ExamGecko
Home Home / ServiceNow / CIS-HAM

ServiceNow CIS-HAM Practice Test - Questions Answers, Page 16

Question list
Search
Search

What are the main purposes of transfer order line tasks? (Choose two.)

A.
To help track service levels and the time frame needed to complete a transfer order
A.
To help track service levels and the time frame needed to complete a transfer order
Answers
B.
To move transfer order lines from one stage to another
B.
To move transfer order lines from one stage to another
Answers
C.
To help track the total number of assets moved from one stockroom to another
C.
To help track the total number of assets moved from one stockroom to another
Answers
D.
To automate reordering of consumables as they are consumed by users
D.
To automate reordering of consumables as they are consumed by users
Answers
E.
To move transfer orders from one stage to another
E.
To move transfer orders from one stage to another
Answers
Suggested answer: A, B

Explanation:

According to the ServiceNow Product Documentation on Transfer Orders1, transfer orders are records that define the movement of assets from one stockroom to another1.They can be used to replenish the stock of assets, fulfill asset requests, or relocate assets1.

According to the ServiceNow Product Documentation on Transfer Order Line Tasks2, transfer order line tasks are records that define the actions that need to be performed for each transfer order line2.A transfer order line is a record that defines the quantity and model of the assets that are being transferred1.

The main purposes of transfer order line tasks are2:

To help track service levels and the time frame needed to complete a transfer order: Transfer order line tasks have a due date and a state that indicate the progress and completion of the transfer order line. They also have a priority and an assignment group that determine the urgency and the responsibility of the transfer order line. These fields help users to monitor and manage the service levels and the time frame needed to complete a transfer order.

To move transfer order lines from one stage to another: Transfer order line tasks have a type that defines the action that needs to be performed for the transfer order line, such as pick, pack, ship, or receive. As transfer order line tasks are completed, the transfer order line moves from one stage to another, such as requested, in transit, or received. These stages reflect the status and location of the assets that are being transferred.

1: ServiceNow Product Documentation: Transfer Orders

2: ServiceNow Product Documentation: Transfer Order Line Tasks

Which of these automatic restocking actions are available in baseline? (Choose two.)

A.
Create a task assigned to stock room manager to contact procurement manager
A.
Create a task assigned to stock room manager to contact procurement manager
Answers
B.
Create a task assigned to the stock room manage to create a purchase order
B.
Create a task assigned to the stock room manage to create a purchase order
Answers
C.
Create a new asset from any returned inventory
C.
Create a new asset from any returned inventory
Answers
D.
Create a transfer order to restock from another stockroom
D.
Create a transfer order to restock from another stockroom
Answers
E.
Create a transfer order to restock from a vendor
E.
Create a transfer order to restock from a vendor
Answers
Suggested answer: B, D

Stock rules have automatic restocking actions that occur through a daily scheduled job. What plugin must be activated in order to configure and use the scheduled job?

A.
Cost Management
A.
Cost Management
Answers
B.
Procurement
B.
Procurement
Answers
C.
Field Service Mobile
C.
Field Service Mobile
Answers
D.
Order Management
D.
Order Management
Answers
Suggested answer: B

Explanation:

Stock rules are rules that define the minimum and maximum quantities of assets that should be maintained in a stockroom1.

Automatic restocking actions are actions that trigger the creation of stock orders when the quantity of an asset falls below the minimum threshold or exceeds the maximum threshold1.

A daily scheduled job runs every day to check the stock levels of assets and execute the automatic restocking actions based on the stock rules1.

The plugin that must be activated in order to configure and use the scheduled job is theProcurementplugin2.

The Procurement plugin enables the procurement of assets and consumables through purchase orders, stock orders, and vendor management2.

The Procurement plugin also provides the Stock Order [Order] table, which stores the stock orders created by the automatic restocking actions2.

What plugin helps alleviate inconsistencies in company names?

