Module 7 Flashcards
Which modules can you use to create a new table?
Tables
Tables & Columns
Which elevated role is required to modify access control rules?
security_admin
What is a CI?
Configurable Item
Can be tangible (hardware, servers..) or intangible (services, email..)
A parent class that is not an extension of another table is called what?
Base Table (e.g. task table)
In what order are access control evaluated?
Table-level: most specific to most general
Field level:most specific to most general
What are the three key tables in the CMDB?
- cmdb
- cmdb_ci
- cmdb_rel_ci
What are tables?
A collection of records in a database.
What provides a graphical representation of the relationship between tables?
Schema map
What are the key attributes of a field?
- Label
- Name
- Value
In which ways can tables relate to each other?
- One-to-many
- Many-to-many
- Database views
- Extensions
What types of one-to-many tables are there?
- Reference fields
- Glide list
- Document ID list
What type of table is the task table?
- Core
- Base
- Parent
How are called the tables that exist in the base system?
Core tables
How are called the tables that are built by admins or developers?
Custom tables
What does the namespace identifier “x_” indicate?
that the table is being created in a scoped application
Those created in the global application feature “u_”
What are scoped apps?
Sandboxes from the system at large used to minimize/prevennt damage to anything outside of their scope.
What are the security modules used my system admins?
All>System properties>Security
All>System Security>Access Control(ACL)
All>System Security>High security settings
What are the 3 types of level security. provided by serviceNow?
- User authentication/login
- Applications and modules access
- Database access
What is an access control?
a security rule defined to restrict the permissions from viewing and interacting with data
It is executed when attempting to access any SN table and can be set at row or column level
What do Access Control rules restrict?
CRUD operations
SN specific operations on tables and fields
Create, Read, Update, Delete
Can the admin role impersonate a security_admin?
No
In the base system, who has the security_admin role?
Only the default system administrator. For others that are granted the admin role, they would also need to be granted the security_admin role to be able to maintain ACLs.