New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is used frequently to move customizations from one instance to another?

A.

Update Sets

B.

Code Sets

C.

Update Packs

D.

Configuration Logs

E.

Remote Sets

F.

Local Sets

G.

Code Packs

A new Service Desk employee in Latin America complains that the create dates and times are incorrect on their Incident list. What would you suggest to fix this issue?

A.

Have them clear their cache.

B.

Have them use the gear icon to set the employee’s time zone.

C.

Recommend they use Chrome, instead of Explorer.

D.

Use the system properties to correct the instance’s time zone.

E.

Have them correct the time zone on their computer.

What needs to be specified, when creating a Business Rule? (Choose four.)

A.

UI action

B.

Table

C.

Fields to update

D.

Who can run

E.

Script to run

F.

Application scope

G.

Update set

Which certificate-based authentication methods can be enabled so that users can log into the Service Portal? (Select all that apply) Select 2 Answers from the below options

A.

Extended Validation Access (EVA)

B.

Organization Verification Card (OVC)

C.

Common Access Card (CAC)

D.

Domain Authentication Card (DAC)

E.

Personal Identify Verification (PIV)

Your company is giving all first line workers a special T-shirt as a recognition for their hard work. Management team wants a way for employees to order the T-shirt, with the ability to specify the preferred size and color. How would you ensure that only first line workers (non-managers) can submit the order?

A.

Create Record Producer and use the Available For list to specify First Line [sn_first_line] role

B.

Create Catalog Item and use the Not Available list to specify the Manager Group

C.

Create Catalog Item and use the Available For list to specify ITIL [itil] role

D.

Create Order Guide and use the User Criteria list to specify First Line [sn_first_line] role

What are three security modules often used by the System Administrator? (Choose three.)

A.

System Properties > Security

B.

Utilities > Migrate Security

C.

System Security > Security

D.

Self-Service > My Access

E.

System Security > Access Control (ACL)

F.

Password Management > Security Questions

G.

System Security > High Security Settings

Which of the following protects applications by identifying and restricting access to available files and data?

A.

Application Configuration

B.

Verbose Log

C.

Access Control Rules

D.

Application Scope

Which of the following is used to categorize, flag, and locate records?

A.

Search

B.

Favorites

C.

Tags

D.

Bookmarks

Which of the following statements describes how data is organized in a table?

A.

A column is a field in the database and a record is one user

B.

A column is one field and a record is one row

C.

A column is one field and a record is one column

D.

A column contains data from one user and a record is one set of fields

The ServiceNow Virtual Agent provides assistance within a messaging interface. Which capability allows end users to configure virtual Agent to intercept and help resolve submitted incidents?

A.

Incident Auto-Resolution

B.

Ticket Resolver

C.

Virtual Agent Helper

D.

Web Intelligence