A.
Extended CMDB
A.
Extended CMDB
Answers
B.
Normalization Data Services
B.
Normalization Data Services
Answers
C.
Contract Management
C.
Contract Management
Answers
D.
Data Certification
D.
Data Certification
Answers
Suggested answer: B

Explanation:

The plugin that helps alleviate inconsistencies in company names is the Normalization Data Services plugin, which is part of the ServiceNow IT Asset Management suite1.

The Normalization Data Services plugin provides a set of features and capabilities that enable you to standardize and normalize data across various tables and fields in ServiceNow, such as manufacturer names, model names, software names, and company names12.

The Normalization Data Services plugin uses a combination of rules, dictionaries, and algorithms to identify and correct data inconsistencies, such as spelling errors, abbreviations, synonyms, and duplicates12.

The Normalization Data Services plugin can help you improve the quality and accuracy of your data, reduce manual efforts and errors, and enhance reporting and analysis12.Reference:

1:Normalization Data Services - Product Documentation: San Diego - ServiceNow

2:Normalization Data Services - ServiceNow

A blind inventory audit is typically initiated via which interface?

A.
Third-party API
A.
Third-party API
Answers
B.
Now Inventory app
B.
Now Inventory app
Answers
C.
Now Agent Mobile app
C.
Now Agent Mobile app
Answers
D.
Now Mobile app
D.
Now Mobile app
Answers
Suggested answer: C

Explanation:

According to theAudit your inventorydocument, a blind inventory audit is a type of audit that hides the expected asset list from the auditor, so that the auditor has to physically scan each asset in the location and compare it with the actual asset list1.

A blind inventory audit helps ensure data integrity and accuracy, as it prevents the auditor from ''cheating on the test'' by relying on the expected asset list1.

A blind inventory audit is typically initiated via the Now Agent Mobile app, which is a mobile application that enables users to perform various tasks related to hardware asset management, such as scanning assets, creating audits, and viewing audit results1.

The Now Agent Mobile app allows users to create an audit on the mobile device, select the location and type of audit, and scan the assets using the device camera or a Bluetooth scanner1.

Therefore, the correct answer is option C, Now Agent Mobile app, as it is the interface that is typically used to initiate a blind inventory audit.Reference:

Audit your inventory

What is Hardware Asset Management?

Winch role allows you to allocate a resource?

A.
resource_user
A.
resource_user
Answers
B.
it_project_user
B.
it_project_user
Answers
C.
business_stakertolder
C.
business_stakertolder
Answers
D.
resource_manager
D.
resource_manager
Answers
Suggested answer: D

Explanation:

According to the ServiceNow Hardware Asset Management documents, the role that allows you to allocate a resource is the resource_manager role1.

The resource_manager role is a role that grants the user the ability to manage resources, such as hardware assets, consumables, and stockrooms, and to perform tasks related to resource allocation, reservation, transfer, and audit1.

The other roles that are not the correct answer are:

A)resource_user: This is a role that grants the user the ability to view and request resources, such as hardware assets and consumables, from the service catalog or the mobile app2.

B)it_project_user: This is a role that grants the user the ability to view and participate in IT projects, such as hardware asset refresh projects, and to track the progress, costs, and risks of the projects3.

C)business_stakeholder: This is a role that grants the user the ability to view and provide feedback on the business services and outcomes that are supported by the IT assets and resources4.Reference:

1: Resource Manager Role

2: Resource User Role

3: IT Project User Role

4: Business Stakeholder Role

For advanced risk assessment, risk response can be handled in the following ways:

(Choose two.)

A.
Create multiple risk response tasks Most Voted
A.
Create multiple risk response tasks Most Voted
Answers
B.
Skipped entirely based on attributes defined in the RAM
B.
Skipped entirely based on attributes defined in the RAM
Answers
C.
Must create a mitigation response task
C.
Must create a mitigation response task
Answers
D.
Must create at least one risk response task
D.
Must create at least one risk response task
Answers
Suggested answer: A, D

Explanation:

According to the ServiceNow Hardware Asset Management documentation, advanced risk assessment is a process of identifying, analyzing, and evaluating the risks associated with hardware assets and configuration items (CIs) in the configuration management database (CMDB)1.Advanced risk assessment uses the Advanced Risk Assessment engine, which is built to address risk through an integrated risk framework2.The advanced risk assessment process consists of the following steps1:

Create a risk assessment scope: This step defines the scope and criteria of the data to be assessed, such as the asset class, category, or attribute. The risk assessment scope also specifies the frequency and duration of the assessment.

