UPDATED ACTUAL Exam Questions and
CORRECT Answers
Deploy Stage - CORRECT ANSWER - Occurs after core system setup, Release Planning,
and Sprint Planning are complete:
Product Owner - CORRECT ANSWER - Who continually refines and prioritizes the
Product Backlog so that those with the highest importance may be prioritized for selection in
next Sprint?
Planning Meeting - CORRECT ANSWER - Occurs at the beginning of each Sprint;
addresses the "what" (stories) and "how" (stories assigned and tasks verified):
Sprint Review - CORRECT ANSWER - Occurs at the end of each Sprint; where Scrum
Team demonstrates completed products to stakeholders:
Sprint Retrospective - CORRECT ANSWER - Following Sprint Review, this meeting
focuses on continuous improvement for the team:
Product Backlog - CORRECT ANSWER - Output of the Requirements Workshop;
consists of Stories prioritized by Product Owner:
Sprint Backlog - CORRECT ANSWER - Output of Sprint Planning meeting; stories are
selected for each Sprint and the team determines the approach for accomplishing work:
Sprint - CORRECT ANSWER - Timeboxed period in which work is conducted (2 week
length is recommended; typically run from 2-4 weeks):
Potentially Shippable Product - CORRECT ANSWER - Should be produced at the end of
each Sprint that can enter the testing and training phase of the Operate stage:
, Burndown Chart - CORRECT ANSWER - Graphical representation of remaining work in
the Sprint Backlog; updated every time a story is complete:
Velocity - CORRECT ANSWER - Speed at which points are completed
TRUE - CORRECT ANSWER - Users, other than admins cannot read, write, create or
delete unless ACLs are in place allowing those actions: (T/F)
TRUE - CORRECT ANSWER - One option for securing cloud software is to restrict and
allow access based on IP Address during login authentication: (T/F)
FALSE - CORRECT ANSWER - Encryption is unavailable in the ServiceNow security
model: (T/F)
Contextual Security - CORRECT ANSWER - Protects a record based on its contents and
table location; Data is acted upon based on the position of the information in the table; Defines
Access Control rules to any level in the object hierarchy; Uses roles to implement Access
Controls and assign permissions:
TRUE - CORRECT ANSWER - Roles are used to assign permissions: (T/F)
FALSE - CORRECT ANSWER - Access Controls are not a feature of contextual security:
(T/F)
FALSE - CORRECT ANSWER - Global "*.*" (field level Access Control) for read, write,
create, delete, and other operations is set to allow access to all tables: (T/F)
CRUD - CORRECT ANSWER - Term for Create, Read, Update and Delete operations on
a table: