CIS-CPG ServiceNow Practice Test Questions and Exam Dumps


Question No 1:

Which Resource Profile can be used to define when to start and stop a resource?

A Security Profile
B Application Profile
C Lease Profile
D Schedule Profile

Correct answer: D

Explanation:

Resource profiles are used to manage and define various characteristics and behaviors of resources within an IT environment, including when they are started or stopped. Let's review each option in relation to the question:

Option A, "Security Profile," is primarily focused on the security settings and permissions associated with a resource. It defines access control, user roles, and security configurations, but does not directly control when a resource should start or stop. Thus, it is not the correct profile for this purpose.

Option B, "Application Profile," generally defines the settings and configurations specific to an application. While this profile may include parameters for application behavior and resource usage, it is not typically used to define the scheduling of resource start and stop times. Therefore, this option is also not suitable for this requirement.

Option C, "Lease Profile," is related to the allocation and duration for which resources are available. Lease profiles are commonly used in environments that require resources to be reserved or allocated for a specific time period, but they do not typically include detailed scheduling for when resources should start or stop. It focuses more on resource allocation rather than active management of their start/stop times.

Option D, "Schedule Profile," is the correct answer. A Schedule Profile is specifically used to define the timing aspects of resource management, including when a resource should start and stop. It provides the scheduling parameters for resources, allowing administrators to configure start and stop times based on specific time windows or recurring schedules. This is the profile that directly addresses the need for managing resource lifecycle timing.

In conclusion, Option D: Schedule Profile is the most appropriate choice because it specifically deals with the scheduling of resource start and stop times.

Question No 2:

Which of the following is true for a Compute Profile? (Choose two.)

A Defines what virtual hardware is presented to end users
B Defines custom t-shirt sizes (small, medium, large, etc.) for virtual hardware
C Defines OS choices for Cloud Catalog offerings
D Defines Security Group offerings
E Defines when virtual hardware can be provisioned by end users

Correct answer: A, B

Explanation:

A Compute Profile is used to define the virtual hardware configurations that can be presented to users in cloud environments, typically in the context of Infrastructure as a Service (IaaS) platforms. It helps to determine the available resources that can be provisioned, such as virtual machines, and defines the size and characteristics of those resources.

Here's why A and B are the correct choices:

  • A. Defines what virtual hardware is presented to end users: A Compute Profile defines the configuration and specifications of virtual hardware, such as the number of CPUs, amount of RAM, and disk space that will be available to users. This setting ensures that users can only provision resources that meet the organization's requirements for performance and cost.

  • B. Defines custom t-shirt sizes (small, medium, large, etc.) for virtual hardware: Many cloud environments use t-shirt sizing to classify virtual machine configurations based on their hardware resources. A Compute Profile can define these custom sizes (e.g., small, medium, large), which users can select when provisioning virtual hardware. This allows the organization to provide pre-defined configurations that meet different workload requirements.

Now, let's review why the other options are incorrect:

C. Defines OS choices for Cloud Catalog offerings: The OS choices for cloud offerings (e.g., Windows, Linux) are generally defined elsewhere in the cloud environment, not in the Compute Profile. While the compute profile may determine the virtual hardware resources, the OS selection would be handled through other settings related to cloud catalog offerings.

D. Defines Security Group offerings: Security Groups typically manage access control and networking rules for virtual machines or resources, but they are not directly defined in a Compute Profile. The Compute Profile focuses on the virtual hardware resources, while Security Groups are managed separately to control access to those resources.

E. Defines when virtual hardware can be provisioned by end users: The Compute Profile does not directly control the timing of resource provisioning. Timing and access control are typically managed through other policies or permissions settings in cloud environments, not by the Compute Profile.

Therefore, the correct answers are A and B, as they accurately reflect the role of a Compute Profile in defining the virtual hardware and resource configurations available to end users.

Question No 3:

Which Permission would you use to make a Catalog Item for a cloud native application that you plan to release, viewable but not executable, for users who belong to the Marketing Developers group?

A All
B Access
C Viewer
D Execute

Correct answer: C

Explanation:

In order to make a catalog item for a cloud-native application viewable but not executable by users belonging to a specific group (in this case, the Marketing Developers group), the Viewer permission is the appropriate choice. Here's why:

  • Viewer (C): This permission allows users to view the catalog item but not execute it. By assigning the Viewer permission, you ensure that users can see the details of the catalog item but are restricted from running or interacting with it. This is the exact behavior you are looking to achieve for the Marketing Developers group.

Now, let’s look at the other options:

  • All (A): The All permission grants full access to the catalog item, including the ability to view, execute, and manage the item. Since the goal is to make the catalog item viewable but not executable, the All permission would be too permissive because it includes execution rights, which you do not want in this case.

  • Access (B): The Access permission typically allows users to access a catalog item but may not provide full visibility or control over it. It’s more of a general access permission, and it doesn’t specifically prevent execution while providing viewing rights. It’s not the best fit for making an item viewable but not executable.

  • Execute (D): The Execute permission is used to give users the ability to actually execute the catalog item, which is the opposite of what you're trying to achieve. You want to restrict execution, so this option is not appropriate.

In conclusion, to make the catalog item viewable but not executable for the Marketing Developers group, you should assign the Viewer permission.

Question No 4:

What governance objects are available in Cloud Provisioning and Governance? (Choose three.)

A Quotas
B Credentials
C Policies
D Permissions
E SLAs

Correct answers: A, C, D

Explanation:

In Cloud Provisioning and Governance, governance objects are the elements used to control, manage, and regulate cloud resources, user access, and operational behaviors. Let’s break down each option:

  • A (Quotas):
    Quotas are a critical governance object in cloud provisioning. They allow organizations to define limits on resource usage, helping to prevent overuse and ensuring that resources are utilized efficiently. Quotas are used to govern the consumption of cloud services, ensuring that teams or projects do not exceed predefined resource limits. Therefore, quotas are a valid governance object.

  • B (Credentials):
    While credentials are essential for user authentication and access management, they are not directly classified as a governance object in the context of cloud provisioning. Credentials are typically more about identity and access management rather than the governance structures that control how cloud resources are provisioned and utilized.

  • C (Policies):
    Policies are key governance objects. They define rules and guidelines for resource usage, access permissions, compliance standards, and security measures. Policies enforce organizational controls and help ensure that cloud resources are used according to predefined rules. This makes policies a valid governance object.

  • D (Permissions):
    Permissions define what actions users and roles can perform on cloud resources. They are a fundamental part of governance because they control access and ensure that users can only perform tasks that are in line with their roles or responsibilities. Permissions are directly related to governance and access control.

  • E (SLAs):
    Service Level Agreements (SLAs) are contractual commitments regarding the level of service a provider will deliver. While SLAs are important for setting expectations, they are not typically considered a governance object within cloud provisioning systems. SLAs define service expectations but do not directly govern how resources are provisioned or controlled.

In conclusion, the key governance objects in Cloud Provisioning and Governance are Quotas, Policies, and Permissions because they directly control and manage the usage, rules, and access of cloud resources. Therefore, the correct answers are A, C, and D.

Question No 5:

Which of the following best describes what Puppet, Chef, Ansible Tower, and Salt are utilized for?

A Clout Cost Control
B Configuration Management
C Cloud Monitoring
D Continuous Integration

Correct answer: B

Explanation:

Puppet, Chef, Ansible Tower, and Salt are all configuration management tools commonly used in the field of DevOps and IT automation. These tools help manage and automate the configuration of servers and infrastructure, ensuring that systems are consistently set up according to a desired state.

B - Configuration Management:
This is the correct answer. Configuration management tools like Puppet, Chef, Ansible, and Salt are primarily used for automating the process of configuring and maintaining the desired state of systems. They help system administrators and IT teams to automate tasks such as installing and configuring software, managing system configurations, and ensuring that all servers in an environment are compliant with the desired setup. These tools allow for easy management of large-scale infrastructure and can be used to enforce consistency across all systems in a network.

A - Cloud Cost Control:
This option is incorrect. While managing costs in the cloud is an important aspect of cloud computing, Puppet, Chef, Ansible Tower, and Salt are not primarily designed for cloud cost control. Instead, they are focused on automating system configurations and deployments, rather than managing and controlling cloud-related expenses.

C - Cloud Monitoring:
This option is also incorrect. Cloud monitoring tools focus on tracking the performance and health of cloud-based applications and infrastructure. Monitoring typically involves tools that can provide real-time metrics and alerts about the health of servers, services, and networks. However, Puppet, Chef, Ansible, and Salt are not designed for monitoring, but rather for managing and automating configuration tasks.

D - Continuous Integration:
This option is incorrect as well. While tools like Puppet, Chef, Ansible, and Salt are often used in DevOps workflows, they are not specifically designed for continuous integration (CI). CI tools (e.g., Jenkins, CircleCI) are focused on automating the process of integrating code changes into a shared repository and running tests. In contrast, configuration management tools automate infrastructure setup and maintenance, making them essential in DevOps, but not directly part of the CI pipeline.

In conclusion, configuration management (option B) is the best description for what Puppet, Chef, Ansible Tower, and Salt are utilized for. These tools help automate and manage configurations to ensure that infrastructure remains consistent, scalable, and compliant across environments.

Question No 6:

Cloud Scripts and Cloud Script Templates utilize which host-based scripting tools to install software?

A Shell scripts and powershell scripts
B Powershell scripts and Ruby
C JavaScript and Perl
D Shell scripts and JavaScripts

Correct answer: A

Explanation:

Cloud Scripts and Cloud Script Templates are widely used for automating tasks and installing software on virtual machines or cloud environments. These scripts help in managing and deploying applications and services without the need for manual intervention. The choice of scripting languages plays a significant role in these automation processes.

Breakdown of the Options:

  • A. Shell scripts and powershell scripts
    This option is the correct one. Shell scripts (for Unix-like systems, such as Linux) and PowerShell scripts (for Windows environments) are commonly used host-based scripting tools for installing and managing software. Shell scripts are often used in Linux or macOS environments to automate tasks, while PowerShell scripts are specifically designed for automation in Windows environments. Both are essential in cloud environments where different operating systems are in use, and they are frequently leveraged for software installation tasks, system configuration, and other administrative operations.

  • B. Powershell scripts and Ruby
    While PowerShell scripts are certainly used for automation tasks in Windows environments, Ruby is not as commonly used for software installation in cloud environments compared to Shell scripts. Ruby is more often associated with web development (e.g., Ruby on Rails), but it is not typically used for the direct installation of software in cloud automation scenarios.

  • C. JavaScript and Perl
    JavaScript is primarily used in web development for client-side scripting and does not play a direct role in cloud-based software installation. Perl, although it has some historical use in system administration, is not as commonly used today for cloud-based automation compared to shell scripting or PowerShell. These two languages are less likely to be the primary tools for installing software in cloud environments.

  • D. Shell scripts and JavaScripts
    This combination is incorrect because JavaScript is a language used for web development and client-side scripting, not for host-based software installation. Shell scripts are indeed used for software installation, but JavaScript is not commonly associated with this task in cloud environments.

The correct answer is A. Shell scripts and PowerShell scripts. These scripting languages are widely used in cloud automation to install software, configure systems, and perform a variety of administrative tasks based on the operating system being used (Linux with Shell scripts and Windows with PowerShell).

Question No 7:

How are variables grouped for a Catalog Item?

A. Update Sets
B. UI Groups
C. Variable Sets
D. Different Forms
E. Form Parameters

Correct answer: C

Explanation:

In ServiceNow, variables are used in Catalog Items to collect input from users when they request a service or item. These variables can be grouped in different ways to ensure the smooth and organized collection of data. Let’s break down the options:

  1. A. Update Sets: Update Sets are used in ServiceNow to track and manage customizations and configurations that need to be moved from one environment to another (e.g., from development to production). While update sets manage changes, they are not used for grouping catalog item variables. Therefore, this option does not apply to variable grouping.

  2. B. UI Groups: UI Groups in ServiceNow are used to organize and manage user interface elements, typically for catalog UI policies or catalog client scripts. While UI Groups can help define which elements are visible or interactable on the user interface, they are not primarily used for grouping catalog item variables.

  3. C. Variable Sets: Variable Sets are the correct method for grouping variables in ServiceNow. A Variable Set is a collection of related variables that can be used across multiple catalog items or records. By grouping variables into a Variable Set, you can easily reuse a set of variables in different catalog items without needing to redefine them each time. This grouping method helps in organizing related variables and applying them efficiently to multiple catalog items.

  4. D. Different Forms: Forms in ServiceNow define the layout of fields and how users interact with them. However, forms are not specifically used to group variables for catalog items. Rather, forms contain fields (which are essentially variables in the context of catalog items). Variables may be part of a form, but they are grouped by Variable Sets, not by the form itself.

  5. E. Form Parameters: Form Parameters refer to parameters that affect the behavior or layout of a form but are not used to group catalog item variables. These parameters can control form settings like visibility, validation, and interaction but are not designed to group the variables themselves.

The correct answer is C. Variable Sets. Variable Sets are used in ServiceNow to group related variables for catalog items, making it easier to manage and reuse variables across multiple items or services.

Question No 8:

What must be created in Azure before you can configure Azure Alerts in ServiceNow?

A. Create a Network Security Group
B. Create a Resource Group
C. Create an App Service
D. Create a Monitor Alert

Correct answer: D

Explanation:

Before configuring Azure Alerts in ServiceNow, it is necessary to create a Monitor Alert in Azure. Azure Monitor Alerts are used to track the health and performance of your resources, and they can be integrated with various systems like ServiceNow for incident management and automated responses.

  • D. Create a Monitor Alert: Azure Monitor provides the capability to create alerts based on specific conditions like resource performance, usage, or health. These alerts can be configured to trigger when certain thresholds are met or specific issues occur within your Azure environment. These alerts are essential when integrating Azure with ServiceNow, as they provide the data needed to initiate the alert-based actions in ServiceNow (such as creating incidents or notifications).

The other options are not directly related to the configuration of Azure Alerts in ServiceNow:

  • A. Create a Network Security Group: A Network Security Group (NSG) is used to manage network traffic rules to and from Azure resources, but it is not directly related to configuring alerts in Azure Monitor or ServiceNow.

  • B. Create a Resource Group: While a Resource Group is a fundamental component in Azure for organizing resources, it is not specifically required to configure Azure Alerts in ServiceNow. Resource groups help manage Azure resources but don't directly influence the creation of monitor alerts.

  • C. Create an App Service: An App Service is used for deploying web apps and APIs in Azure, but it is not necessary for setting up Azure Alerts in ServiceNow. The creation of a monitor alert is what's required, regardless of whether you have an App Service or not.

Therefore, the correct answer is D. Create a Monitor Alert, as it is the essential step for integrating Azure alerts with ServiceNow.

Question No 9:

What application can you use in the Cloud Admin Portal to guide your organization through the process of setting up Cloud Provisioning and Governance?

A. Cloud Orchestration
B. Configuration Templates
C. Cloud Planner
D. Guided Setup

Correct answer: D

Explanation:

The Cloud Admin Portal is a comprehensive platform for managing cloud resources and ensuring that the processes for provisioning and governance are streamlined and well-managed. To assist with the setup of cloud provisioning and governance, Guided Setup is the correct application to use.

A. Cloud Orchestration

Cloud Orchestration refers to automating and managing the process of provisioning and configuring cloud services. While orchestration is important for automating workflows and integrating various systems, it does not specifically guide users through setting up cloud provisioning and governance in the same structured manner that Guided Setup does.

B. Configuration Templates

Configuration Templates are useful for quickly deploying predefined configurations, which can save time and ensure consistency when setting up resources. However, these templates are more about applying specific configurations rather than guiding the overall setup process for provisioning and governance.

C. Cloud Planner

Cloud Planner typically helps organizations plan and optimize their cloud resources, including budgeting and cost forecasting. While useful for planning, it is not specifically designed to guide the setup of cloud provisioning and governance.

D. Guided Setup

Guided Setup is a tool designed to walk administrators through the process of setting up cloud provisioning, governance, and other key configurations. It simplifies complex processes, ensuring that the necessary steps are followed in the correct order. This application is specifically built to guide users through the entire setup process, making it the most suitable choice for this task.

In conclusion, the correct answer is D. Guided Setup, as it directly assists with guiding organizations through the process of setting up Cloud Provisioning and Governance.

Question No 10:

Which Cloud Provider feature do organizations depend on to provide visibility into resource management and billing? (Choose two.)

A. Security Groups
B. Billing Data
C. Identity and Authentication Management
D. Tags

Correct answer: B, D

Explanation:

Organizations rely on specific cloud provider features to help track and manage their resources, costs, and usage. The correct features for visibility into resource management and billing are Billing Data and Tags.

  • B. Billing Data: This feature directly provides insights into an organization's cloud spending. By reviewing billing data, organizations can understand their costs, track usage over time, and optimize resource allocation to avoid unnecessary expenditures. Billing data often includes detailed reports, cost breakdowns, and forecasts, which help organizations manage their budget effectively.

  • D. Tags: Tags are an essential feature for organizing and managing resources in the cloud. By using tags, organizations can categorize and label resources (such as instances, storage, etc.) to track costs more precisely. Tags help allocate expenses to specific departments, projects, or environments, providing better visibility into how resources are being used and facilitating detailed billing reports based on those tags.

On the other hand:

  • A. Security Groups: Security groups are used for controlling access and defining rules for network security, not for billing or resource management. While they are critical for securing resources, they do not provide direct visibility into cost or resource usage.

  • C. Identity and Authentication Management: Identity and Authentication Management (IAM) is responsible for controlling access to resources by users and roles. While important for securing the environment and ensuring proper access control, IAM does not directly provide visibility into resource management or billing.

Thus, the correct answers are B. Billing Data and D. Tags, as they are the features that provide visibility into resource management and billing.


UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.