Create a risk assessment schedule: This step determines when and how often the assessment runs, based on the risk assessment scope. The risk assessment schedule also defines the assessment owner, who is responsible for overseeing the assessment process and approving the results.

Assign the assessment tasks: This step assigns the assessment tasks to the appropriate assessors, who are the users or groups who have the knowledge and authority to evaluate and update the data. The assessment tasks can be assigned manually or automatically, based on predefined rules or workflows.

Run the assessment: This step executes the assessment process, which involves sending notifications and reminders to the assessors, displaying the data to be assessed in a user-friendly interface, allowing the assessors to review and modify the data, and tracking the progress and status of the assessment tasks.

Review the assessment results: This step allows the assessment owner to verify and approve the results of the assessment, before applying the changes to the CMDB. The assessment owner can also view the risk scores, risk indicators, and risk heat maps of the assessed data.

Handle the risk response: This step involves creating and managing risk response tasks to address the identified risks. Risk response tasks are records that track the actions taken to mitigate, transfer, avoid, or accept the risks. Risk response tasks can be created manually by the assessment owner or automatically by the system based on predefined rules or workflows.

For advanced risk assessment, risk response can be handled in the following ways:

Create multiple risk response tasks: This option allows the assessment owner to create more than one risk response task for each assessed data, depending on the complexity and severity of the risk.For example, the assessment owner can create a mitigation task to reduce the impact or likelihood of the risk, and a transfer task to shift the responsibility or ownership of the risk to another party3.

Create at least one risk response task: This option requires the assessment owner to create at least one risk response task for each assessed data, regardless of the complexity and severity of the risk.This ensures that every risk is addressed and documented in the system3.

The other options are not correct because:

Skipped entirely based on attributes defined in the RAM: This option is not a valid way to handle risk response for advanced risk assessment.The RAM (Risk Assessment Matrix) is a tool that helps to calculate the risk score and risk indicator of the assessed data, based on the impact and likelihood attributes defined in the risk assessment scope1. The RAM does not determine whether to skip the risk response or not.

Must create a mitigation response task: This option is not a mandatory way to handle risk response for advanced risk assessment. A mitigation response task is one of the possible types of risk response tasks, but not the only one.Depending on the risk appetite and strategy of the organization, the assessment owner can choose other types of risk response tasks, such as transfer, avoid, or accept3.

ServiceNow Hardware Asset Management: Advanced Risk Assessment

ServiceNow Hardware Asset Management: Risk response tasks

ServiceNow Hardware Asset Management: ServiceNow Risk Management

Your customer complains that when their users click on the Configuration Item magnifier from the Incident form, that they are overwhelmed by the volume of CIs to choose from. They want to exclude certain types of CIs from the CI lists on the Incident. Problem and Change forms. What do you recommend to your customer?

A.
Add a Show field to the base cmdb table: Check the Show box on those CI records they want to display; make reference qualifier to display only the CIs with show=true
A.
Add a Show field to the base cmdb table: Check the Show box on those CI records they want to display; make reference qualifier to display only the CIs with show=true
Answers
B.
Use the Principal CI class checkbox, to identify the CI classes that they want visible on the Incident, Problem, and Change forms Most Voted
B.
Use the Principal CI class checkbox, to identify the CI classes that they want visible on the Incident, Problem, and Change forms Most Voted
Answers
C.
Create an Access control to hide the unnecessary CIs from the itil users
C.
Create an Access control to hide the unnecessary CIs from the itil users
Answers
D.
Make a show/hide UI action to show only the desired CIs to the itil users
D.
Make a show/hide UI action to show only the desired CIs to the itil users
Answers
Suggested answer: B

Explanation:

To exclude certain types of CIs from the CI lists on the Incident, Problem, and Change forms, you can use thePrincipal CI classcheckbox, which is available on theClass Managermodule underConfiguration1.

