Service-Now Implementations Exam Questions

August 1, 2017 | Author: Barun | Category: Web Service, Web Server, Soap, Hypertext Transfer Protocol, Port (Computer Networking)
Share Embed Donate


Short Description

Dumps...

Description

Service-Now Implementations Exam Questions 1. ServiceNow provides customers with a dedicated database, application and data isolation using which one of the following models? a. b. c. d.

Single-‐tenant Multi-‐tenant Hybrid Cloud Domain Separation

2. Within the ServiceNow application, a technical consultant has created and tested a new Outbound SOAP Message. In order for the consultant to invoke the new SOAP message within the ServiceNow application, which of the following can be created? a. b. c. d.

UI Policy Business Rule UI Property Import Set

3. Which one of the following is a valid reason for a customer to obtain a VPN connection for their ServiceNow implementation? a. Encrypt end user access to ServiceNow b. Encrypt a SOAP message to ServiceNow c. Encrypt communication between a MID Server and a customer ServiceNow instance d. Encrypt the communication path between a customer ServiceNow instance and their enterprise mail server

4. Which one of the following would improve the performance of loading forms within ServiceNow? a. b. c. d.

Reduce the number of related lists configured for a form Increase the number of client scripts for a table Reduce the number of read only fields defined for a form Reduce the number of mandatory fields defined for a form

5. Which one of the following is the proper syntax for accessing the values of variables from the record producer script field? a. b. c. d.

g_form.getReference('variable_name') g_form.getVariable('variable_name') producer.variable_name current.variable_name

6. Catalog Client Script - g_form.getValue(‘variable_name’); Ans: to access variables from catalog request pages

7. Record Producer Script

Ans: Producer.variable_name

8. Business Rules, global variable to provide on client script Ans: g_scratchpad

9. Which java script has Insert, Delete, Update , on query, display, before and after executions Ans: Business rule

10.

gs.log() stores log messages where

Ans: System logs

11.

How to check empty values?

Ans: gs.nil()

12.

13.

Which of the following is used in business rule a. gs.addMessageInformation b. gs.log(string, source) - correct answer Email Port used

Ans: SMTP

14.

Email - event stop - business rule Choices a. Eventstop b. gs.eventstop

15.

Which about LDAP is correct?

Ans: Read-Only information of customer client directories

16.

Pings to service now instance, maximum normal response time

Ans: 250ms

17. To get a value from server side to be available to the Incident Form Ans: Business Rule on display

18.

Incident form loads up slow, why?

Ans: Because of too many client scripts

19. Change Task extended from Task table, short description field is created on change task table. What will happen to change task form that already has the task table’s short description Ans: Personalize layout

20. You can find both task table’s short description as well as change task short Ans: Description fields

21. Short Description field’s default value has to be set but only for incident form, shouldn’t be on task table Ans: Dictionary over ride - default value

22.

Firewall has to be monitored, how to create the table for it

Ans: Extend from cmdb_ci table and create a table

23. To provide more information on client transaction timings what plugin to activate? Ans: Client Transaction Timings

24.

Which among the following is correct about LDAP

Ans: ServiceNow does not store user passwords of LDAP

25. LDAP to get info and update user table periodically, what to use? Ans: Scheduled import sets

26.

Transform Maps have performance issues, what to do?

Ans: Remove unwanted custom scripts

27.

3 levels of access within SN a. System Access b. Application & Module Access c. Table and Field Access

28.

3 Servers in the SN Instance architecture a. Physical Server b. Database Server c. Application Server

29.

A fully qualified LDAP tree is known as

Ans: Distinguished Name (DN)

30.

Acceptable ping time

Ans: less than 250ms

31.

Application/Module access is secured by

Ans: Roles

32.

Default contextual security in SN is to

Ans: DENY access

33.

Default port number for LDAPS

Ans: 639

34.

Does LDAP store passwords in SN?

Ans: LDAP does NOT store passwords in SN

35. Each record in ServiceNow is identified by a unique ##character GUID (Globally Unique ID) called a sys_id? Ans: 32-character

36.

Hardware stack used for service-now

Ans: tomcat/mySQL

37.

What provides tables as staging area for integration

Ans: Import set

38.

Part of prepare stage in StartNow

Ans: Core system setup, sprint planning

39. What application/database server combination is used in most datacenters Ans: Tomcat/MySQL 4

40.

