Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIS-ITSM Exam Dumps - Certified Implementation Specialist - IT Service Management

Question # 4

Even Though some catalog items approval workflow might be similar, it is recommended to have separate approval workflow for each catalog item.

A.

True

B.

False

Full Access
Question # 5

Which of the following can be achieved by a user with itil role? (Choose three.)

A.

Reconcile CIs

B.

Import CIs

C.

Create CI

D.

Delete CI

E.

Subscribe to CI

Full Access
Question # 6

If you modify base instance process, it will be skipped during upgrades.

A.

True

B.

False

Full Access
Question # 7

When does the requested item workflow initiate?

A.

Upon confirmation by the requester

B.

There’s no workflow attached to requested items

C.

Upon submission of the request

D.

Upon approval of the request

Full Access
Question # 8

What is the intent of the Watch List in some notifications?

A.

To copy people on notifications sent to the assignee.

B.

None of the listed answers.

C.

To copy people on notifications sent to the assignment group.

D.

To copy people on notifications sent to the caller.

Full Access
Question # 9

Which table is used to store Known Error articles?

A.

kb_article

B.

kb_knowledge

C.

kb_knowledge_article

D.

kb_template_known_error_article

Full Access
Question # 10

Which of the following actions on the Incident table require the itil_admin role?

A.

Update Incident

B.

Close Incident

C.

Archive Incident

D.

Delete Incident

Full Access
Question # 11

Which of the following tables is used to store knowledge articles?

A.

kb_knowledge

B.

None of the listed answers

C.

kb_article

D.

kb_knowledge_article

Full Access
Question # 12

Which of the following outlines the ways changes may be related to incidents?

A.

Incidents may be caused by changes. Investigation of incidents may indicate the need for a change.

B.

Incidents cause changes. Investigation of changes may indicate the need for incidents to be generated.

C.

A change is required to investigate the cause of an incident.

D.

Incidents and changes are separate processes that have little interaction.

Full Access
Question # 13

Which of the following fields in the Choice form specifies the field for which this choice is made?

A.

Dependent value

B.

Element

C.

Value

D.

Field

Full Access
Question # 14

In the baseline platform configuration, a Configuration Item must be specified before Approvals are requested for a Change Request.

A.

True

B.

False

Full Access
Question # 15

Which of the following CANNOT be performed by catalog_editor role?

A.

Update Catalog.manager

B.

Maintain Categories

C.

Maintain Catalog Item

D.

Update Catalog Definition

Full Access
Question # 16

Which of these are considered configuration base items? (Choose three.)

A.

Printers

B.

Database Catalogs

C.

Out-of-Band Devices

D.

Network Gears

E.

Cluster Nodes

Full Access
Question # 17

When referring to the State of an incident in server-side code (such as in a script include, business rule, or UI action), which method is the preferred way to refer to the State field value?

A.

Use the getDisplayValue() method to retrieve the Label associated with the State field value.

B.

If a Constant has been defined, such as Incident.State.IN_PROGRESS, use the Constant.

C.

Use the value of the choice option, such as 2 to refer to a State of in Progress.

Full Access
Question # 18

Which of the following describes the purpose of User Criteria when used in the Service Catalog application?

A.

Pre-fill user preferences on Catalog order forms

B.

Replace Access Controls to provide security to Requests

C.

Determine who can see Categories and Items

D.

Determine who can see Catalogs and Items

Full Access
Question # 19

Which of the following plugins is needed in order to add a survey when calculating risk in change requests?

A.

No additional plugin is needed to add additional factors to calculate risk

B.

Change Management - Risk Assessment

C.

Change Management - Additional Factors

D.

Change Management - Risk Survey

Full Access
Question # 20

Which of the following outlines the ways Changes may be related to Incidents?

A.

Incidents and Changes are separate processes that have little interaction

B.

Incidents cause Changes. Investigation of Changes may indicate the need for Incidents to be generated

C.

Incidents may be caused by Changes. Investigation of Incidents may indicate the need for a Change

D.

A Change is required to investigate the cause of an Incident

Full Access
Question # 21

Which of the following service catalog variable types are NOT supported in Mobile Classic interfaces? (Choose four.)

A.

Label

B.

Container Start

C.

HTML

D.

Lookup Select Box

E.

IP Address

F.

UI Page

Full Access
Question # 22

Which of the following approaches is used to display a variable from a requested item on a Catalog Task form?

A.

In the Catalog Task Activity within the Item's fulfillment workflow, write a Script to retrieve and set Catalog Task field values.

B.

