What is the purpose of a Catalog Item variable?
What is the purpose of a Catalog Item variable?A . Allows the customer to ask a questionB . Provides hint to the user on the fieldC . Opens a chat session with customer supportD . Allows the customer or consumer to qualify their answerView AnswerAnswer: D Explanation: Reference: https://docs.servicenow.com/bundle/orlando-it-service-management/page/product/service-catalogmanagement/task/t_CreateAVariableForACatalogItem.html
What tool would you use to configure the group?
In your project, the client asks for a mechanism by which a workflow can be approved by any one of a pool of people. What tool would you use to configure the group?A . Manage Permission GroupsB . Manage Dynamic RolesC . Manage Workflow RequestsD . Manage Workflow GroupsView AnswerAnswer:...
Which of the following requirements engineering techniques would you use to provide a visual representation of the system and help to see the 'overall* story with the functional flow?
You are part of an agile team creating a user story. Which of the following requirements engineering techniques would you use to provide a visual representation of the system and help to see the 'overall* story with the functional flow? SELECT ONE OPTIONA . PersonasB . Use CasesC . Story...
Which ONE of the following approaches to labelling requires the least time and effort? SELECT ONE OPTION
Which ONE of the following approaches to labelling requires the least time and effort? SELECT ONE OPTIONA . OutsourcedB . Pre-labeled datasetC . InternalD . Al-AssistedView AnswerAnswer: B Explanation: Labelling Approaches: Among the options provided, pre-labeled datasets require the least time and effort because the data has already been labeled,...
Which security standard is most commonly used to secure external API connections in IBM App Connect?
Which security standard is most commonly used to secure external API connections in IBM App Connect?A . AES-256 EncryptionB . SSL/TLSC . RSA EncryptionD . Token-based AuthenticationView AnswerAnswer: B
Which statistical method is commonly used in forecasting based on historical data?
Which statistical method is commonly used in forecasting based on historical data?A . Regression analysisB . Simple data aggregationC . Data normalizationD . Inferential statisticsView AnswerAnswer: A Explanation: Regression analysis is frequently employed for forecasting based on historical data, predicting future trends based on past patterns.
Which malicious activity is NOT typically associated with cyber attacks?
Which malicious activity is NOT typically associated with cyber attacks?A . PhishingB . MalwareC . Data encryptionD . Denial of Service (DoS)View AnswerAnswer: C Explanation: Data encryption is a security measure used to protect data from unauthorized access. While encryption can be utilized by cyber attackers to make stolen data...
What should you do?
You are using Deployment Manager to create a Google Kubernetes Engine cluster. Using the same Deployment Manager deployment, you also want to create a DaemonSet in the kube-system namespace of the cluster. You want a solution that uses the fewest possible services. What should you do?A . Add the cluster’s...
Where would a Snowflake user find information about query activity from 90 days ago?
Where would a Snowflake user find information about query activity from 90 days ago?A . account__usage. query history viewB . account__usage.query__history__archive ViewC . information__schema. cruery_history viewD . information__schema - query history_by_ses s i on viewView AnswerAnswer: B Explanation: To find information about query activity from 90 days ago, a Snowflake...
What is the most likely reason for this issue?
A backup administrator has enabled the Retention Lock feature on their PowerProtect DD appliance. Over time, the administrator noticed an increase in file system utilization. Upon further investigation, the administrator discovered expired files are still present on the appliance. What is the most likely reason for this issue?A . The...