How are workflows captured in update sets

Ans: must be published

41.

How to increase performance of transform maps

Ans: reduce number of scripts running

42. How are remaining points calculated in release burndown charts Ans: Total points in all stories minus points in completed stories

43.

Stages in StartNow

Ans: Plan, Discover, Prepare, Deploy, Operate

44. What extra feature is available when elevated privilege is activated Ans: Write permission on access control record

45. Global variable in business rules besides ‘current’ and ‘previous’ Ans: g_scratchpad

46.

How to avoid unused numbering in records

Ans: Set property “Assign a task number only upon insert” to true

47.

Components of perceived performance of service-now instance

Ans: Application server response, Network latency and Throughput, Browser rendering and parsing

48. Which two statements are true about XML schemas and WSDL 1.1? (Choose two.) a) http://schemas.xmlsoap.org/wsdl/ is the WSDL namespace for SOAP binding. b) xsi is used as a prefix to represent the schema namespace as defined by XSD c) XSD schemas are used as a formal definition of WSDL grammar. d) xsd is used as a prefix to represent the schema namespace as defined by XSD e) http://schemas.xmlsoap.org/wsdl/http/ is the WSDL namespace for SOAP binding Ans: C,D

49. A company's new investment management Java application and a legacy stock trader application need to communicate, but they use different JMS implementations. A developer decides to implement a JMS bridge to solve the problem. Which two advantages does this pattern provide? (Choose two.) a) It converts the interface of a class into another interface that clients expect. b) It decouples an abstraction from its implementation so that the two can vary independently. c) It dynamically attaches additional responsibilities to an object. d) It optimizes network traffic. e) It is vendor independent. Ans: B,E

50. Which situation requires the client to use the Dispatch interface to access the Web service? a) The b) The c) The d) The Ans: D

51.

client client client client

and the server are on different platforms. has access to the portable artifacts, but not to the WSDL. has access to the WSDL, but not to the portable artifacts. will access a REST-based service.

What are two features of a WSDL 1.1 document? (Choose two.)

a) b) c) d) e)

Service defines a collection of related endpoints. Service describes the message's payload using XML. Service assigns an Internet address to a specific binding. Porttype declares complex data types and elements used elsewhere. Porttype elements are used to group a set of abstract operations. f) Porttype defines a concrete protocol and data format specification. Ans: A,E

52.

Which three can an EJB-based endpoint use? (Choose three.)

a) HTTP sessions b) Java EE 5 declarative security c) Java EE 5 programmatic security d) client-demarcated transactions e) container-managed transactions Ans: B,C,E

53. What are two communication modes supported by JAX-WS? (Choose two.) a) Synchronous RPC b) Dynamic Service Binding c) Dynamic Proxy d) Endpoint Invocation e) Dispatch Ans: C,E

54. A company is refactoring an existing website to use Web services clients. The application retrieves lists of parts and displays them to the users in a browser window. Previously, the data was stored as files on the web server and, in order to access the files, the user would simply click on a hyperlink. Now the data must be dynamically generated via a service that another developer has created. They want the easiest way to refactor their website to use Web services. Which three technologies should they use? (Choose three.) a) SOAP b) REST c) JavaScript d) XML e) JSON f) Java Ans: B,C,E

55. A JAXR client has established connection with a UDDI registry and needs to get a service binding from the registry. What is required to accomplish this task? a) find the appropriate concept and then find the service binding associated with that concept b) find the appropriate authentication token and then find the service binding associated with that authentication token c) find the appropriate organization, get the model associated with that organization, and then find the service binding associated with the model d) find the appropriate organization, find the services associated with that organization, and then find the service binding associated with the service Ans: D

56. What are three benefits of using SSL to connect to a Web service without mutual authentication? (Choose three.) a) The server is assured of the client's identity if the client issues the certificate. b) The client is assured of the server's identity. c) Message integrity is preserved between the client and the server. d) The communication between the client and the server is still logged. e) The communication between the client and the server is encrypted. f) Using SSL over HTTP incurs less overhead than HTTPS Ans: B,C,E

57. A developer is creating a servlet-based endpoint for a new payroll application. What are three requirements for the service? (Choose three.) a) It needs to be packaged as a WAR file. b) It needs to be packaged as a JAR file. c) It requires a META-INF folder. d) It requires a WEB-INF folder. e) webservices.xml is required. f) web.xml is required. Ans: A,D,F

