Service-Now Implementations Exam Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

Service-Now Implementations Exam

Questions
1. ServiceNow provides customers with a dedicated database,
application and data isolation using which one of the following
models?
a.
b.
c.
d.

Single-tenant
Multi-tenant
Hybrid Cloud
Domain Separation

2. Within the ServiceNow application, a technical consultant has


created and tested a new Outbound SOAP Message. In order for
the consultant to invoke the new SOAP message within the
ServiceNow application, which of the following can be created?
a.
b.
c.
d.

UI Policy
Business Rule
UI Property
Import Set

3. Which one of the following is a valid reason for a customer to


obtain a VPN connection for their ServiceNow implementation?
a. Encrypt end user access to ServiceNow
b. Encrypt a SOAP message to ServiceNow
c. Encrypt communication between a MID Server and a customer
ServiceNow instance
d. Encrypt the communication path between a customer ServiceNow
instance and their enterprise mail server

4. Which one of the following would improve the performance of


loading forms within ServiceNow?
a.
b.
c.
d.

Reduce the number of related lists configured for a form


Increase the number of client scripts for a table
Reduce the number of read only fields defined for a form
Reduce the number of mandatory fields defined for a form

5. Which one of the following is the proper syntax for accessing the
values of variables from the record producer script field?
a.
b.
c.
d.

g_form.getReference('variable_name')
g_form.getVariable('variable_name')
producer.variable_name
current.variable_name

6. Catalog Client Script - g_form.getValue(variable_name);


Ans: to access variables from catalog request pages

7. Record Producer Script

Ans: Producer.variable_name

8. Business Rules, global variable to provide on client script


Ans: g_scratchpad

9. Which java script has Insert, Delete, Update , on query, display,


before and after executions
Ans: Business rule

10.

gs.log() stores log messages where

Ans: System logs

11.

How to check empty values?

Ans: gs.nil()

12.

13.

Which of the following is used in business rule


a. gs.addMessageInformation
b. gs.log(string, source) - correct answer
Email Port used

Ans: SMTP

14.

Email - event stop - business rule Choices


a. Eventstop
b. gs.eventstop

15.

Which about LDAP is correct?

Ans: Read-Only information of customer client directories

16.

Pings to service now instance, maximum normal response time

Ans: 250ms

17.
To get a value from server side to be available to the Incident
Form
Ans: Business Rule on display

18.

Incident form loads up slow, why?

Ans: Because of too many client scripts

19.
Change Task extended from Task table, short description field
is created on change task table. What will happen to change task
form that already has the task tables short description
Ans: Personalize layout

20.
You can find both task tables short description as well as
change task short
Ans: Description fields

21.
Short Description fields default value has to be set but only
for incident form, shouldnt be on task table
Ans: Dictionary over ride - default value

22.

Firewall has to be monitored, how to create the table for it

Ans: Extend from cmdb_ci table and create a table

23.
To provide more information on client transaction timings what
plugin to activate?
Ans: Client Transaction Timings

24.

Which among the following is correct about LDAP

Ans: ServiceNow does not store user passwords of LDAP

25.
LDAP to get info and update user table periodically, what to
use?
Ans: Scheduled import sets

26.

Transform Maps have performance issues, what to do?

Ans: Remove unwanted custom scripts

27.

3 levels of access within SN


a. System Access
b. Application & Module Access
c. Table and Field Access

28.

3 Servers in the SN Instance architecture


a. Physical Server
b. Database Server
c. Application Server

29.

A fully qualified LDAP tree is known as

Ans: Distinguished Name (DN)

30.

Acceptable ping time

Ans: less than 250ms

31.

Application/Module access is secured by

Ans: Roles

32.

Default contextual security in SN is to

Ans: DENY access

33.

Default port number for LDAPS

Ans: 639

34.

Does LDAP store passwords in SN?

