Skip to main content

ServiceNow Certified Application Developer (CAD)

The ServiceNow Certified Application Developer (CAD) certification validates your ability to design, build, test, and deploy custom applications on the ServiceNow platform. It's designed for developers who create scoped applications using ServiceNow's low-code and pro-code tools.

---------- Question 1
Your application includes a form where a specific text area should become read-only and visible only when a selection in a choice list field is set to 'Rejected'. What is the most efficient and recommended way to implement this UI behavior without server interaction?
  1. Create a Client Script with an onChange function
  2. Implement a UI Policy with the specified conditions
  3. Develop a Business Rule to control field attributes
  4. Use a UI Action to toggle the field properties

---------- Question 2
A custom application requires that when a record is updated in the Hardware Request table, an approval request is automatically sent to the managers of the requested hardware. If approved, the record status should update to Approved; otherwise, it should be Rejected. Which automation tool is best suited for this requirement?
  1. Business Rule
  2. UI Policy
  3. Flow Designer
  4. Scheduled Script Execution

---------- Question 3
A business requirement states that a field named priority should become read-only and visible only when the state field on a custom form changes to closed. Additionally, this rule should only apply if the current user has the special_admin role. Which feature is the most efficient and declarative way to implement this conditional UI behavior?
  1. An onChange Client Script checking user roles and field values.
  2. A Business Rule that executes before update.
  3. A UI Policy with conditions and a UI Policy Script.
  4. A Form UI Action to toggle field properties.

---------- Question 4
Which GlideSystem method is used within an ACL script to check if the currently logged-in user has a specific role?
  1. gs.getUser().hasRole(rolename)
  2. gs.hasRole(rolename)
  3. gs.hasAccess(rolename)
  4. gs.isMember(rolename)

---------- Question 5
A form for a custom application has a field named Reason for Change. This field should only become visible and mandatory if another field, Change Type, is set to Emergency. How can this be most effectively implemented without writing script?
  1. Create a client script that uses g_form.setMandatory() and g_form.setVisible().
  2. Implement a UI Policy with a condition on Change Type and appropriate UI Policy Actions.
  3. Use a Business Rule to manipulate field visibility on form load.
  4. Configure a Dictionary Override for the Reason for Change field.

---------- Question 6
A developer needs to create a reusable piece of server-side code that can be called from various Business Rules, Script Includes, and Workflow Activities within a custom application. This code will perform a common calculation based on input parameters. What is the most appropriate way to encapsulate this logic?
  1. Create a new Script Include.
  2. Define a new Business Rule.
  3. Implement a UI Script.
  4. Develop a new Flow Designer Action.

---------- Question 7
A business process requires a simple automation to send an email notification when a record in a custom table changes its status to Approved, and then automatically updates another field on the record. Which automation tool is generally preferred for this type of straightforward process in modern ServiceNow development?
  1. Legacy Workflow
  2. Scheduled Script Execution
  3. Flow Designer
  4. Event Queue

---------- Question 8
A custom application requires that records can only be deleted if the user is an administrator AND the record's state is Closed. This logic needs to be enforced system-wide. How would you implement this security requirement?
  1. Use an onSubmit Client Script to prevent deletion.
  2. Create a Business Rule that aborts deletion if the conditions are not met.
  3. Configure a delete ACL on the table with a script that evaluates both conditions.
  4. Make the delete button visible only to administrators using a UI Policy.

---------- Question 9
A custom application needs to automatically create a follow-up task record three days after a specific record in the custom_project table reaches a Completed state. This process should be robust, auditable, and easily modifiable by non-developers. Which automation tool is best suited for this requirement?
  1. Flow Designer
  2. Scheduled Script Execution
  3. Business Rule with gs.eventQueue()
  4. Client Script

---------- Question 10
When developing a custom application, a developer wants to ensure that its data, scripts, and configurations are isolated from other applications and the global scope. Which ServiceNow feature inherently provides this level of separation and protection?
  1. Update Sets
  2. Application Scope
  3. Delegated Development
  4. Global Search


Are they useful?
Click here to get 360 more questions to pass this certification at the first try! Explanation for each answer is included!

Follow the below LINKEDIN channel to stay updated about 89+ exams!

Comments

Popular posts from this blog

Microsoft Certified: Azure Fundamentals (AZ-900)

The Microsoft Certified: Azure Fundamentals (AZ-900) is the essential starting point for anyone looking to validate their foundational knowledge of cloud services and how those services are provided with Microsoft Azure. It is designed for both technical and non-technical professionals ---------- Question 1 A new junior administrator has joined your IT team and needs to manage virtual machines for a specific development project within your Azure subscription. This project has its own dedicated resource group called dev-project-rg. The administrator should be able to start, stop, and reboot virtual machines, but should not be able to delete them or modify network configurations, and crucially, should not have access to virtual machines or resources in other projects or subscription-level settings. Which Azure identity and access management concept, along with its appropriate scope, should be used to grant these specific permissions? Microsoft Entra ID Conditional Access, applied at...

Google Associate Cloud Engineer

The Google Associate Cloud Engineer (ACE) certification validates the fundamental skills needed to deploy applications, monitor operations, and manage enterprise solutions on the Google Cloud Platform (GCP). It is considered the "gatekeeper" certification, proving a candidate's ability to perform practical cloud engineering tasks rather than just understanding theoretical architecture.  ---------- Question 1 Your team is developing a serverless application using Cloud Functions that needs to process data from Cloud Storage. When a new object is uploaded to a specific Cloud Storage bucket, the Cloud Function should automatically trigger and process the data. How can you achieve this? Use Cloud Pub/Sub as a message broker between Cloud Storage and Cloud Functions. Directly access Cloud Storage from the Cloud Function using the Cloud Storage Client Library. Use Cloud Scheduler to periodically check for new objects in the bucket. Configure Cloud Storage to directly ca...

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Cybersecurity Analyst (CySA+) focuses on incident detection, prevention, and response through continuous security monitoring. It validates a professional's expertise in vulnerability management and the use of threat intelligence to strengthen organizational security. Achieving the symbol COMP_CYSA marks an individual as a proficient security analyst capable of mitigating modern cyber threats. ---------- Question 1 A security analyst is reviewing logs in the SIEM and identifies a series of unusual PowerShell executions on a critical application server. The logs show the use of the -EncodedCommand flag followed by a long Base64 string. Upon decoding, the script appears to be performing memory injection into a legitimate system process. Which of the following is the most likely indicator of malicious activity being observed, and what should be the analysts immediate technical response using scripting or tools? The activity indicates a fileless malware attack attempting to ...