Monday, 17 December 2018

settimeout / Sleep / wait in ServiceNow

setTimeout in ServiceNow

function onChange(control, oldValue, newValue, isLoading) { 
if (newValue == oldValue){
function Test(){
// do your stuff here
alert('Wait for 4 Seconds.');
var caller = g_form.getReference('<field_name>');

Note: You should always use setTimeout(Test,4000) instead of setTimeout(Test(),4000); 

Sleep in ServiceNow
Note : We cant user gs.sleep function in scooped application it has to be used in non-scooped application
sleep: function (duration) {

Monday, 10 December 2018

Client-Server call in ServiceNow / Ajax Call / Asynchronous Call

AJAX (asynchronous JavaScript and XML) is a group of interrelated, client-side development techniques used to create asynchronous Web applications.
AJAX enables web applications to send and retrieve information to and from a server in the background, without impacting the user experience with the displayed web page.


The GlideAjax class allows the execution of server-side code from the client. GlideAjaxcalls pass parameters to the script includes, and, using naming conventions, allows the use of these parameters.

Using GlideAjax:
·         Initialize GlideAjax with the name of the script include that you want to use.
·         When creating the script include, you must set the name field to be exactly the same as the class name.
·         When creating the script include, you must select the Client callable check box.
·         Specify the parameter sysparm_name. GlideAjax uses sysparm_name to find which function to use.
·         Any extra parameters may be passed in, all of which must begin with sysparm_. Avoid using predefined parameter names:
o   sysparm_name
o   sysparm_function
o   sysparm_value
o   sysparm_type
·         Code is then executed with the getXML() or getXMLWait() functions.

Example of asynchronous GlideAjax call
Client Side:
var ga = new GlideAjax('HelloWorld');
ga.addParam('sysparm_name', 'helloWorld');
ga.addParam('sysparm_user_name', "Bob");
function HelloWorldParse(response) {
  var answer = response.responseXML.documentElement.getAttribute("answer");
  alert(answer); }

Server Side Code:
var HelloWorld = Class.create();
HelloWorld.prototype = Object.extendsObject(AbstractAjaxProcessor, {
   helloWorld:function() { return "Hello " + this.getParameter('sysparm_user_name') + "!"; } ,
   _privateFunction: function() { // this function is not client callable     

Note: You must set the name of the script include to HelloWorld.
  • ·         The sys_script_include code must extend the AbstractAjaxProcessorclass and be client-callable.
  • ·         Function names starting with "_" are considered private and are not callable from the client.
  • ·         Avoid overriding methods of AbstractAjaxProcessor, including initialize. While it is possible to invoke methods of your superclass object which you have overridden, it is complicated and best avoided altogether.

ServiceNow System Administration Part 8

 v  Import Sets
Ø  What is the transform map used for? (A guide for moving data from import set tables to target tables)
Ø  When should you coalesce fields on an import? (Before data transform)
Ø  What happens when a match is found using the coalesce field? (The existing record will be updated with the information being imported)
Ø  What happens if a match is not found? (A new record will be inserted into the database)
v  ACL’s
Ø  What is an access control? (Security rule defined and set at the row and column levels)
Ø  What three ways can ACL’s be defined? (Roles, conditional expressions, and scripts)
Ø  How are record ACL rules processed? (In order of most specific to most general)
Ø  How are Table ACL rules processed? (Match table name, match the parent table name, match any table name [wildcard])
v  Tables
Ø  What does each record correspond to in a table? (Row)
Ø  What does each column correspond to in a table (Field)
Ø  What are the three attributes of a field? [Label (user friendly term), Name (unique term to the system) Value (actual data) ]
v  Service Catalog
Ø  What are the major components of the Service Catalog? (Items, Record Producers, Variables, Variable Sets, Workflows)
Ø  Variables are global by default. (True/False)
Ø  Filter conditions
Ø  What are the three components of a filter condition? (Field, Operator, Value)
v  Settings Menu
Ø  What categories are in the Settings Menu? General, Theme, Notifications, Lists, Forms and Developer
Ø  Where can users define Notification channels and subscriptions? (Gear Icon Settings)

v  Connect Presence
Ø  Using this, are you able to see Editing in real-time on a form?  (True/False)
v  Application Navigator
Ø  What is displayed when using the Filter Navigator? Applications and Modules
Ø  Where can you search text? (Knowledge, Filter Navigator, Chat)
v  Lists
Ø  Personalizing a list, who does it affect?  (Only the user)
v  Forms
Ø  What kinds of fields are typically on a form? (String, choice, true/false, reference)
v  Saving Forms
Ø  When does Submit appear on a form? (When it is a new record)
v  Users
Ø  What are some authentication methods? Local database, LDAP, Multifactor, SAML 2.0, OAuth 2.0, Digest Token, SSO
Ø  Can roles contain other roles? (Yes, a role may contain other roles and any access granted to one role is automatically granted to any role that contains it.)
v  Tables
Ø  A table that is not extending another table but is itself extended is called what? (Base table)
Ø  Can Assignment Rules be scripted? (Yes)
Ø  How do you define a field on an extended table differently than the parent table? (Dictionary Overrides)
v  Events
Ø  How are events triggered? (User Actions, Scripts, Business Rules and Workflows)
Ø  How do you create CI relationships? (Use the CI Relationship Editor)
Ø  What do you use to display the infrastructure view for a CI and its business services? (Dependency View)
v  Reports
Ø  What are metrics used for? (Used to measure and evaluate the effectiveness of IT service management processes)

v  Workflows
Ø  What represents the entire structure of the workflow and the definition of the processing a Workflow can accomplish? (Workflow Model)
Ø  When a workflow is checked out, who do the changes apply to? (The user who has the Workflow checked out)
Ø  What are the Workflow States? (Checked Out, Unpublished, and Published)
v  SLA’s
Ø  What is an SLA? (A record which defines a set amount of time for a task to reach a certain condition.)
Ø  SLA’s can only run against tables that extend which table? (Task Table)
v  Development
Ø  UI Policies run on which side? (Client side)
Ø  A UI action with an order number of 50 will display after a UI action with an order number of 60 (True/False)
Ø  Business Rules monitor fields on a form (True/False)
v  Upgrades
Ø  What are exempt in upgrades? (Customizations)
Ø  When should you clone your instance? (Before a formal testing cycle, after a comprehensive or long development cycle, after the completion of an application upgrade)
v  Update Sets
Ø  If several update sets have modified the same object, like a form, which change will be the one moved to the new, merged update set? (The most recent one)
Ø  What data records are captured in an update set? (None. Data is not captured in an update set.)

