Discovery SN
![]() |
![]() |
![]() |
Título del Test:![]() Discovery SN Descripción: Discovery SN v1.0 |




Comentarios |
---|
NO HAY REGISTROS |
Based on this image, which of the following statements are true? (Choose three.). Attributes from two tables populate a table with the same name as a ServiceNow CMDB table. This operation is more than likely a part of a step on a pattern set to Application Pattern Type. If a value is unmatched, it is still merged into the Target Table. For this operation to run, there must be some data in the process.executablePath variable. This is a horizontal pattern of type "infrastructure.". Based on the following images, which choice best describes what occurs if Discovery sets the name attribute of a discovered Windows Server CI to 'Windows1' and then Altiris discovery runs detecting 'Windows2' for the name attribute on the same CI?. The name of the CI stays 'Windows1'. The name of the CI changes to 'Windows2'. The name of the CI does not populate with either discovery. The CI is not discovered because Discovery is not listed in either image. For the Parse Variable pattern operation, what is required to have two different parsing methods to populate variables?. Two different Debug Mode sessions. A tabular and a scalar variable. Two different steps. Two different Define Parsing selections on the same step. Which best describes Discovery schedule of type Configuration Item?. Verifies Configuration Item data from the scanned IP ranges against the data in the CMDB. Creates only a list of discovered IPs in both IPv4 and IPv6 formats. Collects complete information from the scanned IP ranges and sends it to the CMDB. Directly populates records in the assets table. When installing a MID Server on a Windows platform, which right must be associated when creating a Service Account?. Root. Domain Admin. MID Server User Role. Log on as service. Which of the below choices are needed for Quick Discovery? (Choose two.). MID Server. Discovery Schedule. PID. Target IP. In order to use Debug from the Pattern Designer, you must have what?. a proxy server. a discoverable CI. the admin role. Service Mapping installed. A discovery runs against a Windows Server returning the following attribute values for the first time: name = WindowsSN1 serial_number = 12321 A subsequent discovery runs against a different Windows Server returning the following attribute values: name = WindowsSN2 serial_number = 12321 With only base system CI Identifiers configured, which of the following is true?. A Windows Server CI is created, then updated with WindowsSN2 as the name. Two Windows Sewer CIs are created, with WindowsSN1 AND WindowsSN2 for names. Two Windows Server CIs are created, without serial_number values. A Windows Server CI is created, then updated with WindowsSN1 as the name. Which choice represents the three best ways of extending Discovery?. Orchestration, Classifiers, Discovery Patterns. Fingerprinting, Classifiers, Discovery Patterns. Orchestration, Classifiers, Probes & Sensors. Classifiers, Probes & Sensors, Discovery Patterns. Classifiers, Fingerprinting, Probes & Sensors. SNMP Credentials require which of the following?. write community strings. usernames. read community strings. port 135 access. Which choice will populate the Location field for a discovered CI?. Location field for a Discovery Schedule. Location field for a parent CI Type. Location field for a Port Probe. Location report from the Discovery Dashboard. What role is needed by the MID Server's user account to interact with a ServiceNow instance?. mid_server. discovery_admin. sm_mid. mid_discovery. Which operation is used to change from the default credentials to any other appropriate credentials in a horizontal pattern?. Change credentials. Change user. Alternate credentials. Alternate user. After navigating to an Automaton Error Messages list from Discovery > Home, how are the options on the right navigation pane categorized? (Choose two.). SELECT ALL. SELECT ONE. ACTION ON SELECTED. ACTION ON ALL. Which of the following can be used in the Debug Identification Section in Debug Mode for an infrastructure pattern? (Choose two.). IP. AWS Endpoint. PID. Host Name. With multiple CI data sources, which choice is the best for determining which source can update a CI attribute?. Business Rules. Data Certification. Transform Maps. Reconciliation Rules. One method for deleting specific CIs not discovered in 30 days is: Scheduled Job. UI Policy. Service Mapping. Data Policy. Which of the following choices must be installed on a MID Server to run Credential-less Discovery?. Credential-less Extension. Nmap. Advanced IP Scanner. Defender. A network device has both an SSH port and