Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CIS-Discovery Certified Implementation Specialist - Discovery Questions and Answers

Questions 4

Which of the following related lists can assist with troubleshooting discovery from a discovery status?

Choose 3 answers

Options:

A.

Discovery Log

B.

Running Processes

C.

ECC Queue

D.

Devices

Buy Now
Questions 5

Which of the below choices are the most probable results of the following image? (Choose three.)

CIS-Discovery Question 5

Options:

A.

A tabular variable named ‘WMI Query’.

B.

A scalar variable named ‘MaximumWorkingSetSize’

C.

A scalar variable named ‘PageFaults’.

D.

A scalar variable named ‘PeakVirtualSize’.

E.

A tabular variable named ‘more_process_info’.

F.

A tabular variable named ‘Win32_Process’.

Buy Now
Questions 6

A Discovery Schedule contains a /24 subnet IP Range and a Shazzam batch size of 5000. How many times will a Shazzam probe be launched during discovery?

Options:

A.

1

B.

2

C.

5000

D.

254

Buy Now
Questions 7

What role is needed by the MID Server's user account to interact with a ServiceNow instance?

Options:

A.

mid_server

B.

discovery_admin

C.

sm_mid

D.

mid_discovery

Buy Now
Questions 8

A network device has both an SSH port and an SNMP port open. Discovery tries the SSH probe first and it fails. This triggers the SNMP probe, which succeeds. Discovery uses SNMP first for subsequent discoveries on that device.

What discovery functionality allows the above to happen?

Options:

A.

Classification

B.

Credential affinity

C.

MID Server affinity

D.

IP service affinity

Buy Now
Questions 9

What is the advantage of Discovery Range Sets?

Options:

A.

Range Sets provide flexibility in management and identification of known networks for simplicity of administration.

B.

Range Sets are the only way to have more than one IP Range defined within a Discovery Schedule.

C.

Range Sets show the number of IPs in a subnet.

D.

All the necessary Range Sets are installed in the base installation of Discovery.

Buy Now
Questions 10

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

Options:

A.

The next discovery is stopped for the CI that is duplicated.

B.

Each set of duplicate CIs is added to a de-duplication task.

C.

A notification is sent to the CI owner.

D.

An association identification rule is created automatically.

Buy Now
Questions 11

Which choice best describes a Functionality Definition?

Options:

A.

Defines what CI identifiers to use.

B.

Defines the IP addresses to discover.

C.

Defines what Behavior to use from a Discovery Schedule.

D.

Defines what protocols to detect from within a Behavior.

Buy Now
Questions 12

Which service needs to be running on a host to detect a Windows device?

Options:

A.

WM

B.

WinkM

C.

CM

D.

SSH

Buy Now
Questions 13

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

Options:

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Buy Now
Questions 14

What is the recommended method of consolidating duplicate CIs?

Options:

A.

Duplicate CI Remediator

B.

Event CI Remediation

C.

Ignore Duplicate CI

D.

Manual CI Remediation

Buy Now
Questions 15

Which of the following describes the recommended permission level for credentials to discover Windows Servers?

Options:

A.

A domain user with local administrator access

B.

A userr00t access across the domain

C.

A domain administrator with sudo access

D.

A standard domain user with read access

Buy Now
Questions 16

Which method is used by Discovery to determine if a Host IP is active or alive?

Options:

A.

Port Scan

B.

Traceroute

C.

Ping

D.

Classification

Buy Now
Questions 17

When designing steps with operations requiring variables, it is best practice to do what?

Options:

A.

hard core variables

B.

always use scalar variables

C.

query targets for variables

D.

design for a static environment

Buy Now
Questions 18

Which of the following must be configured to allow a MID Server to access servers using WinRM?

Options:

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Buy Now
Questions 19

Which of the following choices explain differences between Service Mapping and Discovery? (Choose two.)

Options:

A.

Discovery requires agent installation to find hardware devices, Service Mapping requires agents for software.

B.

Discovery finds applications and devices on your network, Service Mapping monitors those devices.

C.

Discovery utilizes IP address ranges for initial discovery, Service Mapping uses entry points.

D.

Discovery addresses inventory-related use-cases, while Service Mapping allows for the creation of accurate maps of application service topologies.