In the Catalog Task Activity within the Item's fulfillment workflow, select variables to be displayed in the Variables on Task Form field.

C.

In the Catalog item, set Cascade Variables to true.

D.

In the Catalog item, set Display Variables in Catalog Tasks to true.

Full Access
Question # 23

An Inbound Action processes an email received by ServiceNow to create or update a record in ServiceNow.

A.

True

B.

False

Full Access
Question # 24

Which type of records use the default Variables Editor (formatter) to display Catalog Item Variables on a form?

A.

Requested Item records, Catalog Task record, and all Tasks created by Record Producers

B.

Any type of record created from Record Producers

C.

Tasks created from Record Producers, Requests, Requested Items

D.

Requested Item records, Catalog Task records, and Request records

Full Access
Question # 25

Which of the following reports are available for incidents in the baseline instance? (Choose three.)

A.

Closed Incidents

B.

Incidents Open per Month

C.

Critical Open Incidents

D.

Incidents Open per Week

E.

Incidents by Priority and State

Full Access
Question # 26

What will be the new state once you click on the "Confirm" button in the problem form?

A.

Closed

B.

Resolved

C.

Root Cause Analysis

D.

Fix in Progress

Full Access
Question # 27

Which mechanism is used to specify who can read Articles and who can contribute Articles in a Knowledge Base?

A.

Knowledge Category Attributes

B.

User Criteria

C.

Filter Criteria

D.

Access Control Rules

Full Access
Question # 28

The contextual search feature allows end users to see related knowledge articles, catalog items, resolved incidents and resolved problems to help them solve their problem before they raise an incident.

A.

True

B.

False

Full Access
Question # 29

Field Decorations are controlled by the "ref_contributions" attribute.

A.

True

B.

False

Full Access
Question # 30

Map to field functionality is NOT supported for variables added inside a variable set.

A.

True

B.

False

Full Access
Question # 31

Catalog UI Policies CANNOT be included within variable sets.

A.

True

B.

False

Full Access
Question # 32

Which one of the following workshops identifies the technical requirements for implementation?

A.

Implementation workshop

B.

Roadmap workshop

C.

Technical workshop

D.

Process workshop

Full Access
Question # 33

Which of the following ways can be used to create configuration items? (Choose all that apply.)

A.

Creation via service catalog fulfillment process

B.

Manual creation via configuration application modules

C.

Automated discovery tools

D.

Integration with 3rd party system

E.

Import from external source

Full Access
Question # 34

Which type of Service Catalog component allows a user to describe their needs, choose options, and then check out ordering multiple items at once

according to their selections?

A.

Content Item

B.

Catalog Item

C.

Execution Plan

D.

Order Guide

Full Access
Question # 35

Because of its agile nature, implementation of ServiceNow processes should compromise quality in favor of speed of delivery. Issues can be fixed later, easily.

A.

True

B.

False

Full Access
Question # 36

What is the relationship between User table and Role table?

A.

Many-to-many

B.

One-to-many (one user can have many roles)

C.

One-to-one

D.

One-to-many (one role can be assigned to many users)

Full Access
Question # 37

Requirements gathered in workshops should be validated against scope before adding them to the backlog.

A.

True

B.

False

Full Access
Question # 38

You can create only one change request from an incident.

A.

True

B.

False

Full Access
Question # 39

Which of the following fields does ServiceNow recommend to move to the Advance view of the catalog item form? (Choose two.)

A.

No subtotal

B.

No cart

C.

Omit price in cart

D.

Shopping cart label

E.

Show shopping cart

Full Access
Question # 40

Using User Criteria, access to catalog categories and catalog items can be applied based on _____________. (Choose three.)

A.

Cost center

B.

Country

C.

Location

D.

Department

E.

Group

Full Access
Question # 41

How is access to knowledge articles administered?

A.

Filter Conditions on the knowledge base

B.

User Criteria and User Roles

C.

User Roles

D.

User Criteria and Entitlements

Full Access
Question # 42

Which of the following roles can delete a change?

A.

itil

B.

change_manager

C.

itil_admin

D.

None of the listed answers

Full Access
Question # 43

Which of the following statements is true regarding configuration items and the table extended?

A.

Neither of technical nor non-technical configuration items extend directly from Base Configuration Item table.

B.

Only non-technical configuration items extend directly from Base Configuration Item table.

C.

Both technical and non-technical configuration items extend directly from Base Configuration Item table.

D.

Only technical configuration items extend directly from Base Configuration Item table.

Full Access
Question # 44

Configuration items (Cls) can be connected to each other. Terms such as Runs on, Depends On, or Contains are examples of a _____________.

