Download Blue Prism.ATA02.TestKing.2018-10-11.19q.vcex

Download Exam

File Info

Exam Designing a Blue Prism (Version 6.0) Environment
Number ATA02
File Name Blue Prism.ATA02.TestKing.2018-10-11.19q.vcex
Size 16 KB
Posted Oct 11, 2018
Download Blue Prism.ATA02.TestKing.2018-10-11.19q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What should be considered when configuring high availability and disaster recovery scenarios for availability of Business Processes managed by Blue Prism? 
(Select 2) 


  1. Resource pools and Active Queues can be used to distribute work to Runtime Resources which are online
  2. The Runtime Resources are “stateful” devices, therefore any failure or maintenance event should also be taken into account in the process design and scheduling methodology
  3. Using a load balancer and 2 application servers will ensure high availability of an automated process
  4. Use the setting within a Blue Prism Process to force a process to fail over to an alternative Runtime Resource in the event of a failure.
Correct answer: AC



Question 2

When is virtualization of a dedicated Interactive Client System most appropriate? (Select 2)


  1. Interactive Clients should never be virtualized
  2. For Process Development - it helps to ensure the Interactive Client has the same configuration as the virtualized Runtime Resources
  3. Where the developers are geographically separate to the Blue Prism environment
  4. To ensure a high-latency connection between the Interactive Client and the Application Server
  5. Whenever runtime resources are virtualized
Correct answer: CD
Explanation:



Question 3

What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)


  1. The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft
  2. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key
  3. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application
  4. Credential Management is handled using session variables and security is applied based on the process logic that is defined.
Correct answer: A



Question 4

What is the difference between a Runtime Resource and a Process? (Select 1)


  1. There is no difference, the terms are synonymous
  2. A Process represents a definition of the automation steps and logic; Runtime Resources execute the steps defined within a Process
  3. A Process represents a definition of the automation steps and logic; and a Runtime Resource is an executable containing all of the logic within a single process.
  4. A Runtime Resource represents a collection of Processes which is used as part of Release Management
Correct answer: C



Question 5

Why is it important to control remote console access to the Runtime Resources? (Select 1)


  1. Because runtime resources are used to control the scheduling of processes
  2. Because runtime Resources will always have administrative level access to the Blue Prism database
  3. Because Runtime Resources will always have administrative level access to the Blue Prism control room 
  4. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Correct answer: A



Question 6

By default what port does a Runtime Resource listen on? (Select 1)


  1. 8181 - but it is configurable
  2. 8199 - this is fixed and cannot be changed
  3. 443
  4. There is no default
Correct answer: A



Question 7

What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)


  1. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  2. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
  3. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  4. The communication between components requires the ability to resolve the IP address of the target machine by name
  5. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Correct answer: BCDE
Explanation:



Question 8

What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1) 


  1. Provide a high performance MPLS connection between sites
  2. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  3. Provide fully replicated Blue Prism environments in each geographic region where users are based
  4. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Correct answer: A



Question 9

What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)


  1. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  2. Consider deploying multiple Application Servers for each environment.
  3. Consider the impact of maintenance schedules on the availability of the environment.
  4. Deploy multiple instances of an application server service on a single VM.
Correct answer: BD
Explanation:



Question 10

What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)


  1. Existing Data Center and Virtualization strategies
  2. Support of the components
  3. Desktop and Application Virtualization Strategies
  4. Availability
  5. All of the above
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files