Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CIS-SM Certified Implementation Specialist - Service Mapping Questions and Answers

Questions 4

Which of the following commands does Service Mapping run on Linux-based targets that requires elevated privileges (i.e. sudo)?

Options:

A.

dir

B.

type

C.

service

D.

netstat

Buy Now
Questions 5

Which one of the following is a public IP Address?

Options:

A.

172.20.5.9

B.

225.16.0.5

C.

192.168.100.100

D.

10.0.6.8

Buy Now
Questions 6

Which is the most common risk that can negatively impact a Service Mapping engagement?

Options:

A.

The customer is not using Active Directory for credential authentication

B.

The customer external firewall only communicates on outbound port 80 and 443

C.

The customer security team is not made aware early enough in the engagement of the credential requirements

D.

The MID Server resource requirements are beyond capacity of the customer

Buy Now
Questions 7

In Service Mapping, which one of the following is true if a target host is already discovered and in the CMDB?

Options:

A.

The host will be deleted in the CMDB and a new host record will be created during Service Mapping discovery.

B.

The host will be immediately rediscovered, but only the changes will be updated in the CMDB during Service Mapping discovery.

C.

The host will be immediately rediscovered and updated in the CMDB during Service Mapping discovery.

D.

The host will not be rediscovered during Service Mapping discovery.

Buy Now
Questions 8

Which of the following are created automatically when using the map option Create pattern from generic application?

Options:

A.

Discovery Pattern, CI Type/Class, Process Classifier

B.

CI Type/Class, Process Classifier, Identification Rule

C.

Process Classifier, Connection Section, Discovery Pattern

D.

Identification Rule, CI Class/Class, Identification Section

Buy Now
Questions 9

Using Pattern Designer, when configuring the first step in an Identification Section, which one of the following is considered a good practice?

Options:

A.

Create a table for the process parameters

B.

Check if connectivity variables are defined

C.

Use a Parse file operation to extract necessary information from a configuration file

D.

Use a Match operation on the process executable or command variable

Buy Now
Questions 10

In Event Management, if a Message key is not passed from an Event, which of the following Alert fields combine to populate the Message key on an Alert?

Options:

A.

Task, Description, Created

B.

Node, Type, Resource, Number

C.

Source, Number, Task

D.

Source, Node, Type, Resource

Buy Now
Questions 11

In Service Mapping, when discovery is started, what is the execution strategy used to run Connection Sections?

Options:

A.

Connection Sections are executed one by one and connections will result from each successful section.

B.

Connection Sections are executed randomly and connections will result from each successful section.

C.

Connection Sections are executed one by one in the order they are listed until the first successful section.

D.

Connection Sections are executed one by one in the order they are listed with a connection created from the last successful section.

Buy Now
Questions 12

Assume an Apache Web Server Identifier Entry is configured as shown:

CIS-SM Question 12

If the Apache Web Server Discovery Pattern has a step configured to collect the Configuration file data but NOT configured with a step to collect the Version information, what will happen when executing a Service Mapping discovery?

Options:

A.

An identification error will occur.

B.

The Apache Web Server CI will be reclassified as a Web Server CI.

C.

The Apache Web Server configuration item will be discovered successfully and either inserted or updated in the CMDB.

D.

A duplication error will occur.

Buy Now
Questions 13

Within the CMDB, all application CI Types/Classes are children of which parent class?

Options:

A.

Database Instance [cmdb_ci_db_instance]

B.

Software [cmdb_ci_software]

C.

Installed Software [cmdb_ci_installed_software]

D.

Application [cmdb_ci_appl]

E.

Licenses [cmdb_ci_license]

Buy Now
Questions 14

You have run Service Mapping discovery against a customer service and discovered the CI in the image. The customer indicates that Apache should have an outgoing connection to Tomcat. Which one of the following could be the issue?

CIS-SM Question 14

Options:

A.

No Connection Section is defined for Apache to Tomcat.

B.

Process is offline for Tomcat.

C.

No Tomcat CI Type is defined.

D.

No Identification Rule is defined for Tomcat.

E.

Credentials are not configured for Tomcat.

Buy Now
Questions 15

Predictive Intelligence provides which one of the following benefits?

Options:

A.

Suggests which application services need pattern extensions

B.

Helps reduce noise from traffic-based connections

C.

Detects performance problems in application mapping

D.

Shows CI suggestions for Dynamic CI Groups

Buy Now
Questions 16

A CI Type is also known as which one of the following?

Options:

A.

Table

B.

Discovery Pattern

C.

Service Group

D.

CI Identifier / Identification Rule

Buy Now
Questions 17

Which one of the following in the CMDB Identification and Reconciliation application allows a CMDB administrator to specify authorized data sources that can update a CMDB table or a set of table attributes?

Options:

A.

Reclassification Tasks

B.

Identification Rules

C.

Datasource Precedence Rules

D.

Reconciliation Rules

Buy Now
Questions 18

Which of the following are methods used to initiate discovery on a service? (Choose three.)

