Service-Now Implementations Exam Questions
Service-Now Implementations Exam Questions
Service-Now Implementations Exam Questions
Questions
1. ServiceNow provides customers with a dedicated database,
application and data isolation using which one of the following
models?
a.
b.
c.
d.
Single-tenant
Multi-tenant
Hybrid Cloud
Domain Separation
UI Policy
Business Rule
UI Property
Import Set
5. Which one of the following is the proper syntax for accessing the
values of variables from the record producer script field?
a.
b.
c.
d.
g_form.getReference('variable_name')
g_form.getVariable('variable_name')
producer.variable_name
current.variable_name
Ans: Producer.variable_name
10.
11.
Ans: gs.nil()
12.
13.
Ans: SMTP
14.
15.
16.
Ans: 250ms
17.
To get a value from server side to be available to the Incident
Form
Ans: Business Rule on display
18.
19.
Change Task extended from Task table, short description field
is created on change task table. What will happen to change task
form that already has the task tables short description
Ans: Personalize layout
20.
You can find both task tables short description as well as
change task short
Ans: Description fields
21.
Short Description fields default value has to be set but only
for incident form, shouldnt be on task table
Ans: Dictionary over ride - default value
22.
23.
To provide more information on client transaction timings what
plugin to activate?
Ans: Client Transaction Timings
24.
25.
LDAP to get info and update user table periodically, what to
use?
Ans: Scheduled import sets
26.
27.
28.
29.
30.
31.
Ans: Roles
32.
33.
Ans: 639
34.
35.
Each record in ServiceNow is identified by a unique
##character GUID (Globally Unique ID) called a sys_id?
Ans: 32-character
36.
Ans: tomcat/mySQL
37.
38.
39.
What application/database server combination is used in most
datacenters
Ans: Tomcat/MySQL 4
40.
41.
42.
How are remaining points calculated in release burndown
charts
Ans: Total points in all stories minus points in completed stories
43.
Stages in StartNow
44.
What extra feature is available when elevated privilege is
activated
Ans: Write permission on access control record
45.
Global variable in business rules besides current and
previous
Ans: g_scratchpad
46.
Ans: Set property Assign a task number only upon insert to true
47.
48.
Which two statements are true about XML schemas and WSDL
1.1? (Choose two.)
a) http://schemas.xmlsoap.org/wsdl/ is the WSDL namespace for SOAP binding.
b) xsi is used as a prefix to represent the schema namespace as defined by XSD
c) XSD schemas are used as a formal definition of WSDL grammar.
d) xsd is used as a prefix to represent the schema namespace as defined by XSD
e) http://schemas.xmlsoap.org/wsdl/http/ is the WSDL namespace for SOAP binding
Ans: C,D
49.
A company's new investment management Java application
and a legacy stock trader application need to communicate, but they
use different JMS implementations. A developer decides to
implement a JMS bridge to solve the problem. Which two advantages
does this pattern provide? (Choose two.)
a) It converts the interface of a class into another interface that clients expect.
b) It decouples an abstraction from its implementation so that the two can vary
independently.
c) It dynamically attaches additional responsibilities to an object.
d) It optimizes network traffic.
e) It is vendor independent.
Ans: B,E
50.
Which situation requires the client to use the Dispatch
interface to access the Web service?
a) The
b) The
c) The
d) The
Ans: D
51.
client
client
client
client
a)
b)
c)
d)
e)
52.
a) HTTP sessions
b) Java EE 5 declarative security
c) Java EE 5 programmatic security
d) client-demarcated transactions
e) container-managed transactions
Ans: B,C,E
53.
What are two communication modes supported by JAX-WS?
(Choose two.)
a) Synchronous RPC
b) Dynamic Service Binding
c) Dynamic Proxy
d) Endpoint Invocation
e) Dispatch
Ans: C,E
54.
A company is refactoring an existing website to use Web
services clients. The application retrieves lists of parts and displays
them to the users in a browser window. Previously, the data was
stored as files on the web server and, in order to access the files,
the user would simply click on a hyperlink. Now the data must be
dynamically generated via a service that another developer has
created. They want the easiest way to refactor their website to use
Web services. Which three technologies should they use? (Choose
three.)
a) SOAP
b) REST
c) JavaScript
d) XML
e) JSON
f) Java
Ans: B,C,E
55.
