Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ServiceNow > CIS-Event Management > CIS-EM

CIS-EM Certified Implementation Specialist - Event Management Exam Question and Answers

Question # 4

Copies of checks that have been included in Agent Client Collector policies are known as what?

A.

Check definitions

B.

Check models

C.

Check clones

D.

Check mirrors

E.

Check instances

Full Access
Question # 5

The additional information field is a JSON string that gives more information about an event. An example of a supported JSON string is:

A.

{"CPU":100}

B.

{"CPU":100,’Status":3}

C.

{"CPU":"100","Status":3}

D.

{"CPU":"100"}

Full Access
Question # 6

What does Operational Intelligence proactively identify before they cause service outages?

A.

Missing CMDB data

B.

Defects

C.

Alert correlations

D.

Orphaned CIs

E.

Anomalies

Full Access
Question # 7

If the Message Key is not populated, the default value is created from which fields?

A.

Source, type. node, resource, and metric name

B.

Source, source instance, node, and resource

C.

Source, type. node, and metric name

D.

Source, source instance, node, and type

E.

Source, type. node, resource, and time of event

Full Access
Question # 8

Which step in the event rule configuration process enables you to ignore events and prevent alert generation?

A.

Transform and compose alert output

B.

Event filter

C.

Event options

D.

Threshold

Full Access
Question # 9

If more than one event rule applies to a particular event or metric, which of the event rules will run based upon the Order of execution number?

A.

Only the event rule with the highest Order of execution number will run.

B.

Only the event rule with the lowest Order of execution number will run.

C.

All event rules will run, from the lowest to the highest Order of execution numbers.

D.

All event rules will run, from the highest to the lowest Order of execution numbers.

Full Access
Question # 10

A monitoring tool notification of a notable occurrence is known as what?

A.

An alarm

B.

An alert

C.

An incident

D.

A notice

E.

An event

F.

A metric

Full Access
Question # 11

What role is required to create a Technical Service?

A.

evt_mgmt_integration

B.

evt_mgmt_user

C.

evt_mgmt_operator

D.

evt_mgmt_admin

Full Access
Question # 12

When performing CI Binding, what fields does Event Management match to the Node?

A.

CI Name, DNS, IP, MAC Address

B.

System class name, FQDN, IP or MAC address

C.

CI name, FQDN, SSH public host keys

D.

CI Name, FQDN, IP, MAC Address

Full Access
Question # 13

What is one of the main benefits of using Event Management and Operational Intelligence?

A.

To improve service availability by helping IT staff pinpoint service issue causes and evaluate the impact of planned changes.

B.

To increase service agility and produce fast, predictable results by automating manual, routine, error-prone tasks.

C.

To rapidly configure and launch secure, agentless discovery of hardware and software resources and their relationships.

D.

To proactively warn against possible service outages using a range of advanced predictive machine learning methods.

Full Access
Question # 14

If a Message Key is not provided, which fields are concatenated to make our own?

A.

Source, Type, Node, Resource, Metric Name

B.

Source, DNS, Node, Additional info, Metric Name

C.

Source, Type, DNS, Additional info, Metric Name

D.

Source, Source Instance, Node, Type, Resource

Full Access
Question # 15

Which is an invalid state for an alert?

A.

Flapping

B.

Closed

C.

Reopen

D.

Processed

Full Access
Question # 16

What are the valid states an alert can be in during its lifecycle?

A.

Open, Reopen, Flapping, Closed

B.

New, Updating, Waiting, Complete

C.

Open, Updating, Swinging, Closed

D.

Open, Warning, Flapping, Clear

Full Access
Question # 17

What Event Management module allows for configuration of automatic task creation?

A.

Alert management rules

B.

Task rules

C.

Event rules

D.

Alert correlation rules

Full Access
Question # 18

Within the ServiceNow IT Operations Management solution set, which statement most accurately describes what Event Management is?

A.

The process responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services

B.

The process responsible for ensuring the capacity of IT Services and IT infrastructure is able to deliver agreed upon service level targets in a cost-effective manner

C.

The process responsible for recovery action and planning through machine learning

D.

The process responsible for monitoring all abnormal occurrences throughout the IT infrastructure, allowing for normal operations, and detecting and escalating exception conditions

Full Access
Question # 19

Out-of-the-box. how often do tie everts get processed in ServiceNow?

A.

Every 5 seconds

B.

Depends on connectors Used

C.

Every minute via a scheduled job

D.

As soon as the event record is inserted via a business rule

Full Access
Question # 20

If more than one alert management rule applies to a particular alert which of the rules will run based upon the Order of execution field?

A.

All alert management rule will run, from the highest to the lowest Order of execution numbers.

B.

Only the alert management rule with the highest Order of execution number will run.

C.

