Professional Certification Exam For CSA System Administrator

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Pippo
P
Pippo
Community Contributor
Quizzes Created: 1 | Total Attempts: 11,145
Questions: 60 | Attempts: 11,161

SettingsSettingsSettings
Professional Certification Exam For CSA System Administrator - Quiz

Do you want to be a System Administrator? Take this informative " Professional Certification Exam For CSA System Administrator " and see for yourself if you have what it takes to be an excellent administrator. A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. If you have an upcoming test then this quiz is perfect to text your basics. Good Luck!


Questions and Answers
  • 1. 

    Where is a customer’s ServiceNow data stored?

    • A.

      Customer data center

    • B.

      ServiceNow data center

    • C.

      User’s computer

    • D.

      Amazon data center

    Correct Answer
    B. ServiceNow data center
    Explanation
    ServiceNow is a cloud-based platform that provides various services to its customers. As a result, the customer's ServiceNow data is stored in ServiceNow's data center. This ensures that the data is securely stored and accessible to the customer whenever they need it. Storing the data in ServiceNow's data center also allows for efficient management and maintenance of the data, ensuring its integrity and availability.

    Rate this question:

  • 2. 

    What is the purpose of a transform map?

    • A.

      Map a user’s groups and roles

    • B.

      Record changes to an instance

    • C.

      Map data from a source table to a target table

    • D.

      None of the above

    Correct Answer
    C. Map data from a source table to a target table
    Explanation
    A transform map is used to map data from a source table to a target table. It allows for the transformation and manipulation of data during the import process, ensuring that the data is correctly mapped and aligned with the target table's structure and fields. This helps in maintaining data integrity and consistency across different tables and systems.

    Rate this question:

  • 3. 

    Which role(s) gives users the ability to make changes to just about any part of the system?

    • A.

      Itil & admin

    • B.

      Admin_all & security

    • C.

      Admin

    • D.

      Admin & security_admin

    Correct Answer
    D. Admin & security_admin
    Explanation
    The correct answer is admin & security_admin. These roles provide users with the ability to make changes to just about any part of the system. The "admin" role allows users to have administrative privileges and control over various system functions, while the "security_admin" role grants users additional permissions related to system security. Together, these roles give users the highest level of access and authority to modify and manage the system.

    Rate this question:

  • 4. 

    A UI action runs on the ____.

    • A.

      Server side

    • B.

      User session

    • C.

      Client & server side

    • D.

      Data center side

    Correct Answer
    C. Client & server side
    Explanation
    A UI action runs on both the client and server side. This means that the action is processed both on the user's device (client side) and on the server. This allows for a more interactive and responsive user experience, as some actions can be handled locally on the client side without requiring a server round-trip, while others may require server-side processing for data retrieval or manipulation. By running on both sides, UI actions can provide a seamless and efficient user interface.

    Rate this question:

  • 5. 

    Administrators can add customizations to the server side by writing Java in business rules.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Administrators cannot add customizations to the server side by writing Java in business rules. The statement is false because business rules are typically written in a specific language or framework provided by the server, and Java is not commonly used for this purpose.

    Rate this question:

  • 6. 

    The ____ role is assigned to users who supervise a group of helpdesk technicians, providing them with access to delete incidents, problems, changes, and other related records.

    • A.

      Itil

    • B.

      Itil_admin

    • C.

      Admin

    • D.

      Security_admin

    Correct Answer
    B. Itil_admin
    Explanation
    The correct answer is "itil_admin" because this role is specifically assigned to users who supervise a group of helpdesk technicians. They are given access to delete incidents, problems, changes, and other related records, indicating their administrative authority over these processes. This role aligns with the ITIL framework, which is a widely recognized set of best practices for IT service management.

    Rate this question:

  • 7. 

    Workflows consist of many ____, which can be notifications, approvals, tasks or a number of other processes.

    • A.

      Activities

    • B.

      Processes

    • C.

      Scheduled jobs

    • D.

      Workers

    Correct Answer
    A. Activities
    Explanation
    Workflows are composed of various components, such as notifications, approvals, tasks, and other processes. These components are referred to as "activities" within the context of workflows. They represent the different steps or actions that need to be performed in order to complete the workflow successfully. Therefore, the correct answer is "Activities."

    Rate this question:

  • 8. 