Ans: LDAP does NOT store passwords in SN

35.
Each record in ServiceNow is identified by a unique
##character GUID (Globally Unique ID) called a sys_id?
Ans: 32-character

36.

Hardware stack used for service-now

Ans: tomcat/mySQL

37.

What provides tables as staging area for integration

Ans: Import set

38.

Part of prepare stage in StartNow

Ans: Core system setup, sprint planning

39.
What application/database server combination is used in most
datacenters
Ans: Tomcat/MySQL 4

40.

How are workflows captured in update sets

Ans: must be published

41.

How to increase performance of transform maps

Ans: reduce number of scripts running

42.
How are remaining points calculated in release burndown
charts
Ans: Total points in all stories minus points in completed stories

43.

Stages in StartNow

Ans: Plan, Discover, Prepare, Deploy, Operate

44.
What extra feature is available when elevated privilege is
activated
Ans: Write permission on access control record

45.
Global variable in business rules besides current and
previous
Ans: g_scratchpad

46.

How to avoid unused numbering in records

Ans: Set property Assign a task number only upon insert to true

47.

Components of perceived performance of service-now instance

Ans: Application server response, Network latency and Throughput, Browser


rendering and parsing

48.
Which two statements are true about XML schemas and WSDL
1.1? (Choose two.)
a) http://schemas.xmlsoap.org/wsdl/ is the WSDL namespace for SOAP binding.
b) xsi is used as a prefix to represent the schema namespace as defined by XSD
c) XSD schemas are used as a formal definition of WSDL grammar.
d) xsd is used as a prefix to represent the schema namespace as defined by XSD
e) http://schemas.xmlsoap.org/wsdl/http/ is the WSDL namespace for SOAP binding
Ans: C,D

49.
A company's new investment management Java application
and a legacy stock trader application need to communicate, but they
use different JMS implementations. A developer decides to
implement a JMS bridge to solve the problem. Which two advantages
does this pattern provide? (Choose two.)
a) It converts the interface of a class into another interface that clients expect.
b) It decouples an abstraction from its implementation so that the two can vary
independently.
c) It dynamically attaches additional responsibilities to an object.
d) It optimizes network traffic.
e) It is vendor independent.
Ans: B,E

50.
Which situation requires the client to use the Dispatch
interface to access the Web service?
a) The
b) The
c) The
d) The
Ans: D

51.

client
client
client
client

and the server are on different platforms.


has access to the portable artifacts, but not to the WSDL.
has access to the WSDL, but not to the portable artifacts.
will access a REST-based service.

What are two features of a WSDL 1.1 document? (Choose two.)

a)
b)
c)
d)
e)

Service defines a collection of related endpoints.


Service describes the message's payload using XML.
Service assigns an Internet address to a specific binding.
Porttype declares complex data types and elements used elsewhere.
Porttype elements are used to group a set of abstract operations.
f) Porttype defines a concrete protocol and data format specification.
Ans: A,E

52.

Which three can an EJB-based endpoint use? (Choose three.)

a) HTTP sessions
b) Java EE 5 declarative security
c) Java EE 5 programmatic security
d) client-demarcated transactions
e) container-managed transactions
Ans: B,C,E

53.
What are two communication modes supported by JAX-WS?
(Choose two.)
a) Synchronous RPC
b) Dynamic Service Binding
c) Dynamic Proxy
d) Endpoint Invocation
e) Dispatch
Ans: C,E

54.
A company is refactoring an existing website to use Web
services clients. The application retrieves lists of parts and displays
them to the users in a browser window. Previously, the data was
stored as files on the web server and, in order to access the files,
the user would simply click on a hyperlink. Now the data must be
dynamically generated via a service that another developer has
created. They want the easiest way to refactor their website to use
Web services. Which three technologies should they use? (Choose
three.)
a) SOAP
b) REST
c) JavaScript
d) XML
e) JSON
f) Java
Ans: B,C,E