58. a) b) c) d)

How do you test SSO using which bypass method? side_door.do back_door.do side_entrance.do none of the above

59. If you want to have a default value for the short description field for a change that extends the task table, which approach is best practice? a) Create a new short description field b) Set the default value for the short description field c) Create a Dictionary Override d) Create a Client Script

60. a) b) c) d)

Which of the following contains a server call? g_form.getValue() g_form.setValue() g_form.getReference() g_form.clearValue()

61.Why is a callback function best practice when using getReference()? a) because it runs synchronously b) it will not affect performance c) because it will run asynchronously d) a callback function is not necessary

62.How do you limit the scope of a variable? a) you declare variables inside a function b) you declare variables using == operators c) you use a comparator such as != d) you declare variables outside a function

63.Which of the following plugins creates baseline ACL rules for a new environment? a) High Security Settings b) ACL Security Jump Start c) It is included by default in new installations d) Security Quick Start

64.Which is the following is true regarding the task table? a) Task is extended from a parent table such as Problem, Change, Incident, etc. b) Applications cannot extend from the Task Table c) Only Problem, change, and incident can be extended from task d) Any application can be extended from Task

65.How is the burn down defined from Release? a) Total points - completed points b) Sprint points - stories in "TESTING" c) Story points - sprint points d) none of the above

66.Which of the following is NOT true about business rules? a) They execute server-side b) g_scratchpad is a global variable c) They can be executed on query d) g_form is accessible

67.Why would a client require VPN tunnels to ServiceNow? a) To encrypt a mail server b) To encrypt communication to a ServiceNow instance c) To encrypt data from ServiceNow to a MidServer d) None of the above

68.How do you access the amount of memory a ServiceNow instance is using? a) Navigate to system logs b) stats.do c) submit a HI ticket d) users do not have access to server information

69.Where is GlideAjax typically used? a) business rules b) client scripts c) ui policy d) ui macro

70.A user wants to use domain separation for his instance. Which of the following is true? a) Domain separation creates separate instances of ServiceNow b) Domain: loc users can view Global records c) Global records are viewable to all users d) B and C are correct

71.LDAP is used for what? a) Automation and Authentication b) Data Population and Automation

c) Authentication and Data Modification d) Data Population and Authentication

72.How do you extract the WSDL for a table? a) WSDL.DO b) open a HI Ticket c) create a LDAP service d) create a business rule 73. Which of the following does a UI Policy affect? a) Form View b) List View c) Access Control d) Client Script

74.A sys_id is which of the following: a) a unique 16 bit GUID b) a unique 32 character GUID c) is unique record d) both b and c

75.Which of the following will increase the performance for a client script: a) using GlideAjax for server calls b) using glide record c) using callback functions for GlideAjax d) a and c

76.How do you secure a field on a form? a) use a UI Policy b) use a ACL rule c) use a Client Script d) a and c

77.Where is gs.log logged to? a) System Transactions b) JavaScript Console c) System Logs d) Script log statements

78.How do you flush the cache in a SNOW instance? a) cache.do b) flush_cache.do c) cache_flush.do d) flush.do 79. Which of the following is NOT a valid query? a) addQuery() b) addNullQuery()

c) addNotNullQuery() d) addEmptyQuery() 80. What does gs.getmessage(X) do? a) Adds a info message b) Retrieves a info message c) Retrieves a message key d) None of the above 81. A user wants to know if you can make each INC# be sequential, how

would you go about doing this? a) a BEFORE business rules b) a on SUBMIT client script c) it can't be done d) Modify system properties 82. How do you access a variable inside a Record producer script? a) g_form.getValue() b) producer.variablename c) current.variablename d) g_form.getVariable() 83. Does ServiceNow stores the LDAP Password? a) Yes b) No 84. Where does ServiceNow stores the LDAP password? a) In LDAP connection URL b) In user password field c) In encrypted password field d) In HTTP Session

