Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ServiceNow CIS-Service Management CIS-ITSM Questions and answers with ValidTests

Exam CIS-ITSM All Questions
Exam CIS-ITSM Premium Access

View all detail and faqs for the CIS-ITSM exam

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

When you create a problem from an incident. Impact, urgency and priority are automatically populated, from the incident record. Your problem management process owner wants the problem manager to be responsible for assessing the impact and urgency on the problem, so they don't want the values from incident to be copied over.

What module would you use to make this adjustment?

Options:

A.

ITSM > Administration > Properties

B.

Incident > Administration > Incident Properties

C.

Problem > Administration > Problem Properties

D.

System Policy > Rules > Priority Lookup Rules

Expert Solution
Questions # 22:

Your customer wants to use Incident Tasks on Incident Records But for efficiency reasons they want to automatically close all Incident Tasks when the parent Incident is closed or canceled. How could you meet this requirement?

Choose 2 answers

Options:

A.

On Incident Properties, for Close Open Incident Tasks when Incident is closed or canceled, select Yes

B.

Enable system property com snc incident.mcidentjask closure

C.

Edit system property com.snc incident autoclose basedon resolved_at

D.

On Incident Properties, for Autoclose Incident Tasks, select Yes

Expert Solution
Questions # 23:

A Portfolio Manager is primarily concerned with the performance of what hierarchy?

Options:

A.

Portfolio Owner, Service Owner, Catalog Manager

B.

Requested Item, Catalog Task, Task SLA

C.

Service Catalog, Catalog Item, Requested Item

D.

Service Portfolio, Service, Service Offering

Expert Solution
Questions # 24:

Where can a change manager define the interval frequency for unauthorized change detection?

Options:

A.

The ci.change.unplanned business rule

B.

Event Processing Properties module

C.

Unauthorized Change Properties module

D.

Unauthorized change flow

Expert Solution
Questions # 25:

The Major Incident Management (MIM) application is linked to the Incident management process, but the records have an additional set of States. What are these MI States?

Options:

A.

Proposed, Accepted, Rejected, Cancelled

B.

Proposed, Accepted, Rejected, Reopened

C.

Proposed, Received, eCAB Convened, Closed

D.

New, Work in progress, Escalated, Communicated

Expert Solution
Questions # 26:

In Change Management, what does a Model State contain? (Choose two.)

Options:

A.

Model State transitions conditions

B.

Model State properties

C.

Model State transition policies

D.

Model State transitions

Expert Solution
Questions # 27:

Where are the timeframe conditions for sending an SLA breach warning notification defined?

Options:

A.

SLA definition record

B.

Default SLA flow

C.

SLA Properties application

D.

SLA trigger conditions

Expert Solution
Questions # 28:

What is an example of a good use case for an Order Guide?

Options:

A.

Order a set of Dishes

B.

Order a Custom Automobile

C.

Order a Technical Consultation

D.

Order a Couch

E.

Order a case of Laundry Soap

Expert Solution
Questions # 29:

Your customer has built a mature knowledge base, with articles targeted to internal audiences, which are technical. Other articles are written for

end users, with simple instructions. From the Incident form, the agents would like to be able to identify which articles are visible to the callers. What

feature would you use, to satisfy this requirement?

Options:

A.

Internal/External Highlighting

B.

Show User Viewable

C.

User Only View

D.

Search as User

Expert Solution
Questions # 30:

When using Inbound Email Actions, what happens it an email is received which has no watermark or reference number?

Options:

A.

New case is created from the message

B.

New incident created from the message

C.

New interaction is created from the message

D.

Email is rejected and auto-reply sent to sender

Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions