Free CAD Exam Dumps

Question 11

Which one of the following is NOT a debugging strategy for client-side scripts?

Correct Answer:D
https://developer.servicenow.com/dev.do#!/learn/learning- plans/rome/new_to_servicenow/app_store_learnv2_scripting_rome_debugging_client_scri pts
The following are debugging strategies for client-side scripts, which run in the web browser and manipulate the user interface:
✑ g_form.addInfoMessage(). This is a client-side API that displays an information
message at the top of the form.
✑ Field Watcher. This is a debugging tool that displays the current and previous values of one or more fields on a form.
✑ jslog(). This is a client-side API that writes a message to the browser console. The following is not a debugging strategy for client-side scripts, but for server-side scripts, which run on the ServiceNow platform and manipulate the database:
✑ gs.log(). This is a server-side API that writes a message to the system log. References: Client-Side Scripting APIs, Debugging Client Scripts

Question 12

In a Business Rule, which one of the following returns the sys_id of the currently logged in user?

Correct Answer:D
https://docs.servicenow.com/bundle/tokyo-application- development/page/app-store/dev_portal/API_reference/glideSystemScoped/concept/c_GlideSystemScopedAPI.ht ml

Question 13

Which one of the following is the baseline behavior of a table in a privately-scoped application?

Correct Answer:D
https://docs.servicenow.com/bundle/rome-application- development/page/build/applications/concept/c_DefaultDesignAccessPermissions.html The baseline behavior of a table in a privately-scoped application is that all application scopes can read from the table. A privately-scoped application is an application that restricts write access to its tables and resources to scripts within the same scope. However, read access is allowed by default for all scopes, unless the administrator explicitly denies it using an Access Control rule. This allows for data sharing between different applications while maintaining data integrity and security. References: [Product Documentation | ServiceNow], [Advantages of Scoped Applications in ServiceNow]

Question 14

There is a basic strategy when creating a Utils Script Include. Identify the step that does not belong.

Correct Answer:A
The step that does not belong when creating a Utils Script Include is identifying the table. A Script Include is a server-side script that can contain one or more classes or functions that can be reused by other scripts. It does not depend on a specific table, but can access any table through GlideRecord or other APIs. The other steps are part of creating a Script Include class and its prototype object. References: [ServiceNow Docs - Script Includes], [ServiceNow Docs - GlideRecord API]

Question 15

Which of the following are true for reports in ServiceNow? (Choose three.)

Correct Answer:BDE
https://docs.servicenow.com/bundle/rome-platform-administration/page/administer/reference-pages/task/schedule-report.html Generate and distribute scheduled reports via email.
A report is a graphical representation of data from one or more tables in ServiceNow. The following are true for reports in ServiceNow:
✑ Can be a graphical representation of data. This is true because reports can use
various chart types, such as pie, bar, line, or gauge, to visualize data in a meaningful way.
✑ Can be run on demand by authorized users. This is true because reports can be
accessed from the Reports menu or the Report Navigator and run by users who have the appropriate roles and permissions to view the data.
✑ Can be scheduled to be run and distributed by email. This is true because reports
can be configured to run at a specific time and frequency and send the results to one or more email recipients.
The following are not true for reports in ServiceNow:
✑ Any user can see any report shared with them. This is false because users can only see reports that are shared with them if they also have access to the data source of the report. For example, a user who does not have the itil role cannot see a report based on the incident table, even if the report is shared with them.
✑ All users can generate reports on any table. This is false because users can only generate reports on tables that they have access to and that are enabled for reporting. For example, a user who does not have the admin role cannot generate reports on the sys_user table, which is the table for user
records. References: Reports, Report Security