55.
A JAXR client has established connection with a UDDI registry
and needs to get a service binding from the registry. What is
required to accomplish this task?
a) find the appropriate concept and then find the service binding associated with
that concept
b) find the appropriate authentication token and then find the service binding
associated with that authentication token
c) find the appropriate organization, get the model associated with that
organization, and then find the service binding associated with the model
d) find the appropriate organization, find the services associated with that
organization, and then find the service binding associated with the service
Ans: D

56.
What are three benefits of using SSL to connect to a Web
service without mutual authentication? (Choose three.)
a) The server is assured of the client's identity if the client issues the certificate.
b) The client is assured of the server's identity.
c) Message integrity is preserved between the client and the server.
d) The communication between the client and the server is still logged.
e) The communication between the client and the server is encrypted.
f) Using SSL over HTTP incurs less overhead than HTTPS
Ans: B,C,E

57.
A developer is creating a servlet-based endpoint for a new
payroll application. What are three requirements for the service?
(Choose three.)
a) It needs to be packaged as a WAR file.
b) It needs to be packaged as a JAR file.
c) It requires a META-INF folder.
d) It requires a WEB-INF folder.
e) webservices.xml is required.
f) web.xml is required.
Ans: A,D,F

58.
a)
b)
c)
d)

How do you test SSO using which bypass method?


side_door.do
back_door.do
side_entrance.do
none of the above

59.
If you want to have a default value for the short description
field for a change that extends the task table, which approach is
best practice?
a) Create a new short description field
b) Set the default value for the short description field
c) Create a Dictionary Override
d) Create a Client Script

60.
a)
b)
c)
d)

Which of the following contains a server call?


g_form.getValue()
g_form.setValue()
g_form.getReference()
g_form.clearValue()

61.Why is a callback function best practice when using getReference()?


a) because it runs synchronously
b) it will not affect performance
c) because it will run asynchronously
d) a callback function is not necessary

62.How do you limit the scope of a variable?


a) you declare variables inside a function
b) you declare variables using == operators
c) you use a comparator such as !=
d) you declare variables outside a function

63.Which of the following plugins creates baseline ACL rules for a new
environment?
a) High Security Settings
b) ACL Security Jump Start
c) It is included by default in new installations
d) Security Quick Start

64.Which is the following is true regarding the task table?


a) Task is extended from a parent table such as Problem, Change, Incident, etc.
b) Applications cannot extend from the Task Table
c) Only Problem, change, and incident can be extended from task
d) Any application can be extended from Task

65.How is the burn down defined from Release?


a) Total points - completed points
b) Sprint points - stories in "TESTING"
c) Story points - sprint points
d) none of the above

66.Which of the following is NOT true about business rules?


a) They execute server-side
b) g_scratchpad is a global variable
c) They can be executed on query
d) g_form is accessible

67.Why would a client require VPN tunnels to ServiceNow?


a) To encrypt a mail server
b) To encrypt communication to a ServiceNow instance
c) To encrypt data from ServiceNow to a MidServer
d) None of the above

68.How do you access the amount of memory a ServiceNow instance is


using?
a) Navigate to system logs
b) stats.do
c) submit a HI ticket
d) users do not have access to server information

69.Where is GlideAjax typically used?


a) business rules
b) client scripts
c) ui policy
d) ui macro

70.A user wants to use domain separation for his instance. Which of the
following is true?
a) Domain separation creates separate instances of ServiceNow
b) Domain: loc users can view Global records
c) Global records are viewable to all users
d) B and C are correct

71.LDAP is used for what?


a) Automation and Authentication
b) Data Population and Automation

c) Authentication and Data Modification


d) Data Population and Authentication

72.How do you extract the WSDL for a table?


a) WSDL.DO
b) open a HI Ticket
c) create a LDAP service
d) create a business rule
73. Which of the following does a UI Policy affect?
a) Form View
b) List View
c) Access Control
d) Client Script