85.which related link is used to test LDAP connection? a) Test authentication b) Test Connection c) Load 20 Records d) Browse 86. In LDAP configuration, If default port is not used and explicit port

number is to be mentioned, how it is done? a) ServiceNow does not support explicit port b) select SSL check box and new port field appears and enter the port number in the field c) enter the port in server URL d)None of the above 87. The coarsest measure of network response time is a ping, which

measures the total time for a packet to travel from the source

machine to the target and back again. What is the reliable time for ServiceNow connection? a) 100 ms b)250 ms c)1000 ms d)300ms

88.Which of the following can be used for user and distribution directory services in ServiceNow a) Webservice b) SNMP c) IMAP d) LDAP 89. Which of the following is server side script? a) UI Script b) Business Rule c) Client Script d) UI Policy 90. What is the most important table of integration in ServiceNow? a) Webservice b) target table c) Import set d) None of the above 91. ServiceNow provides tables that are a staging area for data before

transformation is done and stored into ServiceNow target table. Where is this staging data is stored? a) In http Session b) In Mid server staging table c) third party staging table d) Import Set 92. An integration is done of third part tool in ServiceNow. Data is

inserted into import sets and data is transformed and stored into target table and all fields are being updated. Upon analysis it found that duplicate entries are being created. What could the possible cause of it? a) Fields are not mapped correctly b) Coalesce field is not setup correctly c) Transform scripts are wrong d) Nothing is wrong, write a business rule to delete duplicate records as they are found 93. Which of the following is a global object like gs? a) g_user b) g_form

c) JS: d) g_scratchpad 94. The Client Transaction Timings feature enhances the system logs by

providing more information on the durations of transactions between the client and the server. How do you enable the Client transaction timing? a) set the property glide.client.track_transaction_timings to true b) Install the Client Transaction Plugin c) Enable the system schedules d) Enable the system logs 95. You are loading the data into ServiceNow using Webservice. Which

of the following is being used to bring data into system? a) Rest API b) Script Webservice c) business rule d) Outbound SOAP Message 96. Which of the following is ServiceNow’ s StartNow Methodology to

manage implementation projects? a) Plan, Discover, Prepare, Deploy, Operate, Transform b) Plan, Discover, Operate, Deploy, Transform c) Prepare, Discover, Plan, Deploy, Operate, Transform a) Plan, Discover, Prepare , Deploy, Operate, 97. If your company wants to store firewall equipment details in

ServiceNow. How will you store it? a) create new standalone table b) create a table inherited from task table c) store in base cmdb table d) create new table inherited from cmdb_ci table 98. From which table task table is inherited? a) cmdb_ci b) sys_db_object c) Task table is not inherited from any table d) sys_dictionary 99. Which of the following can be used for row and column level

security? a) client script b) UI Policy c) display business rule d) ACL

Which of the following is called before data is queried and presented to user for display?

100.

a) business rule b) client script c) ACL d) UI Policy 101. How do you start the debugging of security rules? a) start debugging b) debug security c) watch field name d) debug business rules 102. Which Database is used by ServiceNow? a) Oracle b) MSSQL c)Sybase d) MySQL 103. Which Webserver is used by ServiceNow? a)Tomcat b)WebLogic c)WebSphere d)None of the above 104. Which protocol is used to connect mid server and ServiceNow? a) http b) https c) FTP d) soap 105. Which table stores the details of table and inheritance? a) task b) sys_db_object c)cmdb_ci_relationship d) sys_audit

106. Within the ServiceNow application, a technical consultant has created and tested a new Outbound SOAP Message. In order for the consultant to invoke the new SOAP message within the ServiceNow application, which of the following can be created? a) UI Policy b) Business Rule c) UI Property d) Import Set

107. Which one of the following is a valid reason for a customer to obtain a VPN connection for their ServiceNow implementation? a) Encrypt end user access to ServiceNow

b) Encrypt a SOAP message to ServiceNow c) Encrypt communication between a MID Server and a customer ServiceNow instance d) Encrypt the communication path between a customer ServiceNow instance and their enterprise mail server

108. Which one of the following would improve the performance of loading forms within ServiceNow? a) b) c) d)

Reduce the number of related lists configured for a form Increase the number of client scripts for a table Reduce the number of read only fields defined for a form Reduce the number of mandatory fields defined for a form

109. Which one of the following is the proper syntax for accessing the values of variables from the record producer script field? a) b) c) d)

g_form.getReference('variable_name') g_form.getVariable('variable_name') producer.variable_name current.variable_name

110. What stage is this? setup ServiceNow project team setup customer project team setup risk register training sysadmins kickoff workshop customer project team training GOAL : project setup and kicked off Stage 1a: Plan

111.

