What is the difference between UI Policy and UI Action?
What is the difference between UI Policy and UI Action?A . UI Action can make fields read-only, mandatory, or hidden. while UI Policy can make a save button visible for appropriate users.B . UI Policy can make fields read-only, mandatory, or hidden. while UI Action can make a save button...
Each knowledge bases can have unique lifecycle workflows, user criteria, category structures, and management assignments.
Each knowledge bases can have unique lifecycle workflows, user criteria, category structures, and management assignments.A . TrueB . FalseView AnswerAnswer: A
What is a schema map?
What is a schema map?A . A schema map enables administrators to define records from specific tables as trouble sources for Configuration ItemsB . A schema map graphically organizes the visual task boards for the CMDBC . A schema map graphically displays the Configuration Items that support a business serviceD...
Buttons, form links, and context menu items are all examples of what type of functionality?
Buttons, form links, and context menu items are all examples of what type of functionality?A . Business RuleB . UI ActionC . Client ScriptD . UI PolicyView AnswerAnswer: B
What is (are) best practice(s) regarding users/groups/roles? Choose 2 answers
What is (are) best practice(s) regarding users/groups/roles? Choose 2 answersA . You should never assign roles to groups.B . You should assign roles to users.C . You should assign roles to groupsD . You should add users to groupsView AnswerAnswer: CD
What are the four knowledge workflows available in the ServiceNow base instance?
What are the four knowledge workflows available in the ServiceNow base instance?A . Approval publish: Request approval from a manager of the knowledge base before moving the article it the publish stateB . Instant Publish: Immediately publishes a draft article without requiring an approvalC . Instant Retire: Immediately retires a...
Which one statement correctly describes Access Control rule evaluation?
Which one statement correctly describes Access Control rule evaluation?A . Rules are evaluated using roles. The role with the most permissions evaluates the rules firstB . If more than one rule applies to a row, the older rule is evaluated firstC . If a row level rule and a field...
What is the function of user impersonation?
What is the function of user impersonation?A . Testing and visibilityB . Activate verbose loggingC . View custom perspectivesD . Unlock Application master listView AnswerAnswer: A
What is the Import Set Table?
What is the Import Set Table?A . A table where data will be placed, post-transformationB . A table that determines relationshipsC . A staging area for imported recordsD . A repository for Update Set informationView AnswerAnswer: C
Which configuration allows you to use a script to coalesce data in Import Sets?
Which configuration allows you to use a script to coalesce data in Import Sets?A . Multiple-field coalesceB . No coalesceC . Conditional coalesceD . Single-field coalesceView AnswerAnswer: C