Which of the following concepts are associated with the ServiceNow CMDB? (Choose four.)
Service Processes
User Permissions
Tables and Fields
A Database
The Dependency View
TheConfiguration Management Database (CMDB)in ServiceNow is a centralized repository that stores information aboutConfiguration Items (CIs), their attributes, and relationships. It plays a crucial role in IT Service Management (ITSM), helping organizations track assets, dependencies, and service impacts.
Thefour correct concepts associated with the CMDBare:
The CMDB is structured usingtablesandfieldswithin the ServiceNow database.
Different tables store different types ofConfiguration Items (CIs)such as servers, applications, and network devices.
Example CMDB Tables:
cmdb_ci(Base CMDB Table)
cmdb_ci_server(Stores server-specific CIs)
cmdb_ci_database(Stores database-related CIs)
Each table hasfieldsthat store attributes (e.g.,Serial Number, IP Address, Location).
The CMDB is essentially adatabasethat holds detailed information about IT assets and their relationships.
It enables organizations to maintain an accurate inventory of IT infrastructure.
The database helps withincident management, change management, and asset tracking.
Dependency Viewprovides agraphical representationof how Configuration Items (CIs) are related.
This visualization helps IT teamsunderstand dependencies, impact analysis, and root cause analysis.
Example:
If adatabase servergoes down, theDependency Viewcan show which applications and services will be affected.
The CMDB supports variousIT Service Management (ITSM) processes, such as:
Incident Management(linking incidents to affected CIs)
Change Management(analyzing the impact of changes on CIs)
Problem Management(identifying root causes of recurring issues)
The CMDB ensures that these processes operate with accurate and updated asset data.
1. Tables and Fields (Correct)2. A Database (Correct)3. The Dependency View (Correct)4. Service Processes (Correct)
Why the Incorrect Option is Wrong:B. User Permissions (Incorrect)
Whileuser permissions(such as roles and access controls) exist in ServiceNow, they arenot a fundamental concept of the CMDB itself.
Permissions (likecmdb_readoradmin) controlwho can access and modify the CMDB, but they are notcore CMDB components.
AnIT administratorwants to checkwhich business services depend on a specific database serverbefore performing maintenance.
Using theCMDB Dependency View, they see that the database server is linked to anemail serviceand acustomer portal.
This insight helps them plan achange requestto notify impacted users before the server is taken offline.
Example Use Case:
What is the function of user impersonation?
Testing and visibility
Activate verbose logging
View custom perspectives
Unlock Application master list
InServiceNow,User Impersonationallows anadmin or a user with the appropriate roleto temporarily act as another userwithout needing their password. This is mainly used fortesting and visibility, helping administrators and developers verify user permissions, role-based access, and UI experiences.
Testing Permissions & Roles
Ensures thatusers have the correct access rights(e.g., verifying ITIL user permissions for incident management).
Helps testUI Policies, Business Rules, and ACLs (Access Control Rules)by viewing the system from the perspective of different roles.
Debugging & Troubleshooting
Identifies why a usercannot access certain records or modules.
Helps inresolving permission-related issueswithout affecting live users.
Experience Validation
Ensures userssee the correct menus, fields, and optionsbased on their assigned roles.
Useful when developingnew applications, workflows, or Service Catalog items.
Admins and authorized userscan impersonate by clicking on their name in the top-right corner and selectingImpersonate User.
Once impersonated, all actions are logged for security and compliance.
Primary Functions of User Impersonation:How to Use Impersonation:
(A) Testing and visibility – Correct
The primary function ofuser impersonationis totest and verify what different users can see and doin the system.
It helps withdebugging UI, role-based access, ACLs, and workflow execution.
(B) Activate verbose logging – Incorrect
Verbose loggingis used fordetailed debugging and performance monitoring, butimpersonation does not enable logging features.
(C) View custom perspectives – Incorrect
ServiceNow doesnotuse the term "custom perspectives" in the context of impersonation.
Impersonationshows what a specific user sees based on their roles, but it doesnot create custom perspectives.
(D) Unlock Application master list – Incorrect
There isno such featureas an "Application Master List" that requires impersonation to unlock.
Application access is controlled byroles and permissions, not impersonation.
Explanation of Each Option:
Never impersonate a user without permission, especially in production environments.
All impersonation actions are loggedin the system for security and auditing purposes.
