Sie sind auf Seite 1von 12

1.

a)
b)
c)
d)
2.
a)
b)
c)
d)
3.

a)
b)
c)
d)

4.
a)
b)
c)
d)
5.
a)
b)
c)
d)

Which one of the following is not a recommended ServiceNow coding


best practice of improving client scripts?
Make multiple, short server calls rather than one longer call
Use script includes for server calls
Use a callback function in getReference() calls
Avoid server calls unless required
Which one of the following UI actions can be used to test connectivity
between a customer ServiceNow instance and a customer LDAP server?
Connection Authenticator
Test Connection
LDAP Server Test
Authentication Test
In a customer development instance, the Security Manager setting is
set do Deny Access due to the High Security plugin being activated.
Assume a customer creates ONLY two new access controls for a new table
called restaurant. The first grants the read operation to the table
calledrestaurant and the second grants the write operation to a field
called name on the restaurant table. Both access controls are associated
for users with the itil role. When logging in as a user with the itil role,
which one of the following is true?
The user will be able to read all fields on the restaurant table and will
not be able to update values in the name field
The user will be able to read all fields on the restaurant table and will be able to
update values in the name field
The user will be able to update all fields on the restaurant table including values
in the name field
The user will be able to update all fields on the restaurant table except values in
the name field

* no visible update button, user needs write access on whole record in order to see Update button
Which one of the following layers executes business rules?
Scripting layer
Database layer
Protocol layer
UI layer

What is the purpose of the callback function in the


g_form.getReference(field,callback) method?
It causes the browser to display the waiting mouse pointer
It causes the browser to re-direct to a different URL
It causes the routine to run asynchronously
It causes the routine to run synchronously

* without callback it runs synchronously

6.
a)
b)
c)
d)
7.

a)
b)
c)
d)

8.
a)
b)
c)
d)
9.
a)
b)
c)
d)

To prevent form submission performance degradation, which of the


following methods should never be used in a business rule that executes
before the database activity.
current.setAbortAction()
current.operation()
gs.eventQueue()
current.update()

*causes recursion

In a customer development instance, the Security Manager setting is


set to Deny access due to the High Security plugin being activated. If a
customer creates a new application menu, module, table and fields and
does not associate any roles at any level in the new application module (???),
when logging in as an end user who has no roles, which one of the
following is true?
The user will not see the new application menu and module, and will not have
the ability to create, read, update and delete records associated with the new table
The user will see the new application menu and module, but will not
have the ability to create, read, update and delete records associated with
the new table
The user will see the new application menu and module, but will only have the
ability read records associated with the new table
The user will see the new application menu and module, and will have the ability
to create, read, update and delete records associated with the new table

*user only see number of rows removed by constraint


Which one of the following are two integral aspects to an LDAP
integration?
Data Population and Data Sources
Data Population and Authentication
VPN Tunnels and Authentication
Web Services and Authentication
In a ServiceNow baseline instance, which one of the following is true
with respect to customer update sets?
Customer changes to their task and process data are captured in their update
sets
All data and configuration changes on every table in the system is captured in
customer update sets
Customer developed workflows cannot be captured in their update set
Customer homepage configurations can be captured with customer
update set

10. Which one of the following would improve the performance of loading
forms within ServiceNow?
a)
Reduce the number of related lists configured for a form
b)
Increase the number of client scripts for a table
c)
Reduce the number of read only fields defined for a form
d)
Reduce the number of mandatory fields defined for a form

11. ServiceNow provides customers with a dedicated database, application


and data isolation using which one of the following models?
a)
Single-tenant
b)
Multi-tenant
c)
Hybrid Cloud
d)
Domain Separation
12.
a)
b)
c)
d)

Which of the following is a GlideSystem (gs) method?


log(String message, String source)
null(Object)
dateDifference(String, String, Boolean)
addInformationMessage(Object)

13. Which one of the following is the proper syntax for accessing the values
of variables from the record producer script field?
a)
g_form.getReference(variable_name)
b)
g_form.getVariable(variable_name)
c)
producer.variable_name
d)
current.variable_name
14. When troubleshooting performance issues for instances, it is useful to
access the instance information page. Which one of the following
commands displays the instance information?
a)
statistics.do
b)
stats.do
c)
display.stats
d)
info.do
15. Consideration must be taken when setting UI Policies because policies
do not apply to which one of the following?
a)
Editing records on list pages
b)
Editing records on form pages
c)
Creating records on form pages
d)
Reading records on form pages