Who handles:

Overall ServiceNow lead for deployment Peer to customer management and project manager Overall deployment success and customer value Ans: Engagement Manager

112.

Who helps:

Customers with knowledge transfer Development help/support Ans: Technical consultant

113.

Who leads:

Process gap analysis workshops Helps define backlog of requirements to be implemented

Ans: Business process consultant

114.

Who develops:

Strategy for integration Development of the integration points to and from ServiceNow Ans: integration consultant

115.

Who handles:

Instance build and physical environment optimization Datacenter network and connectivity Ans: cloud infrastructure

116.

Who handles:

Visible active and knowledgeable Able to clear road blocks Ans: executive sponsorship

117.

Who handles :

involved with driving priority decision maker tracks scope creep and provides visibility Ans: it manager/director

118.

Who handles :

Hands on Tailors app to business requirements Ans: system admin

119.

Who handles :

Complete definition of current & future processes, Testing, Ensures application maps to business Ans: business process owners

120. What stage is this? Review objectives risk register core system setup initiated apply coding standards GOAL : Core system setup Ans: Stage 2 : Prepare

121.

What stage of engagement methodology is this in?

Base data loads LDAP integration Common data imported Apply coding standards Ans: Stage 2 : Prepare

122.

What stage is this?

Production Readiness Review Review Objectives Risk Register Build out functionality Training GOAL : Processes implemented Ans: Stage 3 : Deploy 123. When should you perform the following? Instance sizing, instance config, hardware, monitoring, network, support transitioning Ans: at least 3 weeks before go live 124. What process is this? Typically done through 'enablement' approach customer resources working side by side with ServiceNow review with process owners change if gaps appear between requirements & development Ans: Build out functionality in Stage 3 : Deploy

125.

What sage is this?

Production Cloud Admin Services initiated Customer success manager assigned GOAL: Platform live Ans: Stage 4 : Operate

126.

What process is this?

Cloning of instances Integration all operational Test data cleared down Ans: Cut over to production of Stage 4 : Operate

127.

When should the following actions be performed?

Update the welcome page Create diff look for each instance (banner name/color) Change email prop notifications to prevent users from getting msgs from sub prod Restrict user access and modify ldap to disable imports and updates Disable active scheduled jobs like imports/reports Ans: cloning back to dev and test from prod

128.

What are the options for post go-live development?

Ans: merge dev sets before pushing up environments OR do one dev update set at a time

129.

What are VPNs used for typically?

Ans: securing connections that originate at ServiceNow and destined for customer network access to LDAP JDBC access with customer DB

130.

How are vpn request submitted?

Ans: self-service form in customer support system called HI

131.

Should end users have to go through vpn for ServiceNow?

Ans: No

132.

What are the two uses for ldap

Ans: 1) data population and 2) authenticatoin

133.

Determine the type of communication channel

define ldap server provide ldap server login scredentials set connection pros & test connection define OU's create data source and transform map create and execute scheduled import Ans: ldap set up procedure

134.

Do you map roles to users?

Ans: no, to groups

135.

What purpose does a schedule provide?

Ans: for inactivity monitor and time-based SLAs

136.

What are the ways of populating CMDB?

Ans: 1) automated discovery product 2) Importing the information from anotehr source 3) Integrating with existing external CMDBs

137.

CRWD stands for

Ans: create read write delete

138.

How do you restrict access and enable contextual security?

Ans: ACLs

139.

You can enable CRWD for

Ans: 1) system access 2) Application and module access 3) table/field access

140.

each time you add a table you are

Ans: creating a dictionary application module

141.

apps and modules are governed by

Ans: roles

142.

table and field are governed by

Ans: ACL

143.

ACL rules are defined by

Ans: 1) Conditional expressions - "category is database" 2) Scripts - custom script written for security access 3) Roles - user require to have one of the defined roles to perform actions

144.

Secure or develop first?

Ans: secure

145.

Standard integrations for ServiceNow are?

Ans: 1) login 2) Data & processes 3) Communications 4) LDAP 5) Monitoring 6) Discovery& systems management 7) ERP 8) Change management

146.

Webservice components supported?

