This page was exported from Free valid test braindumps [ http://free.validbraindumps.com ] Export date:Sat Apr 5 5:04:05 2025 / +0000 GMT ___________________________________________________ Title: Ace CIS-Discovery Certification with 115 Actual Questions [Q52-Q73] --------------------------------------------------- Ace CIS-Discovery Certification with 115 Actual Questions PASS ServiceNow CIS-Discovery EXAM WITH UPDATED DUMPS NO.52 Which of the following must be configured to allow a MID Server to access servers using WinRM?  Add the WinRM parameter on the target servers  Add the MID Servers as a trusted source with DNS  Add a MID Server parameter mid.windows.management protocol to use WinRM  Set the JEA Property to True For a MID Server to access servers using Windows Remote Management (WinRM), it’s necessary to specify that WinRM should be used as the protocol for Windows management. This is typically done by setting the appropriate MID Server parameter, such as mid.windows.management_protocol, to WinRM. This configuration tells the MID Server to use the WinRM protocol when communicating with the target servers for executing commands and collecting data. The answer is derived from understanding how ServiceNow Discovery uses MID Servers to perform remote operations and the need to configure these MID Servers appropriately to communicate using different protocols like WinRM. It is not sufficient to just add the WinRM parameter on target servers or simply add the MID Servers as a trusted source with DNS; the MID Server itself must be configured to use WinRM. Setting a ‘JEA Property’ to true is not relevant to the basic configuration of a MID Server for WinRM access.NO.53 Which choices best describe what is necessary to create a custom horizontal pattern to discover an operating system that is not discovered by the base installation patterns? (Choose two.)  Select a CI Type  Define Process Strategy  Select Infrastructure Pattern Type  Select Application Pattern Type According to the ServiceNow website1, the key capabilities of a ServiceNow ITOM Enterprise solution are:* Manage hybrid clouds: Gain visibility and control across your hybrid cloud environment with a single system of action for IT.* Proactively eliminate service outages: Identify issues and anomalies before they cause service outages with AIOps and machine learning.* Automate IT service operations: Automate common service requests, processes, and tasks with digital workflows and virtual agents.* Optimize IT service delivery: Align your IT resources and investments with business priorities and optimize service delivery performance.References:* 1: ITOM – Enterprise IT Operations Management – ServiceNowNO.54 Based on this image, which of the following statements are true? (Choose three.)  Attributes from two tables populate a table with the same name as a ServiceNow CMDB table.  This operation is more than likely a part of a step on a pattern set to Application Pattern Type.  If a value is unmatched, it is still merged into the Target Table.  For this operation to run, there must be some data in the process.executablePath variable.  This is a horizontal pattern of type “infrastructure.” * A is true because the target table $cmdb_ci_web_server is a ServiceNow CMDB table that stores information about web servers1.* B is true because the merge table operation is typically used for application patterns, which are horizontal patterns that discover applications and their dependencies. The condition on the process.executablePath variable suggests that the operation is looking for a specific application (mongoose) running on the web servers.* D is true because the merge table operation requires at least one matching field value between the two source tables1. In this case, the process.executablePath variable is the matching field, and it must contain “mongoose” for the operation to run.References:* 1: Merge tables – Product Documentation: San Diego – Now Support Portal* 3: Product Documentation | ServiceNow* [4]: Discovery Patterns – Product Documentation: San Diego – Now Support PortalNO.55 A discovery pattern of type application can be used by both Horizontal Discovery and Vertical Discovery.Response:  True.  false. NO.56 What network protocol is needed to discover windows devices and what should be the permissions of the user?Response:  1) SNMP Protocol with community string1) WMI Protocol with username/password  2) Domain Administrator permission1) SSH Protocol with username/password, or private key  2) Root or Sudo privileges must be granted NO.57 Which of the following properties define the maximum overall size for the returned payload that comes from patterns?  