ServiceNow Prerequisites

To better understand the ServiceNow Prerequisites you have understand ITIL concepts.

Click on the below link for ITIL Concept

You can create your own Service-Now instances (10 Mins) 

Kindly find the below screenshots of instance creation for your reference.

1. Click on register on the right hand corner side at the top as shown below.

2. Fill the fields as below and click on submit button.

3. Login with username and password and it will redirect to the page to enter country, pin-code and click on submit
4. After that it will redirect to the page below.

5. Go to manage>Instance
6. Click on request instance and select the version(Jakarta).
7. click on the url and login to the instance with the credentials which has been mentioned at the bottom of the page and reset your password accordingly.
8. After instance creation go through below e-learnings which gives you the overall view of service-now navigations and concepts

Foundation e-Learning

Click on the below link for html, css, Java script
html, css, Java script

Friday, 30 November 2018

ServiceNow Certified Implementation Specialist Exam Practice

ServiceNow Certified Implementation Specialist
Instruction : 
  • Number of Question : 150
  • You dont have time Limit here as its because of testing you own knowledge
  • Must not be finished in one shot.
  • 10 - 15 question will be displayed in one page
  • You can go back and change your answer
  • You have to attend all the questions
  • Passing percentage your own integrity.

This Exam is Powered by Testmoz!

Click on below link to start the exam.

Practice ServiceNow System Administration Exam

ServiceNow Certified System Administrator  

Instruction : 
  • Number of Question : 60
  • Has a time limit of 90 Minut
  • Must be finished in one shot.
  • 10 question will be displayed in one page
  • You can go back and change your answer
  • You have to attend all the questions
  • Passing percentage of this exam is 70%

This Exam is Powered by Classmaker !

Click on below link to start the exam.

Start ServiceNow Administration Exam

All the Best!!

Security Operation Certification preparation

1)Which business rule is used for creating a Ci
A. Determine CI from Network Details
B. Create CI from Vulnerable Item

2)Vulnerability Groups are used to group Vulnerable Items based on ______. (Select all that apply)
A. Vulnerability
 B. Vulnerable Item Condition
C. Filter Group
D. Assignment Group

3)Which of the following is a common integration point between Vulnerability and GRC?
A. Risk Indicators
 B. Problem
C. Change
D. Security Incident Response
4) Which of the following is true about workflows in Vulnerability Response.
A. Any user with sn_vul.vulnerability_read can edit the workflow.
B. Users with sn_vul. vulnerability _write cannot view the workflows
C. There are no workflows available with vulnerability plugin
D. Users with admin role cannot edit vulnerability workflow without sn_vul.admin
5)GRC is available with vulnerability plugin for the management of risk assessments, risk indicators, and risk issues.
6)Which of the following are available on Vulnerability overview(choose all that apply)
A. Vulnerable items by CI
B. Vulnerable items by CVE
C. Vulnerable items by score
D. Vulnerable items by Impact
7) Which plugin must be activated to enable vulnerability response with third party integrations like qualys,rapid7.
A. Vulnerability response
B. Threat intelligence
C. Trusted Security Circles Client
D. Security Incident Response

8)Clicking on close/defer ui action will set vulnerable item to false;
A. True
B. False
9)Applications from Servicenow store are maintained by
A. organizations that created the Application
B. Servicenow Support

10)what is vulnerability
ANS: Any weakness that allows exploitation or an attacker to further reduce security posture.
11)who will maintain CVE and CWE
12)What is the prefix for Vulnerability scope tables
Ans: sn_vul.
13) which property is used for auto creation of vulnerability groups.
14)when creating change from VIT it is recommended to assign the change task to CI owner (Assigned to)
A. true
B. False
15) Which of the following ciso/cio requires on reporting dashboard (select all that apply)(2 questions)
A. overview
B. Drill down reporting
C. Single, overall health of the organization
D. up-to-date minute view

17. which of the following is not available on vulnerability groups.
A. Vulnerability
B. Condition
C. Filter groups
D. Advanced script

18. Closing vulnerability group with exception will close all vulnerable items in the group.
A. True
B. False.

19. What will you recommend your client(donot remember the question exactly)
Ans: Keep CMDB updated.

20. Which of the following business rules are available with Vulnerability plugin.
A. Add Vulnerable Item CI to Task
B. Associate VIs on Condition Change
C. Determine vulnerable items
D. Clear Vulnerability if Custom Filter

21. Vulnerable items created from Qualys scanner are created as
A. Import sets
B. Update sets

22.Which role is required to edit vulnerability workflows.
Ans: sn_vul.admin

23.workflows created for approval of vulnerable item is tagged to which table
ANS:    sn_vul_change_approval

24.CVE’s are imported from
ANS: National vulnerability database

25. What is CWE
ANS: Common weakness enumeration

26. CVE deals with software weakness and find a way of effectively managing the softwares.
ANS: false
27. Path for filter groups
ANS: security operations>groups>filter groups