    If you are experiencing performance issues, a good place to check is the…

    • A.

      Performance analytics application

    • B.

      Slow Queries module

    • C.

      User account sessions

    • D.

      Upgrade monitor

    Correct Answer
    B. Slow Queries module
    Explanation
    The Slow Queries module is a good place to check for performance issues because it specifically focuses on identifying and analyzing slow queries in the system. Slow queries can significantly impact the overall performance of an application or system, so monitoring and optimizing them is crucial. By using the Slow Queries module, developers or administrators can identify which queries are taking longer to execute and then take necessary actions to optimize them, such as adding indexes or rewriting the queries. This helps improve the overall performance and efficiency of the system.

    Rate this question:

  • 9. 

    If you are given requirements to make a field readonly once the record is marked closed , what should you use?

    • A.

      Business rule

    • B.

      Client script

    • C.

      Script include

    • D.

      UI policy

    Correct Answer
    D. UI policy
    Explanation
    UI policy should be used to make a field readonly once the record is marked closed. UI policies are used to dynamically change the behavior of fields on a form based on certain conditions. In this case, when the record is marked closed, the UI policy can be configured to make the field readonly, preventing any further modifications to it. This ensures that the field remains unchanged and maintains its integrity once the record is closed.

    Rate this question:

  • 10. 

    What is the ServiceNow HI portal?

    • A.

      A communication application

    • B.

      A portal for maintaining ServiceNow instances and environments

    • C.

      The out-of-thebox employee self-service portal

    • D.

      None of the above

    Correct Answer
    B. A portal for maintaining ServiceNow instances and environments
    Explanation
    The ServiceNow HI portal is a platform designed for maintaining ServiceNow instances and environments. It serves as a portal where users can manage and monitor their ServiceNow instances, perform administrative tasks, and make necessary changes or updates to the system. It provides a centralized hub for managing the ServiceNow platform and ensuring its smooth operation. It is not a communication application or an out-of-the-box employee self-service portal.

    Rate this question:

  • 11. 

    Personalizing a form requires the admin role.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Personalizing a form does not necessarily require the admin role. It can be done by any user who has the necessary permissions to customize and modify the form according to their preferences. The admin role may have additional privileges and access to certain advanced customization options, but it is not a requirement for personalizing a form. Hence, the correct answer is false.

    Rate this question:

  • 12. 

    The ____ feature allows admins to access ServiceNow as if they were another user.

    • A.

      Security admin

    • B.

      Impersonate

    • C.

      Clone

    • D.

      None of the above

    Correct Answer
    B. Impersonate
    Explanation
    The "Impersonate" feature allows admins to access ServiceNow as if they were another user. This feature is useful for troubleshooting issues or investigating user-specific problems, as it allows admins to see the system from the user's perspective and replicate their actions. By impersonating a user, admins can accurately assess and resolve any issues that the user may be facing, without needing to rely on second-hand information or screenshots. This feature enhances the efficiency and effectiveness of the admin's support and troubleshooting capabilities within the ServiceNow platform.

    Rate this question:

  • 13. 

    An SLA definition has the following conditions: start, pause, stop, and ____.

    • A.

      Reset

    • B.

      Redo

    • C.

      Execute

    • D.

      End

    Correct Answer
    A. Reset
    Explanation
    An SLA definition has the following conditions: start, pause, stop, and reset. Resetting refers to the action of returning the SLA to its initial state or restarting it. This allows for the SLA to be reevaluated and recalibrated if necessary.

    Rate this question:

  • 14. 

    A role is a record in the ____ table.

    • A.

      Sys_role

    • B.

      Roles

    • C.

      Sys_user_role

    • D.

      Sys_user

    Correct Answer
    C. Sys_user_role
    Explanation
    A role is a record in the sys_user_role table. This table is likely used to store information about roles assigned to users in a system. By having a separate table for roles, it allows for better organization and management of user roles within the system.

    Rate this question:

  • 15. 

    Roles may contain 1 or more access control rules.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because roles in access control systems are designed to define a set of permissions or access rights that can be assigned to users. These permissions are typically defined through access control rules, which specify what actions a user with a specific role can perform on certain resources. Since roles can have multiple rules, it allows for more granular control over access privileges and ensures that different users have appropriate levels of access based on their assigned role.

    Rate this question:

  • 16. 

    The sys_dictionary table stores information about ____.

