ServiceNow CIS-SM Certified Implementation Specialist – Service Mapping Online Training
ServiceNow CIS-SM Online Training
The questions for CIS-SM were last updated at Dec 31,2024.
- Exam Code: CIS-SM
- Exam Name: Certified Implementation Specialist - Service Mapping
- Certification Provider: ServiceNow
- Latest update: Dec 31,2024
Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?
- A . Reclassification Tasks
- B . Identification Rules
- C . Datasource Precedence Rules
- D . Reconciliation Rules
To begin the configuration of tag-based services, tag values must be defined where?
- A . Tag categories
- B . Tag catalogs
- C . Tag-based service families
- D . Tag libraries
In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?
- A . The host will be deleted in the CMDB and a new host record will be created during Service Mapping discovery.
- B . The host will be immediately rediscovered, but only the changes will be updated in the CMDB during Service Mapping discovery.
- C . The host will be immediately rediscovered and updated in the CMDB during Service Mapping discovery.
- D . The host will not be rediscovered during Service Mapping discovery.
ServiceNow only needs Domain user with local admin rights to discover Windows hosts as part of a successful implementation of ServiceNow Discovery, however which of the following targets will not be discovered?
- A . Windows Active Directory Servers
- B . Windows DHCP Servers
- C . Windows Domain Controller Servers
- D . Windows DNS Servers
Using Pattern Designer, which one of the following Delimited Text Parsing Strategies could be used to parse CO from the string?
Location,Denver,CO
- A . Delimiter of a comma and position 3
- B . Delimiter of Location, and position 2
- C . Delimiter of Denver and position 2
- D . Delimiter of a comma and position 2
In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?
- A . Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed.
- B . Identification Sections are executed randomly and the data gathered by the successful sections are merged.
- C . Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used.
- D . Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase.
Which of the following are benefits a service map can bring during an Incident resolution? (Choose three.)
- A . Quickly identifies any recent incidents that occurred on components of the impacted service.
- B . Narrows down possible affected components when a service is impacted.
- C . Helps reduce the number of unplanned changes in a customer environment.
- D . Helps pinpoint code errors after a faulty application is identified.
- E . Quickly identifies any recent changes performed on components of the impacted service.
In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?
- A . For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Extension Sections.
- B . For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run all Extension Sections for the pattern.
- C . For each pattern that supports the Entry Point Type, run all the Identification Sections
that finish successfully and then run each Extension Section for the pattern. - D . For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run Extensions Sections until one finishes successfully.
Which one of the following is the most common risk that can negatively impact a Service Mapping
engagement?
- A . The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance.
- B . MID server resource requirements are beyond capacity of the customer.
- C . Customer security team is not made aware early enough in the engagement of the credential requirements.
- D . Customer is not using Active Directory for credential authentication.
Which one of the following represents what the MID stands for in MID Server?
- A . Monitoring, Integration, and Discovery
- B . Management, Integration, and Discovery
- C . Management, Instrumentation, and Discovery
- D . Monitoring, Instrumentation, and Discovery
- E . MID is not an acronym.