Free CIS-SM Sample Questions — Certified Implementation Specialist - Service Mapping

Free CIS-SM sample questions for the Certified Implementation Specialist - Service Mapping exam. No account required: study at your own pace.

Want an interactive quiz? Take the full CIS-SM practice test

Looking for more? Click here to get the full PDF with 35+ practice questions for $5 for offline study and deeper preparation.

Question 1

Which one of the following Linux commands can be used by a non root user to return the process ID listening on port 8080?

  • A. sudo netstat -an -p TCP | grep :8080
  • B. sudo netstat -anp | grep :8080
  • C. netstat -anp | grep :8080
  • D. netstat -an -pid * | grep :8080
Show Answer
Correct Answer:
B. sudo netstat -anp | grep :8080
Question 2

Which of the following are created automatically when using the map option Create pattern from generic application?

  • A. Discovery Pattern, CI Type/Class, Process Classifier
  • B. CI Type/Class, Process Classifier, Identification Rule
  • C. Process Classifier, Connection Section, Discovery Pattern
  • D. Identification Rule, CI Class/Class, Identification Section
Show Answer
Correct Answer:
A. Discovery Pattern, CI Type/Class, Process Classifier
Question 3

Which one of the following Regular Expressions could be used to parse the value 5.2.0 from the string? Version 5.2.0

  • A. Version (\.*)
  • B. Version\s+(\d+\.\d+\.\d+)
  • C. Version (\d+)
  • D. Version (\d+).(\d+).(\d+)
Show Answer
Correct Answer:
B. Version\s+(\d+\.\d+\.\d+)
Question 4

In Service Mapping, when discovery is started, what is the execution strategy used to run Identification Sections?

  • A. Identification Sections are executed randomly until one is successful and if more than one section is successful an error will be displayed
  • B. Identification Sections are executed randomly and the data gathered by the successful sections are merged
  • C. Identification Sections are executed one by one in the order they are listed and the last section that is successful will be used
  • D. Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase
Show Answer
Correct Answer:
D. Identification Sections are executed one by one in the order they are listed until the first successful match which concludes the Identification phase
Question 5

Service Mapping provides visibility to the Operator in Agent Workspace without leaving the Workspace UI. This visibility includes what items associated with the CI? (Choose two.)

  • A. Releases
  • B. Problems
  • C. Incidents
  • D. Alerts
Show Answer
Correct Answer:
  • C. Incidents
  • D. Alerts
Question 6

Which of the following are benefits a service map can bring during an Incident resolution? (Choose three.)

  • A. Quickly identifies any recent incidents that occurred on components of the impacted service
  • B. Narrows down possible affected components when a service is impacted
  • C. Helps reduce the number of unplanned changes in a customer environment
  • D. Helps pinpoint code errors after a faulty application is identified
  • E. Quickly identifies any recent changes performed on components of the impacted service
Show Answer
Correct Answer:
  • A. Quickly identifies any recent incidents that occurred on components of the impacted service
  • B. Narrows down possible affected components when a service is impacted
  • E. Quickly identifies any recent changes performed on components of the impacted service
Question 7

Which one of the following is the most common risk that can negatively impact a Service Mapping engagement?

  • A. The customer external firewall does not meet the requirements needed for the Service Mapping MID Server to communicate with their ServiceNow Instance
  • B. MID server resource requirements are beyond capacity of the customer
  • C. Customer security team is not made aware early enough in the engagement of the credential requirements
  • D. Customer is not using Active Directory for credential authentication
Show Answer
Correct Answer:
C. Customer security team is not made aware early enough in the engagement of the credential requirements
Question 8

Which one of the following describes when the MID Server config.xml file is read and used?

  • A. Config.xml file updated and saved
  • B. Config.xml file created and saved
  • C. MID Server application stop
  • D. MID Server application start
Show Answer
Correct Answer:
D. MID Server application start
Question 9

Which one of the following best represents the output from the following Regular Expression? ([\w\d\-\.]+)

  • A. Match a single character in the list between one and unlimited times
  • B. Match a single character in the list one time
  • C. Match a single character in the list between one and three times
  • D. Match a single character in the list between one and ten times
Show Answer
Correct Answer:
A. Match a single character in the list between one and unlimited times
Question 10

In ServiceNow Discovery, which one of the following phases is the server RAM value discovered?

  • A. Port scan
  • B. Classification
  • C. Classification and Identification
  • D. Identification and Exploration
Show Answer
Correct Answer:
D. Identification and Exploration

Aced these? Get the Full Exam

Download the complete CIS-SM study bundle with 35+ questions in a single printable PDF.