75% found this document useful (4 votes)
1K views12 pages

CSA Sample Questions

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 12

1. UI policy execute on Client side.

2. UI policy can be used to set fields on a form to ? provide 3 options


Ans:- Mandatory/ Optional
Hidden/Visible
Read only/Editable

3. When merging multiple update sets, if several update sets have modified the same
object the Most Recent Change will be the one moved to new, merged update set.

4. What steps are involved in migrating update set?


Ans:-make as complete, retrieve, Preview and Commit

5. ServiceNow Studio provides an IDE like interface for application developers to create
custom applications.

6. In ACL definition permissions required to access an object is defined using which of the
following 3
a. Roles
b. Scripts
c. Business rules
d. Client scripts
e. Conditional expressions
f. groups
Ans:-Roles, Scripts & Conditional Expressions.

8. What role is needed to create / modify ACLs ?


Ans:-Security_admin

9. What is not a type of Visual Task Board?


a. Featured
b. FreeForm
c. Guided form
d. Flexible

10. Event is an indication that certain conditions have occurred in the system ?

11. Metric is used to measure and evaluate the effectiveness of ITSM Processes

12. Base(Task) table is extended, but itself is not extended from another table.

13. Which utility in transform map automatically map the fields between source and target table
based on the name?Ans:-Automatic Mapping Utility.

14. ____ is a collection of permissions used to grant access to applications and other parts of the
platform. Ans: Role

Sensitivity: Internal & Restricted


15. What are 3 parts of Filter condition ? Ans : field, operator, value

16. What content types are not tracked in history ? ANS: UI pages

17. Templates allow fields to be populated automatically, simplifying the process of submitting
records ?

18. When personalizing a form, can mandatory fields be hidden ? Yes / No Ans:-no

19. Tables that exist in base system are called ____ tables ? Ans : Core tables

20. When importing a knowledge article via word document what property needs to be modified
to show the publish checkbox ? Ans : activate the show publish checkbox

21. ______ is a conversational bot platform that provides assistance to help users obtain
information, make decisions and perform common work tasks ? Ans : virtual agent

22. Provide count of the major components of Service Catalog ? Ans : 6(items,variables,variable
sets, record producers, order guide, flow)

23. ____ provide ability to order multiple, related items as one request ? order guide

24. ____ is interface used as alternative to list and forms ? Ans : record producer

25. What is scope if variables by default ? Ans : global

26. Service catalog variables are global by default.

27. For catalog item what records get created when an order is placed ? Ans : Request

28. Which module is used to add, update or remove catalog items ? Ans : Maintain item

29. What is attached to catalog item and determine the fulfillment process ? Ans : Flow

30. Service catalog allows users to attach variables either to a catalog item or ___ ? Ans :
Record producers

31. For catalog item what records get created when an order is placed ? Ans : Request,
requested item, catalog task

32. ___ number is generated to keep track of an order and is stored in ____ table ? Ans : REQ,
sc_request

33. Knowledge articles are browsed and searched by ( choose3)


a. Relevancy

Sensitivity: Internal & Restricted


b. Popularity
c. Number of views
d. Most recently updated
e. manager assignment

34. What should you consider when exporting a report to PDF and sharing the exported file ? Ans
: >Instruction may be obsolete or >Access control is not entered on Exported data.

35. Each Access Control rule specifies the permissions required to access the Object – Ans :
Roles Conditional
Expressions Scripts

36. A user must pass what ACL rules to access a record object ?
Ans : Both table and field ACL rules

37. What is the best practice before importing data Ans : Remove obsolete data

38. A _______ is a rule that enforces data consistency by setting fields as mandatory and/or read
only Ans : Data Policy

39. Data policy are applied to ? Ans : All data entered into the platform; form (UI), Import Sets,
or web Services.

40. Which module is used as the first step for importing data? Ans : Load Data

41. When does knowledge article gets available ? Ans : when article is published

42. ____________ appear as simplified forms, allowing users to provide information that is
translated into task-based records being added or modified in the database Ans : Record
Producer

43. What is attached to a catalog item and determines the fulfillment process? Ans : Workflow
or Flow Designer Flow

44. Which script runs when a record is displayed, inserted, updated, deleted, or when a table is
queried? Ans : Business Rule

45. What types of records are not captured in an update set ? Ans : Data records

46. ________ are the building blocks of the Service Catalog, including hardware, software,
services Ans : Item

