Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIS-EM Exam Dumps - Certified Implementation Specialist-Event Management Exam

Question # 4

What two key steps must be performed after creating a new connector instance? (Choose two.)

A.

Assign a MID Server to the connector

B.

Enter credentials for the connector

C.

Debug the connector

D.

Test the connector

E.

Activate the connector

Full Access
Question # 5

MID Servers provide important functions in your ITOM Health deployment.

What does MID stand for?

A.

Management, Instrumentation, and Discovery

B.

Messaging, Integration, and Data

C.

Monitoring, Insight, and Domain

D.

Maintenance, Information, and Distribution

Full Access
Question # 6

Which attribute is responsible for de-duplication?

A.

Metric_name

B.

Message_key

C.

Short_description

D.

Additional_info

Full Access
Question # 7

For an incoming event with a matching message key, what allows an existing alert to be automatically closed?

A.

In the event rule, set the Severity to 0

B.

In the alert rule, set the Severity to 0

C.

In the alert rule, set the Severity to -1

D.

In the event rule, set the Severity to -1

Full Access
Question # 8

When creating event rules, is it best practice to create:

A.

Two rules for every event

B.

As many rules as possible

C.

As few rules as possible

D.

One rule for every event

Full Access
Question # 9

What is the default collection/polling interval applied to all event connectors?

A.

Every 120 seconds

B.

Every 5 seconds

C.

Every 40 seconds

D.

Every 60 seconds

E.

Every 10 seconds

Full Access
Question # 10

Within an event rule, how would you parse a nodename out of your raw event data?

A.

JavaScript

B.

Groovy script

C.

PowerShell script

D.

Regex statement

Full Access
Question # 11

How would you ensure the quality of data in your Configuration Management Database (CMDB) over time?

A.

Manually inventorying configuration items in the CMDB and eliminating duplicate configuration items (CIs)

B.

Only use the ServiceNow Discovery application to populate your CMDB

C.

Using only scripts to automatically monitor for and remediate duplicate configuration items (CIs)

D.

Having well-defined Identification, Reconciliation, and Relationship rules

Full Access
Question # 12

Which is not a valid method for accessing alert intelligence?

A.

In the right-click menu of an alert list, select Open in Workspace

B.

By appending/workspace to your instance URL

C.

The application navigator Alerts Console menu item

D.

The application navigator Alert Intelligence menu item

E.

Within an open alert record, click the Open in Workspace button

F.

Select the Lists tab in operator workspace

Full Access
Question # 13

How would you interpret the following data in the Operational Intelligence Insights Explorer?

A.

win-ces882ierw is one of your hottest Configuration Items (CIs) that is currently experiencing a high probability of anomalies and should be checked immediately

B.

win-ces882ierw is one of your hottest Configuration Items (CIs), but is currently experiencing a low probability of anomalies

C.

win-ces882ierw is one of your customized list of monitored Configuration Items (CIs) that is currently experiencing a high probability of anomalies and should be checked immediately

D.

win-ces882ierw is one of your customized list of monitored Configuration Items (CIs), but is currently experiencing a low probability of anomalies

Full Access