crackyourinterview.com


ServiceNow CSA Page 16(Dumps)


Question No:-76

Access Control rules may provide access security for which of the following database objects?


  1. For a specific role, group, or user
  2. For a specific row, column, or table
  3. For specific groups
  4. For a specific CMDB Configuration item

 






Question No:-77

What is the primary application used to load data into ServiceNow?


  1. Service Level Management
  2. Configuration
  3. System Import Sets
  4. System Update Sets

 





Question No:-78

Which of the following steps can be used to import new data into ServiceNow from a spreadsheet?


  1. Select Data Source, Schedule Transform
  2. Load Data, Create Transform Map, Run Transform
  3. Define Data Source, Select Transform Map, Run Transform
  4. Select Import Set, Select Transform Map, Run Transform

 







Question No:-79

Which tool is used for creating dependencies between configuration items in the CMDB?


  1. CI Relationship Editor
  2. CMDB Builder
  3. CI Service Manager
  4. Cl Class Manager

 









Question No:-80

What is the difference between a UI Policy and Data Policy?


  1. Data Policies run when data is entered through the form, by an Import Set, or by web services, while UI Policies are set only by web services
  2. Data Policies can be converted into UI Policies, but UI Policies cannot be converted into Data Policies
  3. Data Policies run regardless of how data is entered into ServiceNow, while UI Policies are used for form interactions
  4. Data Policies run only after UI Policies run successfully

 





... | 11 | 12 | 13 | 14 | 15 | 16















@2014-2022 Crackyourinterview (All rights reserved)
Privacy Policy - Disclaimer - Sitemap