    • A.

      Dictionaries for each language in the system

    • B.

      Information about users and groups

    • C.

      System statistics

    • D.

      Table and field properties

    Correct Answer
    D. Table and field properties
    Explanation
    The sys_dictionary table stores information about table and field properties in the system. This includes details such as the name, label, data type, length, and other properties of tables and fields in the system. It is used by the system to define and manage the structure and properties of tables and fields, allowing for efficient data management and customization within the system.

    Rate this question:

  • 17. 

    Which application is available to all users?

    • A.

      Incident

    • B.

      Employee profile

    • C.

      Selfservice

    • D.

      None

    Correct Answer
    C. Selfservice
    Explanation
    Selfservice is the correct answer because it is an application that is available to all users. This application allows users to access and manage their own information and perform various tasks without the need for assistance from IT or administrative staff. It provides users with the ability to update their personal details, view their pay stubs, request time off, and perform other self-service functions.

    Rate this question:

  • 18. 

    What is the purpose of an order guide?

    • A.

      Provide multiple catalog items into a bundle

    • B.

      Provide logic in the workflow of a catalog item

    • C.

      Provide services in the ServiceNow HI portal

    • D.

      An automated wizard for ordering hardware or software

    Correct Answer
    A. Provide multiple catalog items into a bundle
    Explanation
    The purpose of an order guide is to provide multiple catalog items into a bundle. This allows users to select and order multiple items at once, simplifying the ordering process and ensuring that all necessary items are included in the order. By bundling multiple catalog items together, users can easily navigate through the ordering process and ensure that they have everything they need in one transaction.

    Rate this question:

  • 19. 

    All of the following are added to an update set except for:

    • A.

      New fields

    • B.

      Field properties

    • C.

      Workflows

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    An update set is used to capture and move changes made in one instance of ServiceNow to another. It includes new fields, field properties, and workflows, along with other configuration changes. Therefore, the correct answer is "None of the above" as all of these items are added to an update set.

    Rate this question:

  • 20. 

    Which of the following is not a field type in ServiceNow?

    • A.

      String

    • B.

      Boolean

    • C.

      Selector Bucket

    • D.

      HTML

    Correct Answer
    C. Selector Bucket
    Explanation
    The question asks for a field type that is not present in ServiceNow. The first three options, String, Boolean, and HTML, are all valid field types in ServiceNow. However, Selector Bucket is not a valid field type in ServiceNow.

    Rate this question:

  • 21. 

    Which of the following is possible via an inbound action?

    • A.

      Schedule a job

    • B.

      Sends an email notification

    • C.

      Modifying existing records

    • D.

      Impersonate users

    Correct Answer
    B. Sends an email notification
    Explanation
    An inbound action allows for sending an email notification. Inbound actions are triggered by external events and can be used to automate processes within a system. Sending an email notification is a common use case for inbound actions, as it allows for automated communication with users or stakeholders. Other actions listed, such as scheduling a job, modifying existing records, or impersonating users, typically require different types of actions or permissions within a system.

    Rate this question:

  • 22. 

    ACL is part of which security?

    • A.

      Physical Security

    • B.

      Contextual Security

    • C.

      Compliance Security

    • D.

      ServiceNow Security

    Correct Answer
    B. Contextual Security
    Explanation
    ACL stands for Access Control List, which is a mechanism used to control access to resources in a computer system. It is a part of Contextual Security, which focuses on controlling access to different resources based on the context or situation. Contextual Security ensures that users have the appropriate level of access based on factors such as their role, location, time of day, and other contextual information. ACLs are commonly used in network security to control access to networks, devices, or specific files and folders. They help enforce security policies and prevent unauthorized access to sensitive information.

    Rate this question:

  • 23. 

    Which of the following is data saved to?

    • A.

      Table

    • B.

      Form

    • C.

      List

    • D.

      Record

    Correct Answer
    A. Table
    Explanation
    Data is typically saved to a table in a database. A table is a structured collection of data organized into rows and columns. Each row represents a record, and each column represents a specific attribute or field of that record. By saving data to a table, it becomes easier to organize, retrieve, and manipulate the information in a structured and efficient manner.

    Rate this question:

  • 24. 

    If the system administrator wants to modify the homepage, which of the following links on the page indicates that this can be done

    • A.

      Add Context

    • B.

