1. What are the reasons organisations fail to complete implementation or realise business value from the CMDB? Select 3 Answers from the below options.
- Too many non-IT Configuration Items
- Ill-defined relationships among Configurations Items
- Inconsistent data quality
- Unknown Configuration Items
2. What is a good way to privately suggest an article revision to the knowledge manager from the Service Portal?
- Edit article
- Rate article
- Leave comments
- Flag article
3. Which user authentication method is used when it authenticates the username and password configured in identity providers that have a matching user account in the ServiceNow instance?
- Local database
- Multi-factor
- External Single Sign-on (SSO)
- Digest Token
4. Which of the following is an example of a base table that is extended but itself is not extending another table?
- Change Request [change_request]
- Incident [incident]
- Task [task]
- Business Service [cmdb_ci_service]
5. What type of Flow Designer Trigger is needed for an Inbound Email Action?
- Application-based
- Schedule-based
- Role-based
- Record-based
6. If an end user wants to report an incident, where does he/she navigate to on the service portal?
- In the Quick Links Category in the Service Catalogue
- In the Can we Help you? Category in the Service Catalogue
- In the Software Category in the Service Catalogue
- In the infrastructure Services Category in the Service Catalogue
7. Which Flow Designer plugin is activate by default?
- Flow Designer Action Stop - Script
- Connect Spoke for Flow Designer
- The Flow Designer Support for the Service Catalog
- Demo Data for ServiceNow Flow Designer - Introspection
8. Which option does allow you to update existing Target Table records when importing data from an import set?
- Unique
- Transform
- Mandatory
- Coalesce
9. What role is required for a user to create or update access control rules?
- sn_sec_cmn.admin
- sn_si.admin
- security_admin
- sn_sec_int.admin
10. What do access control list rules specify? Select 2 Answers from the below options.
- The relationship between the object and the operation
- The permissions required to access the object
- The object and operation being secured
- The operation required to access the object
This information is really awesome thanks for sharing most valuable information.
ReplyDeleteServiceNow Training
ServiceNow Online Training in Hyderabad