The Principal CI class checkbox allows you to specify which CI classes are considered as principal CIs, meaning they are the most relevant and important CIs for the business services and processes1.By default, only the CI classes that have this checkbox selected are displayed on the CI lists on the Incident, Problem, and Change forms2.

To use this feature, you need to navigate to the Class Manager module, select the CI class that you want to exclude or include, and check or uncheck the Principal CI class checkbox accordingly1.You can also use theFilteroption to search for the CI classes by name or label1.

The other options are not recommended or valid ways to exclude certain types of CIs from the CI lists.Adding a Show field to the base cmdb table would require modifying the table schema and creating a reference qualifier, which could affect the performance and integrity of the CMDB3.Creating an Access control to hide the unnecessary CIs from the itil users would require defining the conditions and roles for the access rule, which could be complex and error-prone4.Making a show/hide UI action to show only the desired CIs to the itil users would require creating a custom script and UI element, which could be incompatible with the existing UI and functionality.Reference:1:Principal configuration item classes2:Configuration item lists3:CMDB table schema4:Access control rules: [UI actions]

When a Document Template is created from an HR Case, the name of the person who created the document is added to the name of the attachment.

Why?

A.
It indicates who should sign the document
A.
It indicates who should sign the document
Answers
B.
It indicates who generated the document
B.
It indicates who generated the document
Answers
C.
It indicates the Opened for user
C.
It indicates the Opened for user
Answers
D.
It indicates who the document is about
D.
It indicates who the document is about
Answers
Suggested answer: B

Explanation:

According to the ServiceNow Product Documentation on Document Templates1, document templates are records that define the layout and content of a document that can be generated from a table record, such as an HR case1.They can include information such as fields, variables, images, and signatures1.

According to the ServiceNow Product Documentation on Generate Documents from Templates2, when a document template is created from an HR case, the name of the person who created the document is added to the name of the attachment2.For example, if John Smith created a document from the template Employee Termination Letter, the attachment name would be Employee Termination Letter - John Smith.docx2.

The reason for this naming convention is to indicate who generated the document, which can be useful for auditing and tracking purposes2.It can also help to avoid confusion or duplication if multiple documents are generated from the same template by different users2.

The other options are not the correct explanation for why the name of the person who created the document is added to the name of the attachment.It does not indicate who should sign the document, as the signature can be added as a variable in the template1.It does not indicate the Opened for user, as the document can be generated for any HR case, not necessarily the one that the user opened2.It does not indicate who the document is about, as the document can contain information about multiple parties, such as the employee, the manager, and the HR representative2.

1: ServiceNow Product Documentation: Document Templates

2: ServiceNow Product Documentation: Generate Documents from Templates

Once a Catalog Item has been requested, what mechanism determines the approvals, and tasks that are triggered in the application?

A.
Processes
A.
Processes
Answers
B.
Flows
B.
Flows
Answers
C.
Procedures
C.
Procedures
Answers
D.
Actions
D.
Actions
Answers
E.
Scripts
E.
Scripts
Answers
Suggested answer: B

Explanation:

Once a catalog item has been requested, the mechanism that determines the approvals and tasks that are triggered in the application is theflow12.

A flow is a graphical representation of a business process that consists of one or more actions, such as approvals, tasks, notifications, scripts, etc., that are executed based on certain conditions and triggers12.

A flow can be associated with a catalog item to define the fulfillment process for that item, such as who needs to approve it, what tasks need to be performed, and what notifications need to be sent12.

A flow can be created and managed using the Flow Designer, a low-code development tool that allows users to design and test flows without writing any code12.

A flow can be activated or deactivated, versioned, and published to make it available for use12.

A flow can be monitored and debugged using the Flow Execution Details and the Flow Logs12.Reference:

Flow Designer

Service Catalog Request Fulfillment

Total 184 questions
Go to page: of 19