Beruflich Dokumente
Kultur Dokumente
a)
b)
c)
d)
2.
a)
b)
c)
d)
3.
a)
b)
c)
d)
4.
a)
b)
c)
d)
5.
a)
b)
c)
d)
* no visible update button, user needs write access on whole record in order to see Update button
Which one of the following layers executes business rules?
Scripting layer
Database layer
Protocol layer
UI layer
6.
a)
b)
c)
d)
7.
a)
b)
c)
d)
8.
a)
b)
c)
d)
9.
a)
b)
c)
d)
*causes recursion
10. Which one of the following would improve the performance of loading
forms within ServiceNow?
a)
Reduce the number of related lists configured for a form
b)
Increase the number of client scripts for a table
c)
Reduce the number of read only fields defined for a form
d)
Reduce the number of mandatory fields defined for a form
13. Which one of the following is the proper syntax for accessing the values
of variables from the record producer script field?
a)
g_form.getReference(variable_name)
b)
g_form.getVariable(variable_name)
c)
producer.variable_name
d)
current.variable_name
14. When troubleshooting performance issues for instances, it is useful to
access the instance information page. Which one of the following
commands displays the instance information?
a)
statistics.do
b)
stats.do
c)
display.stats
d)
info.do
15. Consideration must be taken when setting UI Policies because policies
do not apply to which one of the following?
a)
Editing records on list pages
b)
Editing records on form pages
c)
Creating records on form pages
d)
Reading records on form pages
* UI policies and client scripts apply only to form (exception is onCellEdit script). UI policies
executes after CS.
16. Which one of the following is NOT considered a best practice when
planning to use update sets to move customizations from one instance to
another?
a)
Know which customizations are carried over and which are not
b)
Verify both instances are the same version
c)
23. Which one of the following statements accurately describes the System
Dictionary?
a)
The System Dictionary is a field (sys_dictionary) that describes the field in an
instance. It stores information about the field columns and rows
b)
The System Dictionary is a table (sys_dictionary) that describes the
tables and fields in an instance. It stores field data types, character limits,
default values, dependencies, and other attributes
c)
The System Dictionary is an attribute of a field (sys_dictionary) that describes
field records and character sizes
d)
The System Dictionary is a table (sys_dictionary) that stores information about
base tables and their extensions
24. Which one of the following lists includes appropriate items to cover
during the requirements definition process?
a)
Gap Analysis, Process Definition, Data Dictionary, Workflows
b)
Gap Analysis, Process Setup, Integrations, Workflows
c)
Process Definition, Data Dictionary, Workflows, Process Setup
d)
Process Definition, Data Dictionary, Workflows, UAT
25. Within the ServiceNow application, a technical consultant has created
and tested a new Outbound SOAP Message. In order for consultant to
invoke the new SOAP message within the ServiceNow application, which
one of the following can be created?
a)
UI Policy
b)
Business Rule
c)
UI Property
d)
Import Set
26. Web Services Description Language (WSDL) is best described by which
one of the following statements?
a)
An XML-based language that is used for describing the functionality
offered by a web service
b)
An HTML-based language that is used for describing the functionality offered by a
web service
c)
An Java based language that is used for describing the functionality offered by a
SOAP message
d)
An HTML-based language that is used for describing the functionality offered by a
SOAP message
27. In a ServiceNow instance, if field level security were implemented using
Access Controls, and two SEPARATE rules were created on the same field,
which one of the following is correct?
a)
The system will evaluate both rules and if either is true, then the
requested access is allowed
b)
The system will evaluate both rules and if neither is true, then the requested
access is allowed
c)
The system will evaluate both rules and if both are true, then the requested
access is allowed
d)
The system will evaluate only the lower order rule and if it evaluates to true, then
the requested access is allowed
31. Which one of the following is true with respect to moving workflows
from instance to instance using update sets?
a)
An existing workflow must be checked out to be captured in an update set
b)
An existing workflow must be checked out and then marked as
published to be captured in an update set
c)
All workflows either checked out or marked as published are captured in an
update set
d)
Workflows cannot be captured with an update set
32. Which of the following describes some of the core Access Control
operations?
a)
Read, Write, Create, Delete
b)
Read, Write, Create, Override
c)
Read, Write, Create, Update
d)
Read, Read only, Write, Create
33. Which one of the following types of business rules are processed when a
user requests a record form and can be.?.... information that a client
script requires?
