Possible Questions Flashcards

1
Q

In Discovery, which one of the following should the customer always configure during implementation?
A. Change Management
B. Probes
C. Subnets
D. Credentials

A
  • Credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many CI Identifiers can be configured per CI Class?
A. One
B. Two
C. Five
D. Ten

A
  • One
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which one of the following Discovery phases is the error “No credentials would authenticate, tried” found on?
A. Port Scan
B. Classification
C. Identification
D. Exploration

A
  • Classification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Discovery, which one of the following causes a pattern to fail during discovery?
A. No firewalls installed on the host
B. No parse variable operation used in a step
C. No pattern attached to a classification
D. No CI Identifier exists

A
  • No pattern attached to a classification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does the MID server use?

A
  • https port 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the phases of Discovery?
a. Shamwow
b. Exploration
c. Scan
d. Identification
e. Classification

A
  • Scan
  • Classification
  • Identification
  • Exploration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When installing a MID server on Windows using the native Windows installer (MSI), which of the following policies must be added to the service account needed to complete the installation?
a. Allow log on locally
b. Log on as a service
c. Allow log on through Remote Desktop Services
d. Access this computer from the network
e. Allow MID server user account we services rights

A
  • Log on as a service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The MID server user used as part of the installation must have which of the following ServiceNow roles?
a. mid_server
b. admin
c. web_service_admin
d. ecc_queue_reader
e. workflow_admin

A
  • mid_server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which setting in Discovery Schedules scans devices without the use of credentials?
a. IP Addresses
b. Configuration Items
c. SNMP

A
  • IP Addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which phases can be viewed under the Discovery log tab?
a. Identification
b. Exploration
c. Scanning
d. Probes and Prots
e. Classification

A
  • Identification
  • Exploration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

During which phase are Unix and Windows credentials evaluated?
a. Pattern Phase
b. Classification Phase
c. Applicative Phase
d. Scanning Phase
e. Identification Phase

A
  • Classification Phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What allows for a Discovery administrator to configure the number of IP addresses that each Shazzam probe will scan?
a. IP Ranges
b. Discovery Schedules
c. Shazzam Batch size

A
  • Shazzam Batch Size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which attributes are associated to CI identifiers?
a. Identify a specific device
b. Used during the Scanning phase
c. Helps prevent duplicate CIs
d. Entries are tried in order until a complete match is found
e. If no match is found, an error will occur

A
  • Identify a specific device
  • Helps prevent duplicate CIs
  • Entries are tried in order until a complete match is found
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Discovery know which ports to discover?

A
  • Assign protocols and port numbers to port probes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which functions are used to help prevent duplicate CIs?
a. Process Handlers
b. Process Classifiers
c. Discovery schedules
d. Classification phase
e. CI identifiers

A
  • Process Handler
  • CI Identifier

Process handlers prevent the creation of duplicate CIs by filtering out parameters known to have inconsistent values before process classification occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discovery finds application to host dependencies based on the what?
a. Horizontal Infrastructure Patterns
b. Running process of a computer CI
c. Shazzam Probe
d. CI Identifiers
e. DNS lookup

A
  • running process of a computer CI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which fields are required when creatiin a new asset record?
a. Model Category
b. Model
c. Serial Number
d. Asset Tag
e. MID server ID

A
  • Model Category
  • Model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Model Categories provide which of the following functions?
a. Link directly to CIs
b. Link to Model
c. Tie CI classes to Asset classes
d. Enforce CI verification
e. Determine which table CI records will be created in

A
  • Link to Model
  • Tie CI classes to Asset classes
  • Enforce CI verification
  • Determine which table CI records will be created in
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following plugins provides Enhanced Discovery Policies?
a. ACC-V
b. ACC-F
c. ACC-M

A
  • ACC-V
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Patterns gather data during which Discovery phase?
a. Scanning Phase
b. Exploration Phase
c. Identification Phase
d. Classification Phase
e. All

A
  • Identification Phase
  • Exploration Phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

There are two types of Discovery patterns, application and…?
a. Identification
b. Extensions
c. Infrastructure
d. Horizontal
e. Shazzam

A
  • Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

There are two types of Application Debug types, Top down and …?
a. Application
b. Infrastructure
c. Bottoms up
d. Horizontal
e. Debug Pattern

