CAD Topic 2
QUESTION NO: 21
Which roles grant access to source control repository operations such as importing applications from source control, or linking an application to source control? (Choose two.)
A. source_control
B. source_control_admin
C. admin
D. git_admin
Answer: A,C
QUESTION NO: 22
When configuring the content of an Email Notification, which syntax should be used to reference the properties of an event triggering the Notification?
A. ${event.
B. ${current.
C. ${
D. ${gs.
Answer: C
QUESTION NO: 23
Which one of the following is true for a Script Include with a Protection Policy value of Protected?
A. Any user with the protected_edit role can see and edit the Script Include
B. The Protection policy option can only be enabled by a user with the admin role
C. The Protection Policy is applied only if the glide.app.apply_protection system property value is true
D. The Protection Policy is applied only if the application is downloaded from the ServiceNow App Store
Answer: B
Explanation:
QUESTION NO: 24
Which one of the following is true for GlideUser (g_user) methods?
A. Can be used in Client Scripts and UI Policies only
B. Can be used in Business Rules only
C. Can be used in Client Scripts, UI Policies, and UI Actions
D. Can be used in Business Rules, and Scripts Includes
Answer: C
QUESTION NO: 25
When configuring a module, what does the Override application menu roles configuration option do?
A. Users with the module role but without access to the application menu access the module
B. Self-Service users can access the module even though they do not have roles
C. Admin is given access to the module even if Access Controls would ordinarily prevent access
D. Users with access to the application menu can see the module even if they don’t have the module role
Answer: D
QUESTION NO: 26
Which platform feature can be used to determine the relationships between field in an Import Set table to fields in an existing ServiceNow table?
A. Business Service Management Map
B. Data Sources
C. Transform Map
D. CI Relationship Builder
Answer: C
QUESTION NO: 27
When configuring a REST Message, the Endpoint is:
A. The commands to the REST script to stop execution
B. The URI of the data to be accessed, queried, or modified
C. Information about the format of the returned data
D. The response from the provider indicating there is no data to send back
Answer: B
QUESTION NO: 28
When evaluating Access Controls, ServiceNow searches and evaluates:
A. Only for matches on the current table
B. Only for matches on the current field
C. From the most specific match to the most generic match
D. From the most generic match to the most specific match
Answer: A
Explanation:
QUESTION NO: 29
In a Business Rule, which one of the following returns true if the currently logged in user has the admin role?
A. g_form.hasRoleExactly(‘admin’)
B. gs.hasRole(‘admin’)
C. g_form.hasRole(‘admin’)
D. gs.hasRoleExactly(‘admin’)
Answer: C
Explanation:
QUESTION NO: 30
From the list below, identify one reason an application might NOT be a good fit with ServiceNow.
The application:
A. Needs workflow to manage processes
B. Requires “as-is” use of low-level programming libraries
C. Requires reporting capabilities
D. Uses forms extensively to interact with data
Answer: B
Explanation:
QUESTION NO: 31
Identify the incorrect statement about Delegated Development in ServiceNow.
A. Administrators can grant non-admin users the ability to develop global applications.
B. Administrators can specify which application file types the developer can access.
C. Administrators can grant the developer access to script fields.
D. Administrators can grant the developer access to security records.
Answer: B
QUESTION NO: 32
One of the uses of the ServiceNow REST API Explorer is:
A. Practice using REST to interact with public data providers
B. Find resources on the web for learning about REST
C. Convert SOAP Message functions to REST methods
D. Create sample code for sending REST requests to ServiceNow
Answer: D
QUESTION NO: 33
Which one of the following is true regarding Application Scope?
A. All applications are automatically part of the Global scope
B. Applications downloaded from 3rd party ServiceNow application developers cannot have naming conflicts
C. Any developer can edit any application
D. Developers can choose the prefix for a scope’s namespace
Answer: D
Explanation:
QUESTION NO: 34
Which one of the following is the baseline behavior of a table in a privately-scoped application?
A. The table and its data are not accessible using web services
B. Any Business Rule can read, write, delete, and update from the table
C. Only artifacts in the table’s application can read from the table
D. All application scopes can read from the table
Answer: D
Explanation:
QUESTION NO: 35
Which one of the following is NOT a purpose of application scoping?
A. Provide a relationship between application artifacts
B. Provide a way of tracking the user who developed an application
C. Provide a namespace (prefix and scope name) to prevent cross application name collisions
D. Provide controls for how scripts from another scope can alter tables in a scoped application
Answer: D
Explanation:
QUESTION NO: 36
It is best practice to define the business requirements and the process(es) an application will manage as part of the application development plan. What are some of the considerations to document as part of the business process?
A. Business problem, data input/output, users/stakeholders, and process steps
B. Business problem, data input/output, project schedule, and process steps
C. Business problem, data input/output, users/stakeholders, and database capacity
D. Business problem, users/stakeholders, available licenses, and database capacity
Answer: A
Explanation:
QUESTION NO: 37
Which of the following statements does NOT apply when extending an existing table?
A. The parent table’s Access Controls are evaluated when determining access to the new table’s records and fields
B. The new table inherits the functionality built into the parent table
C. The new table inherits all of the fields from the parent table
D. You must script and configure all required behaviors
Answer: B
QUESTION NO: 38
Which of the following CANNOT be debugged using the Field Watcher?
A. Business Rules
B. Script Includes
C. Client Scripts
D. Access Controls
Answer: B
QUESTION NO: 39
Which objects can be used in Inbound Action scripts?
A. current and previous
B. current and email
C. current and event
D. current and producer
Answer: C
Explanation:
QUESTION NO: 40
Which one of the following is part of the client-side scripting API?
A. workflow.scratchpad
B. GlideUser object (g_user)
C. current and previous objects
D. GlideSystem object (gs)
Answer: C
Explanation: