1. A fulfiller has completed all tasks for one of the items in a request, and the tasks are set to Closed. What happens in the workflow?
- The requested item is automatically set to Closed Complete
- The request is automatically set to Closed Complete
- The requester is notified that the request is Complete
- The requested item moves to the next phase of fulfillment
2. Which report feature is described by the following? Clicking on a report section displays a subset of the report's data in a new report.
- Drilldown
- Sharing
- On-demand report
- Widget
- Dashboard
3. Which of the following are part of the Common Services Data Model (CSDM)? Select 3 Answers from the below options.
- Base system CMDB core tables
- Guidance on service modelling
- A process or implementation guide for ITSM, SPM, APM, EM or other products
- Best practice for CMDB data modelling and data management
- An automatic fix for past implementations
4. Who is able to contribute if no User Criteria is specified for 'Can Contribute' in a Knowledge Base?
- Knowledge Base Managers
- User Criteria Admins
- No one
- All users
5. What deployment permissions can be assigned to a group or user for a specific application when using Manage Developers? Select 3 Answers from the below options.
- Manage update Set
- Flow Designer
- Upgrade App
- Publish to App store
- Integrations
6. Which of the following are possible outcomes when coalescing detects a match between a record in the staging table and a record in the target table? Select 2 Answers from the below options.
- Create duplicate records
- Keep the record already in the target table
- Halt the import and ask the user what to do
- Stop the import and delete the previously imported records
- Overwrite the records in the target with the source data
7. Which incident field is used to predict the Configuration Item and Service fields' value via Predictive Intelligence solution definitions?
- Subcategory
- Category
- Description
- Short description
8. What does each column in the list interface correspond to?
- A property
- An attribute
- A field
- A table
9. Which of the following are true statements about Data Policies? Select 3 Answers from the below options.
- Data Policies are dependent on how a record is updated
- Data Policies are script-free, server-side application files.
- Data Policies have a condition as part of the trigger.
- Data Policies can take different actions when the Conditions field evaluate to true or false.
10. How can one user temporarily become another user for testing purposes?
- Open the User menu and select the Elevate Roles menu ite. Select a user to impersonate.
- Select a user to impersonate with the User Picker in the banner.
- Open User Administration > User, select a user, and click the Impersonate user related link.
- Open the User menu and select the Impersonate user menu item. select a user to impersonate.
No comments:
Post a Comment