A
  • Horizontal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Horizontal Debug requires entrie for Host Name/IP and …?
a. IDIP
b. UDIP
c. WEDIP
d. IDP
e. PID

A
  • PID
24
Q

What are the four Phases of Discovery?
a. Execution
b. Executive
c. Scan
d. Pattern
e. Exploration
f. Classify
g. Identification
h. Credential-less
i. Extension

A
  • Scan
  • Classify
  • Identification
  • Exploration
25
Q

If a device responds on port 135 during the Scanning phase, which type of Classification probe will be launched next?
a. Windows
b. UNIX
c. SNMP

A
  • Windows

A Windows Classify probe will be launched if a device responds on port 135, Microsoft Remote Procedure Call (RPC)

26
Q

If a device responds on port 22 during the Scanning phase, which type of Classification probe will be launched next?
a. Windows
b. UNIX
c. SNMP

A
  • UNIX

A UNIX Classify probe will be launched if a device responds on port 22, Secure Shell Service (SSH)

27
Q

If a device responds on port 161 during the Scanning phase, which type of Classification probe will be launched next?
a. Windows
b. UNIX
c. SNMP

A
  • SNMP

An SNMP Classify probe will be launched if a device responds on port 161, Simple Network Management Protocol (SNMP)

28
Q

MID Servers require port \_\_\_\_\_ to open on the customer's firewall in order to communicate with the ServiceNow instance.
a. 443
b. 343
c. 8080
d. 8081

A
  • 443
29
Q

MID Servers monitor the ECC Queue
a. Daily
b. Hourly
c. Every 2.5 minutes
d. Using a persistent connection

A
  • Using a persistent connection

The MID Server opens a persistent connection to the instance through the Asynchronous Message Bus (AMB) Client and listens on the /mid/server/<mid_sys_id> AMB channel</mid_sys_id>

30
Q

What are the different types of MID Server cluster configurations?
a. Capabilities
b. Load Balance
c. Redundancy
d. Failover

A
  • Load Balance
  • Failover
31
Q

MID Servers are configured
a. in the customer’s DMZ
b. inside the customers network
c. only in a ServiceNow Datacenter
d. only in the cloud running on a VM

A
  • inside the customers network
32
Q

Only files listed in the File Names table will be in the
a. Products Table
b. File information table
c. File map table

A
  • File information table
33
Q

If the Kubernetes pattern and credential type is not available on your ServiceNow instance, which one the following actions can you take?
a. Install the appropriate ServiceNow Store application
b. Commit the appropriate update set
c. Import the appropriate import set
d. Configure the appropriate plugin
e. Call ServiceNow support to enable the functionality

A
  • Install the appropriate ServiceNow Store application
34
Q

A Kubernetes Pod has which of the following relationships? Select all that apply.
a. Upstream relationship to a Docker image
b. Upstream relationship to a Docker container
c. Downstream relationship to a Docker image
d. Downstream relationship to a Docker container

A
  • Downstream relationship to a Docker image
  • Downstream relationship to a Docker container
35
Q

From a Serverless Execution Pattern, which of the following are examples of a valid input parameter configuration for namespace?
a. *
b. All
c. default, kube-sustem
d. default
e. default; kube-system

A
  • *
  • default, kube-sustem
  • default
36
Q

Which of the following are accepted authentication credentials when discovering Kubernetes?
Select all that apply.
a. Bearer Token
b. Basic Auth
c. SSH Private Key
d. Multi-factor Authenticiation
e. Secret Access key

A
  • Bearer Token
  • Basic Auth
37
Q

Which three input parameters are required when configuring a Kubernetes Serverless Execution Pattern?
a. namespace
b. credentialAlias
c. url
d. credld
e. datacenterType

A
  • namespace
  • credentialAlias
  • url
38
Q

After running a Kubernetes discovery, which of the following are common components discovered?
a. API Server
b. Docker Container
c. Kube Proxy Server
d. Kubernetes Cluster
e. Kubernetes Node

A
  • Docker Container
  • Kubernetes Cluster
  • Kubernetes Node
39
Q

Which services do Application services underpin?
a. Both
b. Technical Services
c. Business Services

