New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What entry point type must a horizontal pattern have to execute from a process classifier?

A.

A subnet entry point type.

B.

HTTP(S) entry point type if the pattern is running on a web server application.

C.

TCP entry point type or ALL entry point type.

D.

It does not matter, it is triggered for all entry point types.

What do most Discovery properties start with?

A.

discovery.prop

B.

glide.discovery

C.

disco.release

D.

glide.itom

Which of the following must be configured to allow a MID Server to access servers using WinRM? (Choose two.)

A.

JEA Properties set to True

B.

MID Servers must be configured as a trusted source with DNS

C.

MID Servers need to be added to the WinRM Group policy on the Servers

D.

MID Server Parameters Add WinRM

Which choice best describes how to use a Behavior for discovery?

A.

The MID Server selection method on a Discovery Schedule.

B.

The Behavior drop-down menu on a Discovery IP Range.

C.

The Behavior drop-down menu on a Discovery Status.

D.

The Behavior checkbox on a CI.

In Discovery, what table associates an IP address and a credential?

A.

Credential Affinity

B.

Service Association

C.

Service Affinity

D.

Tags

File-based Discovery is triggered during the.

A.

Classify Phase

B.

Scan Phase

C.

Exploration Phase

D.

Pattern Phase

E.

Identification Phase

Which choice best describes what happens when, by default, duplicate CIs are detected during identification and reconciliation?

A.

A notification is sent to the CI owner.

B.

An associated identification rule is created automatically.

C.

Each set of duplicate CIs is added to a de-duplication task.

D.

The next discovery is stopped for the CI that is duplicated.

Which choice best describes a Functionality Definition?

A.

Defines what CI identifiers to use.

B.

Defines the IP addresses to discover.

C.

Defines what Behavior to use from a Discovery Schedule.

D.

Defines what protocols to detect from within a Behavior.

Which operation is used to change from the default credentials to any other appropriate credentials in a horizontal pattern?

A.

Change credentials

B.

Change user

C.

Alternate credentials

D.

Alternate user

As a first step in horizontal discovery, which of the following is where the Shazzam probe is placed in a request?

A.

Target

B.

Pattern Log

C.

ECC queue

D.

Discovery Log