Ans: 1) soap 2) xml 3) wsdl 4) http

147. Does ServiceNow support consuming or publishing web services? Ans: both

148.

What is scripted web service

Ans: custom web service in javascript

149.

What happens if web service publisher is behind firewall?

Ans: use mid server

150.

How do ServiceNow place data into soap response from DB

Ans: transform map

151.

How do you access default wsdl service for tables

Ans: add ?WSDL eg. :incident.do?WSDL

152.

What hardware limitation is related to license count?

Ans: memory

153.

Query optimizations

Ans: 1) add indexes 2) Limit number of columns returned

154.

Optimization for size of table/ number rows

Ans: cleanup and import set deletion

155.

How to access transaction logs?

Ans: system logs > transactions after enabling system property

156.

To view average response time of transactions

Ans: right click on column Personalize>list calculations Check average value

157.

Common solutions for slow transaction times?

Ans: using indexes intelligently

158. Performance metrics graphs can be viewed for what 8 functional areas? Ans: 1) database 2) Discovery 3) Disk partitions 4) Linux stats logging 5) MySQL overview 6) Node metrics 7) Replication 8) ServiceNow servlet

159. Which of the scripts execution order is decided by System and not by System Administrator? a) b) c) d)

Business rule Script Actions UI Actions Script Includes

160. While fetching a large report, how can we enhance system performance? a) By disabling browser cache b) By increasing the refresh time interval

c) By decreasing homepage gauges d) By editing the homepage

161. a) b) c) d)

Task table comes under which class? Parent class Root class Primary class Extended class

162. Change task table is extended from task table, which of the following is true for short description field? a) Short description is same as of task table b) You can have two short description, you can create one more by right click and personalize. c) Short description is same as of task table and is overridden from task table

163.

Business rule runs on which layer?

a) Protocol b) Scripting c) Application

164.

LOG[] function is related to which table

a) Transaction log b) System logs

165. When you purchase a new instance from service now, which of the following is available by default Ans: High Security

166.

LDAP and LDAPs ports?

Ans: 389 and 636

167. Which is the most important table in service now for integration? Ans: Import set

168. Which of the variable is global in business rules apart from current and previous? Ans: g_scratchpad

169. Which of the following is called before data is submitted and presented to user for display? a) b) c) d)

170.

Before After Async Display

which of the following is a structured query for web service

Ans: SOAP

171.

What is WSDL?

a) It is a xml doc b) It is a html doc which is used by web service c) It is a http doc

172. a) b) c) d)

What is the default format of the email coming to service now? POP3(incoming) SMTP(outgoing) SNMP IMAP

173. When an email is received in service now, two inbound actions got triggered, how can we stop 2nd inbound action from triggering? Ans: Event.state= “stop_processing”

174. In LDAP, how can we use other ports rather than using default port? Ans: By appending port number after IP address in the server url.

175.

What is the Application/Database/Web Server in ServiceNow?

Ans: J2EE/MySQL/Tomcat

176.

How do you modify the buttons in the related list?

Ans: Personalize/configure List Control

177. From where traffic starts in VPN during web service integration? a) b) c) d)

SNOW to customer network Customer network to SNOW SNOW to mid server Mid server to SNOW

178. If data is going to service now from third party, then web service acts as a? a) Consumer b) Publisher c) Both

179. a) b) c) d)

180. a) b) c) d)

181.

Which protocol is used for secure LDAP? http mid server LDAP with mid server LDAP

Which architecture is used for data Webservice integration. Data architecture Object oriented architecture Integrated architecture Service Oriented architecture

how data and process are segregated

Ans: Domain separation

182. In which phase of start now methodology, we do sprint/scrum planning? a) b) c) d) e) f)

Prepare Plan Deploy Discover Operate Transform

183. What is the Coding best Practices that ServiceNow doesn’t recommends? a) b) c) d)

184.

Right small server calls instead of large server calls Write getReference with callback Avoid Server calls unless required Use GlideAjax for Server calls

What is the production Methodology that ServiceNow uses?

a) SDLC b) Agile Scrum (Development Methodology) c) Waterfall

185.

How do you find the null value in the business rule?

a) By .NIL b) By .NULL

186.

How do you create the audit for particular table?

a) Audit checkbox in table dictionary only for Type = Collection b) Set audit – true in the table dictionary

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF