ServiceNow CSA Page 16(Dumps)
Question No:-76
|
Access Control rules may provide access security for which of the following database objects?
1. For a specific role, group, or user
2. For a specific row, column, or table
3. For specific groups
4. For a specific CMDB Configuration item
Answer:-2. For a specific row, column, or table
Most user choose there answer as given below
|
|
Question No:-77
|
What is the primary application used to load data into ServiceNow?
1. Service Level Management
2. Configuration
3. System Import Sets
4. System Update Sets
Answer:-3. System Import Sets
|
|
Question No:-78
|
Which of the following steps can be used to import new data into ServiceNow from a spreadsheet?
1. Select Data Source, Schedule Transform
2. Load Data, Create Transform Map, Run Transform
3. Define Data Source, Select Transform Map, Run Transform
4. Select Import Set, Select Transform Map, Run Transform
Answer:-2. Load Data, Create Transform Map, Run Transform
Most user choose there answer as given below
|
|
Question No:-79
|
Which tool is used for creating dependencies between configuration items in the CMDB?
1. CI Relationship Editor
2. CMDB Builder
3. CI Service Manager
4. Cl Class Manager
Answer:-1. CI Relationship Editor
Most user choose there answer as given below
|
|
Question No:-80
|
What is the difference between a UI Policy and Data Policy?
1. Data Policies run when data is entered through the form, by an Import Set, or by web services, while UI Policies are set only by web services
2. Data Policies can be converted into UI Policies, but UI Policies cannot be converted into Data Policies
3. Data Policies run regardless of how data is entered into ServiceNow, while UI Policies are used for form interactions
4. Data Policies run only after UI Policies run successfully
Answer:-3. Data Policies run regardless of how data is entered into ServiceNow, while UI Policies are used for form interactions
|
|
|