Month End Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ServiceNow CTA ServiceNowCertified Technical Architect (CTA) Exam Practice Test

Page: 1 / 5
Total 47 questions

ServiceNowCertified Technical Architect (CTA) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which encryption solution would ensure that customer credit card numbers were encrypted before being stored in the cloud and would allow for easy administration of encryption keys?

Options:

A.

Edge Encryption

B.

Server-side Encryption

C.

Client-side Encryption

D.

Database Encryption

Question 2

What should be included in the go-live planning to handle and manage potential risks?

Options:

A.

A list of key performance metrics to track the performance.

B.

A back-out plan and mitigation plan for unforeseen circumstances.

C.

A detailed communication plan for all stakeholders.

D.

A schedule for user training and support sessions.

Question 3

What are included in the domains of technical architecture in ServiceNow?

Choose 3 answers

Options:

A.

Risk Management

B.

Security Management

C.

Environment Management

D.

Data Management

E.

App Dev Management

Question 4

What does a ServiceNow governance framework typically define?

Choose 3 answers

Options:

A.

How decisions are made

B.

What decisions need to be made

C.

Who is involved in decision-making

D.

Recurring schedules for governance meetings

E.

How work gets done on the platform

Question 5

What are the advantages of a 5-stack instance structure that consists of development, quality assurance, user acceptance testing, staging, and production?

Choose 3 answers

Options:

A.

Staging instance for troubleshooting

B.

Lower maintenance effort

C.

Deployment testing

D.

Increased parallel activity

E.

Single Dev track

Question 6

What components constitute the application layer security within ServiceNow?

Choose 3 answers

Options:

A.

Multi-Factor Authentication (MFA)

B.

Platform Encryption (PE)

C.

Access Control Lists (ACLs)

D.

Full Disk Encryption (FDE)

E.

IP address access control

Question 7

Which methods can be used to populate the CMDB with data from third-party sources? Choose 2 answers

Options:

A.

Identification and Reconciliation Engine (IRE)

B.

Discovery

C.

IntegrationHub ETL

D.

Service Graph Connectors

E.

Service Mapping

Question 8

What is the primary purpose of security threat modeling?

Options:

A.

To identify potential threats and develop mitigations.

B.

To manage the encryption key management process.

C.

To backup, restore and recover critical customer data.

D.

To configure trusted IP address ranges in the system.

Question 9

Which strategy is recommended for effective communication during the go-live phase?

Options:

A.

Focus communications only on immediate supervisors.

B.

Provide minimal updates to avoid overloading the team.

C.

Postpone any form of communication until all issues are resolved.

D.

Describe released functionality and provide knowledge base articles.

Question 10

Why is IP address access control considered part of the network layer despite being implemented in the application layer?

Options:

A.

It performs data tokenization and substitution for security.

B.

It uses encryption to protect data at rest in the ServiceNow instance.

C.

It restricts access to the instance based on IP address ranges.

D.

It manages user authentication to the ServiceNow platform.

Question 11

When should security be set up in the ServiceNow application build process?

Options:

A.

Only when issues are encountered during operations

B.

After configuring all the application workspaces

C.

After configuring all required integrations

D.

Before configuring interfaces or business logic

Question 12

What aspect of software is evaluated during non-functional testing?

Options:

A.

Specific behaviors and outputs of the system.

B.

The way a system operates and meets user expectations.

C.

The creation of records and setting field values.

D.

Functional requirements outlined in the design document.

Question 13

What is the primary purpose of the Test Management 2.0 application in ServiceNow?

Options:

A.

To streamline manual testing processes

B.

To generate test cases automatically

C.

To automate software testing processes

D.

To replace human testers with AI

Question 14

A system administrator, Priya, notices that certain Configuration Items (CIs) in the CMDB have not populated the required and recommended fields, impacting data integrity. Which KPI should Priya review to diagnose this issue?

Options:

A.

Compliance

B.

Correctness

C.

Completeness

D.

Relationships

Page: 1 / 5
Total 47 questions