a)
Display rules
b)
Before rules
c)
After rules
d)
Async rules
34. Which one of the following statements is true regarding the Task table?
a)
The Task table can be extended but does not extend from any other
tables
b)
The Task table can be extended but can also extend from other tables
c)
The Task table cannot be extended
d)
The task table can be extended and can extend only from specific tables
39. A ServiceNow instance has a Change Task table which extends from the
Task table. If you were to add a new filed to the Change Task table named
Short Description, which one of the following statements is true?
a)
The Change Task table will only have one Short Description field, the one
defined on the child table overrides what is on the parent table.
b)
The Short Description field available on the Change Task table is the same field
that is on the Task table, and only the System Administrator will be able to access
this field on the Change Task table.
c)
The Short Description field available on the Change Task table is the same field
that is on the Task table.
d)
The Change Task form could be personalized with two Short
Description fields. One from the Task table and one from the Change Task
table.
40. Which one of the following permits a user to turn on debugging for
security rules on an instance?
a)
Turn on security debugging in the System Diagnostics Application
b)
Turn on security debugging in the System Security Application
c)
Elevate your role to the security_admin role
d)
Right-click on the field and select show security rules
41. When writing a business rule and using the method log(), which one of
the following logs captures this?
a)
All Contexts
b)
System Log
c)
Transaction Log
d)
Event Log
42. Which one of the following is the proper syntax for accessing the values
of variables in the service catalog request?
a)
g_form.getValue(variable_name)
b)
g_form.getVariable(variable_name)
c)
g_form.getControl(variable_name)
d)
current.variable_pool.variable_name
a)
Setup the default value on the Task table and the Problem task table will
automatically have this new default value
b)
Create a Dictionary override for the Problem Task table on the Short
Description field and set the default value of the override to Problem
Task
c)
It is not possible in this situation to setup a default value for the Short
Description field
d)
Create a new field called Short Description on the Problem Task table and set the
default value
45. Network latency and throughput is one of the major components that
can affect performance of a ServiceNow instance. The coarse method of
measure of network response is a ping. Which one of the following is the
maximum ping response time that is acceptable when testing network
latency?
a)
100 ms
b)
250 ms
c)
500 ms
d)
1000 ms
46. For a client script, when is it appropriate to use a getReference with a
call back function instead of a getReference without the call back
function?
a)
Only when an alert needs to be implemented
b)
Only when a business rule need to be incorporated
c)
getReference should always be accompanied with a call back function
d)
getReference should never be accompanied with a call back function
47. Which one of the following actions allows you to set a global user
preference?
a)
Add a Global entry in the User Preference table
b)
Add a Global entry in the System Properties table
c)
Add a System entry in the User Preference table
d)
Add a System entry in the System Properties table
48. Which one of the following would prevent auditing of a field on an
audited table?
a)
Ensure that the Audit field is unchecked
b)
Ensure that the Logging field is unchecked
c)
Add the attribute no_audit=true
d)
Add the attribute no_audit=false
49. Which one of the following should be implemented to consume an
external web service within ServiceNow?
a)
b)
c)
d)
50. During LDAP integrations, which one of the following tools is necessary
to help map fields from one data source to another?
a)
Web service
b)
Update Set
c)
Related map
d)
Transform Map
b)
c)
d)
The Client Transaction Timings plugin does which one of the following?
Enables better performance between the browser and the instance
Enhances the graphic accelerator
Enhances performance of the homepage
Enhances transaction duration logging
61. System provided variables such as current and previous are global across
all business rules that run for a transaction. Which one of the following is
another global, pre-defined business rule object variable?
a)
jslog
b)
g_form
c)
g_scratchpad
d)
g_user
62. Which one of the following contains the three key components to
consider when analyzing your ServiceNow instance?
a)
Application server response, network latency and throughput, browser
rendering and parsing
b)
Application server response, network latency and throughput, browser type
c)
Database server response, network latency and throughput, browser type
d)
Database server response, network latency, browser rendering and parsing
63. Which one of the following is a security rule defined and set at the row
and column level and is executed when attempting to access any
ServiceNow table?
a)
Business Rule
b)
Security Jump Start
c)
Elevated Privilege
d)
Access Control
64. Which one of the following features is implemented to provide
protection of assets that do not need to be exposed in integration
processing? ?
a)
Update Sets
b)
Import Sets
c)
Scheduled Data Imports
d)
Access Controls
65. It takes a long time for the incident form to load when you click on the
Create New Incident button or when you try to view an existing incident.
Which one of the following is the likely cause of the problem?
a)
Before Business Rules
b)
UI Actions
c)
Client Scripts
d)
Script Include