Buy Now
Questions 20

In Discovery, what table associates an IP address and a credential?

Options:

A.

Credential Affinity

B.

Service Affinity

C.

Service CI Association

D.

Tags

Buy Now
Questions 21

As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?

Options:

A.

Target

B.

Pattern Log

C.

ECC queue

D.

Discovery Log

Buy Now
Questions 22

What is the default thread count for a MID Server?

Options:

A.

5

B.

1

C.

50

D.

25

Buy Now
Questions 23

Which of the following best describes the relationship between the Tomcat [cmdb_ci_app_server_tomcat] table and the Application Server [cdmb_ci_app_server] table? (Choose two.)

Options:

A.

Tomcat does not extend the Application Server table

B.

Tomcat table extends the Application Server table

C.

Tomcat table is a child of the Application Server table

D.

Tomcat table is a parent of the Application Server table

Buy Now
Questions 24

Which of the following choices must be installed on a MID Server to run Credential-less Discovery?

Options:

A.

Credential-less Extension

B.

Nmap

C.

Advanced IP Scanner

D.

Defender

Buy Now
Questions 25

What operation is shown in this image? (has image took pic)

Options:

A.

Transform Table

B.

Put File

C.

Union Table

D.

Parse Variable

Buy Now
Questions 26

What are the two main options within a Parse File operation?

Options:

A.

Discover Now and Quick Discovery

B.

Select Operating System and Method

C.

Select File and Define Parsing

D.

Match and Select File

Buy Now
Questions 27

Which of the following choices are only used for the Application Pattern Type? (Choose two.)

Options:

A.

Run Order

B.

Identification Section

C.

CI Type

D.

Operating System

Buy Now
Questions 28

Which of the following pattern operations query targets? (Choose two.)

Options:

A.

WMI Query

B.

Merge Table

C.

Get Process

D.

Parse Variable

Buy Now
Questions 29

In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)

Options:

A.

Global CI types

B.

Main pattern CI type

C.

Related CI types

D.

All CI types

Buy Now
Questions 30

For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?

Options:

A.

Hash tag

B.

Brackets

C.

Quotes

D.

Dollar sign

Buy Now
Questions 31

What entry point type must a horizontal pattern have to execute from a process classifier?

Options:

A.

A subnet entry point type.

B.

HTTP(S) entry point type if the pattern is running on a web server application.

C.

TCP entry point type or ALL entry point type.

D.

It does not matter, it is triggered for all entry point types.

Buy Now
Questions 32

If the WMI service is not running on a host, it will prevent the discovery of which devices?

Options:

A.

Network

B.

Windows

C.

Storage

D.

Unix

Buy Now
Questions 33

What related list on a classifier dictates which Horizontal Pattern probe is launched?

Options:

A.

Discovery Log

B.

Classification Criteria

C.

Pattern probes

D.

Triggers probes

Buy Now
Questions 34

While discovering a new SNMP network device, which choice could cause the error ‘Active, couldn't classify" to occur on a Discovery Status?

Options:

A.

SNMP credentials are incorrect.

B.

SNMP only behavior is not configured.

C.

A firewall blocking the communication between the MID Server and the target device.

D.

An SNMP Classification must be updated or created for the new device.

Buy Now
Questions 35

By default, which of the following are automatically available as variables for horizontal discovery patterns? (Choose two.)

Options:

A.

infrastructure_system

B.

The CI Type on the Discovery Pattern form

C.

windows_cmdb_ci

D.

computer_system

Buy Now
Questions 36

Which service needs to be running on a host to detect a Windows device?

    WMI

    SSH

Options:

A.

WinRM

B.

CIM

Buy Now
Questions 37

Which choice best describes a horizontal discovery pattern?

Options:

A.

Classifiers that execute probes

B.

Steps that execute operations

C.

Credential depot

D.

Port scanning tool

Buy Now
Exam Code: CIS-Discovery
Exam Name: Certified Implementation Specialist - Discovery
Last Update: Sep 16, 2025
Questions: 125

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CIS-Discovery testing engine

PDF (Q&A)

$36.75  $104.99
buy now CIS-Discovery pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 16 Sep 2025