* UI policies and client scripts apply only to form (exception is onCellEdit script). UI policies
executes after CS.
16. Which one of the following is NOT considered a best practice when
planning to use update sets to move customizations from one instance to
another?
a)
Know which customizations are carried over and which are not
b)
Verify both instances are the same version

c)

Ensure out-of-the-box records have matching sys_ids by cloning one instance


onto the other instance before creating the first update set
d)
Apply an update set to a production instance during business hours
17. Which one of the following protects a record based on its contents and
table location?
a)
Contextual Security
b)
Content Management
c)
Encryption Support
d)
Web Service Consumer
18. Which one of the following can be used to facilitate the separation of
BOTH data and process in ServiceNow?
a)
Business Rules
b)
Company Separation
c)
Domain Separation
d)
Server Scripts

*company separation is legacy


19. An instance is experiencing slow response times due to heavy
customization of custom reports on the home page. Which one of the
following can significantly improve performance?
a)
Disable browser caching
b)
Reduce the number of gauges on the homepage
c)
Increase the home page refresh rate
d)
Change the layout of the home page
20. After importing user data into ServiceNow, it is discovered that the
same user records appear multiple times in the Users table? Which one of
the following situations may be the cause of this behavior?
a)
Coalesce value is incorrectly configured
b)
Update Set is incorrectly configured
c)
Import Set is incorrectly configured
d)
Data source is incorrectly configured
21. Which one of the following describes the situation where a field (or set
of fields) are used as a unique key during an import?
a)
Transform
b)
Merge
c)
Coalesce
d)
Keyed
22.
a)
b)
c)
d)

Which one of the following statements describes the sys_id?


A unique 32-character GUID that identifies each record in ServiceNow
A unique 16-character GUID that identifies each record in ServiceNow
A unique 32-character GUID that identifies each table in ServiceNow
A unique 64-character GUID that identifies each table in ServiceNow

23. Which one of the following statements accurately describes the System
Dictionary?
a)
The System Dictionary is a field (sys_dictionary) that describes the field in an
instance. It stores information about the field columns and rows
b)
The System Dictionary is a table (sys_dictionary) that describes the
tables and fields in an instance. It stores field data types, character limits,
default values, dependencies, and other attributes
c)
The System Dictionary is an attribute of a field (sys_dictionary) that describes
field records and character sizes
d)
The System Dictionary is a table (sys_dictionary) that stores information about
base tables and their extensions
24. Which one of the following lists includes appropriate items to cover
during the requirements definition process?
a)
Gap Analysis, Process Definition, Data Dictionary, Workflows
b)
Gap Analysis, Process Setup, Integrations, Workflows
c)
Process Definition, Data Dictionary, Workflows, Process Setup
d)
Process Definition, Data Dictionary, Workflows, UAT
25. Within the ServiceNow application, a technical consultant has created
and tested a new Outbound SOAP Message. In order for consultant to
invoke the new SOAP message within the ServiceNow application, which
one of the following can be created?
a)
UI Policy
b)
Business Rule
c)
UI Property
d)
Import Set
26. Web Services Description Language (WSDL) is best described by which
one of the following statements?
a)
An XML-based language that is used for describing the functionality
offered by a web service
b)
An HTML-based language that is used for describing the functionality offered by a
web service
c)
An Java based language that is used for describing the functionality offered by a
SOAP message
d)
An HTML-based language that is used for describing the functionality offered by a
SOAP message
27. In a ServiceNow instance, if field level security were implemented using
Access Controls, and two SEPARATE rules were created on the same field,
which one of the following is correct?
a)
The system will evaluate both rules and if either is true, then the
requested access is allowed

b)

The system will evaluate both rules and if neither is true, then the requested
access is allowed
c)
The system will evaluate both rules and if both are true, then the requested
access is allowed
d)
The system will evaluate only the lower order rule and if it evaluates to true, then
the requested access is allowed

*one passed rule on same level is enough for access


28. When creating new incidents, your customer is complaining that the
next sequential number is not always used. Which one of the following
would help prevent the system from having unused numbers?
a)
Create a business rule to check for the last number on the database and assign it
to the new incident record
b)
Enable the Assign a task number only upon insert option from System
Properties
c)
Create a new custom string field and a business rule to generate and assign a
number to that field
d)
This cannot be done on the ServiceNow platform
29. Which one of the following is the most efficient way of making server
calls from Client Scripts?
a)
Asynchronous Glide Ajax
b)
Glide Record Lookup
c)
setValue()
d)
Business Rule
30.
a)
b)
c)
d)

Which one of the following is the default port for LDAPS?


389
363
636
689

31. Which one of the following is true with respect to moving workflows
from instance to instance using update sets?
a)
An existing workflow must be checked out to be captured in an update set
b)
An existing workflow must be checked out and then marked as
published to be captured in an update set
c)
All workflows either checked out or marked as published are captured in an
update set
d)
Workflows cannot be captured with an update set
32. Which of the following describes some of the core Access Control
operations?
a)
Read, Write, Create, Delete
b)
Read, Write, Create, Override
c)
Read, Write, Create, Update
d)
Read, Read only, Write, Create

33. Which one of the following types of business rules are processed when a
user requests a record form and can be.?.... information that a client
script requires?
a)
Display rules
b)
Before rules
c)
After rules
d)
Async rules

34. Which one of the following statements is true regarding the Task table?
a)
The Task table can be extended but does not extend from any other
tables
b)
The Task table can be extended but can also extend from other tables
c)
The Task table cannot be extended
d)
The task table can be extended and can extend only from specific tables

*it is not possible to set Extend from table on task table


35. Which one of the following is a valid reason for a customer to obtain a
VPN connection for their ServiceNow implementation?
a)
Encrypt end user access to ServiceNow
b)
Encrypt a SOAP message to ServiceNow
c)
Encrypt communication between a MID Server and a customer
ServiceNow instance
d)
Encrypt the communication path between a customer ServiceNow instance and
their enterprise mail server
36. Which of the following script types executes in a system selected rather
than user selected order?
a)
UI Policies
b)
Business Rules
c)
Script Actions
d)
Client Scripts

* other script types has Order column


37. Which one of the following is commonly used with a Single Sign-On
(SSO) intergration?
a)
CSV
b)
JDBC
c)
SAML
d)
Web Services
38. A VPN connection between the ServiceNow network and a customer
network is implemented to?
a)
Encrypt data flowing OUT of the customer network
b)
Encrypt data flowing INTO the customer network?
c)
Encrypt data flowing IN and OUT of the customer network
d)
Encrypt data flowing INTO the ServiceNow network

39. A ServiceNow instance has a Change Task table which extends from the
Task table. If you were to add a new filed to the Change Task table named
Short Description, which one of the following statements is true?
a)
The Change Task table will only have one Short Description field, the one
defined on the child table overrides what is on the parent table.
b)
The Short Description field available on the Change Task table is the same field
that is on the Task table, and only the System Administrator will be able to access
this field on the Change Task table.
c)
The Short Description field available on the Change Task table is the same field
that is on the Task table.
d)
The Change Task form could be personalized with two Short
Description fields. One from the Task table and one from the Change Task
table.
40. Which one of the following permits a user to turn on debugging for
security rules on an instance?
a)
Turn on security debugging in the System Diagnostics Application
b)
Turn on security debugging in the System Security Application
c)
Elevate your role to the security_admin role
d)
Right-click on the field and select show security rules
41. When writing a business rule and using the method log(), which one of
the following logs captures this?
a)
All Contexts
b)
System Log
c)
Transaction Log
d)
Event Log
42. Which one of the following is the proper syntax for accessing the values
of variables in the service catalog request?
a)
g_form.getValue(variable_name)
b)
g_form.getVariable(variable_name)
c)
g_form.getControl(variable_name)
d)
current.variable_pool.variable_name

*first works in client scripts, last works in business rules


43. Which one of the following is the person who acts as the overall focal
point for ServiceNow deployments including escalation?
a)
Delivery Consultant
b)
Operations Manager
c)
Engagement Manager
d)
System Administrator
44. An instance has a Problem Task table that is extended from the Task
table. The customer would like all problem tasks to have the value for the
Short Description field to be Problem Task. Which one of the following is
correct? ?

a)

Setup the default value on the Task table and the Problem task table will
automatically have this new default value
b)
Create a Dictionary override for the Problem Task table on the Short
Description field and set the default value of the override to Problem
Task
c)
It is not possible in this situation to setup a default value for the Short
Description field
d)
Create a new field called Short Description on the Problem Task table and set the
default value

45. Network latency and throughput is one of the major components that
can affect performance of a ServiceNow instance. The coarse method of
measure of network response is a ping. Which one of the following is the
maximum ping response time that is acceptable when testing network
latency?
a)
100 ms
b)
250 ms
c)
500 ms
d)
1000 ms
46. For a client script, when is it appropriate to use a getReference with a
call back function instead of a getReference without the call back
function?
a)
Only when an alert needs to be implemented
b)
Only when a business rule need to be incorporated
c)
getReference should always be accompanied with a call back function
d)
getReference should never be accompanied with a call back function
47. Which one of the following actions allows you to set a global user
preference?
a)
Add a Global entry in the User Preference table
b)
Add a Global entry in the System Properties table
c)
Add a System entry in the User Preference table
d)
Add a System entry in the System Properties table
48. Which one of the following would prevent auditing of a field on an
audited table?
a)
Ensure that the Audit field is unchecked
b)
Ensure that the Logging field is unchecked
c)
Add the attribute no_audit=true
d)
Add the attribute no_audit=false
49. Which one of the following should be implemented to consume an
external web service within ServiceNow?