47. Difference between UI policy and data policy Ans : UI policy works on the form, when the
form is loaded.. at the browser level whereas data policy works outside the form too, on
the server side

Sensitivity: Internal & Restricted


48. What is stored in the Event Registration table? Ans : a.
Event definition
b. Event records

49. Options in user menu Ans : profile,impersonate user,elevate roles

50. Service catalog home page Ans : categories, catalog items, record producers, order guides

51. What feature provides ability to change the default values, field dependencies or read-only
status of a field in a child class ? Ans: UI actions

52. The CMDB is a series of: Ans : Tables and fields

53. What are the types of Service Processes using CMDB? Ans : Request, Change, Problem,
Incident

54. Components of CMDB : Ans : Service Process, CI Relationship Editor, Dependency View

55. What is the other role apart from admin to add and remove columns from a list or change
the order in which the column appears in the list for all users.
a. Personalize_ list
b. security _ admin

55. Difference between form configuration and form personalization


a. Configure is for all users and personalization is for one user only
b. Configure is for one user and personalization is for one user
c. Configure and personalization is for all users
d. Configure is for one user and personalization is for all user

56. For object and operations to be secure reasons, user used elevated roles for which of the
following?
a. Access control list
b. SLA

57. What is at the start of the flow?


a. Triggers
b. Actions

58. When is Knowledge articles visible to all users


a. Retired
b. Checkout
c. Published
d. Approved

59. Access controls are evaluated in following order :


a. Table, Parent table, Wildcard(*)
b. parent table, table, wildcard(*)

Sensitivity: Internal & Restricted


c. Wildcard (*), parent table, table
d. Table, Wildcard (*), parent table.

60. Formatter
Ans: Formatter is an element used to display information that is not a field in the record.

61. Dictionary Override


Ans: Provide the ability to define a field on an extended table differently from the field
on the parent table

62. What can be done using column context menu?


Ans: Creating quick report, configuring the list and exporting the data

63. Coalesce field


Ans:If a match is found using the coalesce field(s), the existing record will be updated
with the information being imported.

64. Display sequence of service catalog


Ans : Order field in the variable form

65. In application form menus and modules which user want to access quickly or often?
a. Breadscrum
b. Tag
c. Favorite
d. Bookmark

66. What is import set table?


Ans: A staging area for imported records

67. ACL Evaluation


Ans:If a row level and field level rule exist, both rules must be true before an operation
is allowed

68. Button, Form links, Context menu items are


Ans: UI action

69. Purpose of updateset


Ans: updateset is a group of customizations that can be moved from one instance of
ServiceNow to another.

70. User authentication methods


a. SSO
b. LDAP
c. FTOP authentication
d. XML feed
e. Local DataBase

Sensitivity: Internal & Restricted


71. What is true when new table is created by extending another table
Ans: It contains fields of parent table & new fields unique to itself.

72. ___ allows a field value to be edited in a list without opening the record
Ans: List editor

73. Characteristics of importing data in ServiceNow


Ans: An existing transform map can be used multiple times on the same import set

74. REQ number represents___


Ans: The order number

75. Create incident, password reset, report outage. What do these services in service catalog
have in common?
Ans: They direct the user to record producer

76. CMDB
Ans: Tangible and intangible business assets

77. Purpose of service catalog flow?


Ans: Drive complex fulfillment process and send notification to define users and groups

78. Concepts are associated with ServiceNow CMDB?


a. Dependency view
b. Service processes
c. Tables and fields
d. A database
e. User permissions

79. What can be accessible when we use elevate privilege


Ans: ACL rules can be created or modified

80. Variable types addes in service catalog item


Ans: Multiple choice, selectbox, checkbox

81. Recommendation about updateset


Ans: Avoid using the default update set as current and for moving customizations
between instances.

82. Workflows moved between instance?


Ans: Moved using updateset

83. Which term best describes something that is created, has work performed upon it, and is
eventually moved to a state of closed?

