CH4: Access Controls Flashcards

1
Q

What are the “CRUD” operations that can be preformed by an end user?

A

Create, Read, Update, Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: In order to preform “CRUD” operations, an end user must be provided access to: User Authentication/Login, Application / Module Access, and Database Access.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ACL stand for in regards to elevated user access?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: An elevated privelege role only lasts for the duration of your user session.

A

True - Session timeout, logout, or impersonating another user removes the role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When elevated privileges are activated, an ____________ will appear next to your user avatar.

A

Arrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: All admins having the security_admin role IS a best practice.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___________ is a security rule defined to restrict the permissions of a user from viewing and interacting with data.

A

Acces Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acces control maye be set at the _____ level and/or the _______ level.

A

Row, Column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Most security settings are implemented using Access Controls.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: In addition to restricting CRUD operations, Access Controls can restrict ServiceNow-specefic operations on tables and fields.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: In the base system, all users with the admn role can impersonate security_admin.

A

False - only the default System Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: With System-created Access Controls, it is rare to have a table with no access control rules.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Each Access Control rule specifies: A valid ________ - a valid action the system can take.

A

Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each Access Control rule specifies: The ______ being secured.

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Each Access Control rule specifies: The ________ required to access the object.

A

Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Access Control rules are defined for and applied to a specific table to that the rule is within the context of the table and the type of data stored.

A

TRUE

17
Q

Access Control Rules: table.–None– applies to __________.

A

The entire table

18
Q

Access Control Rules: table.field applies to _________________________.

A

One specific field on the table.

19
Q

Access Control Rules: table.* applies to ____________________.

A

All other fields in the table not defined with a table.field rule (house.*)

20
Q

True or False: When creating a .* access control, also creating a .–None– access control is a best practice as only the .–None– control grants access to records.

A

TRUE

21
Q

True or False: When writing an ACL that mostly grants access, using only .–none– is a best practice.

A

TRUE

22
Q

True or False: When writing an ACL that mostly denies access, using .–none– and .* is the best practice.

A

TRUE

23
Q

True or False: A user only needs to pass either table or field ACL rules to access a record object.

A

False - A user most pass both

24
Q

True or False: ACL rules for parent tables apply to any table that extends the parent table

A

TRUE

25
Q

True or False: ACL rules for fields in a parent table apply to any table that extends the parent table

A

TRUE