A
  • Both
40
Q

1

How do tables ‘Business Application’ and ‘Application’ differ?
Choose 3 answers
a. CI vs. non-CI
b. Design vs. Technical Domain
c. Operational vs. Planning
d. Logical vs Physical Entities

A
  • Operational vs. Planning
  • Design vs. Technical Domain
  • Logical vs. Physical Entities
41
Q

1

Are Service Offerings required to connect Technical or Business Service to Application Services and Infrastructure CIs?
a. No
b. Yes

A
  • Yes
42
Q

1

What is a Sell/Consume Persona?
a. Network Engineer
b. Business Relationship Manager
c. CIO
d. Application Architect

A
  • Business Relationship Manager

or a Customer Service Manager

43
Q

1

What table is not a Foundational Domain table?
a. Locations
b. Users
c. Servers
d. Company

A
  • Servers
44
Q

1

Which domain does Business Capability reside in?
a. Sell/Consume
b. CMDB
c. Design
d. Physical

A
  • Design
45
Q

1

Are Business Applications operational?
a. Sometimes
b. Yes
c. No

A
  • No
46
Q

1

Which Sell/Consume tables are not CIs?
Choose 2 answers.
a. Service Offering
b. Request Catalog
c. Business Service Portfolio
d. Service

A
  • Request Catalog
  • Business Service Portfolio
47
Q

1

What are the 5 CSDM domains?
Choose 5 answers.
a. Sell/Consume
b. Manage Technical Services
c. Foundations
d. Design
e. Logical Model
f. Build

A
  • Foundations
  • Sell/Consume
  • Design
  • Build
  • Manage Technical Services
48
Q

1

Which of the following domains contains the optional SDLC component?
a. Foundations
b. Manage Technical Services
c. Build

A
  • Build
49
Q

1

What attribute is used to route a change?
a. IT Owner
b. Assignment Group
c. Support Group
d. Business Owner

A
  • Assignment group
50
Q

The Logistics Company has created a Health Inclusion Rule to better understand the data in their CMDB. What does this rule do?
a. Allows them to test for required fields that are missing data
b. Allows them to filter which CIs are calculated as part of the CMDB Health Dashboard
c. Allows them to identify and filter duplicate CIs
d. Allows them to validate the CMDB is configured and populates data for imcomplete fields

A
  • Allows them to filter which CIs are calculated as part of the CMDB Health Dashboard
51
Q

Which of the following are network considerations when installing a MID Server?
a. MID Server has outbound access over port 443
b. Install on a network with 100MB of bandwidth or greater
c. MID Server requires access to install.service-now.com for upgrades
d. MID Server should be installed as close to the targets as possible
e. MID Server should not be installed in the DMZ for security reasons
f. Only one MID Server per country should be installed
for ease of maintenance

A
  • MID Server has outbound access over port 443
  • Install on a network with 100MB of bandwidth or greater
  • MID Server requires access to install.service-now.com for upgrades
  • MID Server should be installed as close to the targets as possible
52
Q

On Windows servers where a MID Server will be installed, the minimum PowerShell version is which of the following?
a. 1.0
b. 2.0
c. 3.0
d. 4.0
e. 5.0

A
  • 3.0
53
Q

When installing a MID Server on Windows using the native Windows installer (MSI), which of the following policies must be added to the service account needed to complete the installation?
a. Allow log on locally
b. Log on as service
c. Allow log on through Remote Desktop Services
d. Access this computer from the network

A
  • Log on as service
54
Q

The MID Server user used as part of the installation must have which of the following ServiceNow roles?
a. mid_server
b. admin
c. web_service_admin
d. ecc_queue_reader

A
  • mid_server
55
Q

Using the shell script mid.sh, which of following tasks can be performed?
a. Stop the MID Server
b. Start the MID Server
c. Check the status of the MID Server
d. Install a MID Server service
e. Reboot the MID Server
f. Uninstall a MID Server

A
  • Stop the MID Server
  • Start the MID Server
  • Check the status of the MID Server
  • Install a MID Server service
56
Q

Which of the following files must be modified to run the MID Server using a non-root user?
a. config.xml
b. wrapper.conf
c. mid.schconf_override
d. EnforceFilePermissions

A
  • mid.shconf_override