a)
b)
c)
d)

A new Inbound web service


A new Outbound SOAP message ?
A new WSDL
A new provider of web service

50. During LDAP integrations, which one of the following tools is necessary
to help map fields from one data source to another?
a)
Web service
b)
Update Set
c)
Related map
d)
Transform Map

51. Which one of the following statements applies to an LDAP integration


with ServiceNow?
a)
ServiceNow has read only access and cannot change a customers
Active Directory
b)
ServiceNow can both query and set information within a customers directory
c)
ServiceNow sets the LDAP user password to match the password of the
corresponding user in ServiceNow
d)
ServiceNow gathers the passwords from the LDAP user accounts and stores them
in corresponding ServiceNow user record
52. According to ServiceNows engagement methodology, which one of the
following includes the stages of an implementation?
a)
Plan, Discover, Prepare, Deploy, Operate
b)
Discover, Prepare, Deploy, Operate
c)
Plan, Deploy, Operate
d)
Plan, Deploy
53. If users in one location are complaining about performance in one
location but at another it is good, then which one of the following
components is the likely cause of the problem?
a)
Application server
b)
Database server
c)
Network
d)
Client Transaction Plugin
54. Which one of the following provides tables that are a staging area for
your data during an integration?
a)
Import Sets
b)
Interface
c)
Access Control
d)
Scheduled Import
55.
a)

When performing an LDAP integration, how is the user password stored?


The password is stored in the User table

b)
c)
d)

The password is stored in the Role table


The password can be stored in any table depending on the integration
The password is not stored in ServiceNow

56. The MID Server facilitates communication and movement of data


between the ServiceNow platform and external applicationsand services
within a company environment. The ServiceNow instance communicates
with the MID Server via which one of the?
a)
Event Log
b)
Notification Engine
c)
Email
d)
External Communication Channel Queue

57. Which one of the following is a key component of ServiceNow


integrations?
a)
Transform Maps
b)
Service Catalog
c)
Update Sets
d)
UI Policies
58. When writing business rule scripts, user created variables are globally
scoped by default unless the code is wrapped in which of following?
a)
Function
b)
Client Script
c)
Local variable
d)
While loop
59.
a)
b)
c)
d)

The Client Transaction Timings plugin does which one of the following?
Enables better performance between the browser and the instance
Enhances the graphic accelerator
Enhances performance of the homepage
Enhances transaction duration logging

60. Which one of the following describes dot-walking?


a)
Dot-walking references a field by building a chain of field names
separated by dots (periods)
b)
Dot-walking describes the structure of a variable in a script that contains one or
more fields, separated by a dot for each table involved
c)
Dot-walking describes the structure of a table that directs you to one of more
reference fields
d)
Dot-walking describes the structure of a field in a script that contains one or more
reference fields, separated by a dot for each table involved

61. System provided variables such as current and previous are global across
all business rules that run for a transaction. Which one of the following is
another global, pre-defined business rule object variable?
a)
jslog
b)
g_form
c)
g_scratchpad
d)
g_user
62. Which one of the following contains the three key components to
consider when analyzing your ServiceNow instance?
a)
Application server response, network latency and throughput, browser
rendering and parsing
b)
Application server response, network latency and throughput, browser type
c)
Database server response, network latency and throughput, browser type
d)
Database server response, network latency, browser rendering and parsing
63. Which one of the following is a security rule defined and set at the row
and column level and is executed when attempting to access any
ServiceNow table?
a)
Business Rule
b)
Security Jump Start
c)
Elevated Privilege
d)
Access Control
64. Which one of the following features is implemented to provide
protection of assets that do not need to be exposed in integration
processing? ?
a)
Update Sets
b)
Import Sets
c)
Scheduled Data Imports
d)
Access Controls
65. It takes a long time for the incident form to load when you click on the
Create New Incident button or when you try to view an existing incident.
Which one of the following is the likely cause of the problem?
a)
Before Business Rules
b)
UI Actions
c)
Client Scripts
d)
Script Include

Das könnte Ihnen auch gefallen