All alert management rule will run, from the lowest to the highest Order of execution numbers.

D.

Only the alert management rule with the lowest Order of execution number will run.

Full Access
Question # 21

What is the minimum role needed to view alerts?

A.

alert_operator

B.

evt_mgmt_user

C.

evt_mgmt_operator

D.

alert_user

Full Access
Question # 22

In the event table, which field maps the external attributes from the target system?

A.

Resource

B.

Description

C.

Source

D.

Additional Information

Full Access
Question # 23

What applications are included in the ITOM Health solution?

Choose 3 answers

A.

Cloud Provisioning and Governance

B.

Health Log Analytics

C.

Agent Client Collector

D.

Discovery

E.

Service Mapping

F.

Event Management

Full Access
Question # 24

Given the following Impact settings and Alerts in a three node cluster that makes up the components of a Business Service, what is the overall service health of this Business Service?

A.

Critical

B.

Error

C.

Major

D.

Minor

E.

Warning

F.

Clear

Full Access
Question # 25

How often do baseline event connectors retrieve events?

A.

Every 30 seconds

B.

Every 2 minutes

C.

Every 10 minutes

D.

Every 1 minute

E.

Every 5 minutes

Full Access
Question # 26

Which is a correct regex expression to capture only the server's hostname (webserver3) in "The server webserver3.domain.com is down."?

A.

The server (.*)\..*

B.

.*(\w+\Aw+VAw+).*

C.

The server (.*)\s.*

D.

The server (.*?)\„*

Full Access
Question # 27

Which attribute is responsible for de-duplication?

A.

Metric_name

B.

Message_key

C.

Short_description

D.

Additional_info

Full Access
Question # 28

Based on the information shown, which of the following three alerts should be processed first?

A.

The Alert Priority score 3106020.001 was calculated according to the following factors, ordered by their respective priority (2018-06-01 19:34:01 GMT) Category (Score, Weight)

1. Business services – (3.0, 1000000)

2. Severity – (1.0, 100000)

3. CI type – (60.0, 100)

4. Role – (2.0, 10)

5. Secondary – (0)

6. State – (1.0, 0.001)

B.

The Alert Priority score 4406020.001 was calculated according to the following factors, ordered by their respective priority (2018-05-31 20:04:47 GMT) Category (Score, Weight)

1. Business services – (4.0, 1000000.0)

2. Severity – (4.0, 100000.0)

3. CI type – (60.0, 100.0)

4. Role – (2.0, 10.0)

5. Secondary – (0)

6. State – (1.0, 0.001)

C.

The Alert Priority score 3306020.001 was calculated according to the following factors, ordered by their respective priority (2018-05-31 19:56:54 GMT) Category (Score, Weight)

1. Business services – (3.0, 1000000.0)

2. Severity – (3.0, 100000.0)

3. CI type – (60.0, 100.0)

4. Role – (2.0, 10.0)

5. Secondary – (0)

6. State – (1.0, 0.001)

D.

They should be processed in the order in which they were received.

Full Access
Question # 29

MID Servers provide important functions in your ITOM Health deployment.

What does MID stand for?

A.

Management, Instrumentation, and Discovery

B.

Messaging, Integration, and Data

C.

Monitoring, Insight, and Domain

D.

Maintenance, Information, and Distribution

Full Access
Question # 30

For an incoming event with a matching message key, what allows an existing alert to be automatically closed?

A.

In the event rule, set the Severity to 0

B.

In the alert rule, set the Severity to 0

C.

In the alert rule, set the Severity to -1

D.

In the event rule, set the Severity to -1

Full Access
Question # 31

What makes all ServiceNow metrics, tasks, services, configuration items, assets, people, locations, and information a single system of record for IT and business processes?

A.

ServiceNow is installed within your datacenter providing you complete control

B.

All applications are built on the Oracle database standard, providing uniformity across products

C.

All applications that are built by ServiceNow utilize the same data model and code base

D.

ServiceNow runs on supported Windows servers and is managed through Windows Update

E.

A single table houses all data elements within ServiceNow

F.

ServiceNow utilizes the AWS MariaDB cloud database structure, providing a single system of record

Full Access
Question # 32

In default configuration using baseline connectors, how often is event data collected from event sources?

A.

Once every minute

B.

Every 2 minutes

C.

Twice every minute

D.

Every 5 minutes

Full Access
Question # 33

The ServiceNow standard and shared set of service-related definitions that enable and support true service level reporting is known as what?

A.

Service level data model

B.

Business service data model

C.

Application service data model

D.

Common service data model

Full Access
Question # 34

What is the primary function of enrich automation in Service Operations Workspace?

A.

To populate events with more meaningful information

B.

To manage team roles and permissions

C.

To transform and compose event rules

D.

To generate alerts populated with more meaningful information

Full Access