74.A sys_id is which of the following:


a) a unique 16 bit GUID
b) a unique 32 character GUID
c) is unique record
d) both b and c

75.Which of the following will increase the performance for a client


script:
a) using GlideAjax for server calls
b) using glide record
c) using callback functions for GlideAjax
d) a and c

76.How do you secure a field on a form?


a) use a UI Policy
b) use a ACL rule
c) use a Client Script
d) a and c

77.Where is gs.log logged to?


a) System Transactions
b) JavaScript Console
c) System Logs
d) Script log statements

78.How do you flush the cache in a SNOW instance?


a) cache.do
b) flush_cache.do
c) cache_flush.do
d) flush.do
79. Which of the following is NOT a valid query?
a) addQuery()
b) addNullQuery()

c) addNotNullQuery()
d) addEmptyQuery()
80. What does gs.getmessage(X) do?
a) Adds a info message
b) Retrieves a info message
c) Retrieves a message key
d) None of the above
81. A user wants to know if you can make each INC# be sequential, how

would you go about doing this?


a) a BEFORE business rules
b) a on SUBMIT client script
c) it can't be done
d) Modify system properties
82. How do you access a variable inside a Record producer script?
a) g_form.getValue()
b) producer.variablename
c) current.variablename
d) g_form.getVariable()
83. Does ServiceNow stores the LDAP Password?
a) Yes
b) No
84. Where does ServiceNow stores the LDAP password?
a) In LDAP connection URL
b) In user password field
c) In encrypted password field
d) In HTTP Session

85.which related link is used to test LDAP connection?


a) Test authentication
b) Test Connection
c) Load 20 Records
d) Browse
86. In LDAP configuration, If default port is not used and explicit port

number is to be mentioned, how it is done?


a) ServiceNow does not support explicit port
b) select SSL check box and new port field appears and enter the port number in the
field
c) enter the port in server URL
d)None of the above
87. The coarsest measure of network response time is a ping, which

measures the total time for a packet to travel from the source

machine to the target and back again. What is the reliable time for
ServiceNow connection?
a) 100 ms
b)250 ms
c)1000 ms
d)300ms

88.Which of the following can be used for user and distribution


directory services in ServiceNow
a) Webservice
b) SNMP
c) IMAP
d) LDAP
89. Which of the following is server side script?
a) UI Script
b) Business Rule
c) Client Script
d) UI Policy
90. What is the most important table of integration in ServiceNow?
a) Webservice
b) target table
c) Import set
d) None of the above
91. ServiceNow provides tables that are a staging area for data before

transformation is done and stored into ServiceNow target table.


Where is this staging data is stored?
a) In http Session
b) In Mid server staging table
c) third party staging table
d) Import Set
92. An integration is done of third part tool in ServiceNow. Data is

inserted into import sets and data is transformed and stored into
target table and all fields are being updated. Upon analysis it found
that duplicate entries are being created. What could the possible
cause of it?
a) Fields are not mapped correctly
b) Coalesce field is not setup correctly
c) Transform scripts are wrong
d) Nothing is wrong, write a business rule to delete duplicate records as they are
found
93. Which of the following is a global object like gs?
a) g_user
b) g_form

c) JS:
d) g_scratchpad
94. The Client Transaction Timings feature enhances the system logs by

providing more information on the durations of transactions


between the client and the server. How do you enable the Client
transaction timing?
a) set the property glide.client.track_transaction_timings to true
b) Install the Client Transaction Plugin
c) Enable the system schedules
d) Enable the system logs
95. You are loading the data into ServiceNow using Webservice. Which

of the following is being used to bring data into system?


a) Rest API
b) Script Webservice
c) business rule
d) Outbound SOAP Message
96. Which of the following is ServiceNow s StartNow Methodology to

manage implementation projects?


