Possible Questions Flashcards
In Discovery, which one of the following should the customer always configure during implementation?
A. Change Management
B. Probes
C. Subnets
D. Credentials
- Credentials
How many CI Identifiers can be configured per CI Class?
A. One
B. Two
C. Five
D. Ten
- One
Which one of the following Discovery phases is the error “No credentials would authenticate, tried” found on?
A. Port Scan
B. Classification
C. Identification
D. Exploration
- Classification
In Discovery, which one of the following causes a pattern to fail during discovery?
A. No firewalls installed on the host
B. No parse variable operation used in a step
C. No pattern attached to a classification
D. No CI Identifier exists
- No pattern attached to a classification
What port does the MID server use?
- https port 443
What are the phases of Discovery?
a. Shamwow
b. Exploration
c. Scan
d. Identification
e. Classification
- Scan
- Classification
- Identification
- Exploration
When installing a MID server on Windows using the native Windows installer (MSI), which of the following policies must be added to the service account needed to complete the installation?
a. Allow log on locally
b. Log on as a service
c. Allow log on through Remote Desktop Services
d. Access this computer from the network
e. Allow MID server user account we services rights
- Log on as a service
The MID server user used as part of the installation must have which of the following ServiceNow roles?
a. mid_server
b. admin
c. web_service_admin
d. ecc_queue_reader
e. workflow_admin
mid_server
Which setting in Discovery Schedules scans devices without the use of credentials?
a. IP Addresses
b. Configuration Items
c. SNMP
- IP Addresses
Which phases can be viewed under the Discovery log tab?
a. Identification
b. Exploration
c. Scanning
d. Probes and Prots
e. Classification
- Identification
- Exploration
During which phase are Unix and Windows credentials evaluated?
a. Pattern Phase
b. Classification Phase
c. Applicative Phase
d. Scanning Phase
e. Identification Phase
- Classification Phase
What allows for a Discovery administrator to configure the number of IP addresses that each Shazzam probe will scan?
a. IP Ranges
b. Discovery Schedules
c. Shazzam Batch size
- Shazzam Batch Size
Which attributes are associated to CI identifiers?
a. Identify a specific device
b. Used during the Scanning phase
c. Helps prevent duplicate CIs
d. Entries are tried in order until a complete match is found
e. If no match is found, an error will occur
- Identify a specific device
- Helps prevent duplicate CIs
- Entries are tried in order until a complete match is found
How does Discovery know which ports to discover?
- Assign protocols and port numbers to port probes
Which functions are used to help prevent duplicate CIs?
a. Process Handlers
b. Process Classifiers
c. Discovery schedules
d. Classification phase
e. CI identifiers
- Process Handler
- CI Identifier
Process handlers prevent the creation of duplicate CIs by filtering out parameters known to have inconsistent values before process classification occurs.
Discovery finds application to host dependencies based on the what?
a. Horizontal Infrastructure Patterns
b. Running process of a computer CI
c. Shazzam Probe
d. CI Identifiers
e. DNS lookup
- running process of a computer CI
Which fields are required when creatiin a new asset record?
a. Model Category
b. Model
c. Serial Number
d. Asset Tag
e. MID server ID
- Model Category
- Model
Model Categories provide which of the following functions?
a. Link directly to CIs
b. Link to Model
c. Tie CI classes to Asset classes
d. Enforce CI verification
e. Determine which table CI records will be created in
- Link to Model
- Tie CI classes to Asset classes
- Enforce CI verification
- Determine which table CI records will be created in
Which of the following plugins provides Enhanced Discovery Policies?
a. ACC-V
b. ACC-F
c. ACC-M
- ACC-V
Patterns gather data during which Discovery phase?
a. Scanning Phase
b. Exploration Phase
c. Identification Phase
d. Classification Phase
e. All
- Identification Phase
- Exploration Phase
There are two types of Discovery patterns, application and…?
a. Identification
b. Extensions
c. Infrastructure
d. Horizontal
e. Shazzam
- Infrastructure
There are two types of Application Debug types, Top down and …?
a. Application
b. Infrastructure
c. Bottoms up
d. Horizontal
e. Debug Pattern
- Horizontal
Horizontal Debug requires entrie for Host Name/IP and …?
a. IDIP
b. UDIP
c. WEDIP
d. IDP
e. PID
- PID
What are the four Phases of Discovery?
a. Execution
b. Executive
c. Scan
d. Pattern
e. Exploration
f. Classify
g. Identification
h. Credential-less
i. Extension
- Scan
- Classify
- Identification
- Exploration
If a device responds on port 135 during the Scanning phase, which type of Classification probe will be launched next?
a. Windows
b. UNIX
c. SNMP
- Windows
A Windows Classify probe will be launched if a device responds on port 135, Microsoft Remote Procedure Call (RPC)
If a device responds on port 22 during the Scanning phase, which type of Classification probe will be launched next?
a. Windows
b. UNIX
c. SNMP
- UNIX
A UNIX Classify probe will be launched if a device responds on port 22, Secure Shell Service (SSH)
If a device responds on port 161 during the Scanning phase, which type of Classification probe will be launched next?
a. Windows
b. UNIX
c. SNMP
- SNMP
An SNMP Classify probe will be launched if a device responds on port 161, Simple Network Management Protocol (SNMP)
MID Servers require port \_\_\_\_\_ to open on the customer's firewall in order to communicate with the ServiceNow instance.
a. 443
b. 343
c. 8080
d. 8081
- 443
MID Servers monitor the ECC Queue
a. Daily
b. Hourly
c. Every 2.5 minutes
d. Using a persistent connection
- Using a persistent connection
The MID Server opens a persistent connection to the instance through the Asynchronous Message Bus (AMB) Client and listens on the /mid/server/<mid_sys_id> AMB channel</mid_sys_id>
What are the different types of MID Server cluster configurations?
a. Capabilities
b. Load Balance
c. Redundancy
d. Failover
- Load Balance
- Failover
MID Servers are configured
a. in the customer’s DMZ
b. inside the customers network
c. only in a ServiceNow Datacenter
d. only in the cloud running on a VM
- inside the customers network
Only files listed in the File Names table will be in the
a. Products Table
b. File information table
c. File map table
- File information table
If the Kubernetes pattern and credential type is not available on your ServiceNow instance, which one the following actions can you take?
a. Install the appropriate ServiceNow Store application
b. Commit the appropriate update set
c. Import the appropriate import set
d. Configure the appropriate plugin
e. Call ServiceNow support to enable the functionality
- Install the appropriate ServiceNow Store application
A Kubernetes Pod has which of the following relationships? Select all that apply.
a. Upstream relationship to a Docker image
b. Upstream relationship to a Docker container
c. Downstream relationship to a Docker image
d. Downstream relationship to a Docker container
- Downstream relationship to a Docker image
- Downstream relationship to a Docker container
From a Serverless Execution Pattern, which of the following are examples of a valid input parameter configuration for namespace?
a. *
b. All
c. default, kube-sustem
d. default
e. default; kube-system
*
- default, kube-sustem
- default
Which of the following are accepted authentication credentials when discovering Kubernetes?
Select all that apply.
a. Bearer Token
b. Basic Auth
c. SSH Private Key
d. Multi-factor Authenticiation
e. Secret Access key
- Bearer Token
- Basic Auth
Which three input parameters are required when configuring a Kubernetes Serverless Execution Pattern?
a. namespace
b. credentialAlias
c. url
d. credld
e. datacenterType
- namespace
- credentialAlias
- url
After running a Kubernetes discovery, which of the following are common components discovered?
a. API Server
b. Docker Container
c. Kube Proxy Server
d. Kubernetes Cluster
e. Kubernetes Node
- Docker Container
- Kubernetes Cluster
- Kubernetes Node
Which services do Application services underpin?
a. Both
b. Technical Services
c. Business Services
- Both
1
How do tables ‘Business Application’ and ‘Application’ differ?
Choose 3 answers
a. CI vs. non-CI
b. Design vs. Technical Domain
c. Operational vs. Planning
d. Logical vs Physical Entities
- Operational vs. Planning
- Design vs. Technical Domain
- Logical vs. Physical Entities
1
Are Service Offerings required to connect Technical or Business Service to Application Services and Infrastructure CIs?
a. No
b. Yes
- Yes
1
What is a Sell/Consume Persona?
a. Network Engineer
b. Business Relationship Manager
c. CIO
d. Application Architect
- Business Relationship Manager
or a Customer Service Manager
1
What table is not a Foundational Domain table?
a. Locations
b. Users
c. Servers
d. Company
- Servers
1
Which domain does Business Capability reside in?
a. Sell/Consume
b. CMDB
c. Design
d. Physical
- Design
1
Are Business Applications operational?
a. Sometimes
b. Yes
c. No
- No
1
Which Sell/Consume tables are not CIs?
Choose 2 answers.
a. Service Offering
b. Request Catalog
c. Business Service Portfolio
d. Service
- Request Catalog
- Business Service Portfolio
1
What are the 5 CSDM domains?
Choose 5 answers.
a. Sell/Consume
b. Manage Technical Services
c. Foundations
d. Design
e. Logical Model
f. Build
- Foundations
- Sell/Consume
- Design
- Build
- Manage Technical Services
1
Which of the following domains contains the optional SDLC component?
a. Foundations
b. Manage Technical Services
c. Build
- Build
1
What attribute is used to route a change?
a. IT Owner
b. Assignment Group
c. Support Group
d. Business Owner
- Assignment group
The Logistics Company has created a Health Inclusion Rule to better understand the data in their CMDB. What does this rule do?
a. Allows them to test for required fields that are missing data
b. Allows them to filter which CIs are calculated as part of the CMDB Health Dashboard
c. Allows them to identify and filter duplicate CIs
d. Allows them to validate the CMDB is configured and populates data for imcomplete fields
- Allows them to filter which CIs are calculated as part of the CMDB Health Dashboard
Which of the following are network considerations when installing a MID Server?
a. MID Server has outbound access over port 443
b. Install on a network with 100MB of bandwidth or greater
c. MID Server requires access to install.service-now.com for upgrades
d. MID Server should be installed as close to the targets as possible
e. MID Server should not be installed in the DMZ for security reasons
f. Only one MID Server per country should be installed
for ease of maintenance
- MID Server has outbound access over port 443
- Install on a network with 100MB of bandwidth or greater
- MID Server requires access to install.service-now.com for upgrades
- MID Server should be installed as close to the targets as possible
On Windows servers where a MID Server will be installed, the minimum PowerShell version is which of the following?
a. 1.0
b. 2.0
c. 3.0
d. 4.0
e. 5.0
- 3.0
When installing a MID Server on Windows using the native Windows installer (MSI), which of the following policies must be added to the service account needed to complete the installation?
a. Allow log on locally
b. Log on as service
c. Allow log on through Remote Desktop Services
d. Access this computer from the network
- Log on as service
The MID Server user used as part of the installation must have which of the following ServiceNow roles?
a. mid_server
b. admin
c. web_service_admin
d. ecc_queue_reader
- mid_server
Using the shell script mid.sh, which of following tasks can be performed?
a. Stop the MID Server
b. Start the MID Server
c. Check the status of the MID Server
d. Install a MID Server service
e. Reboot the MID Server
f. Uninstall a MID Server
- Stop the MID Server
- Start the MID Server
- Check the status of the MID Server
- Install a MID Server service
Which of the following files must be modified to run the MID Server using a non-root user?
a. config.xml
b. wrapper.conf
c. mid.schconf_override
d. EnforceFilePermissions
- mid.shconf_override