SNOW CSA - Database
|
|
Title of test:
![]() SNOW CSA - Database Description: Certified System Administrator (CSA) - Database |



| New Comment |
|---|
NO RECORDS |
|
What is Configuration Item (CI)?. nformation that further describes a CI such as a name, serial number, or operating system. Components of an infrastructure required to deliver a product or service. A database used to store configuration records throughout their lifecycle. A set of tools and databases that are used to manage an organizations configuration data. ServiceNow can import data from which of the following external data source types when a valid transform map is available? Select 3 Answers from the below options. CSV. JSON. REST. LDAP. OIDC. Which of the following is the customer's responsibility under the Shared Responsibility Model?. Authentication and authorisation. Backup restoration. Disaster recovery. Infrastructure management. Which Security Center feature allows you to view, compare and update compliance scores?. Customer Actions. Scanner. Metrics. Hardening. What related list can you use to extend and track the different types of groups assigned to a Configuration Item?. Resource Group. CMDB Alert Groups. Dynamic CI Group. Teams. What access control rules are created by default when creating a custom table? Select 4 Answers from the below options. Delete. Write. Create. Access. Read. Archive. Which of the following is an example of a base table that is extended but is not extending another table?. Business Service [cmdb_ci_service]. Task [task]. Incident [incident]. Change Request [change_request]. Which of the following is a true statement about importing data into ServiceNow?. Every Transform Map must have at least one coalesce field. Every application has one staging table. Every date field has to be mapped. Every staging table can be used once. Every import must have at least one Transform Map. Which CMDB feature tracks the activities and history of data sources as they insert and update Cl attributes? Select 2 Answers from the below options. Multisource CMDB. CI Class Manager. CMDB CI Lifecycle Management. CMDB Data Manager. CMDB 360. Which tool do you use to determine the relationship between fields in an import set and an existing table?. Target Table. Coalesce. Import Set. Transform map. What CMDB table stores the basic attributes of all the configuration items?. Configuration File [cmdb_ci_config_file]. CI Relationship [cmdb_rel_ci]. Base Configuration Item [cmdb]. Configuration Item [cmdb_ci]. Which of the following describes the relationship between the Problem and the Task tables?. The Problem table is a parent of the Task table. The Problem table extends the Task table. The Problem table is a remote table for the Task table. The Problem table is referenced in the Task table. The Problem table has a many-to-many relationship with the Task table. The Problem table is a database view of the Task table. What are the different Schema relationship types that are supported for tables? Select 4 Answers from the below options. Extending. Referencing. Extended by. Depended by. Referenced by. Depending. There is a business requirement to restrict incident reporting to specific roles for better governance. The Development team decided to add a new access control (ACL) so that only those roles can view the contents of the reports on the incident table. What access control operation should they use to allow this access on the incident table?. execute. read. report_view. add_to_list. report_on. Which admin role is required to modify access control rules?. admin. security_admin. metric_admin. business_rule_admin. itil_admin. u_acl_admin. What CMDB Workspace feature lets you visualise the hierarchical map of CIs and the relationships between them while centred on a CI that you choose?. 360° Relationship Visualization. Unified Map. Schema Map. Service Mapping. Visualization Designer. Access Control List (ACL) rules allow you to specify the decision type, rule type and operation that defines them. What are the two decision types in ACL rules? Select 2 Answers from the below options. Restrict Access. Deny Unless. Deny Always. Allow If. Allow Once. The CMDB is the authoritative source of what information? Select 3 Answers from the below options. Server log files. Owner. Support group. Contact. Contents of all server and application configuration files. |