an SNMP port open. Discovery tries the SSH probe first and it fails. This triggers the SNMP probe, which succeeds. Discovery uses SNMP first for subsequent discoveries on that device. What discovery functionality allows the above to happen?. Classification. Credential affinity. MID Server affinity. IP service affinity. The CMDB contains which of the following record types? (Choose two.). Model. Configuration Item (CI). Asset. Relation Type. When is the Extension section in a horizontal pattern executed?. As part of the post sensor processing script. After the Identification sections. As part of the port scan. Before the Identification sections. For CMDB Health, relationships can be which of the following choices? (Choose three.). Duplicate. Stale. Orphan. Required. Recommended. Which of the choices provides active discovery errors with a help link for each error?. Discovery Dashboard. IP Address Failure Report. Discovery Schedule. MID Server Dashboard. What related list on a classifier dictates which Horizontal Pattern probe is launched?. Discovery Log. Classification Criteria. Pattern probes. Triggers probes. Which of the following does the ECC Queue provide? (Choose two.). Login credentials for the MID Server host. The actual XML payload that is sent to or from an instance. A connected flow of probe and sensor activity. The process responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services. Which of the following choices are only used for the Application Pattern Type? (Choose two.). Run Order. Identification Section. CI Type. Operating System. By default, which of the following are automatically available as variables for horizontal discovery patterns? (Choose two.). infrastructure_system. The CI Type on the Discovery Pattern form. windows_cmdb_ci. computer_system. Which choices are necessary to launch any pattern? (Choose two.). CI Classification. CI Serial Number Attribute. Data Certification. CI Type. Which of the below choices are horizontal pattern types? (Choose two.). Hardware. Software. Infrastructure. Application. What does the MID Server need to collect vCenter events?. vCenter Event Collector extension. MID SNMP Trap Listener extension. Firewall. vCenter probes. A Discovery Schedule contains a /24 subnet IP Range and a Shazzam batch size of 5000. How many times will a Shazzam probe be launched during discovery?. 1. 2. 5000. 254. Which method is used by Discovery to determine if a Host IP is active or alive?. Port Scan. Traceroute. Ping. Classification. Discovery finds and maps dependencies for the following types of storage devices. (Choose three.). Direct-attached storage (DAS). Network-attached storage (NAS). Storage area network (SAN). Multiple area network (MAN). Redundant Array of Independent Disks (RAID). Which choice allows the following functionality to occur? If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses. MID Server Clusters. MID Server selection method. Shazzam Batch Size. Behaviors. Which choice best describes how to use a Behavior for discovery?. The MID Server selection method on a Discovery Schedule. The Behavior drop-down menu on a Discovery IP Range. The Behavior drop-down menu on a Discovery Status. The Behavior checkbox on a CI. Which of the following pattern operations query targets? (Choose two.). WMI Query. Merge Table. Get Process. Parse Variable. File-based Discovery is triggered during the __________. Classify Phase. Scan Phase. Exploration Phase. Pattern Phase. Identification Phase. Given a custom column named u_custom_column on table cmdb_ci_linux_server, which variable syntax should be used to populate the column in a horizontal discovery pattern using the Set Parameter Value operation?. $user_var_custom_column. $cmdb_ci_linux_server.u_custom_column.INSERT. $u_custom_column[1].cmdb_ci_linux_server. $cmdb_ci_linux_server[*].u_custom_column. What entry point type must a horizontal pattern have to execute from a process classifier?. A subnet entry point type. HTTP(S) entry point type if the pattern is running on a web server application. TCP entry point type or ALL entry point type. It does not matter, it is triggered for all entry point types. Which metrics comprise the Completeness KPI for CMDB Health? (Choose two.). Required. Recommended. Audit. Overall. Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.). Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software. Discovery finds applications and devices on your network, Service Mapping monitors those devices. Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points. Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies. What are the two main options within a Parse File operation?. Discover Now and Quick Discovery. Select Operating System and Method. Select File and Define Parsing. Match and Select File. Based on the following image, which of the following choices is also true about London Linux Servers?. It is a CMDB Group with Dashboard Group type. It is a CMDB Group with Health Group type. It is a Datacenter Group in London. It is a CMDB Group with Default Group type. For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?. Hash tag. Brackets. Quotes. Dollar sign. From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.). Test. Table. Scalar. CI Type. Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?. A notification is sent to the CI owner. An associated identification rule is created automatically. Each set of duplicate CIs is added to a de-duplication task. The next discovery is stopped for the CI that is duplicated. Which choice best describes a horizontal discovery pattern?. Steps that execute operations. Credential depot. Port scanning tool. Classifiers that execute probes. A config file for an application has the following three lines: Line 1: app build 1.2.3.4 version 5.14 Line 2: installation_dir=c:\opt\bin Line 3: build_type=Server. Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.). Get Process operation with correct Port. Find Matching URL operation with Target Variable. Parse File operation with Delimited Text parsing strategy. Parse File operation with Regular Expression parsing strategy. The following shows part of the Windows OS - Servers pattern in Pattern Designer: Which of the steps above use(s) a shared library?. Step 26. Neither step. Step 25. Both steps. Which of the following is required for a MID Server to have access to automatically stay up-to-date with instance versions?. install.service-now.com. docs.servicenow.com. developer.service-now.com. service-now.com. When designing steps with operations requiring variables, it is best practice to do what?. hard core variables. always use scalar variables. query targets for variables. design for a static environment. For what is File Based Discovery used?. To discover the checksum of a file and store it to track for changes. To discover the contents of flat files such as configuration files. To discover that file names conform to a defined naming standard. To discover file paths to recognize the signature of installed software. Which of the following properties define the maximum overall size for the returned payload that comes from patterns?. cmdb.properties.payload_max_size. glide.discovery.payload_max. mid.discovery.max_payload_size. mid.discovery.max_pattern_payload_size. Based on this image, which of the following choices is true?. This is from a WMI query operation step. There is a scalar variable labeled ‘1’. This Value cannot be used in a pattern step. There is a tabular variable named ‘name_details’. Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?. Modify the default MIB information. Enable SSH as a secondary protocol. Use live devices in production. Use the publish manufacturer’s device MIB. After running Discovery and viewing the ECC Queue tab, what are some of the displayed default fields? (Choose three.). Details. Topic. Pattern log link. CMDB CI. Queue. Source. Discovery schedule name. Hardware Models can have a one-to-many relationship with the following: (Choose three.). Assets. Manufacturer. Configuration Items. Product owner. Model Categories. Which choice best represents how to modify the functionality shown in this image?. From a Classifier. From a Discovery Pattern. From the MID Server. From a Probe. What is the recommended method of consolidating duplicate CIs?. Duplicate CI Remediator. Event CI Remediation. Ignore Duplicate CI. Manual CI Remediation. During the Discovery process, what determines if an Asset record is created?. CMDB. Model Category. Model Product. ECC Queue. Configuration Item. What pattern operation allows the transfer of a file from the MID Server to a target?. Parse file. Create Connection. Put file. Manage Attachments. On the ECC Queue, sensor records have a Queue value of ___________ and probe records have a Queue value of ___________. input, output. started, ready. ready, started. output, input. In Discovery, what table associates an IP address and a credential?. Credential Affinity. Service Affinity. Service CI Association. Tags. If the WMI service is not running on a host, it will prevent the discovery of which devices?. Network. Windows. Storage. Unix. In general, Discovery can provide which of the following kinds of application relationships? (Choose two.). tcp to udp. application to application. mid server to target. host to application. Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.). JEA Properties set to True. MID Servers must be configured as a trusted source with DNS. MID Servers need to be added to the WinRM Group policy on the Servers. MID Server Parameters Add WinRM. For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.) $IfTable<_>.InstanceID. [3]. [X]. [&]. [.]. [*]. []. Which of the below choices are the most probable results of the following image? (Choose three.). A tabular variable named ‘WMI Query’. A scalar variable named ‘MaximumWorkingSetSize’. A scalar variable named ‘PageFaults’. A scalar variable named ‘PeakVirtualSize’. A tabular variable named ‘more_process_info’. A tabular variable named ‘Win32_Process’. What is found on the far-right section of the Pattern Designer for horizontal patterns? (Choose two.). CI Attributes. Operations. Temporary Variables. CMDB Dashboard. Which of the choices below best represent key capabilities of a ServiceNow ITOM Enterprise solution? (Choose two.). Create an Engaging User Experience. Build New Apps Fast. Manage Hybrid Clouds. Proactively Eliminate Service Outages. Which choices best describe what is necessary to create a custom horizontal pattern to discover an operating system that is not discovered by the base installation patterns? (Choose two.). Select a CI Type. Define Process Strategy. Select Infrastructure Pattern Type. Select Application Pattern Type. Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.). Tomcat does not extend the Application Server table. Tomcat table extends the Application Server table. Tomcat table is a child of the Application Server table. Tomcat table is a parent of the Application Server table. In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.). Global CI types. Main pattern CI type. Related CI types. All CI types. Which of the below choices are benefits of Tracked Configuration Files? (Choose two.). Content version comparison. Files tracked as CIs. Unwanted files removed from target. No credentials needed. Which choice best describes a Functionality Definition?. Defines what CI identifiers to use. Defines the IP addresses to discover. Defines what Behavior to use from a Discovery Schedule. Defines what protocols to detect from within a Behavior. As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?. Target. Pattern Log. ECC queue. Discovery Log. Which of the choices have a higher chance of leading to lost data during CI reclassification? (Choose two.). Switching. Identifying. Downgrading. Upgrading. Which of the below choices are kinds of variables used in discovery patterns? (Choose three.). CI attributes. Prefix. Temporary. Fixed. Global. Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.). system. computer_system. process. baseline. Which ECC Queue message contains the XML payload returned from the MID Server?. Ready. Output. Pending. Input. Which of the following executes the osquery commands on agents to gather attribute details from a CI?. Agent Collector. Agent listener. ACC for Discovery. Check Definitions. Policies. What is the advantage of Discovery Range Sets?. Range Sets are the only way to have more than one IP Range defined within a Discovery Schedule. Range Sets show the number of IPs in a subnet. All the necessary Range Sets are installed in the base installation of Discovery. Range Sets provide flexibility in management and identification of known networks for simplicity of administration. From Pattern Designer, which horizontal pattern type is the image below showing?. Application. Computer System. Infrastructure. Service Mapping. Which of the following fields are editable from a Merge Table pattern operation? (Choose three.). Target Table. Second Table. Primary Table. First Table. While discovering a new SNMP network device, which choice could cause the error “Active, couldn’t classify” to occur on a Discovery Status?. A firewall blocking the communication between the MID Server and the target device. SNMP credentials are incorrect. SNMP only behavior is not configured. An SNMP Classification must be updated or created for the new device. The deletion strategy is set to ‘Mark as absent’ for related Disk CIs discovered via the Linux Server pattern. If a related Disk CI is discovered during the Linux Server discovery and then the same related Disk CI is not found the next time the Linux Server is discovered, the following will happen: The Disk Status CI (install_status) is set to Absent. The Disk CI Operational Status (operational_status) is set to Non-Operational. The Linux Server CI Operational Status (operational_status) is set to Non-Operational. The Linux Server CI Status (install_status) is set to Absent. What would you see in the Discovery pattern log that you would not see in the ECC Queue?. Success or failure of the individual pattern steps. Payload of CI attributes and relationships. Shazzam probe payload. Relationships created. What do most Discovery properties start with?. discovery.prop. disco.release. glide.itom. glide.discovery. What is the default thread count for a MID Server?. 