Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIS-SM Exam Dumps - Certified Implementation Specialist - Service Mapping

Go to page:
Question # 17

Which of the following commands does Service Mapping run on Linux-based targets that requires elevated privileges (i.e. sudo)?

A.

dir

B.

type

C.

service

D.

netstat

Full Access
Question # 18

To begin the configuration of tag-based services, tag values must be defined where?

A.

Tag categories

B.

Tag catalogs

C.

Tag-based service families

D.

Tag libraries

Full Access
Question # 19

A CI Type is also known as which one of the following?

A.

Table

B.

Discovery Pattern

C.

Service Group

D.

CI Identifier / Identification Rule

Full Access
Question # 20

In Pattern Designer, which one of the following best describes the Create Connection step?

A.

Provides information about integrations to the host

B.

Provides information about relationships between cluster members

C.

Provides information about outbound connections to other CIs

D.

Provides information about relationships between the host and installed software

Full Access
Question # 21

Which one of the following can be used to enable patterns to search for additional attributes and modify discovery logic defined in an Identification Section without modifying the baseline pattern and potentially impacting upgrades?

A.

Add step(s) to the pattern’s Identification Section.

B.

Add step(s) to the pattern’s Connection Section.

C.

Add step(s) to the pattern’s Extension Section.

D.

Add step(s) to the pattern’s Update Set.

E.

Add step(s) directly to the NDL code.

Full Access
Question # 22

What component does Apache Tomcat represent in the following top-down topology?

Cisco ACE ➝ Apache Tomcat cluster ➝ JBoss cluster ➝ Oracle database

A.

Authentication provider

B.

The function of the Apache Tomcat in this example is not conclusive

C.

Monitoring server

D.

Web server

Full Access
Question # 23

Which best describes what Identification Rules are?

A.

Used to track duplicate CIs until resolved

B.

Consists of one or more identifier entries that specify the criterion attributes that uniquely identify a CI

C.

Used by the coalesce field when importing data into ServiceNow using a transform map

D.

Allows the ability to assign a priority to data sources if multiple data sources are authorized to update the same table or table attributes

Full Access
Question # 24

Which one of the following Linux commands can be used by a non root user to return the process ID listening on port 8080?

A.

sudo netstat -an -p TCP | grep :8080

B.

sudo netstat -anp | grep :8080

C.

netstat -anp | grep :8080

D.

netstat -an -pid * | grep :8080

Full Access
Go to page:

Hot Exams