a) Plan, Discover, Prepare, Deploy, Operate, Transform
b) Plan, Discover, Operate, Deploy, Transform
c) Prepare, Discover, Plan, Deploy, Operate, Transform
a) Plan, Discover, Prepare , Deploy, Operate,
97. If your company wants to store firewall equipment details in

ServiceNow. How will you store it?


a) create new standalone table
b) create a table inherited from task table
c) store in base cmdb table
d) create new table inherited from cmdb_ci table
98. From which table task table is inherited?
a) cmdb_ci
b) sys_db_object
c) Task table is not inherited from any table
d) sys_dictionary
99. Which of the following can be used for row and column level

security?
a) client script
b) UI Policy
c) display business rule
d) ACL

Which of the following is called before data is queried and


presented to user for display?

100.

a) business rule
b) client script
c) ACL
d) UI Policy
101.
How do you start the debugging of security rules?
a) start debugging
b) debug security
c) watch field name
d) debug business rules
102.
Which Database is used by ServiceNow?
a) Oracle
b) MSSQL
c)Sybase
d) MySQL
103.
Which Webserver is used by ServiceNow?
a)Tomcat
b)WebLogic
c)WebSphere
d)None of the above
104.
Which protocol is used to connect mid server and ServiceNow?
a) http
b) https
c) FTP
d) soap
105.
Which table stores the details of table and inheritance?
a) task
b) sys_db_object
c)cmdb_ci_relationship
d) sys_audit

106.
Within the ServiceNow application, a technical consultant
has created and tested a new Outbound SOAP Message. In
order for the consultant to invoke the new SOAP message
within the ServiceNow application, which of the following can
be created?
a) UI Policy
b) Business Rule
c) UI Property
d) Import Set

107.
Which one of the following is a valid reason for a
customer to obtain a VPN connection for their ServiceNow
implementation?
a) Encrypt end user access to ServiceNow

b) Encrypt a SOAP message to ServiceNow


c) Encrypt communication between a MID Server and a customer ServiceNow
instance
d) Encrypt the communication path between a customer ServiceNow instance
and their enterprise mail server

108.
Which one of the following would improve the
performance of loading forms within ServiceNow?
a)
b)
c)
d)

Reduce the number of related lists configured for a form


Increase the number of client scripts for a table
Reduce the number of read only fields defined for a form
Reduce the number of mandatory fields defined for a form

109.
Which one of the following is the proper syntax for
accessing the values of variables from the record producer
script field?
a)
b)
c)
d)

g_form.getReference('variable_name')
g_form.getVariable('variable_name')
producer.variable_name
current.variable_name

110.
What stage is this?
setup ServiceNow project team
setup customer project team
setup risk register
training sysadmins
kickoff workshop
customer project team training
GOAL : project setup and kicked off
Stage 1a: Plan

111.

Who handles:

Overall ServiceNow lead for deployment


Peer to customer management and project manager
Overall deployment success and customer value
Ans: Engagement Manager

112.

Who helps:

Customers with knowledge transfer


Development help/support
Ans: Technical consultant

113.

Who leads:

Process gap analysis workshops


Helps define backlog of requirements to be implemented

Ans: Business process consultant

114.

Who develops:

Strategy for integration


Development of the integration points to and from ServiceNow
Ans: integration consultant

115.

Who handles:

Instance build and physical environment optimization


Datacenter network and connectivity
Ans: cloud infrastructure

116.

Who handles:

Visible active and knowledgeable


Able to clear road blocks
Ans: executive sponsorship

117.

Who handles :

involved with driving priority


decision maker
tracks scope creep and provides visibility
Ans: it manager/director

118.

Who handles :

Hands on
Tailors app to business requirements
Ans: system admin

119.

Who handles :

Complete definition of current & future processes,


Testing,
Ensures application maps to business
Ans: business process owners

120.
What stage is this?
Review objectives
risk register
core system setup initiated
apply coding standards
GOAL : Core system setup
Ans: Stage 2 : Prepare

121.

