Which statement about manipulating XML data in CA Process Automation is TRUE?
A. CA Process Automation defines its own XPath query syntax.
B. The applyXPath operator can be used to extract data from an XML document.
C. CA Process Automation contains no system functions related to XML or XPath.
D. In a CA Process Automation operator, if data returned from a Simple Object Access Protocol (SOAP) call is in XML format, you cannot retrieve the value of a specific XML element in this data.
When you plan your CA Process Automation deployment, which architecture-related factors should you consider? (Choose three)
A. Multiple domains can be added to an environment.
B. Installing a domain orchestrator creates a new CA Process Automation domain.
C. Orchestrators and agents communicate bidirectionally to perform process operations.
D. While agents can only exist in a single environment, orchestrators can be configured to be used in multiple environments.
E. A new universally unique identifier (UUID) is generated in the Domain .xml file to identify any new environments you create.
When you are storing multiple versions of an object on an orchestrator, which factors do you need to consider? (Choose two)
A. Any version can be edited and made current.
B. Only the last version of an object checked in can be edited.
C. Creating a baseline version enables you to check out and edit that baselined version.
D. When the orchestrator starts running the current version of an object, it makes a copy of that object.
You need to integrate CA Process Automation with an external application. A data value or status change in the application will result in a CA Process Automation process starting, continuing, or stopping. Which approach enables you to minimize any potential impact on performance?
A. Send an email into a mailbox monitored by a CA Process Automation mail trigger.
B. Continuously poll the external application from the CA Process Automation process to ascertain if data values or statuses in its database change.
C. Continuously check for a predefined file that the external application will be configured to create in a commonly accessible file system when data values or statuses change.
D. Send an event to CA Process Automation from the external application when data values or statuses change with a data payload, which will start, continue, or stop the execution of a designated CA Process Automation process.
The mail server for email notifications can be configured for all operators and processes by:
A. Setting the hostname variable.
B. Setting the outgoing mail server in Outlook.
C. Defining an SMTPServer variable within your process.
D. Modifying the SMTP Server for Outgoing e-mail setting in the Email module for the domain.
A Start Request Form (SRF) enables you to:
A. Retrieve information that is only available from a person at runtime.
B. Prompt the user from within a running process for a next course of action.
C. Create an interface that can be used during the execution of a process to interact with a user in a structured manner.
D. Create an interface that users can use to start a process instance and provide appropriate input at startup in a structured manner.
Which CA Process Automation tab enables you to monitor selected tasks and system elements managed by CA Process Automation?
A. Operations
B. Designer
C. Reports
D. Library
Why might you add a cluster node to a domain orchestrator? (Choose two)
A. To achieve high availability
B. To enable granular security
C. To set up independent databases
D. To extend the processing power of the domain orchestrator and improve performance
You want to break down large processes into smaller sections to increase readability. You also want the ability to define rules that are triggered when processing moves between these sections. Which CA Process Automation feature provides the functionality you require?
A. Boundaries
B. Swim lanes
C. Limit dividers
D. Highway lanes
When you configure host groups, which steps do you need to perform? (Choose three)
A. Lock the environment.
B. Associate the host group to at least one agent.
C. Specify the credentials to connect to the remote host using Secure Shell (SSH).
D. Create a trust relationship between the hosts in the group and a target remote host referenced in the group.
E. Specify the touch point name that content designers will use as the target for operations directed at the group.