Easter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CIS-EM Sample Questions Answers

Questions 4

If the Message Key is not populated, the default value is created from which fields?

Options:

A.

Source, type. node, resource, and metric name

B.

Source, source instance, node, and resource

C.

Source, type. node, and metric name

D.

Source, source instance, node, and type

E.

Source, type. node, resource, and time of event

Buy Now
Questions 5

What attribute is used to consolidate events into a single alert?

Options:

A.

Event Rules

B.

Message Key

C.

Alert Priority

D.

Severity

Buy Now
Questions 6

Which attribute correlates multiple events to one alert?

Options:

A.

Additional_info

B.

Message_key

C.

Metric_name

D.

Short_description

Buy Now
Questions 7

By default, Event Management tries to bind an alert to CI (configuration item), by matching the node name in the event to which three items in the CMDB (configuration management database)?

Options:

A.

CI name, Fully qualified domain name, IP or MAC address

B.

CI name, Webserver name, IP or MAC address

C.

CI name, Fully qualified domain name, SSH public host keys

D.

System class name, Fully qualified domain name, IP or MAC address

Buy Now
Questions 8

What is Event Management licensing based on?

Options:

A.

The number of unique nodes that can send events to the instance

B.

The number of connectors and listeners it will collect data from

C.

The number of connectors it will collect data from

D.

The number of CIs in the CMDB that it will be monitoring

Buy Now
Questions 9

To determine the top incidents for the CI associated with an alert, where is the best place to look?

Options:

A.

Alert Insights

B.

Incident List View

C.

CMDB Health Dashboard

D.

Event Management Overview page

Buy Now
Questions 10

What two key steps must be performed after creating a new connector instance? (Choose two.)

Options:

A.

Assign a MID Server to the connector

B.

Enter credentials for the connector

C.

Debug the connector

D.

Test the connector

E.

Activate the connector

Buy Now
Questions 11

What is the minimum role needed to view alerts?

Options:

A.

alert_operator

B.

evt_mgmt_user

C.

evt_mgmt_operator

D.

alert_user

Buy Now
Questions 12

What three areas of data quality does the CMDB Health Dashboard focus on? (Choose three.)

Options:

A.

Correctness

B.

Completeness

C.

Configuration

D.

Conciseness

E.

Conformity

F.

Compliance

Buy Now
Questions 13

What is the preferred method of parsing in the Transform/Compose step of an event rule?

Options:

A.

Python

B.

Regex

C.

sed/awk

D.

JavaScript

Buy Now
Questions 14

For an incoming event with a matching message key, what allows an existing alert to be automatically closed?

Options:

A.

In the event rule, set the Severity to 0

B.

In the alert rule, set the Severity to 0

C.

In the alert rule, set the Severity to -1

D.

In the event rule, set the Severity to -1

Buy Now
Questions 15

Which is the best option to reduce latency issues when receiving events?

Options:

A.

Verify bucket field in em_event table > 0

B.

Verify event_processor_job_count = 2

C.

Verify event_processor_job_count = 0

D.

Verify event_processor_enable_multi_node = 2

Buy Now
Questions 16

When are anomaly alerts generated by Operational Intelligence displayed in alert intelligence?

Options:

A.

When the statistical model threshold is breached

B.

When they are promoted to IT alerts

C.

When it is manually promoted in insights explorer

D.

When the anomaly score is greater than 100

Buy Now
Questions 17

Copies of checks that have been included in Agent Client Collector policies are known as what?

Options:

A.

Check definitions

B.

Check models

C.

Check clones

D.

Check mirrors

E.

Check instances

Buy Now
Questions 18

What would you use to define the monitoring sources allowed to communicate with the ServiceNow instance for Operational Intelligence?

Options:

A.

Metric Registration

B.

Metric Config Rules

C.

Metric Type Actions

D.

Metric to CI

Buy Now
Questions 19

In default configuration using baseline connectors, how often is event data collected from event sources?

Options:

A.

Once every minute

B.

Every 2 minutes

C.

Twice every minute

D.

Every 5 minutes

Buy Now
Questions 20

Agent Client Collector can perform application service monitoring by configuring what option?

Options:

A.

An alert management rule

B.

A proxy agent

C.

A distributed cluster

D.

An event rule

E.

A REST API

Buy Now
Questions 21

In your environment, no alert CMDB, automated, or text based grouping is occurring. What is most likely the problem?

Options:

A.

No correlation rules have been defined

B.

No event management rules have been defined

C.

Application services are not operational

D.

No CMDB is configured

E.

The alert correlation property that enables grouping is set to false

Buy Now
Questions 22

When creating event rules, is it best practice to create:

Options:

A.

Two rules for every event

B.

As many rules as possible

C.

As few rules as possible

D.

One rule for every event

Buy Now
Questions 23

What missing attribute would cause an event to have a state of Error?

Options:

A.

Metric Name

B.

Source

C.

Classification

D.

Node

E.

Severity

Buy Now
Questions 24

Which is an invalid state for an alert?

Options:

A.

Flapping

B.

Closed

C.

Reopen

D.

Processed

Buy Now
Questions 25

Processing on an event will create a state of error if what value is not set?

Options:

A.

Node

B.

Source

C.

Severity

D.

Message Key

E.

Resource

Buy Now
Questions 26

The additional information field is a JSON string that gives more information about an event. An example of a supported JSON string is:

Options:

A.

{"CPU":100}

B.

{"CPU":100,’Status":3}

C.

{"CPU":"100","Status":3}

D.

{"CPU":"100"}

Buy Now
Questions 27

You have a system configured with a MID Web Server using Basic authentication to enable Operational Management Intelligence (OI) to push raw metric data to the MID Server. No data is getting through to the MID Server.

What is the most likely cause of the issue?

Options:

A.

The MID Web Server needs to be Restarted

B.

The MID Web Server needs to be Started

C.

An invalid secret key is being passed in the header information of the URL for the REST request

D.

An invalid password is set in the MID Web Server Context

Buy Now
Exam Code: CIS-EM
Exam Name: Certified Implementation Specialist - Event Management Exam
Last Update: May 14, 2024
Questions: 92
$64  $159.99
$48  $119.99
$40  $99.99
buy now CIS-EM