1/31
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following are possible outcomes when coalescing detects a match between a record in the staging table and a record in the target table?
Select 2 Answers from the below options.
a. Stop the import and delete the previously imported records.
b. Halt the import and ask the user what to do.
c. Create duplicate records.
d. Overwrite the record in the target table with the source data.
e. Keep the record already in the target table.
d. Overwrite the record in the target table with the source data.
e. Keep the record already in the target table.
What role is required to create and edit Access Controls?
security
admin
security_admin
elevated_admin
elevated_security
security_admin
What do you use to control access to features and capabilities in ServiceNow applications and modules?
Department
Organisation
Company
Group
Role
Role
What are the possible data source file formats for an import set?
Select 4 Answers from the below options.
XML
TXT
CSV
JSON
XLSX
XML
CSV
JSON
XLSX
Which of the following can be used to create configuration items (CIs) in the CMDB?
Select 3 Answers from the below options.
Creation via the incident management process
Creation triggered by asset management
Creation via the change management process
Creation via service catalogue fulfilment processes
Creation triggered by asset management
Creation via the change management process
Creation via service catalogue fulfilment processes
Which of the following is true about the CMDB Data Manager?
Select 3 Answers from the below options.
It is a wizard-like tool that provides a comprehensive solution for managing CIs.
It is a policy-driven framework for managing CI life cycle operations.
It can create policies that govern CI life cycle stages such as retirement and deletion.
It is a framework that supports multiple configuration strategies.
It is a wizard-like tool that provides a comprehensive solution for managing CIs.
It is a policy-driven framework for managing CI life cycle operations.
It can create policies that govern CI life cycle stages such as retirement and deletion.
Which of the following operations is a record-type access control list that restricts report access based on a role?
report_admin
report_view
report_on
report_access
report_view
Which of the following core tables is both a base and a parent table?
Task [task
]
Incident [incident
]
Knowledge Base [kb_knowledge_base
]
Visual Task Board [vtb_board
]
Configuration Item [cmdb_ci
]
Task [task
]
What are the three sections of an Access Control record that must evaluate to true
to grant access to a resource?
Select 3 Answers from the below options.
Advanced
Condition
Script
Condition Script
Requires Role
Condition
Script
Requires Role
What minimum role is required to subscribe to or unsubscribe from a Configuration Item?
ecmdb_admin
itil
itil_admin
cmdb_read
cmdb_read
Which of the following should you do before importing data into ServiceNow?
Select 3 Answers from the below options.
Decide what to do with incomplete or erroneous data.
Understand the data you plan to import.
Delete all the existing target table records to avoid conflicts.
Determine which source data maps to which target fields.
Decide what to do with incomplete or erroneous data.
Understand the data you plan to import.
Determine which source data maps to which target fields.
Which of the following indicates the type of relationship for the bi-directionally related tables, where the related records are visible from both tables in a related list?
One to Many
MetricBase
Many to Many
Database View
Referenced
Extended
Parent/Child
Many to Many
What represents a standard and shared set of service-related definitions across the products and platform that will provide prescriptive guidance on service modelling within the CMDB?
Configuration Item (CI)
Configuration Management System (CMS)
Common Services Data Model (CSDM)
Configuration Management Database (CMDB)
Common Services Data Model (CSDM)
Which of the following is an example of a CI Class switch?
A CI from the Windows Server [cmdb_ci_win_server
] class is switched off.
A Server record that was upgraded from the Server [cmdb_ci_server
] class to the Windows Server [cmdb_ci_win_server
] class.
A CI is reclassified from the Linux Server [cmdb_ci_linux_server
] class to the Windows Server [cmdb_ci_win_server
] class.
A CI is moved from the Windows Server [cmdb_ci_win_server
] class to the Server [cmdb_ci_server
] class.
A CI is reclassified from the Linux Server [cmdb_ci_linux_server
] class to the Windows Server [cmdb_ci_win_server
] class.
Which field on a Configuration Item (CI) record is recommended for routing Incidents to the appropriate group to resolve CI-related incidents quickly?
Managed By Group
Support Group
Assignment Group
Approval Group
Change Group
Support Group
You can access CMDB Data Manager from CMDB Workspace, built using UI Builder components.
What can you do using the CMDB Data Manager?
Select 3 Answers from the below options.
Manage retirement definitions and exclusion lists
Administer and manage policies and tasks
Create new Configuration Item (CI) classes in the CMDB
Monitor the overall health and performance of the CMDB
Review and approve or reject assigned tasks
Perform regular data backups for the CMDB
Manage retirement definitions and exclusion lists
Administer and manage policies and tasks
Review and approve or reject assigned tasks
Which table does the Change Request [change_request
] extend?
Task [task
]
Incident [incident
]
Problem [problem
]
Request [sc_request
]
Task [task
]
What are the database views for incident management in the base system?
Select 3 Answers from the below options.
incident_state
incident_metric
incident_sla
incident_time_worked
incident_metric
incident_sla
incident_time_worked
What model/standard across applications helps track life cycle stages and stage statuses for CIs effectively?
CMDB Data Model
Universal Task data model
Product Catalogue Data Model
Common Service Data Model
Common Service Data Model
What IT challenges can be solved with the CMDB?
Select 3 Answers from the below options.
Consolidate disparate Configuration Item (CI) data into a single Configuration Management Database.
Regularly maintain complex data for accuracy.
Store well-defined relationships.
Make sense of data to drive decisions and services.
Capture known Configuration Items (CIs).
Consolidate disparate Configuration Item (CI) data into a single Configuration Management Database.
Regularly maintain complex data for accuracy.
Make sense of data to drive decisions and services.
What is a CI?
Select 3 Answers from the below options.
Intangible (e.g. business services, email) entities
Configuration Management Database
Tangible (e.g. hardware, software, servers) entities
Configuration Item
configuration_admin
role
Intangible (e.g. business services, email) entities
Tangible (e.g. hardware, software, servers) entities
Configuration Item
What types of permissions can be configured in an access control rule?
Select 3 Answers from the below options.
A script that sets the 'answer' variable to true
or false
Roles
Conditions
Groups
Users
A script that sets the 'answer' variable to true
or false
Roles
Conditions
What coalesce configuration in the import process treats all imported rows as new records and does not update existing records?
Multi-field coalesce
No coalesce
Conditional coalesce
Single-field coalesce
No coalesce
An Access Control List (ACL) rule only grants users access to an object if they meet all of the following permissions required by the matching ACL rule.
Select 3 Answers from the below options.
The user must have one of the roles in the required roles list. If the list is empty, this condition evaluates to true
.
The script must evaluate to true
or return an answer variable with the value of true
.
The condition must evaluate to true
.
Either the matching table level or the field level for the Record ACL rules must evaluate to true
.
The user must have one of the roles in the required roles list. If the list is empty, this condition evaluates to true
.
The script must evaluate to true
or return an answer variable with the value of true
.
The condition must evaluate to true
.
What is a definition of a transform map in ServiceNow?
A map used to store the history of the incident records
A map used to add data to encrypted fields
A map to determine relationships between fields displayed in an Import Set to fields in an existing table
A map used to trigger Business Rules before the data is queued in the outbound Web Service
A map to determine relationships between fields displayed in an Import Set to fields in an existing table
What are the different levels of ServiceNow security before an end-user can perform CRUD (Create, Read, Update, Delete) operations on a table?
Select 3 Answers from the below options.
Application and Modules Access
User Authentication
Database Access
Anonymous Access
3rd Party Application Security
Overall explanation
Application and Modules Access
User Authentication
Database Access
Which of the following defines an application service in the best way?
It is a set of interconnected applications and hosts configured to offer a service to an organisation.
An application service monitors services in an organisation.
It provides standard fields and values for tracking life-cycle stages.
It supports multiple configuration strategies.
It is a set of interconnected applications and hosts configured to offer a service to an organisation.
What are the different ways for ServiceNow tables to be related to each other?
Select 4 Answers from the below options.
Database Views
One-to-Many
Extensions
One-to-One
Zero-to-Many
Many-to-Many
Database Views
One-to-Many
Extensions
Many-to-Many
(Xanadu) How do you define an Access Control List (ACL) rule to prevent user access unless the role, condition, and script requirements are all met?
UserIsAuthenticated security attribute
Deny-Unless decision type
Query_match operation
Read-only Protection policy
Deny-Unless decision type
What application enables you to discover Personally Identifiable Information (PII) within the ServiceNow instance and classify, report, or act on the PII?
Data Privacy
Data Classification
Data Filtration
Data Separation
Data Discovery
Data Discovery
Which of the following statements are true about import sets?
Select 3 Answers from the below options.
Import Sets cannot add data to encrypted fields.
Transform map is the conversion of data from an import set table to another table.
Creating an extremely large import set can cause delays and system outages.
The Import Set Deleter scheduled job cleans up all import set data every day at midnight.
You can import data from several different file formats or external data sources.
Import Sets cannot add data to encrypted fields.
Creating an extremely large import set can cause delays and system outages.
You can import data from several different file formats or external data sources.
What scores are found on the CMDB health dashboard?
Select 3 Answers from the below options.
Connectedness
Correctness
Completeness
Compliance
Correctness
Completeness
Compliance