Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70
Pass the CA Technologies CA Unified Infrastructure Management CAT-540 Questions and answers with ExamsMirror
Exam CAT-540 Premium Access
View all detail and faqs for the CAT-540 exam
527 Students Passed
93% Average Score
95% Same Questions
You are a CA UIM administrator in a financial organization. Your company provides and hosts agency services in a highly secure network. In some cases, one operating system is shared to host multiple services for multiple agencies. Your manager has assigned you the task of managing and monitoring each server.
However, this must be done independently for each agency. You can deploy multiple robots on each server to independently monitor the services for each agency.
For the successful deployment of multiple robots, which steps must be included in your configuration plans? (Choose four.)
You have created a drop-down menu with several dashboards. Another UMP user wants to use this menu with
its dashboards. She asks you to send her the files. Which step should you perform?
In your CA UIM infrastructure, the primary and remote hubs are connected through a firewall. To deploy robots automatically from the remote hub for deployment inside the firewall, which steps do you need to perform? (Choose three.)
CA UIM fails to communicate with a device hosted on a network protected by a firewall. Which command is used to test the routing from the CA UIM server to the device and from the device to the CA UIM server?
In response to the needs of a specific customer, you create a group in Unified Service Manager (USM) with 600 servers. The group is populated with some baseline Monitoring Configuration Service (MCS) profiles for the cdm and processes probes. However, the customer subsequently tells you that 10 of the 600 servers require slightly different thresholds. Which action do you recommend?
In CA UIM 8.5.1. which probes are covered by Monitoring Configuration Service (MCS) templates? (Choose three.)
Which methods are valid for populating the snmpcollector? (Choose three.)
When you build an Auto-Operator (AO) profile, which action do you perform?
You check the contents of a package in the archive and notice that it only contains a single file with a .cfx
extension. What can you conclude from this?
You are a CA UIM administrator in a financial organization. Your manager wants you to manage and monitor
the highly secure network zone. The security policies do not allow any traffic to and from the highly secure
network zone over the non-standard firewall policies. The ports above 48000, which are used for CA UIM
communications, are considered to be nonstandard ports. To deploy bulk robots using CA UIM, which tasks are required?
1. Deploy a hub in the secure network zone and set up a tunnel.
2. Deploy a hub in the secure network zone but do not apply any probes to it.
3. Deploy the discovery_agent probe on the hub in the secure network zone.
4. Deploy the automated_deployment_engine (ade) probe on the hub in the secure network zone.
5. Ensure that HTTPS port 443 is open between the hub in the secure network zone and the tunnel server.
TOP CODES
Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.