New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ServiceNow CIS-ITSM Exam - Topic 3 Question 10 Discussion

Actual exam question for ServiceNow's CIS-ITSM exam
Question #: 10
Topic #: 3
[All CIS-ITSM Questions]

Which table do all technical configuration items extend from?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Caitlin
4 months ago
I agree with C, all tech items extend from there.
upvoted 0 times
...
Kyoko
4 months ago
Wait, are we sure about C? Seems a bit off.
upvoted 0 times
...
Titus
5 months ago
No way, it's D for sure!
upvoted 0 times
...
Margurite
5 months ago
I thought it was B, but C makes sense too.
upvoted 0 times
...
Avery
5 months ago
Definitely C, it's the Technical Configuration Item.
upvoted 0 times
...
Andra
5 months ago
I feel like the answer is definitely the Configuration Item table, but I might need to double-check my notes on this.
upvoted 0 times
...
Annice
5 months ago
I’m a bit confused; I thought it might be the Base Configuration Item, but now I’m second-guessing myself.
upvoted 0 times
...
Barbra
5 months ago
I remember practicing a similar question, and I believe it was the Technical Configuration Item table that was mentioned.
upvoted 0 times
...
Becky
5 months ago
I think all technical configuration items extend from the Configuration Item table, but I'm not completely sure.
upvoted 0 times
...
Hildred
5 months ago
Okay, let's see. Option A mentions PSM connections to devices not managed by CyberArk, so that seems relevant. I'll mark that one.
upvoted 0 times
...
Ranee
5 months ago
FlexVPN could be a good fit, but I'm not sure if it can scale up to 250,000 CE devices per customer. The low operational management requirement is also a bit of a concern with that option.
upvoted 0 times
...
Alysa
5 months ago
I'm a bit confused by the wording of this question. Can someone clarify what they're looking for exactly?
upvoted 0 times
...
Lashandra
5 months ago
Hmm, this looks like a tricky one. I'll need to think carefully about the different LDAP query types and which two are available when an LDAP profile is configured.
upvoted 0 times
...
Lavina
6 months ago
I had a practice question on phishing like this last week, and I confidently chose that; really hope that's still the right answer!
upvoted 0 times
...

Save Cancel