5. 1. 50. 25. For a pattern operation, which of the following choices is used to combine variables into a single variable in Value fields?. [*]. AND. +. ==. What is the recommended method for excluding specific software from discovery on Windows and Unix Servers?. Pattern Modification. Probe Modification. Configuration Console. Discovery Properties. Which of the choices best describes a tabular variable in a discovery pattern?. A single column. A single string. Each cell is a CI attribute. Each cell is a scalar variable. When configuring the MID Server Service Settings, which of the following is not a valid MID Server name?. my_mid_server1. mid_server1. mid.server1. midserver1. Which one of the following is not used in a horizontal discovery pattern?. Variables. Connectivity section. Operations. Identification section. During the Port Scan phase what could the Warning level error “No results returned from probe.” mean?. Process Classifier incorrectly configured. Logical or physical firewall preventing connectivity. Wrong credentials. Incorrect Datasource Precedence. Which of the choices are types of temporary variables in a discovery pattern? (Choose two.). SQL statement. Tabular/Table. Command. Scalar/List. What operation is shown in this image?. Put File. Parse Variable. Transform Table. Union Table. Which of the following describes the recommended permission level for credentials to discover Windows Servers?. A standard domain user with read access. A domain user with local administrator access. A user with root access across the domain. A domain administrator with sudo access. Which choice best describes the Reconciliation process?. The process of reconciling a deleted CI, if it is identified as a duplicate. The result is stored in de-duplication tasks. The process of reconciling uniquely identifying CIs, to determine if the CI already exists in the CMDB or if it is a newly discovered CI. The process of reconciling CIs and CI attributes by allowing only designated authoritative data sources to write to the CMDB at the CI table and attribute level. The process of normalizing applications, to allow the data to be used by Software Asset Management. Which of the following related lists can assist with troubleshooting discovery from a discovery status? (Choose three.). ECC Queue. Devices. Running Processes. Discovery Log. Which of the following are contained in an extension section of a discovery pattern?. Shared libraries. Connection sections. Identification sections. Network libraries. Which of the below choices are possible options under ACTION ON ALL in the Recommended Actions pane for an Automated Error Messages list within Discovery > Home? (Choose two.). Ping IP Addresses. Retry Discovery. View instructions. Make Ranges. From the Discovery Status record, which of the following does a Device record contain?. the contents of the discovered CI. contains a link to the discovered CI. the CMDB Health Dashboard link. contains a link to the discovered Asset. In a pattern operation, which of the following correctly calls the value of the executableDir variable from the tabular process variable?. process(executableDir). $process_executableDir. “process_executableDir”. $process.executableDir. For a Parse Variable operation, when using the Delimited Text parsing strategy, which options are available in a step? (Choose two.). Positions. Use SNMP Browser. Delimiters. Merge Criteria. How do you create relationships between CIs in a horizontal pattern?. Relationships are created automatically for each successful connection section. By using the Create Connections operation. By using the Create Relation/Reference operation. Relationships cannot be created via patterns. CI identifiers can be viewed under which of the following?. Discovery Dashboard. CI Class Manager. Process Handlers. Processes and Classification. CI record. Which choice best describes the main KPIs for CMDB Health?. Correctness, Completeness, Compliance. Compliance, Ownership, Reconciliation. Speed of Discovery, Type of CI Class, Staleness. Last discovered CIs, Correctness Required. Which of the following best describes what may also be required when increasing the max number of threads for a MID Server?. updating the acl rules for the CMDB tables in ServiceNow. increase the amount of disk space on the MID Server host. increasing the memory allocated to the MID Server app. increase the MID Server max payload size. |