Halloween 2025 - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CIS-SM Sample Questions Answers

Questions 4

When using Service Mapping Pattern Designer, which one of the following is the result when using the Parse command output operation with the following command?

cat /etc/haproxy/haproxy.cfg

Options:

A.

Search for the file haproxy.cfg

B.

List all files in the haproxy.cfg directory

C.

Display lines with cat in the file haproxy.cfg

D.

Display the contents of the file haproxy.cfg

Buy Now
Questions 5

In the image, which one of the following best describes the lower icons?

Options:

A.

The connections from HAProxy are to other CIs that had errors during discovery.

B.

The connections from HAProxy are application clusters.

C.

The connections from HAProxy could not be identified and are marked as a Generic Application.

D.

The connections from HAProxy are marked as boundaries.

Buy Now
Questions 6

Which of the following represents the skills needed that a Service Mapping administrator or implementer should have? (Choose four.)

Options:

A.

Understanding of XML, Regex, Delimited text, and JSON

B.

Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST

C.

Scripting capabilities with respect to Unix and Windows commands

D.

Intermediate or above Windows and Unix administration skills

E.

Sufficient skills to build an enterprise web site

F.

Understanding of relational database theory

Buy Now
Questions 7

In Event Management, if a Message key is not passed from an Event, which of the following Alert fields combine to populate the Message key on an Alert?

Options:

A.

Task, Description, Created

B.

Node, Type, Resource, Number

C.

Source, Number, Task

D.

Source, Node, Type, Resource

Buy Now
Questions 8

In Service Mapping, which one of the following best describes the process of discovery after an Entry Point is configured?

Options:

A.

For each pattern that supports the Entry Point Type, run all the Identification Sections and run all Extension Sections.

B.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run all Extension Sections for the pattern.

C.

For each pattern that supports the Entry Point Type, run all the Identification Sections that finish successfully and then run each Extension Section for the pattern.

D.

For each pattern that supports the Entry Point Type, run Identification Sections until one finishes successfully and then run Extensions Sections until one finishes successfully.

Buy Now
Questions 9

ServiceNow only needs Domain user with local admin rights to discover Windows hosts as part of a successful implementation of ServiceNow Discovery, however which of the following targets will not be discovered?

Options:

A.

Windows Active Directory Servers

B.

Windows DHCP Servers

C.

Windows Domain Controller Servers

D.

Windows DNS Servers

Buy Now
Questions 10

Which one of the following describes when the MID Server config.xml file is read and used?

Options:

A.

Config.xml file updated and saved

B.

Config.xml file created and saved

C.

MID Server application stop

D.

MID Server application start

Buy Now
Questions 11

When building a Discovery Pattern, which one of the following operations results in a termination of the Identification or Connection Section if a condition is not met?

Options:

A.

Set Parameter Value

B.

Merge Table

C.

Filter Table

D.

Match

Buy Now
Questions 12

Within the CMDB, all application CI Types/Classes are children of which parent class?

Options:

A.

Database Instance [cmdb_ci_db_instance]

B.

Software [cmdb_ci_software]

C.

Installed Software [cmdb_ci_installed_software]

D.

Application [cmdb_ci_appl]

E.

Licenses [cmdb_ci_license]

Buy Now
Questions 13

Which of the following are methods used to initiate discovery on a service? (Choose three.)

Options:

A.

Map multiple services suggested by Service Mapping by discovering the load balancers in an enterprise.

B.

Map multiple services by importing entry points from a CSV file.

C.

Map a single service defined by configuring an entry point.

D.

Map services suggested by the discovery of MID Servers in an enterprise.

E.

Map services based on Assets stored in the CMDB.

Buy Now
Questions 14

When using Pattern Designer, which one of the following best describes a variable $proxy_urls[+].host?

Options:

A.

The proxy_urls value for the first row of the host table

B.

The proxy_urls values from all rows of the host table

C.

The host field values from all rows of the proxy_urls table

D.

The host field value for the first row of the table proxy_urls

Buy Now
Questions 15

In Service Mapping, which one of the following can be useful in determining which Patterns, Identification Sections, Connection Sections, and Steps are tried?

Options:

A.

Workflow Log

B.

Discovery Log

C.

System Log

D.

ECC Log

Buy Now
Questions 16

In the following image of the Discovery Log, the green S represents which one of the following?

Options:

A.

A library in the Connection Section of a pattern

B.

A step in the Connection Section of a pattern

C.

A step in an Identification Section of a pattern

D.

A library in an Identification Section of a pattern

Buy Now
Questions 17

Which is the most common risk that can negatively impact a Service Mapping engagement?