A.

CI Dependency

B.

Relationship Type

C.

CI Attribute

D.

Related List

Full Access
Question # 45

According to ServiceNow, it is recommended to use Widgets instead of Macros.

A.

True

B.

False

Full Access
Question # 46

When can a user (who has no assigned roles in the system) close an incident?

A.

When the user is the Caller and the incident's State is Resolved.

B.

When the user is the Caller or on the Watch list and the incident's State is Resolved.

C.

When the user is the Caller and the incident's State is not already closed.

D.

When the user is the Caller and the incident's State is not already resolved.

Full Access
Question # 47

In the baseline platform configuration, a end-user with no assigned roles can read an Incident when they are _________.

A.

Caller or the Caller's Delegate

B.

Caller, Opened By or on the Work Notes List

C.

Caller, Opened By or on the Watch List

D.

Opened By or the Configuration Item's business owner

Full Access
Question # 48

How can you remove demo data?

A.

In the settings, you can check the "Remove demo data" check box.

B.

You have to go through the tables and select all records and delete them.

C.

You can request that through the HI portal.

D.

You have to deactivate the ITSM Foundation plugin and activate it again without selecting the "demo data" check box.

Full Access
Question # 49

Which table is used to store Q&A data for knowledge articles?

A.

kb_qa

B.

kb_social

C.

kb_social_qa_question

D.

kb_social_qa

Full Access
Question # 50

Benchmarks provide comparative insights relative to industry averages.

A.

False

B.

True

Full Access
Question # 51

In the baseline platform configuration, which Incident Management function is limited to users with roles of either itil_admin or admin?

A.

Close Incident

B.

Delete Incident

C.

Reopen Incident

D.

Archive Incident

Full Access
Question # 52

Which of the following is NOT a way service catalog requests may be submitted in a baseline ServiceNow instance?

A.

From an inbound email

B.

From the service catalog

C.

From the service portal

D.

From an incident record

Full Access
Question # 53

Which platform feature is used to track field value durations, such as the length of time an Incident spent in each State or the length of time an Incident

was assigned to each group?

A.

Key Performance Indicator (KPI)

B.

Metric

C.

Database view

D.

Audit

Full Access
Question # 54

Configuration items can be created from asset management.

A.

True

B.

False

Full Access
Question # 55

True or False:

Users with the itil role can delete an Incident.

A.

True

B.

False

Full Access
Question # 56

For each Requested Item, a _________ enables the approval and delivery of that Item.

A.

User Criteria

B.

Work Order

C.

Catalog Item

D.

Workflow

Full Access
Question # 57

Which module to use in order to change the default behavior of "Communicate Workaround" in problems?

A.

Configurations > UI Actions

B.

System Policy > Script Actions

C.

System Policy > UI Actions

D.

Configurations > Script Actions

Full Access
Question # 58

g_scratchpad CANNOT be used in catalog items.

A.

True

B.

False

Full Access
Question # 59

Change tasks can manually be added in the following states. (Choose three.)

A.

Canceled

B.

Implement

C.

Authorize

D.

Closed

E.

Assess

Full Access
Question # 60

Can a group have a parent group?

A.

Yes

B.

No

Full Access
Question # 61

When an end-user (with no roles in the platform) submits an Incident using the Self-Service interface or Service Portal, Related Search Results

automatically display search results from Knowledge Bases and Service Catalogs. These Related Search Results are a form of __________ ?

A.

Live Agent Intervention

B.

Incident Avoidance

C.

Service Marketing

D.

Incident Deflection

Full Access
Question # 62

Default Variables Editor is used to edit catalog items.

A.

True

B.

False

Full Access
Question # 63

Which of the following statements is true regarding Group Type?

A.

Every group can have zero or more types.

B.

None of the listed answers.

C.

Every group can have one or more types.

D.

Every group can have one type.

Full Access
Question # 64

Which one of the following represents the overall lifecylce of a Request?

A.

Submittal -> Approval -> Fulfillment -> Closure

B.

Approval -> Submittal -> Fulfillment -> Closure

C.

Approval -> Submittal -> Delivery -> Resolution

D.

Submittal -> Approval -> Resolution -> Closure

Full Access
Question # 65

By which of the following CMDB aids ITSM processes. (Choose three.)

A.

Identify the affected applications which helps in prioritization.

B.

Automatically repair affected configuration items.

C.

Identifying potential upstream or downstream impacts.

D.

Identify the preferences of the requester user based on profile data.

E.

Associating configuration items to incidents, problems or change records.

Full Access