ServiceNow cis discovery practice test

certified implementation specialist - discovery

Last exam update: Nov 07 ,2025
Page 1 out of 10. Viewing questions 1-10 out of 100

Question 1

One method for deleting specific CIs not discovered in 30days is:

  • A. Scheduled Job
  • B. UI Policy
  • C. Service Mapping
  • D. Data Policy
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

The deletion strategy is set to Mark as absent for related Disk CIs discovered via the Linux Server pattern. If a related Disk CI is discovered during the Linux Server discovery and then the same related Disk CI is not found the next time the Linux Server is discovered, the following will happen:

  • A. The Disk Status CI (install_status) is set to Absent.
  • B. The Disk CI Operational Status (operational_status) is set to Non-Operational.
  • C. The Linux Server CI Operational Status (operational_status) is set to Non-Operational.
  • D. The Linux Server CI Status (install_status) is set to Absent.
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What does the MID Server need to collect vCenter events?

  • A. vCenter Event Collector extension
  • B. MID SNMP Trap Listener extension
  • C. Firewall
  • D. vCenter probes
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following describes the recommended permission level for credentials to discover Windows Servers?

  • A. A standard domain user with read access
  • B. A domain user with local administrator access
  • C. A user with root access across the domain
  • D. A domain administrator with sudo access
Mark Question:
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the choices best describes a tabular variable in a discovery pattern?

  • A. A single column
  • B. A single string
  • C. Each cell is a CI attribute
  • D. Each cell is a scalar variable
Mark Question:
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which choice best describes a horizontal discovery pattern?

  • A. Steps that execute operations
  • B. Credential depot
  • C. Port scanning tool
  • D. Classifiers that execute probes
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

A config file for an application has the following three lines:
Line 1: app build 1.2.3.4 version 5.14
Line 2: installation_dir=c:\opt\bin
Line 3: build_type=Server.
Which methods below will extract the build and version numbers from these lines using a horizontal discovery pattern? (Choose two.)

  • A. Get Process operation with correct Port
  • B. Find Matching URL operation with Target Variable
  • C. Parse File operation with Delimited Text parsing strategy
  • D. Parse File operation with Regular Expression parsing strategy
Mark Question:
Answer:

ad

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

For what is File Based Discovery used?

  • A. To discover the checksum of a file and store it to track for changes
  • B. To discover the contents of flat files such as configuration files
  • C. To discover that file names conform to a defined naming standard
  • D. To discover file paths to recognize the signature of installed software
Mark Question:
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

With multiple CI data sources, which choice is the best for determining which source can update a CI attribute?

  • A. Business Rules
  • B. Data Certification
  • C. Transform Maps
  • D. Reconciliation Rules
Mark Question:
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A network device has both an SSH port and an SNMP port open. Discovery tries the SSH probe first and it fails. This triggers the SNMP probe, which succeeds. Discovery uses SNMP first for subsequent discoveries on that device.
What discovery functionality allows the above to happen?

  • A. Classification
  • B. Credential affinity
  • C. MID Server affinity
  • D. IP service affinity
Mark Question:
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2