What stage of engagement methodology is this in?

Base data loads


LDAP integration
Common data imported
Apply coding standards
Ans: Stage 2 : Prepare

122.

What stage is this?

Production Readiness Review


Review Objectives
Risk Register
Build out functionality
Training
GOAL : Processes implemented
Ans: Stage 3 : Deploy
123.
When should you perform the following?
Instance sizing, instance config, hardware, monitoring, network, support transitioning
Ans: at least 3 weeks before go live
124.
What process is this?
Typically done through 'enablement' approach
customer resources working side by side with ServiceNow
review with process owners
change if gaps appear between requirements & development
Ans: Build out functionality in Stage 3 : Deploy

125.

What sage is this?

Production
Cloud Admin Services initiated
Customer success manager assigned
GOAL: Platform live
Ans: Stage 4 : Operate

126.

What process is this?

Cloning of instances
Integration all operational
Test data cleared down
Ans: Cut over to production of Stage 4 : Operate

127.

When should the following actions be performed?

Update the welcome page


Create diff look for each instance (banner name/color)
Change email prop notifications to prevent users from getting msgs from sub prod
Restrict user access and modify ldap to disable imports and updates
Disable active scheduled jobs like imports/reports
Ans: cloning back to dev and test from prod

128.

What are the options for post go-live development?

Ans: merge dev sets before pushing up environments OR do one dev update set at a
time

129.

What are VPNs used for typically?

Ans: securing connections that originate at ServiceNow and destined for customer
network access to LDAP JDBC access with customer DB

130.

How are vpn request submitted?

Ans: self-service form in customer support system called HI

131.

Should end users have to go through vpn for ServiceNow?

Ans: No

132.

What are the two uses for ldap

Ans: 1) data population and 2) authenticatoin

133.

Determine the type of communication channel

define ldap server


provide ldap server login scredentials
set connection pros & test connection
define OU's
create data source and transform map
create and execute scheduled import
Ans: ldap set up procedure

134.

Do you map roles to users?

Ans: no, to groups

135.

What purpose does a schedule provide?

Ans: for inactivity monitor and time-based SLAs

136.

What are the ways of populating CMDB?

Ans: 1) automated discovery product


2) Importing the information from anotehr source
3) Integrating with existing external CMDBs

137.

CRWD stands for

Ans: create read write delete

138.

How do you restrict access and enable contextual security?

Ans: ACLs

139.

You can enable CRWD for

Ans: 1) system access


2) Application and module access
3) table/field access

140.

each time you add a table you are

Ans: creating a dictionary application module

141.

apps and modules are governed by

Ans: roles

142.

table and field are governed by

Ans: ACL

143.

ACL rules are defined by

Ans: 1) Conditional expressions - "category is database"


2) Scripts - custom script written for security access
3) Roles - user require to have one of the defined roles to perform actions

144.

Secure or develop first?

Ans: secure

145.

Standard integrations for ServiceNow are?

Ans: 1) login
2) Data & processes
3) Communications
4) LDAP
5) Monitoring
6) Discovery& systems management
7) ERP
8) Change management

146.

Webservice components supported?

Ans: 1) soap
2) xml
3) wsdl
4) http

147.
Does ServiceNow support consuming or publishing web
services?
Ans: both

148.

What is scripted web service

Ans: custom web service in javascript

149.

What happens if web service publisher is behind firewall?

Ans: use mid server

150.

How do ServiceNow place data into soap response from DB

Ans: transform map

151.

How do you access default wsdl service for tables

Ans: add ?WSDL eg. :incident.do?WSDL

152.

What hardware limitation is related to license count?

Ans: memory

153.

Query optimizations

Ans: 1) add indexes


2) Limit number of columns returned

154.

Optimization for size of table/ number rows

Ans: cleanup and import set deletion

155.

How to access transaction logs?

Ans: system logs > transactions after enabling system property

156.

To view average response time of transactions

Ans: right click on column


Personalize>list calculations
Check average value

157.

Common solutions for slow transaction times?

Ans: using indexes intelligently

158.
Performance metrics graphs can be viewed for what 8
functional areas?
Ans: 1) database
2) Discovery
3) Disk partitions
4) Linux stats logging
5) MySQL overview
6) Node metrics
7) Replication
8) ServiceNow servlet

159.
Which of the scripts execution order is decided by System and
not by System Administrator?
a)
b)
c)
d)

Business rule
Script Actions
UI Actions
Script Includes

160.
While fetching a large report, how can we enhance system
performance?
a) By disabling browser cache
b) By increasing the refresh time interval

c) By decreasing homepage gauges


d) By editing the homepage

161.
a)
b)
c)
d)

Task table comes under which class?


Parent class
Root class
Primary class
Extended class

162.
Change task table is extended from task table, which of the
following is true for short description field?
a) Short description is same as of task table
b) You can have two short description, you can create one more by right click and
personalize.
c) Short description is same as of task table and is overridden from task table

163.

Business rule runs on which layer?

a) Protocol
b) Scripting
c) Application

164.

LOG[] function is related to which table

a) Transaction log
b) System logs

165.
When you purchase a new instance from service now, which of
the following is available by default
Ans: High Security

166.

LDAP and LDAPs ports?

Ans: 389 and 636

167.
Which is the most important table in service now for
integration?
Ans: Import set

168.
Which of the variable is global in business rules apart from
current and previous?
Ans: g_scratchpad

169.
Which of the following is called before data is submitted and
presented to user for display?
a)
b)
c)
d)

170.

Before
After
Async
Display

which of the following is a structured query for web service

Ans: SOAP

171.

What is WSDL?

a) It is a xml doc
b) It is a html doc which is used by web service
c) It is a http doc

172.
a)
b)
c)
d)

What is the default format of the email coming to service now?


POP3(incoming)
SMTP(outgoing)
SNMP
IMAP

173.
When an email is received in service now, two inbound actions
got triggered, how can we stop 2nd inbound action from triggering?
Ans: Event.state= stop_processing

174.
In LDAP, how can we use other ports rather than using default
port?
Ans: By appending port number after IP address in the server url.

175.

What is the Application/Database/Web Server in ServiceNow?

Ans: J2EE/MySQL/Tomcat

176.

How do you modify the buttons in the related list?

Ans: Personalize/configure List Control

177.
From where traffic starts in VPN during web service
integration?
a)
b)
c)
d)

SNOW to customer network


Customer network to SNOW
SNOW to mid server
Mid server to SNOW

178.
If data is going to service now from third party, then web
service acts as a?
a) Consumer
b) Publisher
c) Both

179.
a)
b)
c)
d)

180.
a)
b)
c)
d)

181.

Which protocol is used for secure LDAP?


http
mid server
LDAP with mid server
LDAP

Which architecture is used for data Webservice integration.


Data architecture
Object oriented architecture
Integrated architecture
Service Oriented architecture

how data and process are segregated

Ans: Domain separation

182.
In which phase of start now methodology, we do sprint/scrum
planning?
a)
b)
c)
d)
e)
f)

Prepare
Plan
Deploy
Discover
Operate
Transform

183.
What is the Coding best Practices that ServiceNow doesnt
recommends?
a)
b)
c)
d)

184.

Right small server calls instead of large server calls


Write getReference with callback
Avoid Server calls unless required
Use GlideAjax for Server calls

What is the production Methodology that ServiceNow uses?

a) SDLC
b) Agile Scrum (Development Methodology)
c) Waterfall

185.

How do you find the null value in the business rule?

a) By .NIL
b) By .NULL

186.

How do you create the audit for particular table?

a) Audit checkbox in table dictionary only for Type = Collection


b) Set audit true in the table dictionary

You might also like