Download Blue Prism.ATA02.CertKiller.2018-10-01.27q.vcex

Download Exam

File Info

Exam Designing a Blue Prism (Version 6.0) Environment
Number ATA02
File Name Blue Prism.ATA02.CertKiller.2018-10-01.27q.vcex
Size 20 KB
Posted Oct 01, 2018
Download Blue Prism.ATA02.CertKiller.2018-10-01.27q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Why is it important to control remote console access to the Runtime Resources? (Select 1)


  1. Because runtime resources are used to control the scheduling of processes
  2. Because runtime Resources will always have administrative level access to the Blue Prism database
  3. Because Runtime Resources will always have administrative level access to the Blue Prism control room
  4. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Correct answer: A



Question 2

Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)


  1. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
  2. The Database server should never be virtualized
  3. Virtualization is only supported on Vmware Hypervisor technology
  4. Virtualization should be considered only in very small environments
Correct answer: C



Question 3

By default what port does a Runtime Resource listen on? (Select 1)


  1. 8181 - but it is configurable
  2. 8199 - this is fixed and cannot be changed
  3. 443
  4. There is no default
Correct answer: A



Question 4

What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)


  1. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  2. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
  3. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  4. The communication between components requires the ability to resolve the IP address of the target machine by name
  5. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Correct answer: BCDE



Question 5

Where can the key used by the Credential Manager be stored? (Select 1)


  1. The key is always stored in the database
  2. The key is always stored within the config file on the Application Server
  3. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  4. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  5. The key can only be stored in the database or in the config file on the Application Server
Correct answer: D



Question 6

What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)


  1. Provide a high performance MPLS connection between sites
  2. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  3. Provide fully replicated Blue Prism environments in each geographic region where users are based
  4. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Correct answer: A



Question 7

What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)


  1. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  2. Consider deploying multiple Application Servers for each environment.
  3. Consider the impact of maintenance schedules on the availability of the environment.
  4. Deploy multiple instances of an application server service on a single VM.
Correct answer: BD



Question 8

What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)


  1. Existing Data Center and Virtualization strategies
  2. Support of the components
  3. Desktop and Application Virtualization Strategies
  4. Availability
  5. All of the above
Correct answer: C



Question 9

Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)


  1. The encryption of the remoting connection always uses AES256.
  2. The security of the connection is handled by WCF.
  3. Any of the WCF modes will provide full encryption of the connection.
  4. The security of the connection is handled by .NET remoting and the windows SSPI layer.
Correct answer: A



Question 10

When process automations are designed appropriately, which connections between Blue Prism devices can support high-latency? (Select 1)


  1. Interactive Clients to Runtime Resources
  2. Application Server to Runtime Resources
  3. Application Server to Database Server
  4. Application Server to Interactive Client
  5. No components can be supported over a high-latency connection
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files