1.
Which component requires port 4334 for connecting to the primary hub?
2.
The CA UIM infrastructure is organized into a hierarchy. From the top, what is the second highest level in the hierarchy?
3.
In a three-tier CA UIM architecture of primary, proxy, and robot hubs, with firewalls between tiers, where is the tunnel server normally located?
4.
The Package Archive encompasses the Local Archive and the Web Archive, from which you deploy probes to robots. Which feature characterizes the Local Archive?
5.
In Unified Services Manager (USM), you are attempting to discover Linux/UNIX servers on a remote site using the Discovery Wizard. However, no servers are discovered. You know that several servers exist at the remote site, as does a firewall with TCP ports 48000 to 48030 open. Earlier, you successfully deployed robots on Windows and Linux target servers. In addition, Quality of Service (QoS) data is visible. Why is the Discovery Wizard failing to locate the servers?
6.
CA UIM fails to communicate with a device hosted on a network protected by a firewall. Which command is used to test the routing from the CA UIM server to the device and from the device to the CA UIM server?
7.
CA UIM server components automate the discovery of hosts and devices throughout your network. For discovery, which protocols are supported?
8.
You are a CA UIM administrator in a financial organization. Your company provides and hosts agency services in a highly secure network. In some cases, one operating system is shared to host multiple services for multiple agencies. Your manager has assigned you the task of managing and monitoring each server. However, this must be done independently for each agency. You can deploy multiple robots on each server to independently monitor the services for each agency. For the successful deployment of multiple robots, which steps must be included in your configuration plans? (Choose four.)
9.
You completed the nimldr installation on several Linux distributions. Now you need to enable the nimbus service. Which Linux command should you run to enable the service?
10.
You are a CA UIM administrator in a financial organization. Your manager wants you to manage and monitor the highly secure network zone. The security policies do not allow any traffic to and from the highly secure network zone over the non-standard firewall policies. The ports above 48000, which are used for CA UIM communications, are considered to be nonstandard ports. To deploy bulk robots using CA UIM, which tasks are required? 1. Deploy a hub in the secure network zone and set up a tunnel. 2. Deploy a hub in the secure network zone but do not apply any probes to it. 3. Deploy the discovery_agent probe on the hub in the secure network zone. 4. Deploy the automated_deployment_engine (ade) probe on the hub in the secure network zone. 5. Ensure that HTTPS port 443 is open between the hub in the secure network zone and the tunnel server.