Sensitivity: Internal & Restricted


a. Task
b. Flows
c. Report
d. Event

84. Purpose of related list


Ans: Present related records

85. What is true about Business rule


Ans: can be a piece of javascript

86. Event log and event registry


Ans: Event definitions are in event registry,
event log has log of every generated event

87. Schema map


Ans: Provides graphical representation of other table related to a specific table

88. What configurations can be done in Basic configuration UI16?(select 3)


a. Browser tab title
b. system date format
c. form header size
d. record number format
e. banner image

89. Where we can check the version of instance


Ans: Stats module

90. User impersonation?


Ans: Testing and visibility

91. System dictionary


Ans: Definition for each table and column

92. When searching using application navigator serach field, what can be returned?(select 4
options)
a. Names of modules
b. Favorite
c. Title of dashboard gadges
d. History record
e. Names of application and modules
f. Names of application

93. ___ is messaging tool that lets you work with others in real time
Ans: connect chat

Sensitivity: Internal & Restricted


94. Service catalog items in relation service catalog?
Ans: They are building blocks

95. Service catalog homepage contain links to which of the following components?
Ans: Record producer, order guides, catalog items

96. Dot walking


Ans: gathers information from series of tables through reference fields.

97. Tables may be extended by other table, but do not extend another table
Ans: Base

98. How do you generate report?


Ans: View/Run, List column heading

99. When using the load data and transform map process, what is mapping assist used for?
Ans: Mapping fields using field map

ServiceNow Questions and Answer (Jan 2019)

1. A group is represented by a record in which table?

a. Sys_group

b.
b. Sys_user_group

c. Group

d. Sys_user

2. Global search is present in which part of the Interface?

a. Application navigator

b.Banner Frame

c. Content Frame

d. Column header search


3. What is present on the system settings (gear) icon of the servicenow UI?(choose 4)

a.

Sensitivity: Internal & Restricted


a. Forms

b. Lists

c. Views

d. Developer

e. Notifications

4. What is true about the roles?

a. A role can be assigned to a user

b. Role may contain other roles, role is assigned to a group and, all the users in the group
inherit all the roles within that role

c. You can delete roles assigned to a group from a user record

5. What is true about the row and columns?

a. Each row is a record and each column is one field

6. What is used to categorise, flag and locate records?

a. Bookmarks

b. Filter

c. Tags

d. breadcrumbs

7. Difference between form configuration and form personalization

A. Configure is for all users and personalization is for one user only

B. Configure is for one user and personalization is for one user

C. Configure and personalization is for all users

D. Configure is for one user and personalization is for all users

8. When is Submit button visible on the form?

a. When a new record is inserted

b. When an old record is inserted

c. When a record is updated

d. When a record is saved

Sensitivity: Internal & Restricted


9. Difference between Save button and Insert button?

a. Save button saves and stays on the form, insert will insert record and exits the form

b. Save button saves and exits the form,insert will insert and exits the form

c. Save button saves and stays on the form, insert will save and stays on the form

d. Save and insert button both saves and stays on the form

10. Events are generated by (any two)?

a. Business Rules

b. Workflows

c. Log entry

d. Knowledge article publication

11. What is notification?

a. A tool for alerting users when events that concern them have occurred

12. What is dictionary?

a. It is used to store the definition for each and every table and field in the database

13. The incident number prefix is “INC” and requires to be changed to “IN” using?

a. Number maintenance application

14. Table named “abc” Is created by a user, how will it be saved in the application ?

a. u_abc

b. abc

c. abc_u

d. abc_l

15. When a custom table is created , system creates access control rules by default?

a. Create, read, upload, delete

b. Create, read, write, delete

c. Create, rate, write ,delete

d. Create, rate, update, delete

16. What are the datasources from which the date is imported to?

Sensitivity: Internal & Restricted


a. XML,pdf,txt

b. XML,excel,csv

17. Catalog items are

a. They are optional

b. They provide options

c. They are building blocks of service catalog

18. Common variable types in service catalogare:

a. Number list,single line text,reference

b. True/false,checkbox,numberlist
c. Multiple choice,select box,checkbox

d. Multiple choice, true/false,checkbox

19. What is generated when an order is placed for a catalog item?

a. REQ,RITM,SCTASK

b. RITM,Number,REQ

20. Expand the flow designer solutions to integrate with the external instances and third party
applications with subscription to Integration Hub

a. Spokes

21. How is UI policy activated on the form

a. Make active,set visible and readonly

22. New users,Groups and modified CI’s are common in

a. They are captured in an update sets

b. They are not captured in an update sets

23. What triggers an assignment rule

a. Conditions

b. Events

24. Where is the imported data stored in the ‘destination’ of serviceNow

a. Any new servicenow table

b. Only task table

Sensitivity: Internal & Restricted


c. Incident,problem and change management tables

25. What are the characteristics ofServiceNow?

A. Load-balanced

B. Single-tenant

C. Multiple database

D. Multi-tenant
E. Customizations Applications

Sensitivity: Internal & Restricted

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy