Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Blue Prism ATA02 Designing a Blue Prism (Version 6.0) Environment Exam Practice Test

Page: 1 / 5
Total 45 questions

Designing a Blue Prism (Version 6.0) Environment Questions and Answers

Question 1

Which of the following should be taken into account, when considering using a Virtual desktop for the Runtime Resource using Virtual Desktop Infrastructure (VDI) or Hosted Virtual Desktop (HVD) Software (such as Citrix XenDesktop or Vmware Horizon View)? (Select 2)

Options:

A.

When using a non-persistent Virtual Desktop, the image may be refreshed and this could be problematic if not carefully managed.

B.

It may be necessary to use the Blue Prism login agent or another automatic login method, to instantiate the Virtual Desktop session.

C.

The Runtime Resources should not be deployed on Virtual Desktop Infrastructure.

D.

It is always appropriate to use the same technology and strategy as is used for the human operators in the client environment.

Question 2

Which components of the Blue Prism solution may be supported via Presentation / Session Virtualization Software (such as Microsoft RDSH session virtualization)? (Select 1)

Options:

A.

Runtime Resource

B.

Interactive Client (for Monitoring and Control)

C.

Interactive Client (for development)

D.

Application Server

E.

All of the above

Question 3

Which of the following statements is true, when considering the Virtualization of Blue Prism? (Select 2)

Options:

A.

Type 1 hypervisors, such as VMWare Vsphere and Citrix XenServer should be used for production grade deployments of Blue Prism.

B.

Type 2 hypervisors, such as Oracle Virtualbox and Vmware Workstation may be used for production grade deployments of Blue Prism.

C.

All desktop virtualization strategies are suitable for deployment of Runtime Resources.

D.

Consideration should be given to the system resource requirements of the automated applications, on top of the Blue Prism minimum specifications.

E.

The Blue Prism minimum specifications should be sufficient for all use cases.

Question 4

What are appropriate methods for designing high availability and disaster recovery scenarios for the Blue Prism Database? (Select 3)

Options:

A.

SQL Always on Availability Groups

B.

Windows Clustering

C.

Replication

D.

Blue Prism Active Sync

E.

Connect an application server to 2 Database Instances in parallel

Question 5

What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)

Options:

A.

The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft

B.

The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key

C.

The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application

D.

Credential Management is handled using session variables and security is applied based on the process logic that is defined.

Question 6

Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)

Options:

A.

The encryption of the remoting connection always uses AES256.

B.

The security of the connection is handled by WCF.

C.

Any of the WCF modes will provide full encryption of the connection.

D.

The security of the connection is handled by .NET remoting and the windows SSPI layer.

Page: 1 / 5
Total 45 questions