From the User menu, which actions can a user select? (Choose three.)
A. Send Notifications
B. Log Out ServiceNow
C. Elevate Roles
D. Impersonate Users
E. Order from Service Catalog
F. Approve Records
Which of the following is used to initiate a flow?
A. A Trigger
B. Core Action
C. A spoke
D. An Event
Which one statement correctly describes Access Control rule evaluation?
A. Rules are evaluated using roles. The role with the most permissions evaluates the rules first
B. If more than one rule applies to a row, the older rule is evaluated first
C. If a row level rule and a field level rule exist, both rules must be true before an operation is allowed
D. Rules are evaluated from the general to the specific, so a table rule must be active to continue
In what order should filter elements be specified?
A. Field, Operator, then Value
B. Field, Operator, then Condition
C. Operator, Condition, then Value
D. Value, Operator, then Field
Which technique is used to get information from a series of referenced fields from different tables?
A. Table-Walking
B. Sys_ID Pulling
C. Dot-Walking
D. Record-Hopping
What is a schema map?
A. A schema map enables administrators to define records from specific tables as trouble sources for Configuration Items
B. A schema map graphically organizes the visual task boards for the CMDB
C. A schema map graphically displays the Configuration Items that support a business service
D. A schema map displays the details of tables and their relationships in a visual manner, allowing administrators to view and easily access different parts of the database schema
How is the Event Log different from the Event Registry?
A. Event Log contains generated Events, the Event Registry is a table of Event definitions
B. Event Log is formatted in the Log style, the Event Registry displays different fields
C. Event Log lists Events that were triggered by integrations, the Event Registry lists the Events that were triggered during the day (24-hour period)
D. Event Log is the same as the Event Registry
Which group of permissions is used to control Application and Module access?
A. Access Control Rules
B. UI Policies
C. Roles
D. Assignment Rules
Which of the following statements is true when a new table is created by extending another table?
A. The new table archives the parent table and assumed its roles in the database
B. The new table inherits all of the Business Rules, Client Scripts, and UI Policies of the parent table, but none of the existing fields
C. The new table inherits all of the fields of the parent table and can also contain new fields unique to itself
D. The new table inherits all of the fields, but does not inherit Access Control rules, Client Scripts, and UI Policies of the parent table
Which are valid Service Now User Authentication Methods? (Choose three.)
A. XML feed
B. Local database
C. LDAP
D. SSO
E. FTP authentication