Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.)

Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.)A . Tomcat does not extend the Application Server table B. Tomcat table extends the Application Server table C. Tomcat table is a child of the Application Server table D....

January 21, 2023 No Comments READ MORE +

Which of the following does the ECC Queue provide? (Choose two.)

Which of the following does the ECC Queue provide? (Choose two.)A . Login credentials for the MID Server host. B. The actual XML payload that is sent to or from an instance. C. A connected flow of probe and sensor activity. D. The process responsible for defining, analyzing, planning, measuring,...

January 21, 2023 No Comments READ MORE +

What entry point type must a horizontal pattern have to execute from a process classifier?

What entry point type must a horizontal pattern have to execute from a process classifier?A . A subnet entry point type. B. HTTP(S) entry point type if the pattern is running on a web server application. C. TCP entry point type or ALL entry point type. D. It does not...

January 20, 2023 No Comments READ MORE +

Given a custom column named u_custom_column on table cmdb_ci_linux_server, which variable syntax should be used to populate the column in a horizontal discovery pattern using the Set Parameter Value operation?

Given a custom column named u_custom_column on table cmdb_ci_linux_server, which variable syntax should be used to populate the column in a horizontal discovery pattern using the Set Parameter Value operation?A . $user_var_custom_column B. $cmdb_ci_linux_server.u_custom_column.INSERT C. $u_custom_column[1].cmdb_ci_linux_server D. $cmdb_ci_linux_server[*].u_custom_columnView AnswerAnswer: B

January 20, 2023 No Comments READ MORE +

Which choice allows the following functionality to occur?

Which choice allows the following functionality to occur? If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.A . MID Server Clusters B. MID Server selection method C....

January 20, 2023 No Comments READ MORE +

During the Discovery process, what determines if an Asset record is created?

During the Discovery process, what determines if an Asset record is created?A . CMDB B. Model Category C. Model Product D. ECC Queue E. Configuration ItemView AnswerAnswer: B

January 20, 2023 No Comments READ MORE +

What role is needed by the MID Server's user account to interact with a ServiceNow instance?

What role is needed by the MID Server's user account to interact with a ServiceNow instance?A . mid_server B. discovery_admin C. sm_mid D. mid_discoveryView AnswerAnswer: A Explanation: Reference: https://docs.servicenow.com/bundle/quebec-servicenow-platform/page/product/mid-server/task/t_SetupMIDServerRole.html

January 18, 2023 No Comments READ MORE +

From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.)

From an SNMP Query pattern operation, which of the choices are valid Variable Types? (Choose two.)A . Test B. Table C. Scalar D. CI TypeView AnswerAnswer: C,D Explanation: Reference: https://docs.servicenow.com/bundle/quebec-it-operations-management/page/product/service-mapping/reference/r_PatternVariables.html

January 18, 2023 No Comments READ MORE +

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)A . Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software. B. Discovery finds applications and devices on your network, Service Mapping monitors those devices. C. Discovery utilizes IP address ranges for...

January 18, 2023 No Comments READ MORE +

For what is File Based Discovery used?

For what is File Based Discovery used?A . To discover the checksum of a file and store it to track for changes B. To discover the contents of flat files such as configuration files C. To discover that file names conform to a defined naming standard D. To discover file...

January 16, 2023 No Comments READ MORE +