cmdb.properties.payload_max_size  glide.discovery.payload_max  mid.discovery.max_payload_size  mid.discovery.max_pattern_payload_size The mid.discovery.max_pattern_payload_size property defines the maximum overall size for the returned payload that comes from patterns. This property is set on the MID Server and applies to all patterns that run on that MID Server. If the payload size exceeds this limit, the pattern execution fails and an error message is logged in the ECC queue. The default value of this property is 10 MB1.References: 1: ServiceNow Docs – MID Server properties for Discovery and Service Mapping 2: ServiceNow Docs – Discovery payload size and processingNO.58 Is a failover Midserver cluster load balanced?Response:  Yes  No, the next available midserver in a failover cluster takes over NO.59 Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)  system  computer_system  process  baseline Global variables are variables that are automatically available for all steps in horizontal discovery patterns.They store information about the target CI, such as its IP address, host name, operating system, and credentials. There are two global variables that may be used for steps in horizontal discovery patterns: system and computer_system. The system variable contains the information about the target CI’s IP address, host name, and credentials. The computer_system variable contains the information about the target CI’s operating system, such as its name, version, and architecture12.References:* Patterns and horizontal discovery – Product Documentation: Tokyo – Now Support Portal* Horizontal Pattern probe – Product Documentation: San Diego – Now Support PortalNO.60 For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)$IfTable<_>.InstanceID  [3]  [X]  [&]  [.]  [*]  [] For a pattern operation, the <_> placeholder can be replaced by any valid index or wildcard character that can be used to access an element of an array or a table. The $IfTable variable is a table that contains information about the network interfaces of a device1. The InstanceID attribute is a unique identifier for each interface2.To access the InstanceID of a specific interface, the pattern operation can use the following syntax:$IfTable[<index>].InstanceIDwhere <index> is either:* A numeric index that corresponds to the position of the interface in the table, such as 3 for the third interface.* A dot (.) followed by a key-value pair that matches a specific attribute and value of the interface, such as[.Name=eth0] for the interface with the name eth0.* An asterisk () that represents a wildcard that matches any interface in the table, such as [] for all interfaces.References:* 1: IfTable – Product Documentation: San Diego – ServiceNow* 2: InstanceID – Product Documentation: San Diego – ServiceNowNO.61 Based on the following images, which choice best describes what occurs if Discovery sets the name attribute of a discovered Windows Server CI to ‘Windows1’ and then Altiris discovery runs detecting ‘Windows2’ for the name attribute on the same CI?  The name of the CI stays ‘Windows1’.  The name of the CI changes to ‘Windows2’.  The name of the CI does not populate with either discovery.  The CI is not discovered because Discovery is not listed in either image. NO.62 To populate variables with two different parsing methods in Parse Variable pattern operation it is necessary to have ______ .Response:  two separate Define Parsing selections on a single step  a scalar and a tabular variable  two separate Debug Mode sessions  two different steps NO.63 Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)  JEA Properties set to True  MID Servers must be configured as a trusted source with DNS  MID Servers need to be added to the WinRM Group policy on the Servers  MID Server Parameters Add WinRM To allow a MID Server to access servers using WinRM, the following configurations are required:* MID Servers need to be added to the WinRM Group policy on the Servers: This enables the servers to accept WinRM connections from the MID Servers and grant them the necessary permissions to execute commands and scripts1.* MID Server Parameters Add WinRM: This enables the MID Server to use WinRM as a protocol for Discovery and Orchestration and specify the WinRM port, authentication method, and encryption settings2.References:* Configure Windows servers for WinRM* MID Server Parameters Add WinRMNO.64 A discovery runs against a Windows Server returning the following attribute values for the first time:name = WindowsSN1 serial_number = 12321A subsequent discovery is ran against a different Windows Server returning the following attribute values: name = WindowsSN2 serial_number = 12321 With only base system CI Identifiers configured, which of the following is true?  A Windows Server CI is created, then updated with WindowsSN2 as the name.  Two Windows Sewer CIs are created, with WindowsSN1 AND WindowsSN2 for names.  Two Windows Server CIs are created, without serial_number values.  