Join the discussion
Question 1/107
Security rules are defined to restrict the permission of users from viewing and interacting with dat a. What are these security rules called?
Correct Answer: C
Add Comments
- Other Question (107q)
- Q1. Security rules are defined to restrict the permission of users from viewing and interactin...
- Q2. What is the path an Administrator could take to view the fulfillment stage task list for a...
- Q3. What kind of data can Import Sets use to populate tables in ServiceNow?...
- Q4. What icon do you use to change the icon and color on a Favorite'?...
- Q5. How are local flow variables accessed in the Flow Designer Data panel?...
- Q6. How do you make a list filter available to everyone?...
- Q7. As an IT employee what interface would you use, if you wanted to browse internal IT docume...
- Q8. Which is the most efficient way to move large amounts of data between instances?...
- Q9. When moving multiple update sets at one time, what might you do to facilitate the move?...
- Q10. Which feature enables business process owners to organize Flow Designer content into unifi...
- Q11. Which of the following statements describes how data is organized in a table?...
- Q12. That access does a user need to be able to import articles to a knowledge base?...
- Q13. Which SericeNow utility gives a Service Desk agent the ability to trace from a Service hav...
- Q14. Where can Admins check which release is running on an ServiceNow instance?...
- Q15. What is a role in ServiceNow?
- Q16. What type of query allows you to filter list data using normal words, instead of the condi...
- Q17. Which tool is used for creating dependencies between configuration items in the CMDB?...
- Q18. An IT user calls the service desk because they need to work on task records. All they can ...
- Q19. What is an Event in ServiceNow?
- Q20. When a user reports that they are not able to see modules on the application navigator, wh...
- Q21. On a form header, what icon would you click to access Template features?...
- Q22. What is the difference between a UI Policy and Data Policy?...
- Q23. After finishing your work on High Security Settings, what do you do to return to normal ad...
- Q24. A REQ number in the Service Catalog represents......
- Q25. Which one of the following statements best describes the purpose of an Update Set?...
- Q26. What is the function of user impersonation?
- Q27. How are Workflows moved between instances?
- Q28. To apply a UI Policy to all views, which field should be set to true in its definition rec...
- Q29. Which type of ServiceNow script runs on the web browser?...
- Q30. On the Reports page, what sections allow you to see which reports are visible to different...
- Q31. What would you do, on a list, if you wanted to show the records in groups, based on the co...
- Q32. When working on a form, what is the difference between Insert and Update operations?...
- Q33. There are _____ common types of Interfaces (Numeric Value) 6: There are six common types o...
- Q34. Which application is used primarily to load data into ServiceNow?...
- Q35. What attributes can you manage, using System Properties > Basic Configuration UI16? (Ch...
- Q36. A department manager asks an analyst to build some reports. Where do you recommend the ana...
- Q37. What types of entities can receive task assignments, in ServiceNow? Choose 2 answers...
- Q38. Which one of the following statements describes the purpose of a Service Catalog flow?...
- Q39. Which of the following is true of Service Catalog Items in relation to the Service Catalog...
- Q40. Which statement correctly describes the differences between a Client Script and a Business...
- Q41. When building an extended table from a base table, which fields do you need to create? Cho...
- Q42. Which of the following protects applications by identifying and restricting access to avai...
- Q43. Which one of the following statements is true about Column Context Menus?...
- Q44. Which of the following statements is true when a new table is created by extending another...
- Q45. When importing spreadsheet data into ServiceNow, what is the first step in the process?...
- Q46. What are three security modules often used by the System Administrator? (Choose three.)...
- Q47. Tables may have a One to Many relationships. From the Service Catalog, what are examples o...
- Q48. What is the name of the conversational bot platform that provides assistance to help users...
- Q49. On a Business Rule, the When setting determines at what point the rule executes. What are ...
- Q50. You are looking at a list of Active incidents. You want to exclude incidents with the stat...
- Q51. The wait time for end users is based on the round-trip between the client and the server. ...
