A CMDB Administrator is implementing Vulnerability Response or Security Incident Response and needs to ensure customers have enough context to estimate risk and set task priorities.
Which Get Well Playbook from the CSDM Data Foundations Dashboard helps with this?
Comprehensive and Detailed Explanation (200--300 words):
In ServiceNow, Vulnerability Response and Security Incident Response rely heavily on business context to accurately assess risk, prioritize remediation tasks, and communicate impact to stakeholders. From a CSDM (Common Service Data Model) perspective, this context is primarily delivered through properly modeled relationships between Application Services and Business Applications.
The ''Application Services with Business Application Relationships'' Get Well Playbook directly addresses this requirement. In CSDM, Application Services represent the technical, deployable services that run in the environment, while Business Applications represent the logical applications that support business capabilities. When these two are correctly related, security teams can clearly understand which business processes, customers, and revenue streams are affected by a vulnerability or security incident.
Without this relationship, vulnerabilities may still be detected, but they lack meaningful prioritization. For example, a critical vulnerability on an application service supporting a revenue-generating or customer-facing business application should be addressed far more urgently than one tied to a low-impact internal tool. This relationship is what enables risk-based prioritization, rather than purely technical severity-based prioritization.
The other options do not fulfill this need. Location hierarchy issues (Option A) and CI lifecycle status consistency (Option D) relate more to CMDB hygiene and governance, not security context. Product ownership gaps (Option C) affect accountability but do not directly enable risk estimation during security response.
Therefore, Option B is the correct and CSDM-aligned Get Well Playbook for ensuring sufficient business context in Vulnerability Response and Security Incident Response workflows.
A CMDB Data Manager needs to access the ServiceNow platform to create, publish, and manage policies that automate and govern CI lifecycle operations, ensuring the CMDB remains healthy and efficient.
Where can the Data Manager do this?
Comprehensive and Detailed Explanation (200--300 words):
The CMDB Data Manager performs governance activities such as creating, publishing, and managing lifecycle policies (archival, certification, attestation, cleanup) to ensure long-term CMDB health. These activities are executed within the CMDB Workspace, specifically under the Management tab.
In ServiceNow, the CMDB Workspace -- Management tab is the centralized location for CMDB governance operations. From here, Data Managers can define policy logic, assign ownership, schedule execution, monitor outcomes, and manage remediation tasks generated by those policies.
Option A (CMDB 360 tab) focuses on visibility and analysis of CI data and relationships, not policy authoring. Option B (Service Operations Workspace) is used for operational response and service monitoring, not CMDB governance. Option C (CI Class Manager) is used to define class hierarchy and ownership, but it does not manage lifecycle policies.
Therefore, the correct location for CMDB Data Manager policy management is CMDB Workspace -- Management tab, making Option D correct.
(Choose 2 options)
A Configuration Management Process Owner is preparing solution options for presentation to technical governance for ingesting custom CIs into the CMDB. The solution must align with best practices, minimize future technical debt, and ensure upgrade compliance.
Which solutions accomplish this?
Comprehensive and Detailed Explanation (200--300 words):
In ServiceNow, ingesting custom CIs must be done with a strong focus on upgrade safety, governance, and long-term maintainability. Data Foundations guidance explicitly discourages repurposing or overloading base classes, as this creates technical debt and upgrade risk.
Option B is a best practice because the CMDB CI Class Models Store delivers ServiceNow-supported CI classes that align with platform evolution. Before creating or extending classes, administrators should verify whether a suitable class already exists or has been introduced in newer releases. This avoids duplication and ensures future compatibility.
Option D is also correct. When no suitable class exists, extending an existing CI class (under the appropriate parent) to add required attributes preserves inheritance, discovery behavior, reporting, and upgrade compatibility. This approach is preferred over creating entirely new, disconnected schemas.
Option A is incorrect because repurposing base classes and renaming attributes breaks standard semantics, causes confusion, and complicates upgrades. Option C is incorrect because extending Asset tables to represent CIs conflates ITAM and CMDB concerns; assets and CIs serve different purposes and lifecycles.
Therefore, the solutions that minimize technical debt and ensure upgrade compliance are B and D.
An organization is updating the CMDB to include new asset types like loT devices Relevant CI classes need to be added and outdated ones need to be removed from the Principal Class filler to ensure accurate display in ITSM processes.
Which roles are needed to add or remove classes?
Managing CI classes and Principal Class designation is a schema-level CMDB activity that directly impacts how CIs appear in ITSM processes such as Incident, Change, and Problem. In ServiceNow, these activities require specific administrative privileges to ensure governance, security, and upgrade safety.
The sn_cmdb_admin role is required because it provides administrative access to CMDB structures, including CI class hierarchy management, Principal Class configuration, and overall CMDB governance. Without this role, users cannot add, remove, or govern CI classes effectively.
The personalize_dictionary role is also required because adding or removing CI classes involves dictionary-level changes. CI classes are implemented as tables that extend the CMDB schema, and modifying the Principal Class filter relies on dictionary metadata. This role grants permission to create, modify, or remove class definitions safely.
The sn_csdm_admin role focuses on managing CSDM constructs (domains, services, lifecycle alignment) but does not grant dictionary or schema modification rights. The cmdb_query_builder role is used only for querying and reporting and does not allow structural changes.
Therefore, the two required roles are personalize.dictionary and sn_cmdb_admin, making Options A and B correct.
The following identification rule for a Hardware CI class has been defined

Two new CI records are imported into the Hardware class of the CMDB:
CI1: The name of this CI record matches the name of an existing CI record in the CMDB.
CI2: The IP address of this CI record matches the IP address of an existing CI record in the CMDB.
Which is correct based on the identification rule and the imported CI records?
Comprehensive and Detailed Explanation (200--300 words):
This question tests understanding of how the Identification and Reconciliation Engine (IRE) evaluates incoming CI data against Identification Rules and their priority order in ServiceNow.
From the identification rule shown:
Serial number (+ type) Priority 100
Serial number Priority 200
Name (Hardware) Priority 300
MAC address + name (Network Adapter) Priority 400
For a CI to be identified and matched, the incoming record must satisfy one complete identifier entry exactly as defined for that class.
CI1 (Name match only)
Although the name matches an existing Hardware CI, name alone is a low-priority identifier (300) and is not sufficient to uniquely identify a Hardware CI unless no higher-priority identifiers exist and the identifier entry criteria are fully satisfied. In practice, Hardware identification relies on serial number--based identifiers, not name-only matching, to avoid false positives. Therefore, CI1 cannot be confidently matched and is inserted as a new record.
CI2 (IP address match)
IP address is not part of any Hardware identification rule shown. IP address is typically used for discovery correlation or network relationships, not as a primary Hardware identifier. Since no identifier entry includes IP address, CI2 does not match any valid identification rule and is also inserted as a new record.
Because neither CI satisfies a valid identifier entry, both records are inserted as new CIs.
Amina
3 days agoCiara
11 days agoSkye
18 days agoMelissa
25 days ago