A JAXR client has established connection with a UDDI registry
and needs to get a service binding from the registry. What is
required to accomplish this task?
a) find the appropriate concept and then find the service binding associated with
that concept
b) find the appropriate authentication token and then find the service binding
associated with that authentication token
c) find the appropriate organization, get the model associated with that
organization, and then find the service binding associated with the model
d) find the appropriate organization, find the services associated with that
organization, and then find the service binding associated with the service
Ans: D
56.
What are three benefits of using SSL to connect to a Web
service without mutual authentication? (Choose three.)
a) The server is assured of the client's identity if the client issues the certificate.
b) The client is assured of the server's identity.
c) Message integrity is preserved between the client and the server.
d) The communication between the client and the server is still logged.
e) The communication between the client and the server is encrypted.
f) Using SSL over HTTP incurs less overhead than HTTPS
Ans: B,C,E
57.
A developer is creating a servlet-based endpoint for a new
payroll application. What are three requirements for the service?
(Choose three.)
a) It needs to be packaged as a WAR file.
b) It needs to be packaged as a JAR file.
c) It requires a META-INF folder.
d) It requires a WEB-INF folder.
e) webservices.xml is required.
f) web.xml is required.
Ans: A,D,F
58.
a)
b)
c)
d)
59.
If you want to have a default value for the short description
field for a change that extends the task table, which approach is
best practice?
a) Create a new short description field
b) Set the default value for the short description field
c) Create a Dictionary Override
d) Create a Client Script
60.
a)
b)
c)
d)
63.Which of the following plugins creates baseline ACL rules for a new
environment?
a) High Security Settings
b) ACL Security Jump Start
c) It is included by default in new installations
d) Security Quick Start
70.A user wants to use domain separation for his instance. Which of the
following is true?
a) Domain separation creates separate instances of ServiceNow
b) Domain: loc users can view Global records
c) Global records are viewable to all users
d) B and C are correct
c) addNotNullQuery()
d) addEmptyQuery()
80. What does gs.getmessage(X) do?
a) Adds a info message
b) Retrieves a info message
c) Retrieves a message key
d) None of the above
81. A user wants to know if you can make each INC# be sequential, how
measures the total time for a packet to travel from the source
machine to the target and back again. What is the reliable time for
ServiceNow connection?
a) 100 ms
b)250 ms
c)1000 ms
d)300ms
inserted into import sets and data is transformed and stored into
target table and all fields are being updated. Upon analysis it found
that duplicate entries are being created. What could the possible
cause of it?
a) Fields are not mapped correctly
b) Coalesce field is not setup correctly
c) Transform scripts are wrong
d) Nothing is wrong, write a business rule to delete duplicate records as they are
found
93. Which of the following is a global object like gs?
a) g_user
b) g_form
c) JS:
d) g_scratchpad
94. The Client Transaction Timings feature enhances the system logs by
security?
a) client script
b) UI Policy
c) display business rule
d) ACL
100.
a) business rule
b) client script
c) ACL
d) UI Policy
101.
How do you start the debugging of security rules?
a) start debugging
b) debug security
c) watch field name
d) debug business rules
102.
Which Database is used by ServiceNow?
a) Oracle
b) MSSQL
c)Sybase
d) MySQL
103.
Which Webserver is used by ServiceNow?
a)Tomcat
b)WebLogic
c)WebSphere
d)None of the above
104.
Which protocol is used to connect mid server and ServiceNow?
a) http
b) https
c) FTP
d) soap
105.
Which table stores the details of table and inheritance?
a) task
b) sys_db_object
c)cmdb_ci_relationship
d) sys_audit
106.
Within the ServiceNow application, a technical consultant
has created and tested a new Outbound SOAP Message. In
order for the consultant to invoke the new SOAP message
within the ServiceNow application, which of the following can
be created?
a) UI Policy
b) Business Rule
c) UI Property
d) Import Set
107.
Which one of the following is a valid reason for a
customer to obtain a VPN connection for their ServiceNow
implementation?
a) Encrypt end user access to ServiceNow
108.
Which one of the following would improve the
performance of loading forms within ServiceNow?
a)
b)
c)
d)
109.
Which one of the following is the proper syntax for
accessing the values of variables from the record producer
script field?
a)
b)
c)
d)
g_form.getReference('variable_name')
g_form.getVariable('variable_name')
producer.variable_name
current.variable_name
110.
