ServiceNow Application Developer Certification (CAD) Exam (Verified content) 2022-2023.
Application - A collection of files and data that deliver a
... [Show More] service and manage business processes
Application Scope - Protects applications by identifying and restricting access to application files and data
Private - By default, all custom applications have a ________ scope that uniquely identifies them and their associated artifact with a namespace identifier
Global Scope - Special application scope that identifies applications developed prior to application scoping or applications intended to be accessible to all other global applications
Global Scope - ________ applications can bypass scope protections, allowing them to:
-Read records
-Run API requests
-Create Configuration records
False - True//False: Assume an application scope, sn_my_app, exists. Scripts from other application scopes can never delete records from tables in the sn_my_app scope.
All application scope, This application scope - The application Access settings for a table are:
True - True//False: An application owns its tables and determine whether other application can access resources from them
DO NOT - Developers DO/DO NOT create application file records directly from the Application File table
contextual - The platform is a ____________ development environment that displays the currently selected application, identifies the scope of every application artifact, and prevent any changes that violate the access settings for an application
Application Access Settings - ____________________ is similar to ACLs in that it allow you to restrict access to certain resources, but instead of restricting tables and records from users - they restrict application resources from other applications
Runtime Access tracking - -Allows administrators to manage script access to application resources be creating a list of script operations and targets that the system authorizes to run
-Options: None, Tracking, Enforcing
Cross-scope privilege record - -Runtime access tracking uses __________________________ to determine which script operations and targets the system allows to run
-System creates this when: Runtime Tracking is set to "Tracking" or "Enforcing"
Script API, Web Services - Runtime access points
Application List - Allows application developers to view and select applications
Application Picker - Allows application developers to view and select the application where their changes apply
False - True//False: Removing a field from a form using the Form Designer deletes the field from the database table. [Show Less]