Options:

A.

The customer is not using Active Directory for credential authentication

B.

The customer external firewall only communicates on outbound port 80 and 443

C.

The customer security team is not made aware early enough in the engagement of the credential requirements

D.

The MID Server resource requirements are beyond capacity of the customer

Buy Now
Questions 18

Which one of the following Regular Expressions could be used to parse "San Diego" from the string "Location San Diego"?

Options:

A.

Location (\W) (\w)

B.

Location (L*)

C.

Location (\w+ \w+)

D.

Location (W)

Buy Now
Questions 19

Assuming the Apache Web Server Identification Rule (CI Identifier) is configured as shown with the following

Criterion attributes:

    Class

    Configuration file

    Version

Yesterday, an Apache Web Server CI was discovered as part of Service Mapping. Today, the application owner upgraded the Apache Web Server to a different version and reran discovery of the service. What will happen in the CMDB?

Options:

A.

A duplication error will occur.

B.

A new Apache Web Server CI is created.

C.

The existing Apache Web Server CI will be reconciled with the upgraded Apache Web Server CI and its version will be updated.

D.

The Apache Web Server CI will be reclassified as a Web Server CI.

Buy Now
Questions 20

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string?

Version 5.2.0

Options:

A.

Version (\.*)

B.

Version\s+(\d+\.\d+\.\d+)

C.

Version (\d+)

D.

Version (\d+).(\d+).(\d+)

Buy Now
Questions 21

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?

Options:

A.

Reclassification Tasks

B.

Identification Rules

C.

Datasource Precedence Rules

D.

Reconciliation Rules

Buy Now
Questions 22

A CI Type is also known as which one of the following?

Options:

A.

Table

B.

Discovery Pattern

C.

Service Group

D.

CI Identifier / Identification Rule

Buy Now
Questions 23

In the following image, the 5x next to Citrix XenA represents which one of the following?

Options:

A.

Five errors while identifying the CI

B.

Five discovery executions on the CI

C.

Five members of a cluster

D.

Five outgoing connections from the cluster

Buy Now
Questions 24

Which represents the skills needed that a Service Mapping administrator or implementer should have?

Choose 4 answers

Options:

A.

Understanding of relational database theory

B.

Understanding of XML, Regex, Delimited text, and JSON

C.

Intermediate or above Windows and Unix administration skills

D.

Scripting capabilities with respect to Unix and Windows commands

E.

Sufficient skills to build an enterprise website

F.

Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST

Buy Now
Questions 25

After discovering load balancers in a customer environment, service candidates may appear on the Service Mapping Home page under which one of the following tiles?

Options:

A.

Map

B.

Fix

C.

Approve

D.

Completed

E.

Review

Buy Now
Questions 26

In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?

Options:

A.

Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed.

B.

Identification Sections are executed randomly and the data gathered by the successful sections are merged.

C.

Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used.

D.

Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase.

Buy Now
Questions 27

Which one of the following ServiceNow application KPIs would improve most as a direct result of having visibility to a service map created through Service Mapping?

Options:

A.

Problem Management: Number of Incidents per Known Problem

B.

Incident Management: Mean Time to Resolve

C.

Event Management: Signal to Noise Ratio

D.

Change Management: Number of Major Changes

Buy Now
Questions 28

Which one of the following is a public IP Address?

Options:

A.

172.20.5.9

B.

225.16.0.5

C.

192.168.100.100

D.

10.0.6.8

Buy Now
Questions 29

Which address is required for Service Mapping to discover a Load Balancer that does not previously exist in the CMDB?

Options:

A.

Management IP address

B.

MAC address

C.

Public IP address

D.

MIB address

Buy Now
Questions 30

Service Mapping uses which table to build tag-based maps from?

Options:

A.

Application Service [cmdb_ci_service_discovered]

B.

Application [cmdb_ci_app]

C.

Key Value [cmdb_key_value]

D.

Servers [cmdb_ci_server]

Buy Now
Questions 31

In Service Mapping, when discovery is started, what is the execution strategy used to run Connection Sections?

Options:

A.

Connection Sections are executed one by one and connections will result from each successful section.

B.

Connection Sections are executed randomly and connections will result from each successful section.

C.

Connection Sections are executed one by one in the order they are listed until the first successful section.

D.

Connection Sections are executed one by one in the order they are listed with a connection created from the last successful section.

Buy Now
Exam Code: CIS-SM
Exam Name: Certified Implementation Specialist - Service Mapping
Last Update: Nov 3, 2025
Questions: 106
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CIS-SM