What stage is this?
setup ServiceNow project team
setup customer project team
setup risk register
training sysadmins
kickoff workshop
customer project team training
GOAL : project setup and kicked off
Stage 1a: Plan
111.
Who handles:
112.
Who helps:
113.
Who leads:
114.
Who develops:
115.
Who handles:
116.
Who handles:
117.
Who handles :
118.
Who handles :
Hands on
Tailors app to business requirements
Ans: system admin
119.
Who handles :
120.
What stage is this?
Review objectives
risk register
core system setup initiated
apply coding standards
GOAL : Core system setup
Ans: Stage 2 : Prepare
121.
122.
125.
Production
Cloud Admin Services initiated
Customer success manager assigned
GOAL: Platform live
Ans: Stage 4 : Operate
126.
Cloning of instances
Integration all operational
Test data cleared down
Ans: Cut over to production of Stage 4 : Operate
127.
128.
Ans: merge dev sets before pushing up environments OR do one dev update set at a
time
129.
Ans: securing connections that originate at ServiceNow and destined for customer
network access to LDAP JDBC access with customer DB
130.
131.
Ans: No
132.
133.
134.
135.
136.
137.
138.
Ans: ACLs
139.
140.
141.
Ans: roles
142.
Ans: ACL
143.
144.
Ans: secure
145.
Ans: 1) login
2) Data & processes
3) Communications
4) LDAP
5) Monitoring
6) Discovery& systems management
7) ERP
8) Change management
146.
Ans: 1) soap
2) xml
3) wsdl
4) http
147.
Does ServiceNow support consuming or publishing web
services?
Ans: both
148.
149.
150.
151.
152.
Ans: memory
153.
Query optimizations
154.
155.
156.
157.
158.
Performance metrics graphs can be viewed for what 8
functional areas?
Ans: 1) database
2) Discovery
3) Disk partitions
4) Linux stats logging
5) MySQL overview
6) Node metrics
7) Replication
8) ServiceNow servlet
159.
Which of the scripts execution order is decided by System and
not by System Administrator?
a)
b)
c)
d)
Business rule
Script Actions
UI Actions
Script Includes
160.
While fetching a large report, how can we enhance system
performance?
a) By disabling browser cache
b) By increasing the refresh time interval
161.
a)
b)
c)
d)
162.
Change task table is extended from task table, which of the
following is true for short description field?
a) Short description is same as of task table
b) You can have two short description, you can create one more by right click and
personalize.
c) Short description is same as of task table and is overridden from task table
163.
a) Protocol
b) Scripting
c) Application
164.
a) Transaction log
b) System logs
165.
When you purchase a new instance from service now, which of
the following is available by default
Ans: High Security
166.
167.
Which is the most important table in service now for
integration?
Ans: Import set
168.
Which of the variable is global in business rules apart from
current and previous?
Ans: g_scratchpad
169.
Which of the following is called before data is submitted and
presented to user for display?
a)
b)
c)
d)
170.
Before
After
Async
Display
Ans: SOAP
171.
What is WSDL?
a) It is a xml doc
b) It is a html doc which is used by web service
c) It is a http doc
172.
a)
b)
c)
d)
173.
When an email is received in service now, two inbound actions
got triggered, how can we stop 2nd inbound action from triggering?
Ans: Event.state= stop_processing
174.
In LDAP, how can we use other ports rather than using default
port?
Ans: By appending port number after IP address in the server url.
175.
Ans: J2EE/MySQL/Tomcat
176.
177.
From where traffic starts in VPN during web service
integration?
a)
b)
c)
d)
178.
If data is going to service now from third party, then web
service acts as a?
a) Consumer
b) Publisher
c) Both
179.
a)
b)
c)
d)
180.
a)
b)
c)
d)
181.
182.
In which phase of start now methodology, we do sprint/scrum
planning?
a)
b)
c)
d)
e)
f)
Prepare
Plan
Deploy
Discover
Operate
Transform
183.
What is the Coding best Practices that ServiceNow doesnt
recommends?
a)
b)
c)
d)
184.
a) SDLC
b) Agile Scrum (Development Methodology)
c) Waterfall
185.
a) By .NIL
b) By .NULL
186.