      Change Layout

    • C.

      Make Gauge

    • D.

      Modify Homepage

    Correct Answer
    B. Change Layout
    Explanation
    The link "Change Layout" indicates that the system administrator can modify the homepage. This suggests that the administrator has the ability to customize the layout of the page according to their preferences or requirements. By clicking on this link, they can make changes to the overall design and arrangement of the elements on the homepage.

    Rate this question:

  • 25. 

    What are the main structures used in ServiceNow?

    • A.

      Table, schedules, forms

    • B.

      Table, forms, data

    • C.

      Table, forms, homepages

    • D.

      Tables, forms, views

    Correct Answer
    B. Table, forms, data
    Explanation
    ServiceNow is a platform that allows organizations to manage their services and processes. The main structures used in ServiceNow are tables, forms, and data. Tables are used to store and organize data, forms provide a user-friendly interface for entering and viewing data, and data refers to the information that is stored and manipulated within the platform. These structures are essential for effectively managing and utilizing the features and functionalities of ServiceNow.

    Rate this question:

  • 26. 

    Which of the following is true:

    • A.

      When moved from left to right slush bucket, ref fields become bold

    • B.

      System tables cannot be deleted

    • C.

      Deleted system tables will be created again during an instance upgrade

    • D.

      Custom table cannot be deleted permanently

    Correct Answer
    B. System tables cannot be deleted
    Explanation
    System tables cannot be deleted because they are essential for the functioning of the system. These tables contain important information and metadata that is used by the system to manage and organize data. Deleting system tables can cause the system to malfunction or become unstable. Therefore, it is not possible to delete system tables.

    Rate this question:

  • 27. 

    ACL is applied on:

    • A.

      User

    • B.

      Groups

    • C.

      Applications/modules

    • D.

      Table and field in table

    Correct Answer
    D. Table and field in table
    Explanation
    ACL (Access Control List) is a security measure that determines who can access certain resources or perform specific actions. In this case, the correct answer is "table and field in table" because ACL can be applied to control access to specific tables and their fields within a database. By applying ACL to tables and fields, organizations can restrict or grant access to sensitive data, ensuring that only authorized individuals or groups can view, modify, or delete the information stored in those tables and fields.

    Rate this question:

  • 28. 

    How will you approve a catalog request?

    • A.

      Right click request record in request list and click approve

    • B.

      Right click task record in task list and click approve

    • C.

      Right click list in task list and click approve

    • D.

      Left click task record in task list and click approve

    Correct Answer
    A. Right click request record in request list and click approve
    Explanation
    To approve a catalog request, the correct method is to right-click on the request record in the request list and select the "approve" option. This action can be performed directly on the request record, and it is the appropriate way to indicate approval for the catalog request.

    Rate this question:

  • 29. 

    For an incident form, when it is saved, what happens?  

    • A.

      Additional comments get copied to work notes

    • B.

      Work notes get copied to activity log

    • C.

      Work notes get overwritten

    • D.

      Acitivity log get copied to work notes

    Correct Answer
    B. Work notes get copied to activity log
    Explanation
    When an incident form is saved, the work notes are copied to the activity log. This means that any additional comments or information that was added in the work notes section will be transferred and recorded in the activity log. This allows for a comprehensive record of the incident and any updates or actions taken to be easily accessible and tracked in the activity log.

    Rate this question:

  • 30. 

    Which one on homepage will access knowledge?

    • A.

      News

    • B.

      Catalog item

    • C.

      Report

    • D.

      Service catalog

    Correct Answer
    A. News
    Explanation
    The correct answer is "news" because news articles typically contain information or updates on various topics, which can help users access knowledge and stay informed about current events or specific subjects of interest.

    Rate this question:

  • 31. 

    Data inconsistency correction is done from automated?

    • A.

      Plugin

    • B.

      Configurations

    • C.

      Workflow

    • D.

      None of these

    Correct Answer
    A. Plugin
    Explanation
    Data inconsistency correction is typically done through the use of plugins. Plugins are software components that can be added to an existing system to enhance its functionality. In the context of data inconsistency correction, plugins can be used to automate the process of identifying and resolving inconsistencies in the data. These plugins can perform tasks such as data validation, data cleansing, and data synchronization, ensuring that the data remains consistent and accurate. Therefore, the correct answer is Plugin.

    Rate this question:

  • 32. 

    Upgrade of instance, which is true?

    • A.

      As an SN Admin, you will manually do it

    • B.

      It happens once in a year at 8 pm

    • C.

      Customizations are lost?

    • D.

      Cancel all data record

    Correct Answer
    A. As an SN Admin, you will manually do it
  • 33. 

    Which of the following are form feature field status indicators?

    • A.

      Light red - Required field that has a saved value

    • B.

      Green- modified field content

    • C.

      Red - Required field that requires a value

    • D.

      Orange - Read only data that is not editable

    Correct Answer
    C. Red - Required field that requires a value
    Explanation
    The correct answer is Red - Required field that requires a value. This indicator is used to highlight a field that is mandatory and needs to be filled out by the user. It signifies that the user cannot proceed without providing a value in that field.

    Rate this question:

  • 34. 

    The application navigator provides links to all applications and modules they comprise.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The application navigator is a feature that provides links to all applications and modules within a system. It allows users to easily navigate and access different parts of the system without having to search for them individually. This statement is true because the application navigator does indeed provide links to all applications and modules.

    Rate this question:

  • 35. 

    Type filter text is a valuable way of searching applications in ServiceNow

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that the "type filter text" is a valuable method for searching applications in ServiceNow. This implies that using the "type filter text" can help users effectively find and locate specific applications within the ServiceNow platform. Therefore, the correct answer is "True" as it supports the usefulness of the "type filter text" for searching applications.

    Rate this question:

  • 36. 

    An order generates a request?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An order typically generates a request because when someone places an order, they are requesting a product or service from a seller. The act of ordering is essentially making a request for something to be provided. Therefore, it is true that an order generates a request.

    Rate this question:

  • 37. 

    The order field establishes the sequence for displaying the variables?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The order field determines the sequence in which the variables are displayed. This means that the variables will be shown in the order specified by the order field. If the order field is not used or left blank, the variables may be displayed in a random or default order. Therefore, the statement "The order field establishes the sequence for displaying the variables" is true.

    Rate this question:

  • 38. 

    A variable Set is a modular unit of variables that can be shared between catalog items?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A variable set is a collection or group of variables that can be utilized and accessed by multiple catalog items. This allows for the sharing and reusability of variables across different items, promoting modularity and efficiency in managing and organizing variables. Therefore, the statement that a variable set is a modular unit of variables that can be shared between catalog items is true.

    Rate this question:

  • 39. 

    An update set is a "point in time" XML snapshot of the record?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An update set is a "point in time" XML snapshot of the record because it captures the changes made to a record at a specific moment. It allows users to track and manage changes, and can be used to transfer updates between instances. By creating a snapshot of the record, users can easily revert back to a previous state if needed. Therefore, the statement is true.

    Rate this question:

  • 40. 

    It is best practice to never make changes to an update set in the Default update set?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is best practice to never make changes to an update set in the Default update set because the Default update set is a system-defined update set that should only be used for capturing changes made outside of update sets. Making changes directly in the Default update set can lead to confusion and potential conflicts when merging update sets. It is recommended to create a new update set for making changes and keep the Default update set clean for better organization and easier management of changes.

    Rate this question:

  • 41. 

    After created, do you have to delete update sets?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Update sets in ServiceNow are not required to be deleted after they are created. Update sets are a way to package and move customizations between instances, and they can be kept for reference or future use. However, it is recommended to clean up and delete unnecessary update sets to maintain a clean and organized instance. So, the correct answer is False.

    Rate this question:

  • 42. 

    You don't need to checkout workflows before they can be edited

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "You don't need to checkout workflows before they can be edited" is incorrect. In most cases, workflows need to be checked out before they can be edited. This is a common practice in many software development environments to ensure that only one person is making changes to a workflow at a time to avoid conflicts and maintain version control. By checking out a workflow, it becomes locked for editing by other users until it is checked back in. Therefore, the correct answer is False.

    Rate this question:

  • 43. 

    To make a new or edited workflow available to all users, it needs to be published.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When a new or edited workflow is created, it needs to be published in order to make it available to all users. Publishing the workflow means that it is made accessible and visible to all users who have the necessary permissions. Without publishing, the workflow will only be visible to the creator or a limited group of users. Therefore, the statement "To make a new or edited workflow available to all users, it needs to be published" is true.

    Rate this question:

  • 44. 

    All Workflows doesn't have an end

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because all workflows do have an end. A workflow is a series of tasks or steps that are performed in a specific order to achieve a desired outcome. Once all the tasks or steps in a workflow have been completed, the workflow comes to an end. Without an end, the workflow would continue indefinitely, which is not practical or efficient. Therefore, it is incorrect to say that all workflows do not have an end.

    Rate this question:

  • 45. 

    A workflow can have multiple layers of approval

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A workflow can have multiple layers of approval because in many organizations, there are multiple levels of management or decision-making authority. Each layer may have different individuals or teams responsible for reviewing and approving the workflow. This allows for a thorough and comprehensive evaluation of the work being done, ensuring that it meets all necessary requirements and standards before progressing to the next stage. Having multiple layers of approval can also help distribute the workload and prevent bottlenecks in the workflow process.

    Rate this question:

  • 46. 

    Which of the following thing is true while solving incidents as per ITIL framework ?

    • A.

      Incident Urgency is based on Impact & Priority

    • B.

      Incident Impact is calculated on the basis of Urgency & Priority

    • C.

      Incident Priority is filled by the user

    • D.

      Incident Priority is calculated on the basis of Impact & Urgency

    Correct Answer
    D. Incident Priority is calculated on the basis of Impact & Urgency
    Explanation
    The correct answer is that incident priority is calculated on the basis of impact and urgency. In ITIL framework, incident priority is determined by assessing the impact of the incident on the business and the urgency of resolving it. Impact refers to the extent of disruption or damage caused by the incident, while urgency refers to the time sensitivity of resolving the incident. By considering both factors, the appropriate priority level can be assigned to ensure that incidents are addressed in the most efficient and effective manner.

    Rate this question:

  • 47. 

    Which of the following option is an example of UI Policy ?

    • A.

      Increasing width of field

    • B.

      Creating a new field on form

    • C.

      To make priority field mandatory

    • D.

      None of these

    Correct Answer
    C. To make priority field mandatory
    Explanation
    An example of a UI Policy is to make the priority field mandatory. This means that when a user is filling out a form, they will be required to select a priority level for the task or item. This UI Policy helps to ensure that important tasks or items are not overlooked or forgotten, as the user is forced to assign a priority level. This can help with organization and task management.

    Rate this question:

  • 48. 

    Where Pause condition in SLA can be used ?

    • A.

      It can be put on any desired field

    • B.

      When putting Pending State

    • C.

      When putting Resolved State

    • D.

      When putting Closed State

    Correct Answer
    A. It can be put on any desired field
    Explanation
    The correct answer states that the Pause condition in SLA can be used on any desired field. This means that the Pause condition can be applied to any specific field within the SLA, allowing for flexibility and customization based on the specific requirements and needs of the situation. This provides the user with the ability to pause or halt the SLA based on specific conditions or criteria within the chosen field.

    Rate this question:

  • 49. 

    When you click on create an incident, reset an password, report an outage, where does it take you?

    • A.

      Catalog property

    • B.

      Service Requests

    • C.

      Order Guides

    • D.

      Record Producers

    Correct Answer
    D. Record Producers
    Explanation
    Clicking on "create an incident, reset a password, report an outage" would take you to the Record Producers. Record Producers are a type of catalog item in ServiceNow that allows users to create or modify records in a specific table. They provide a form interface for users to enter information and create records based on predefined templates or workflows. In this case, clicking on any of those options would trigger a Record Producer that is designed to handle incidents, password resets, or outage reports.

    Rate this question:

  • 50. 

    What is the use of Script Includes in Service Now?

    • A.

      It is used as same as client script

    • B.

      Script Includes is not there in Service Now

    • C.

      The scripts that are used again & again are maintained in Script Includes so that it can be called any time in the required scripts

    • D.

      Call the Business Rule

    Correct Answer
    C. The scripts that are used again & again are maintained in Script Includes so that it can be called any time in the required scripts
    Explanation
    Script Includes in ServiceNow are used to store reusable scripts that can be called from other scripts. By maintaining commonly used scripts in Script Includes, developers can avoid duplicating code and improve code reusability. These scripts can be called anytime and from any required scripts, making it efficient and easy to manage.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 29, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 19, 2018
    Quiz Created by
    Pippo
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.