Want to pass your CA Process Automation r4.x Professional Exam CAT-500 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
You are upgrading from CA Process Automation 3.1 SP1 to the latest release. If you use SQL Server in your implementation, you will need to configure SQL Server to support:
A. Hex transactions.
B. Binary transactions.
C. Binary Large Object (BLOB) transactions.
D. Extended Distributed Transactions (XA) transactions.
The process you are designing requires parameters to be passed to a child process. You will therefore need to edit the data initialization code of the Start Process operator. To pass the parameters to the child process, which syntax should you use?
A. Process.x = Caller.x;
B. Caller.x = Process.x;
C. Process.x == Caller.x;
D. Process. x = Process. y;
Because a host in your environment contains social security numbers, you need to restrict access to a small high-privilege group. You have been asked to investigate and implement the touchpoint security feature of CA Process Automation. To help ensure a successful touchpoint security implementation, which factor do you need to consider?
A. It is an orchestrator-level property that can be enforced at the orchestrator level only.
B. The default inherited enforcement ensures non-secure processes only run if you disable touch point security.
C. Even if you enforce it, it will not function unless you also configure a CA Embedded Entitlements Manager (CA EEM) policy.
D. For touch point security policies, best practice is to directly name the operators that act on touchpoints you want to secure.