CA UIM fails to communicate with a device hosted on a network protected by a firewall. Which command is used to test the routing from the CA UIM server to the device and from the device to the CA UIM server?
You have created a drop-down menu with several dashboards. Another UMP user wants to use this menu with
its dashboards. She asks you to send her the files. Which step should you perform?
In a three-tier CA UIM architecture of primary, proxy, and robot hubs, with firewalls between tiers, where is the tunnel server normally located?
In CA UIM 8.5.1. which probes are covered by Monitoring Configuration Service (MCS) templates? (Choose three.)
You are a CA UIM administrator in a financial organization. Your manager wants you to manage and monitor
the highly secure network zone. The security policies do not allow any traffic to and from the highly secure
network zone over the non-standard firewall policies. The ports above 48000, which are used for CA UIM
communications, are considered to be nonstandard ports. To deploy bulk robots using CA UIM, which tasks are required?
1. Deploy a hub in the secure network zone and set up a tunnel.
2. Deploy a hub in the secure network zone but do not apply any probes to it.
3. Deploy the discovery_agent probe on the hub in the secure network zone.
4. Deploy the automated_deployment_engine (ade) probe on the hub in the secure network zone.
5. Ensure that HTTPS port 443 is open between the hub in the secure network zone and the tunnel server.
You are planning your hub-to-hub communication strategy. To ensure that each hub transports its messages up to the next tier efficiently, which guideline should you follow?