(Which permissions can Administrators give to Delegated Developers? Choose 2 options.)
Delegated Development is intended to let administrators grant controlled development permissions to non-admin developers for a specific scoped application. Within that model, admins can allow delegated developers to work on application artifacts and administration tasks that are still limited to the application scope. One of the permitted areas is managing security artifacts, which includes creating and maintaining Access Controls (ACLs) and related security configuration for the application's tables and resources. That aligns directly to option C. Administrators can also grant the permission to delete the scoped application, which aligns to option D and is treated as a high-impact capability that is explicitly controlled by delegated development permissions. By contrast, option A is not valid because delegated development is for scoped applications and does not grant authority to develop or deploy global applications. Option B is not a delegated development permission category; coalesce configuration is part of import/set-up behavior and is not represented as a delegated developer permission in the application development permission set.
As administrator, what must you do to access features of High Security Settings?
Which database operations can be controlled with Access Control?
Choose 2 answers
In ServiceNow, Access Controls (ACLs) are used to manage permissions for various database operations on tables and their records. The primary operations that can be controlled include:
Create:
Description: Permission to insert new records into a table.
Control: ACLs can be defined to allow or deny users the ability to create records based on roles, conditions, or scripts.
Update:
Description: Permission to modify existing records in a table.
Control: ACLs can restrict who can update records, ensuring that only authorized users can make changes.
Other Operations:
Read: Controls the ability to view records in a table.
Delete: Manages the permission to remove records from a table.
Incorrect Options:
Execute: Not a standard database operation controlled by ACLs in ServiceNow.
Query: While querying is part of the read operation, ACLs specifically control the read access rather than the query process itself.
When debugging Email Notifications, what must you check on a user record?
Choose 2 answers
Ensuring that users receive email notifications in ServiceNow requires verifying specific attributes on the user record:
A . The Email field must have a valid value: This is correct. The Email field should contain a valid email address, as notifications are sent to the address specified in this field.
B . The user must not be locked out: While it's important for user access, being locked out does not directly impact the sending of email notifications.
C . The First name and Last name fields must have values: These fields are for identification purposes and do not affect email notification delivery.
D . Active must be true: This is correct. Only active users are eligible to receive email notifications. If a user is marked as inactive, notifications will not be sent to them.
E . Delegation must be enabled: Delegation pertains to assigning responsibilities to another user and does not influence the receipt of email notifications.
For effective email notification delivery, always ensure that the user's Email field contains a valid address and that the Active field is set to true.
For Application Access there is a configuration option called Allow access to this table via web services. Which one of the following statements is true when this option is selected?
Application Access is a feature that allows you to control the access level of other application scopes to your application's data tables. By selecting the Allow access to this table via web services option, you can enable other application scopes to access your data tables using web services, such as SOAP or REST. However, the user performing the query via web services must have the correct permissions to access the table's records. The user must have the appropriate roles and access controls to perform the operations on the table, such as create, read, write, or delete.
The other statements are not true when this option is selected. This option does not restrict the ability to delete records via web services, nor does it allow records to be always read. The access to the records depends on the user's permissions and the web service method. This option also does not restrict access only to SOAP web services, but applies to both SOAP and REST web services. Finally, this option is not the only way to enable web service access to the table's records. Even when this option is not selected, users with the correct permissions can use web services to access the table's records, as long as they specify the application scope in the web service request.
Application Access
Web service access to scoped applications
Amos
3 days agoJoesph
12 days agoChantay
19 days agoReuben
27 days agoRutha
1 month agoJillian
1 month agoTenesha
2 months agoDorcas
2 months agoTequila
2 months agoSharika
2 months agoJanet
3 months agoRossana
3 months agoGerman
3 months agoSherell
3 months agoBette
4 months agoEdna
4 months agoOcie
4 months agoRocco
4 months agoMarilynn
5 months agoMurray
5 months agoAngelyn
5 months agoWeldon
5 months agoNancey
6 months agoKimbery
6 months agoReiko
8 months agoEileen
9 months agoCoral
10 months agoDaniel
11 months agoCherelle
1 year agoRene
1 year agoMurray
1 year agoEzekiel
1 year agoDoretha
1 year agoRene
1 year agoJerry
1 year agoViva
1 year agoMargurite
1 year agoElfriede
1 year agoJonell
1 year agoBrandee
1 year agoOna
1 year agoBeata
1 year agoSimona
1 year agoCecily
1 year agoTresa
2 years agoRemona
2 years agoVeronika
2 years agoParis
2 years agoValentin
2 years agoMarva
2 years agoKayleigh
2 years ago