Use impersonation in a sub-production (development or test) instancebefore making changes to production.
Admins should use impersonation instead of logging in with test user accountsto maintain security and accountability.
Additional Notes & Best Practices:
ServiceNow Docs: Impersonating Users
ServiceNow Community: Best Practices for User Impersonation
References from Certified System Administrator (CSA) Documentation:
Tables are made up of which of the following?
records
lists
forms.
fields
In ServiceNow,tablesare fundamental components of the platform's database structure. A table consists ofrecords (rows)andfields (columns)that store data.
Arecordis an individual entry in a table, similar to a row in a traditional database.
Each record represents a single entity (e.g., an incident, a user, a request).
Records are stored uniquely in the system and are identified by aSys ID(a globally unique identifier).
Afieldis an attribute of a record, like a column in a database.
Each field has a specificdata type(e.g., string, integer, date, reference).
Fields define what type of information can be stored in a record.
1. Records (Rows) – Correct Option2. Fields (Columns) – Correct OptionExample:TheIncident [incident]tableSys ID
Number
Short Description
Caller
State
123abc
INC001
System crash
John D
New
456def
INC002
Network issue
Jane S
Open
Records:INC001, INC002 (each row is a record).
Fields:Number, Short Description, Caller, State (each column is a field).
B. Lists – Incorrect
Listsare aviewof table data but are not a part of the table itself.
A list displays multiple records from a table but does not define the structure of a table.
C. Forms – Incorrect
Formsare user interfaces used to view or edit single records.
A form allows users to interact with the data stored in a table but is not part of the table structure itself.
ServiceNow Docs: Tables and Records
ServiceNow CSA Study Guide – Understanding Tables, Records, and Fields
ServiceNow Product Documentation: List and Form Views
Explanation of Incorrect Options:References from Certified System Administrator (CSA) Documentation:
What is the Import Set Table?
A table where data will be placed, post-transformation
A table that determines relationships
A staging area for imported records
A repository for Update Set information
InServiceNow, anImport Set Tableis atemporary staging areawhere raw data is storedbefore it is transformed and moved into a target table. It is primarily used indata import processesto ensure data integrity and allow transformation before committing data to production tables.
Stores incoming data from external sources(e.g., CSV files, Excel files, APIs, LDAP, etc.).
Acts as a temporary staging areabefore records are mapped and transformed into atarget table(e.g.,incident,cmdb_ci,problem).
Allows validation and error handlingbefore final data migration.
Uses Transform Mapsto determine how fields in the import set relate to fields in the target table.
Key Functions of an Import Set Table:
Data is importedinto anImport Set Tablefrom an external source.
TheImport Set Table temporarily stores the datawithout affecting existing records.
ATransform Mapis applied to move and modify the data before inserting it into the correct table.
Once transformation is complete, the data is transferred to thetarget table, and the Import Set Table can be cleared.
Example Workflow of an Import Set:
(A) A table where data will be placed, post-transformation – Incorrect
Thetarget table(e.g.,incident,cmdb_ci,problem) holds the dataaftertransformation.
TheImport Set Table is only a temporary staging areabefore transformation occurs.
(B) A table that determines relationships – Incorrect
Relationship tables(e.g.,cmdb_rel_ci) definedependencies between recordsbut are not used for data import.
Import Set Tables do not determine relationships between records.
(C) A staging area for imported records – Correct
Import Set Tables temporarily store incoming recordsbefore processing.
The data is transformed and mappedbefore being inserted into the final target table.
This ensuresdata integrity and consistency.
(D) A repository for Update Set information – Incorrect
Update Sets (sys_update_set) store changes to configurations, such as scripts, workflows, and UI policies.
Import Set Tables are used for data imports, not Update Sets.
Explanation of Each Option:
Always review data in the Import Set Table before applying transformationsto avoid incorrect data entry.
Use Transform Mapsto define field mappings between Import Set Tables and target tables.
Monitor Import Logs(sys_import_set_run) for errors or incomplete data.
Delete old Import Set dataperiodically to improve performance and avoid unnecessary storage usage.
Additional Notes & Best Practices:
ServiceNow Docs: Import Set Overview
ServiceNow Community: Best Practices for Import Set Management
References from Certified System Administrator (CSA) Documentation:
Copyright © 2021-2025 CertsTopics. All Rights Reserved