Certbus > CA > Professional > CAT-500 > CAT-500 Online Practice Questions and Answers

CAT-500 Online Practice Questions and Answers

Questions 4

In a highly available CA Process Automation deployment, what is the main role of the Apache software load balancer?

A. To prevent unauthorized access to the CA Process Automation UI and Web services

B. To dynamically direct incoming UI and Web Services requests to another CA Process Automation orchestrator

C. To dynamically direct incoming UI and Web Services requests to nodes in a CA Process Automation orchestrator cluster

D. To set up and limit the total number of incoming UI and Web Services requests to a CA Process Automation orchestrator cluster

Browse 50 Q&As
Questions 5

Avoid using named datasets to store:

A. Credentials for use as login information for a system management tool.

B. Configuration information that will be used in several different processes.

C. Information for one-time use, such as Simple Object Access Protocol (SOAP) session IDs.

D. Error messages that will be printed out and used by only a small subset of processes in the Ii bra ry.

Browse 50 Q&As
Questions 6

You have installed a CA Process Automation agent on a host. Now you want to associate the current environment with the agent host. To do this, you need to configure:

A. A module.

B. A touch point.

C. The domain orchestrator.

D. CA Embedded Entitlements Manager (CA EEM).

Browse 50 Q&As
Questions 7

Which data types can you use for dataset variables? (Choose three)

A. Char

B. String

C. Double

D. ValueMap

E. XML Fragment

Browse 50 Q&As
Questions 8

When planning your CA Process Automation implementation in production environments, you might need to consider factors such as high availability, fault tolerance, and scalability. Which capabilities help ensure that your automation solution meets such requirements? (Choose two)

A. Executing a large amount of process instances concurrently

B. Continuing process execution if an individual orchestrator or agent node fails

C. Completing the execution of any given process instance within a defined period

D. Continuing to run CA Process Automation processes in another environment if the main environment completely fails

Browse 50 Q&As
Questions 9

When you plan your CA Process Automation deployment, which architecture-related factors should you consider? (Choose three)

A. Multiple domains can be added to an environment.

B. Installing a domain orchestrator creates a new CA Process Automation domain.

C. Orchestrators and agents communicate bidirectionally to perform process operations.

D. While agents can only exist in a single environment, orchestrators can be configured to be used in multiple environments.

E. A new universally unique identifier (UUID) is generated in the Domain .xml file to identify any new environments you create.

Browse 50 Q&As
Questions 10

You want to define a rule to run a set of tasks on the last day of each month. You create an object and name it LastOpenDayofMonth, which will be used to specify the time to run backups and monthly reports. The object you created, which contains the necessary rule, is a:

A. Policy object.

B. Calendar object.

C. Resource object.

D. Schedule object.

Browse 50 Q&As
Questions 11

Before you install a CA Process Automation domain orchestrator, which components must be already installed? (Choose three)

A. JBoss

B. Database

C. Java Development Kit (JDK)

D. Java Runtime Environment (JRE)

E. CA Embedded Entitlements Manager (CA EEM)

Browse 50 Q&As
Questions 12

The mail server for email notifications can be configured for all operators and processes by:

A. Setting the hostname variable.

B. Setting the outgoing mail server in Outlook.

C. Defining an SMTPServer variable within your process.

D. Modifying the SMTP Server for Outgoing e-mail setting in the Email module for the domain.

Browse 50 Q&As
Questions 13

To invoke a Start Request Form (SRF):

A. Run the process containing the SRF.

B. Use the Assign User Request operator.

C. On the Library tab, right-click the SRF and click Start.

D. Open the SRF in Form Designer and click the green Start button on the toolbar.

Browse 50 Q&As
Questions 14

You recently assigned Indira Chopra to the Environment Configuration Administrator role. With the associated rights, Indira will be able to override various inherited settings. However, Indira will be unable to overwrite settings at the:

A. Agent level.

B. Domain level.

C. Orchestrator level.

D. Environment level.

Browse 50 Q&As
Questions 15

Which features characterize CA Process Automation package objects? (Choose three)

A. They are exported as Java Archive (JAR) files.

B. They can contain multiple versions of the same object.

C. They enable you to define a collection of shortcuts to objects.

D. They can be distributed with unrelated objects between several folders.

E. They are primarily used to define and group variables that are used as parameters by multiple processes.

Browse 50 Q&As
Questions 16

At which level do you enable process runtime security?

A. Environment

B. Orchestrator

C. Domain

D. Agent

Browse 50 Q&As
Questions 17

You want to break down large processes into smaller sections to increase readability. You also want the ability to define rules that are triggered when processing moves between these sections. Which CA Process Automation feature provides the functionality you require?

A. Boundaries

B. Swim lanes

C. Limit dividers

D. Highway lanes

Browse 50 Q&As
Questions 18

Because a host in your environment contains social security numbers, you need to restrict access to a small high-privilege group. You have been asked to investigate and implement the touchpoint security feature of CA Process Automation. To help ensure a successful touchpoint security implementation, which factor do you need to consider?

A. It is an orchestrator-level property that can be enforced at the orchestrator level only.

B. The default inherited enforcement ensures non-secure processes only run if you disable touch point security.

C. Even if you enforce it, it will not function unless you also configure a CA Embedded Entitlements Manager (CA EEM) policy.

D. For touch point security policies, best practice is to directly name the operators that act on touchpoints you want to secure.

Browse 50 Q&As
Exam Code: CAT-500
Exam Name: CA Process Automation r4.x Professional Exam
Last Update: Apr 25, 2024
Questions: 50 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99