Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You have an event with a Source of ‘Trap from Enterprise 111’, but the alert created for this event shows a Source of ‘Oracle EM’. If you want to change what this is set to, where in the event rule would you do this?

A.

Transform and Compose Alert Output lab

B.

Event rule info tab

C.

CI Binding tab

D.

Event Filter tab

Full Access
Question # 5

During CI binding, CI matching is done using which two fields? (Choose two.)

A.

Message Key

B.

Additional Information

C.

Source

D.

Node

Full Access
Question # 6

What two key steps must be performed after creating a new connector instance? (Choose two.)

A.

Assign a MID Server to the connector

B.

Enter credentials for the connector

C.

Debug the connector

D.

Test the connector

E.

Activate the connector

Full Access
Question # 7

What applications are included in the ITOM Health solution?

Choose 3 answers

A.

Cloud Provisioning and Governance

B.

Health Log Analytics

C.

Agent Client Collector

D.

Discovery

E.

Service Mapping

F.

Event Management

Full Access
Question # 8

In your environment, no alert CMDB, automated, or text based grouping is occurring. What is most likely the problem?

A.

No correlation rules have been defined

B.

No event management rules have been defined

C.

Application services are not operational

D.

No CMDB is configured

E.

The alert correlation property that enables grouping is set to false

Full Access
Question # 9

A monitoring tool notification of a notable occurrence is known as what?

A.

An alarm

B.

An alert

C.

An incident

D.

A notice

E.

An event

F.

A metric

Full Access
Question # 10

What is the default collection/polling interval applied to all event connectors?

A.

Every 120 seconds

B.

Every 5 seconds

C.

Every 40 seconds

D.

Every 60 seconds

E.

Every 10 seconds

Full Access
Question # 11

What Event Management module allows for configuration of automatic task creation?

A.

Alert management rules

B.

Task rules

C.

Event rules

D.

Alert correlation rules

Full Access
Question # 12

What determines if an alert management rule's actions apply to an alert?

A.

The alert's bound configuration item

B.

The alert management rule's filter

C.

The alert management rule's field mapping

D.

The message key

Full Access
Question # 13

In Service Operations Workspace, what tool shows relationships between configuration items and alerts with real-time updates and detailed impact paths?

A.

CMDB identification and reconciliation engine (IRE)

B.

Unified service map

C.

Dependency view map

D.

CMDB class manager

Full Access
Question # 14

A Service is not viewable in Operator Workspace. What could be the issue?

A.

The service is a manual service

B.

The service is not set to operational

C.

The service was created through Service Mapping

D.

The service is a technical service

Full Access
Question # 15

The value of the Alert Priority score is a composite of what?

A.

The value of the alert’s category and its relative weight

B.

The value of the alert’s category and its Priority Group

C.

The value of the alert’s Severity and its Priority Group

D.

The value of the alert’s Severity and its relative weight

Full Access
Question # 16

Within the ServiceNow IT Operations Management solution set, which statement most accurately describes what Event Management is?

A.

The process responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services

B.

The process responsible for ensuring the capacity of IT Services and IT infrastructure is able to deliver agreed upon service level targets in a cost-effective manner

C.

The process responsible for recovery action and planning through machine learning

D.

The process responsible for monitoring all abnormal occurrences throughout the IT infrastructure, allowing for normal operations, and detecting and escalating exception conditions

Full Access
Question # 17

MID Servers provide important functions in your ITOM Health deployment.

What does MID stand for?

A.

Management, Instrumentation, and Discovery

B.

Messaging, Integration, and Data

C.

Monitoring, Insight, and Domain

D.

Maintenance, Information, and Distribution

Full Access
Question # 18

When setting up a monitoring connector definition PULL the M.0 Server must be validated and have Line of Sight (LoS) to the monitoring system. This configuration requires what?

Choose 4 answers

A.

Polling interval for scheduling access to the target system

B.

Internal IP address and port for communication with the target System

C.

An active and validated MID Server

D.

Access credentials la the MID Server system

E.

Internal IP address and port for communication with the MID Server system

F.

Access credentials lo the monitoring system

Full Access
Question # 19

What are the server requirements to allow Operational Intelligence to successfully collect operational metric data via a push?

A.

This requires a minimum of three MID Servers - two for Event Management and one additional MID Server dedicated for use by Operational Intelligence (OI).

B.

This requires a MID Web Server in addition to the MID Server.

C.

Nothing additional is required; this is handled by the MID Server.

D.

This requires a minimum of two MID Servers - one for Event Management and one additional MID Server dedicated for use by Operational Intelligence (OI).

Full Access
Question # 20

Which is an invalid state for an alert?

A.

Flapping

B.

Closed

C.

Reopen

D.

Processed

Full Access
Question # 21

When creating event rules, is it best practice to create:

A.

Two rules for every event

B.

As many rules as possible

C.

As few rules as possible

D.

One rule for every event

Full Access
Question # 22

Which is a correct regex expression to capture only the server's hostname (webserver3) in "The server webserver3.domain.com is down."?

A.

The server (.*)\..*

B.

.*(\w+\Aw+VAw+).*

C.

The server (.*)\s.*

D.

The server (.*?)\„*

Full Access
Question # 23

Processing on an event will create a state of error if what value is not set?

A.

Node

B.

Source

C.

Severity

D.

Message Key

E.

Resource

Full Access
Question # 24

What are the possible actions available in alert management?

Choose 3 answers

A.

Execute remediation subflows

B.

Execute remediation workflows

C.

Launch applications

D.

Evaluate business rule

E.

Create a service catalog request

Full Access
Question # 25

Applying recommended Event Management best practice guidelines, which of the following alerts should be processed first?

A.

Alert00l0042

B.

Alert0010003

C.

Alert00l0075

D.

Alert00l0074

Full Access
Question # 26

Agent Client Collector is built on what framework that enables you to adopt and extend monitoring checks from the community?

A.

Icinga

B.

Sensu

C.

SolarWinds

D.

Nagios

E.

Zabbix

Full Access
Question # 27

Agent Client Collector can perform application service monitoring by configuring what option?

A.

An alert management rule

B.

A proxy agent

C.

A distributed cluster

D.

An event rule

E.

A REST API

Full Access
Question # 28

In the event table, which field maps the external attributes from the target system?

A.

Resource

B.

Description

C.

Source

D.

Additional Information

Full Access
Question # 29

If the Message Key is not populated, the default value is created from which fields?

A.

Source, type. node, resource, and metric name

B.

Source, source instance, node, and resource

C.

Source, type. node, and metric name

D.

Source, source instance, node, and type

E.

Source, type. node, resource, and time of event

Full Access
Question # 30

What does Now Assist for ITOM use to provide alert analysis?

A.

Third-party monitoring tool connectors with out-of-box alert rules

B.

GenAI and the ServiceNow large language model

C.

Basic keyword matching in the alert description and tags

D.

The unified service map and link view topology

Full Access
Question # 31

Alerts are processed using which of the following? (Choose three.)

A.

Alert management rules

B.

Event action rules

C.

Event rules

D.

Scheduled jobs

E.

Java and Groovy scripts

Full Access
Question # 32

The additional information field is a JSON string that gives more information about an event. An example of a supported JSON string is:

A.

{"CPU":100}

B.

{"CPU":100,’Status":3}

C.

{"CPU":"100","Status":3}

D.

{"CPU":"100"}

Full Access
Question # 33

What does Operational Intelligence proactively identify before they cause service outages?

A.

Missing CMDB data

B.

Defects

C.

Alert correlations

D.

Orphaned CIs

E.

Anomalies

Full Access
Question # 34

If more than one alert management rule applies to a particular alert which of the rules will run based upon the Order of execution field?

A.

All alert management rule will run, from the highest to the lowest Order of execution numbers.

B.

Only the alert management rule with the highest Order of execution number will run.

C.

All alert management rule will run, from the lowest to the highest Order of execution numbers.

D.

Only the alert management rule with the lowest Order of execution number will run.

Full Access