Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You have decided that it is unnecessary to show socket-level metrics in your system and want to disable the SocketTracing tracer group. Which command will enable you to do this?

A.

TurnOff: SocketTracing

B.

//TurnOn: SocketTracing

C.

--TurnOn: SocketTracing

D.

#TurnOn: SocketTracing

Which metric type measures the number of requests completed over a period of time?

A.

Errors Per Interval

B.

Responses Per Interval

C.

Average Response Time

D.

Approximate Instance Count

You are creating a Report Template for an incident that took place recently. For the metrics you include in the report, you want to visually mark the time period and the threshold values that were crossed. Which element type will enable you to do this?

A.

Table

B.

Graph

C.

Pie chart

D.

Bar chart

While viewing Investigator, you notice that metric values are acceptable, but you want to determine whether there are any outlying Servlet Response Times exceeding threshold limits. Which Workstation feature enables you to do this?

A.

Metric data

B.

Boundary Blame

C.

View Historical Data

D.

Minimum and Maximum Metric values

Which information can you view using the Summary View tab of the CA Introscope Transaction Tracer? (Choose three)

A.

Color codes, which indicate call durations

B.

The number of times a URL was accessed

C.

The number of milliseconds to complete the call

D.

The number of milliseconds required for the fastest call completion

E.

The number of transaction components affected, shown using a hierarchical format

When creating a report, where do you specify the metrics on which the report is based?

A.

Text tab

B.

Data Properties tab

C.

Display Properties tab

D.

Default Data Properties tab

A summary alert notification includes: (Choose three)

A.

Time stamps.

B.

Transaction traces.

C.

A summary alert name.

D.

The current state of the summary alert.

E.

Details of the user-defined time period for checking the current state of each underlying simple alert.

Deleting a management module:

A.

removes the associated jar file from the operating system of the Enterprise Manager.

B.

does not remove the .jar file from the operating system of the Enterprise Manager and makes no changes to the file.

C.

does not remove the .jar file from the operating system of the Enterprise Manager, but copies it to a folder named MM_old.

D.

does not remove the jar file from the operating system of the Enterprise Manager, but renames it by appending the suffix ".inactive".

You are configuring the Environment Performance Agent (EPA) that came bundled with your Enterprise Manager. Which configuration file do you use?

A.

EPAgent.pbd

B.

IntroscopeAgent.properties

C.

IntroscopeEPAgent.properties

D.

IntroscopeEnterpriseManager.properties

Which statement about CA Customer Experience Manager (CA CEM) domains is TRUE?

A.

A domain cannot contain applications.

B.

A domain can contain multiple applications.

C.

A domain can only contain a single application.

D.

An application managed by CA CEM is known as a domain.