Options:

A.

Map multiple services suggested by Service Mapping by discovering the load balancers in an enterprise.

B.

Map multiple services by importing entry points from a CSV file.

C.

Map a single service defined by configuring an entry point.

D.

Map services suggested by the discovery of MID Servers in an enterprise.

E.

Map services based on Assets stored in the CMDB.

Buy Now
Questions 19

In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?

Options:

A.

Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed.

B.

Identification Sections are executed randomly and the data gathered by the successful sections are merged.

C.

Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used.

D.

Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase.

Buy Now
Questions 20

Which one of the following statements best explains the following URL: https:// < Instance_URL > /

SaCmdManager.do?ip=198.51.100.66?

Options:

A.

The user is starting the Command Line Console and is able to send commands to the host 198.51.100.66.

B.

The user is starting the Command Line Console and explicitly directs Service Mapping to use the MID Server 198.51.100.66 to execute commands.

C.

This is not a valid URL for Service Mapping.

D.

The user is starting the Command Line Console and is able to send commands against the ServiceNow instance at 198.51.100.66.

Buy Now
Questions 21

Which represents the skills needed that a Service Mapping administrator or implementer should have?

Choose 4 answers

Options:

A.

Understanding of relational database theory

B.

Understanding of XML, Regex, Delimited text, and JSON

C.

Intermediate or above Windows and Unix administration skills

D.

Scripting capabilities with respect to Unix and Windows commands

E.

Sufficient skills to build an enterprise website

F.

Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST

Buy Now
Questions 22

Which one of the following best represents the output from the following Regular Expression?

([\w\d\-\.]+)

Options:

A.

Match a single character in the list between one and unlimited times.

B.

Match a single character in the list one time.

C.

Match a single character in the list between one and three times.

D.

Match a single character in the list between one and ten times.

Buy Now
Questions 23

During ServiceNow Discovery, credentials are stored in memory in which one of the following?

Options:

A.

MID Server

B.

SNMP Agent

C.

ServiceNow Instance

D.

Collector

Buy Now
Questions 24

What describes the main feature offered by Service Mapping Plus?

Options:

A.

A suite of quick start tests that can be run to verify Service Mapping still works as expected after upgrades and deployments

B.

A collection of connection rules that are used to automatically add CIs to one or more application services

C.

Enables Kubernetes and cloud components to be added to service maps during tag-based discovery

D.

An enhanced version of mapping based on Machine Learning (Predictive Intelligence)

Buy Now
Questions 25

During ServiceNow Discovery, which one of the following protocols is used to extract data from printers?

Options:

A.

WMI

B.

PowerShell

C.

SSH

D.

SNMP

Buy Now
Questions 26

Service Mapping uses which table to build tag-based maps from?

Options:

A.

Application Service [cmdb_ci_service_discovered]

B.

Application [cmdb_ci_app]

C.

Key Value [cmdb_key_value]

D.

Servers [cmdb_ci_server]

Buy Now
Questions 27

Which of the following represents the skills needed that a Service Mapping administrator or implementer should have? (Choose four.)

Options:

A.

Understanding of XML, Regex, Delimited text, and JSON

B.

Understanding of protocols such as HTTP, TCP, SNMP, SOAP, and REST

C.

Scripting capabilities with respect to Unix and Windows commands

D.

Intermediate or above Windows and Unix administration skills

E.

Sufficient skills to build an enterprise web site

F.

Understanding of relational database theory

Buy Now
Questions 28

Which one of the following is the most common risk that can negatively impact a Service Mapping

engagement?

Options:

A.

The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance.

B.

MID server resource requirements are beyond capacity of the customer.

C.

Customer security team is not made aware early enough in the engagement of the credential requirements.

D.

Customer is not using Active Directory for credential authentication.

Buy Now
Questions 29

In the following image of the Discovery Log, the green S represents which one of the following?

CIS-SM Question 29

Options:

A.

A library in the Connection Section of a pattern

B.

A step in the Connection Section of a pattern

C.

A step in an Identification Section of a pattern

D.

A library in an Identification Section of a pattern

Buy Now
Questions 30

What are the roles of the Application Service Readiness Dashboard in ML-powered Service Mapping?

Choose 2 answers

Options:

A.

To clearly display the detailed mapping status of all discovered application services

B.

To list prerequisites and their readiness status for application service mapping

C.

To monitor the performance of all active scheduled jobs

D.

To configure Predictive Intelligence plugins and ADME probes

Buy Now
Questions 31

In Service Mapping, which one of the following icons represents a credential error on the Service map?

Options:

A.

Yellow triangle

B.

Generic application

C.

QUESTION NO: mark

D.

Red stop sign

Buy Now
Exam Code: CIS-SM
Exam Name: Certified Implementation Specialist - Service Mapping
Last Update: May 17, 2026
Questions: 106

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now CIS-SM testing engine

PDF (Q&A)

$54.99  $157.11
buy now CIS-SM pdf