New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ServiceNow CIS-ITSM Exam - Topic 2 Question 15 Discussion

Actual exam question for ServiceNow's CIS-ITSM exam
Question #: 15
Topic #: 2
[All CIS-ITSM Questions]

Which of the following database views is useful if you need to create a report of the changes that were closed by category?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Ezekiel
4 months ago
I’m not convinced, what about D? It might have some insights.
upvoted 0 times
...
Michal
4 months ago
Wait, is A really the only option? Seems too simple.
upvoted 0 times
...
Marguerita
5 months ago
A is the best choice, no doubt!
upvoted 0 times
...
Denny
5 months ago
I think B could work too, but not as focused.
upvoted 0 times
...
Ellsworth
5 months ago
Definitely A, it’s all about categories!
upvoted 0 times
...
Eloisa
5 months ago
I honestly can't remember which one is correct. I thought change_request_metric was more about performance than categories.
upvoted 0 times
...
Johnna
5 months ago
I'm leaning towards D because it mentions metrics related to categories, but I could be mixing it up with another topic.
upvoted 0 times
...
Kayleigh
5 months ago
I feel like I've seen a question similar to this in practice exams. Maybe it's B? It seems relevant to SLAs.
upvoted 0 times
...
Gayla
5 months ago
I think the answer might be A, but I'm not entirely sure. I remember something about categories being important for reports.
upvoted 0 times
...
Ilda
5 months ago
I think the key here is that Paul is taking the time to test and refine his process before rolling it out. That sounds like the Lean approach to me - continuously improving through small iterations. I'm pretty confident that's the right answer.
upvoted 0 times
...
Edward
5 months ago
I'm pretty confident about option C regarding perimeter security, but I wonder if just using transport-layer security is enough for these vulnerabilities?
upvoted 0 times
...
Kindra
5 months ago
I remember learning about CASO in class, but I'm drawing a blank on the specifics of the catalog modes. I'll have to review my notes before answering this.
upvoted 0 times
...
Frederic
5 months ago
I'm pretty sure analyzing email headers is not a technique used for active OS fingerprinting, since that's more about network traffic analysis.
upvoted 0 times
...
Wade
5 months ago
I definitely remember practicing a similar question where the hash was described as a unique identifier, so I lean towards option A.
upvoted 0 times
...
Cassie
6 months ago
Hmm, this seems like a tricky one. I'll need to carefully read through the question and options to make sure I understand what's being asked.
upvoted 0 times
...

Save Cancel