ServiceNow CTA ServiceNow Certified Technical Architect Exam Practice Test

Page: 1 / 14
Total 47 questions
Question 1

When advising on release and instance management, what should be considered as key governance factors?

Choose 3 answers



Answer : B, C, E

Key governance factors for release and instance management include:

B . Operating model and development approach: Define the organization's approach to development (e.g., Agile, Waterfall), release cycles, and how different teams collaborate on the platform.

C . Platform scope and deployed applications: Clearly define the scope of the ServiceNow platform within the organization and the applications that will be deployed. This helps with planning and resource allocation.

E . Number and purpose of instance environments: Establish a clear instance strategy, including the number of instances (dev, test, prod, etc.), their purpose, and how they are used to support development and deployment processes.

Why not the other options?

A . Release performance and instance usage analytics: While these are important for monitoring and optimization, they are not primary governance factors.

D . Day-to-day instance performance metrics: These are operational metrics, not directly related to governance decisions.


Question 2

What type of testing requires human observation to measure how user-friendly, efficient, or convenient the software or product is for end-users?



Answer : B

Usability testing is the type of testing that relies on human observation to assess the user-friendliness of a software product.

In usability testing:

Real users interact with the software or product in a realistic setting.

Observers watch and record user behavior, noting any difficulties, frustrations, or areas of confusion.

Feedback is gathered from users to understand their experiences and identify areas for improvement.

Why not the other options?

A . Smoke testing: A quick, preliminary test to ensure basic functionality is working.

C . Integration testing: Tests the interaction between different modules or components of a system.

D . System testing: Tests the entire system as a whole.


Question 3

What components constitute the application layer security within ServiceNow?

Choose 3 answers



Answer : A, C, E

Application layer security in ServiceNow focuses on protecting data and functionality within the ServiceNow application itself. The following components contribute to this:

A . Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring users to provide multiple forms of authentication (e.g., password, security token, biometric verification) to access the application.

C . Access Control Lists (ACLs): ACLs define which users or roles have permission to access, modify, or delete specific data and functionality within the application.

E . IP address access control: While technically a network layer control, IP address access control is often implemented and managed within the ServiceNow application. It restricts access to the instance based on IP address ranges.

Why not the other options?

B . Platform Encryption (PE): This is a broader encryption solution that protects data at rest across the platform, not specifically at the application layer.

D . Full Disk Encryption (FDE): This encrypts the entire hard drive of the server where the ServiceNow instance is hosted, providing protection at the infrastructure level, not the application layer.


Question 4

What does the ServiceNow Security Center's daily compliance score indicate in ServiceNow?



Answer : C

The ServiceNow Security Center's daily compliance score represents the security compliance percentage of the ServiceNow instance. It provides an overall measure of how well your instance adheres to defined security policies and best practices.

The score is calculated based on various factors, including:

Vulnerability Management: The number of identified vulnerabilities and their severity.

Configuration Compliance: How well the instance configuration aligns with security standards.

User Access Controls: The effectiveness of user access management and authentication.

Security Incident Management: The handling and resolution of security incidents.


Question 5

Which type of testing is best suited for scenarios requiring repeated execution of tasks over a long period of time?



Answer : A

Automated testing is ideal for scenarios involving repetitive tasks over extended periods. Here's why:

Efficiency: Automated tests can execute tasks much faster than humans.

Consistency: Automated tests perform the same steps precisely every time, eliminating human error.

Endurance: Automated tests can run continuously for long durations without fatigue.

Regression Testing: Automated tests are excellent for regression testing, repeatedly checking that existing functionality hasn't been broken by new changes.

Why not the other options?

B . Usability testing: Focuses on user experience and requires human observation.

C . Ad hoc testing: Informal, unplanned testing without specific test cases.

D . Manual testing: Performed by humans, which can be time-consuming and prone to errors for repetitive tasks.


Question 6

Why is IP address access control considered part of the network layer despite being implemented in the application layer?



Answer : C

IP address access control is considered part of the network layer because it restricts access to the instance based on IP address ranges.

Here's why:

Network Layer Functionality: IP address filtering operates at the network level by controlling which IP addresses are allowed to connect to the ServiceNow instance. This is similar to firewall rules that control network traffic.

Application Layer Implementation: While the filtering might be implemented within the ServiceNow application (application layer), the underlying functionality is related to network access control.

Why not the other options?

A . It performs data tokenization and substitution for security: This is a data security technique, not related to network layer access control.

B . It uses encryption to protect data at rest in the ServiceNow instance: This is a data security measure, not network access control.

D . It manages user authentication to the ServiceNow platform: Authentication is a separate security layer (usually application layer) that verifies user identities.


Question 7

What does a ServiceNow governance framework typically define?

Choose 3 answers



Answer : A, B, C

A ServiceNow governance framework provides structure and guidance for managing the platform and its applications. It typically defines:

A . How decisions are made: The framework outlines the processes for making decisions related to the platform, such as changes to configurations, new application development, and platform upgrades. This might include approval processes, escalation procedures, and communication protocols.

B . What decisions need to be made: The framework identifies the types of decisions that require governance oversight. This might include decisions about platform strategy, architecture, security, data management, and integration with other systems.

C . Who is involved in decision-making: The framework establishes roles and responsibilities for different stakeholders in the governance process. This might include defining a governance board, steering committees, and individual roles with specific decision-making authority.

Why not the other options?

D: While recurring schedules for governance meetings are important, they are not a defining element of the governance framework itself. The framework focuses on the overall structure and processes for decision-making.

E: How work gets done on the platform is more related to process definitions and workflows within specific applications, not the overarching governance framework.


Page:    1 / 14   
Total 47 questions