ExamGecko
Home Home / ServiceNow / CIS-EM

ServiceNow CIS-EM Practice Test - Questions Answers, Page 6

Question list
Search
Search

What is the function of the External Communication Channel (ECC) Queue? (Choose three.)

A.
It is a connection point between a ServiceNow instance and the MID Server.
A.
It is a connection point between a ServiceNow instance and the MID Server.
Answers
B.
It contains probe records to be executed on the customer’s network.
B.
It contains probe records to be executed on the customer’s network.
Answers
C.
It holds jobs that the MID Server needs to perform.
C.
It holds jobs that the MID Server needs to perform.
Answers
D.
It is a connection point between a hardware CI on a customer’s network and the MID Server.
D.
It is a connection point between a hardware CI on a customer’s network and the MID Server.
Answers
E.
It contains records of CIs that the ServiceNow admin has submitted for entry into the CMDB.
E.
It contains records of CIs that the ServiceNow admin has submitted for entry into the CMDB.
Answers
Suggested answer: A, B, E

The correct regex to capture the name of the server in “the server webserver3.domain.com is down” would be:

A.
.*(\w+\.\w+\.\w+).*
A.
.*(\w+\.\w+\.\w+).*
Answers
B.
The server (.*)\s.*
B.
The server (.*)\s.*
Answers
C.
.*\s(\w+\.\w+\.\w+).*
C.
.*\s(\w+\.\w+\.\w+).*
Answers
D.
the server (.*).*
D.
the server (.*).*
Answers
Suggested answer: A

What is the recommended approach to normalizing data from a source system to the default values in Event Management?

A.
Event field mapping
A.
Event field mapping
Answers
B.
Transform maps
B.
Transform maps
Answers
C.
Alert management rules
C.
Alert management rules
Answers
D.
Business rules
D.
Business rules
Answers
Suggested answer: D

You have an event that needs to be bound to a non-host CI.

Which attribute needs to be removed from the Transform and Compose tab?

A.
Source Instance
A.
Source Instance
Answers
B.
Metric Name
B.
Metric Name
Answers
C.
Node
C.
Node
Answers
D.
Resource
D.
Resource
Answers
Suggested answer: C

When are anomaly alerts generated by Operational Intelligence displayed in alert intelligence?

A.
When the statistical model threshold is breached
A.
When the statistical model threshold is breached
Answers
B.
When they are promoted to IT alerts
B.
When they are promoted to IT alerts
Answers
C.
When it is manually promoted in insights explorer
C.
When it is manually promoted in insights explorer
Answers
D.
When the anomaly score is greater than 100
D.
When the anomaly score is greater than 100
Answers
Suggested answer: B

Alerts are processed using which of the following? (Choose three.)

A.
Alert management rules
A.
Alert management rules
Answers
B.
Event action rules
B.
Event action rules
Answers
C.
Event rules
C.
Event rules
Answers
D.
Scheduled jobs
D.
Scheduled jobs
Answers
E.
Java and Groovy scripts
E.
Java and Groovy scripts
Answers
Suggested answer: A, C, D

The individual commands that the Agent Client Collector executes on the host are known as what?

(Choose three.)

A.
Events
A.
Events
Answers
B.
Checks
B.
Checks
Answers
C.
Parameters
C.
Parameters
Answers
D.
Policies
D.
Policies
Answers
E.
Metrics
E.
Metrics
Answers
F.
Scripts
F.
Scripts
Answers
Suggested answer: A, B, E

What is Event Management licensing based on?

A.
The number of unique nodes that can send events to the instance
A.
The number of unique nodes that can send events to the instance
Answers
B.
The number of connectors and listeners it will collect data from
B.
The number of connectors and listeners it will collect data from
Answers
C.
The number of connectors it will collect data from
C.
The number of connectors it will collect data from
Answers
D.
The number of CIs in the CMDB that it will be monitoring
D.
The number of CIs in the CMDB that it will be monitoring
Answers
Suggested answer: D

What missing attribute would cause an event to have a state of Error?

A.
Metric Name
A.
Metric Name
Answers
B.
Source
B.
Source
Answers
C.
Classification
C.
Classification
Answers
D.
Node
D.
Node
Answers
E.
Severity
E.
Severity
Answers
Suggested answer: E

What is the preferred method of parsing in the Transform/Compose step of an event rule?

A.
Python
A.
Python
Answers
B.
Regex
B.
Regex
Answers
C.
sed/awk
C.
sed/awk
Answers
D.
JavaScript
D.
JavaScript
Answers
Suggested answer: B
Total 92 questions
Go to page: of 10