Table Access Control rules are processed in the following order:
A.
any table name (wildcard), parent table name, table name
B.
table name, parent table name, any table name (wildcard)
C.
parent table name, table name, any table name (wildcard)
D.
any table name (wildcard), table name, parent table name
A group is stored in which table?
A.
Group[user group]
B.
Group[sys_user]
C.
Group[sys_user_group]
D.
Group[sys_user_group_profile]
What resource can you use to view details of the tables and configuration items (CIs) associated with a particular use case?
A.
Scenario Dashboard
B.
CI Use Case Modeler
C.
CMDB Use Case Modeler
E.
Common Service Data Model (CSDM) product view
After finishing your work on High Security Settings, what do you do to return to normaladmin security levels?
A.
Select Normal role
B.
Log out and back in
C.
Use System Administration > Normal Security module
D.
Select Global Update Set
E.
End Impersonation
Which of the following is used to initiate a flow?
A.
A Trigger
B.
Core Action
C.
A spoke
D.
An Event
Page 5 out of 49 Pages |
Previous |