System Log
D. ECC Log
View answer
Correct Answer: B
Question #22
Which of the following represents the skills needed that a Service Mapping administrator or implementer should have? (Choose four.)
A. Understanding of XML, Regex, Delimited text, and JSON
B. Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST
C. Scripting capabilities with respect to Unix and Windows commands
D. Intermediate or above Windows and Unix administration skills
E. Sufficient skills to build an enterprise web site
F. Understanding of relational database theory
View answer
Correct Answer: ABCD
Question #23
Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string? Version 5.2.0
A. Version (
B. Versions+(d+
C. Version (d+)
D. Version (d+)
View answer
Correct Answer: A
Question #24
Which one of the following best describes what will happen if Discovery is configured with 3 MID Servers in a Load Balance Cluster with Shazzam cluster support disabled?
A. All three MID Servers will be used during the Port Scan phase and all three will be used during the classification phase
B. Only one MID Server will be used during the Identification phase and all three will be used during the exploration phase
C. Only one MID Server will be used during the Port Scan phase and all three will be used during the classification phase
D. All three MID Server will be used during the Identification phase and only one will be used during the exploration phase
View answer
Correct Answer: A
Question #25
In Service Mapping, which one of the following can be useful in determining which Patterns, Identification Sections, Connection Sections, and Steps are tried?
A. Workflow Log
B. Discovery Log
C. ECC Log
D. System Log
View answer
Correct Answer: B
Question #26
Which one of the following best represents the breadth of types of Configuration Items (CIs) discovered byrunning Service Mapping?
A. Hardware, Installed Software, Network Gear
B. Physical Components, Logical Components, Certificates
C. Applications, Licenses, IP Addresses
D. Cloud Services, Applications, CI Relationships
E. Hardware, Licenses, CI Relationships
View answer
Correct Answer: C
Question #27
In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?
A. Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed
B. Identification Sections are executed randomly and the data gathered by the successful sections are merged
C. Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used
D. Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase
View answer
Correct Answer: B
Question #28
Which one of the following best describes the definition of an Entry Point?
A. A method by which a user interacts with a service or a CI interacts with another CIcorrect
B. A type of communication taking place between applicationscorrect
C. A template of attributes that define a communication type between applications
D. A Host::Hosted on relation between CIscorrect
View answer
Correct Answer: ABD
Question #29
Which one of the following is the most common risk that can negatively impact a Service Mapping engagement?
A. The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance
B. MID server resource requirements are beyond capacity of the customer
C. Customer security team is not made aware early enough in the engagement of the credential requirements
D. Customer is not using Active Directory for credential authentication
View answer
Correct Answer: ACD
Question #30
Which of the following are methods used to initiate discovery on a service? (Choose three.)
A. Map multiple services suggested by Service Mapping by discovering the load balancers in an enterprise
B. Map multiple services by importing entry points from a CSV file
C. Map a single service defined by configuring an entry point
D. Map services suggested by the discovery of MID Servers in an enterprise
E. Map services based on Assets stored in the CMDB
View answer
Correct Answer: ACD

View The Updated ServiceNow Exam Questions

SPOTO Provides 100% Real ServiceNow Exam Questions for You to Pass Your ServiceNow Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: