Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A Service is not viewable in Operator Workspace. What could be the issue?

A.

The service is a manual service

B.

The service is not set to operational

C.

The service was created through Service Mapping

D.

The service is a technical service

How often do baseline event connectors retrieve events?

A.

Every 30 seconds

B.

Every 2 minutes

C.

Every 10 minutes

D.

Every 1 minute

E.

Every 5 minutes

What does Now Assist for ITOM use to provide alert analysis?

A.

Third-party monitoring tool connectors with out-of-box alert rules

B.

GenAI and the ServiceNow large language model

C.

Basic keyword matching in the alert description and tags

D.

The unified service map and link view topology

Which is an invalid state for an alert?

A.

Flapping

B.

Closed

C.

Reopen

D.

Processed

What attribute is used to consolidate events into a single alert?

A.

Event Rules

B.

Message Key

C.

Alert Priority

D.

Severity

A support agent resolves an incident associated with an alert. What is the best method to close the alert?

A.

Set the evt_mgmt.incident_closes_alert

B.

Set the evt_mgmt.alert_closes_incident

C.

Switch over to the alert form and close the alert manually

D.

Create a business rule on the alert table to match the associated Incident with its respective alert

E.

Create a business rule on the incident table

What event will cause Agent Client Collector self-monitoring to pause data collection?

A.

Communication with the MID server is lost

B.

The amount of host memory being used by the agent exceeds a threshold

C.

Communication with the ServiceNow instance is lost

D.

The amount of host disk space used by the agent exceeds a threshold

E.

The amount of host CPU being utilized by the agent exceeds a threshold

What is the recommended approach to normalizing data from a source system to the default values in Event Management?

A.

Event field mapping

B.

Transform maps

C.

Alert management rules

D.

Business rules

Which is not a valid method for accessing alert intelligence?

A.

In the right-click menu of an alert list, select Open in Workspace

B.

By appending/workspace to your instance URL

C.

The application navigator Alerts Console menu item

D.

The application navigator Alert Intelligence menu item

E.

Within an open alert record, click the Open in Workspace button

F.

Select the Lists tab in operator workspace

A four node cluster makes up the components (CIs) of a Business Service. The impact influence for the cluster is set to 60%.

How many members of the cluster must be in a Critical state in order for the Business Service to display as Critical in the Impact Tree?

A.

1

B.

2

C.

3

D.

4