A Windows Server CI is created, then updated with WindowsSN1 as the name. NO.65 SNMP Credentials ______ .Response:  need port 135 access  has to have usernames  must have write community strings  require read community strings NO.66 The following is displayed while discovering a new network device on a Discovery Status: “Active, couldn’t classify”. What could cause this error?Response:  Communication between target device and the MID Server blocked by a firewall.  No SNMP Classification exists for the new device.  Lack of SNMP only behavior configuration.  Incorrect SNMP credentials. NO.67 During which of the following phases a file-based Discovery is triggered?Response:  Identification  Classify  Scan  Pattern  Exploration NO.68 Which of the below choices are the most probable results of the following image? (Choose three.)  A tabular variable named ‘WMI Query’.  A scalar variable named ‘MaximumWorkingSetSize’  A scalar variable named ‘PageFaults’.  A scalar variable named ‘PeakVirtualSize’.  A tabular variable named ‘more_process_info’.  A tabular variable named ‘Win32_Process’. The image shows a part of a horizontal pattern in Pattern Designer that uses the WMI Query operation to retrieve information about the processes running on a Windows server. The operation takes a WQL query as an input parameter and returns a tabular variable that contains the results of the query. The tabular variable is named ‘WMI Query’ by default, but it can be renamed by the user. The WQL query in the image selects four attributes from the Win32_Process class: Name, MaximumWorkingSetSize, PageFaults, and PeakVirtualSize.These attributes are stored as scalar variables in the tabular variable, and they can be accessed by using the dot notation, such as WMI Query.Name or WMI Query.MaximumWorkingSetSize. Therefore, the most probable results of the image are a tabular variable named ‘WMI Query’ and two scalar variables named‘MaximumWorkingSetSize’ and ‘PeakVirtualSize’.References:* Pattern Designer | WMI Query* Win32_Process class* WQL (SQL for WMI)NO.69 Which of the following choices are only used for the Application Pattern Type? (Choose two.)  Run Order  Identification Section  CI Type  Operating System NO.70 The CMDB contains which of the following record types? (Choose two.)  Model  Configuration Item (CI)  Asset  Relation Type NO.71 You should use ______ when using the SNMP Query operation.Response:  the management Information Base (MIB) from the SNMP Browser in the step  Multiple Variable Types  Scalar Variable Types  the management information base (MIB) from the manufacturer of the device you are targeting NO.72 In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)  tcp to udp  application to application  mid server to target  host to application Discovery can provide information about the relationships between configuration items (CIs), including applications and hosts. Application relationships are the connections between applications that run on different hosts or servers, such as web servers, databases, load balancers, etc. Host relationships are the connections between applications and the hosts or servers that they run on, such as Windows, Linux, Unix, etc. Discovery can identify these relationships using various methods, such as probes, sensors, patterns, file-based discovery, etc. Discovery can also create and update these relationships in the CMDB, using the Depends on::Used by or Runs on::Runs relationship types.References: Discovery Relationship Creation, Application Discovery Mapping Overview, IT Discovery – Application Dependency MappingNO.73 Which of the following choices must be installed on a MID Server to run Credential-less Discovery?  Credential-less Extension  Nmap  Advanced IP Scanner  Defender Credential-less Discovery is a feature of ServiceNow Discovery that allows the instance to identify configuration items (CIs) without using credentials. Credential-less Discovery uses Network Mapper (Nmap), a free and open-source network scanner, to collect information about the CIs by sending packets and analyzing the responses. Nmap must be installed on the MID Server that runs Credential-less Discovery. Credential-less Discovery can be used as a fallback option when credential-based probes fail, or as a primary option for scanning certain types of devices, such as network devices, printers, or IoT devices12.References:* Credential-less Discovery with Nmap – Product Documentation: San Diego – Now Support Portal* Credential-less host Discovery – ServiceNow – Now Support Loading … CIS-Discovery Questions PDF [2024] Use Valid New dump to Clear Exam: https://www.validbraindumps.com/CIS-Discovery-exam-prep.html --------------------------------------------------- Images: https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2024-07-09 10:15:07 Post date GMT: 2024-07-09 10:15:07 Post modified date: 2024-07-09 10:15:07 Post modified date GMT: 2024-07-09 10:15:07