A. Port scanning tool
B. Steps that execute operations
C. Credential depot
D. Classifiers that execute probes
A. To discover that file names conform to a defined naming standard
B. To discover file paths to recognize the signature of installed software
C. To discover the checksum of a file and store it to track for changes
D. To discover the contents of flat files such as configuration files
A. Infrastructure Patterns
B. Credential-less Discovery
C. Check
D. ACC Websocket Endpoint
A. This operation is more than likely a part of a step on a pattern set to Application Pattern Type.
B. If a value is unmatched, it is still merged into the Target Table.
C. This is a horizontal pattern of type "infrastructure."
D. Attributes from two tables populate a table with the same name as a ServiceNow CMDB table.
E. For this operation to run, there must be some data in the process.executablePath variable.
A. Recommended
B. Overall
C. Audit
D. Required
A. Dollar sign
B. Brackets
C. Hash tag
D. Quotes
A. always use scalar variables
B. design for a static environment
C. query targets for variables
D. hard core variables
A. updating the acl rules for the CMDB tables in ServiceNow
B. increase the MID Server max payload size
C. increasing the memory allocated to the MID Server app.
D. increase the amount of disk space on the MID Server host
A. Duplicates
B. Compliance
C. Correctness
D. Staleness
E. Completeness
A. $cmdb_ci_linux_server.u_custom_column.INSERT
B. $u_custom_column[1].cmdb_ci_linux_server
C. $user_var_custom_column
D. $cmdb_ci_linux_server[*].u_custom_column