Which one of the following is NOT a method used for logging messages in a server-side script for a privately- scoped application?
Which one of the following is NOT a method used for logging messages in a server-side script for a privately- scoped application?A . gs.log() B. gs.error() C. gs.warn() D. gs.debug()View AnswerAnswer: A Explanation: gs.print() and gs.log() are older and not available in scoped applications, whereas gs.debug(), gs.info(), gs.warn(), gs.error() work...
Access Control debug information identification whether each element of an Access Control granted of denied access. The elements of an Access Control evaluated?
Access Control debug information identification whether each element of an Access Control granted of denied access. The elements of an Access Control evaluated?A . Conditions, Script, Roles B. Script, Conditions, Roles C. Conditions, Roles, Script D. Roles, Conditions, ScriptView AnswerAnswer: C
In which order are the elements of an Access Control evaluated?
Access Control debug information identifies whether each element of an Access Control granted or denied access. The elements appear in the debug information in the order of evaluation. In which order are the elements of an Access Control evaluated?A . Conditions, Roles, Script B. Conditions, Script, Roles C. Roles, Conditions,...
A scoped application containing Flow Designer content dedicated to a particular application is called a(n):
A scoped application containing Flow Designer content dedicated to a particular application is called a(n):A . Spoke B. Bundle C. Action D. FlowView AnswerAnswer: A Explanation: https://docs.servicenow.com/bundle/paris-servicenow-platform/page/administer/flow-designer/concept/spokes.html A spoke is a scoped application containing Flow Designer content dedicated to a particular application or record type. Flow Designer provides a set...
What is a Module?
What is a Module?A . The functionality within an application menu such as opening a page in the content frame or a separate tab or window B. A group of menus, or pages, providing related information and functionality to end-users C. A way of helping users quickly access information and...
The task table is an example of which of the following? Choose 2 answers
The task table is an example of which of the following? Choose 2 answersA . Legacy class B. Child class C. Base class D. Parent classView AnswerAnswer: C,D Explanation: "A table that extends another table is called a child class, and the table it extends is the parent class" -...
Which of the following is NOT a caller access field option?
Which of the following is NOT a caller access field option?A . Caller Tracking B. Caller Restriction C. None D. Caller PermissionView AnswerAnswer: D Explanation: https://docs.servicenow.com/bundle/tokyo-application-development/page/build/applications/task/set-RCA-level.html
What records are used to track cross-scope applications or scripts that request access to an application, application resource, or event?
What records are used to track cross-scope applications or scripts that request access to an application, application resource, or event?A . Restricted caller access records B. Caller tracking records C. Access control level records D. Cross-scope access recordsView AnswerAnswer: A Explanation: "Restricted caller access [sys_restricted_caller_access] records track cross-scope applications or...
When configuring an Access Control which has no condition or script, which one of the following statements is NOT true?
When configuring an Access Control which has no condition or script, which one of the following statements is NOT true?A . table.*will grant access to every field in a record B. table.None will grant access to every record on the table C. table.field will grant access to a specific field...
How can an application link to a repository behind a firewall?
How can an application link to a repository behind a firewall?A . This option is not supported. B. Link an application to source control through a MID Server. C. Link an application to source control through an access token. D. Link an application to source control with multi-factor authentication.View AnswerAnswer:...