- Q52. When testing a catalog item, having a manager approval flows, which of these best practice...
- Q53. Your customer requires that they be able to monitor which users are performing impersonati...
- Q54. What displays a set of records from a table?
- Q55. What do you need to do before you can use an Application-based trigger in your flow?...
- Q56. As administrator, what must you do to access feature of High Security Settings?...
- Q57. What needs to be specified, when creating a Business Rule? (Choose four.)...
- Q58. What is a schema map?
- Q59. What type of field allows you to look up values from one other table?...
- Q60. Your company is giving all first line workers a special T-shirt as a recognition for their...
- Q61. What is used to determine user access to knowledge bases or a knowledge article?...
- Q62. What is the result of the order in which access controls are evaluated?...
- Q63. What Service Catalog feature do you use to organize items into logical groups?...
- Q64. Two departments (HR Onboarding and Facilities) have come to you, asking for a way for empl...
- Q65. Which one of the following statements describes a characteristic of role assignment?...
- Q66. Your customer would like to create a new template to notify users who are affected by netw...
- Q67. What ServiceNow feature can be triggered by events, and is used to inform users about acti...
- Q68. The ServiceNow platform includes which types of interfaces? (Choose three.)...
- Q69. While on an Incident record, how would you add a Tag for "Special Handling" to the record?...
- Q70. One related list, which buttons are commonly used for managing the records on the list? Ch...
- Q71. What section on the notes tab, shows the history of the work documented on the record?...
- Q72. Which one of the following modules can be used to view field settings for a table?...
- Q73. Which type of interface enables you to display multiple performance analytics, reporting a...
- Q74. What capability allows users to create dashboards with widgets to visualize data over time...
- Q75. Which feature helps to automatically allocate a critical, high priority, service request t...
- Q76. Which one statement correctly describes Access Control rule evaluation?...
- Q77. ServiceNow contains over 25 different report types. What are some of the types? Choose 5 a...
- Q78. What are the 5 provided Roles by ServiceNow?
- Q79. What are advantages of using spokes for integrations? Choose 3 answers...
- Q80. What are benefits of assigning work tasks to a group, rather than to an individual? (Choos...
- Q81. On a Form header, what is the three bar icon called?...
- Q82. Access Control rules may be defined with which of the following permission requirements? (...
- Q83. Which one of these applications is available to all users?...
- Q84. What is a Dictionary Override?
- Q85. Which section of the ServiceNow UI allows you to perform a global search?...
- Q86. Knowledge articles within a knowledge base are grouped by category....
- Q87. What is specified in an Access Control rule?
- Q88. Which is the base table of the configuration management database hierarchy?...
- Q89. What is the name of the string that display filter criteria?...
- Q90. Which certificate-based authentication methods can be enabled so that users can log into t...
- Q91. Access Control rules may provide access security for which of the following database objec...
- Q92. The display sequence is controlled in a Service Catalog Item using which of the following?...
- Q93. When adding a related list to a form, you choose the related list from the list callector,...
- Q94. Which tool should be used to populate commonly used fields in a form?...
- Q95. What defines conditions that are evaluated against users to determine which users can crea...
- Q96. Data Policy can enforce mandatory data on import....
- Q97. Which framework can automatically populate values for the priority and Category field base...
- Q98. Here is an example of the criteria set for a knowledge base: * Companies: ACME North Ameri...
- Q99. What are the three key tables in an enterprise CMDB? Choose 3 answers....
- Q100. What is a formatter? Select one of the following....
- Q101. What Is the purpose of the Fitter navigator In the Application Navigator?...
- Q102. A Service Catalog may include which of the following components?...
- Q103. _______________ is a computer program running as a service; a physical computer dedicated ...
- Q104. What is the difference between a Ul Policy and Data Policy?...
- Q105. Which testing framework is used to test ServerNew Applications?...
- Q106. What defines conditions that are evaluated against users to determine which users can crea...
- Q107. What is the purpose of flagging an article in a knowledge base?...
