In a highly available CA Process Automation deployment, what is the main role of the Apache software load balancer?
A. To prevent unauthorized access to the CA Process Automation UI and Web services
B. To dynamically direct incoming UI and Web Services requests to another CA Process Automation orchestrator
C. To dynamically direct incoming UI and Web Services requests to nodes in a CA Process Automation orchestrator cluster
D. To set up and limit the total number of incoming UI and Web Services requests to a CA Process Automation orchestrator cluster
Avoid using named datasets to store:
A. Credentials for use as login information for a system management tool.
B. Configuration information that will be used in several different processes.
C. Information for one-time use, such as Simple Object Access Protocol (SOAP) session IDs.
D. Error messages that will be printed out and used by only a small subset of processes in the Ii bra ry.
You have installed a CA Process Automation agent on a host. Now you want to associate the current environment with the agent host. To do this, you need to configure:
A. A module.
B. A touch point.
C. The domain orchestrator.
D. CA Embedded Entitlements Manager (CA EEM).
Which data types can you use for dataset variables? (Choose three)
A. Char
B. String
C. Double
D. ValueMap
E. XML Fragment
When planning your CA Process Automation implementation in production environments, you might need to consider factors such as high availability, fault tolerance, and scalability. Which capabilities help ensure that your automation solution meets such requirements? (Choose two)
A. Executing a large amount of process instances concurrently
B. Continuing process execution if an individual orchestrator or agent node fails
C. Completing the execution of any given process instance within a defined period
D. Continuing to run CA Process Automation processes in another environment if the main environment completely fails
When you plan your CA Process Automation deployment, which architecture-related factors should you consider? (Choose three)
A. Multiple domains can be added to an environment.
B. Installing a domain orchestrator creates a new CA Process Automation domain.
C. Orchestrators and agents communicate bidirectionally to perform process operations.
D. While agents can only exist in a single environment, orchestrators can be configured to be used in multiple environments.
E. A new universally unique identifier (UUID) is generated in the Domain .xml file to identify any new environments you create.
You want to define a rule to run a set of tasks on the last day of each month. You create an object and name it LastOpenDayofMonth, which will be used to specify the time to run backups and monthly reports. The object you created, which contains the necessary rule, is a:
A. Policy object.
B. Calendar object.
C. Resource object.
D. Schedule object.
Before you install a CA Process Automation domain orchestrator, which components must be already installed? (Choose three)
A. JBoss
B. Database
C. Java Development Kit (JDK)
D. Java Runtime Environment (JRE)
E. CA Embedded Entitlements Manager (CA EEM)
The mail server for email notifications can be configured for all operators and processes by:
A. Setting the hostname variable.
B. Setting the outgoing mail server in Outlook.
C. Defining an SMTPServer variable within your process.
D. Modifying the SMTP Server for Outgoing e-mail setting in the Email module for the domain.
To invoke a Start Request Form (SRF):
A. Run the process containing the SRF.
B. Use the Assign User Request operator.
C. On the Library tab, right-click the SRF and click Start.
D. Open the SRF in Form Designer and click the green Start button on the toolbar.
You recently assigned Indira Chopra to the Environment Configuration Administrator role. With the associated rights, Indira will be able to override various inherited settings. However, Indira will be unable to overwrite settings at the:
A. Agent level.
B. Domain level.
C. Orchestrator level.
D. Environment level.
Which features characterize CA Process Automation package objects? (Choose three)
A. They are exported as Java Archive (JAR) files.
B. They can contain multiple versions of the same object.
C. They enable you to define a collection of shortcuts to objects.
D. They can be distributed with unrelated objects between several folders.
E. They are primarily used to define and group variables that are used as parameters by multiple processes.
At which level do you enable process runtime security?
A. Environment
B. Orchestrator
C. Domain
D. Agent
You want to break down large processes into smaller sections to increase readability. You also want the ability to define rules that are triggered when processing moves between these sections. Which CA Process Automation feature provides the functionality you require?
A. Boundaries
B. Swim lanes
C. Limit dividers
D. Highway lanes
Because a host in your environment contains social security numbers, you need to restrict access to a small high-privilege group. You have been asked to investigate and implement the touchpoint security feature of CA Process Automation. To help ensure a successful touchpoint security implementation, which factor do you need to consider?
A. It is an orchestrator-level property that can be enforced at the orchestrator level only.
B. The default inherited enforcement ensures non-secure processes only run if you disable touch point security.
C. Even if you enforce it, it will not function unless you also configure a CA Embedded Entitlements Manager (CA EEM) policy.
D. For touch point security policies, best practice is to directly name the operators that act on touchpoints you want to secure.