New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Blue Prism ATA02 Designing a Blue Prism (Version 6.0) Environment Exam Practice Test

Demo: 6 questions
Total 45 questions

Designing a Blue Prism (Version 6.0) Environment Questions and Answers

Question 1

What are benefits of using Active Directory Single Sign-on for Blue Prism? (Select 2)

Options:

A.

Policies applied by Active Directory such as multi-factor authentication and password complexity are applied to Blue Prism

B.

It makes it possible to add custom security roles in Blue Prism

C.

Users are assigned security roles based on their group membership in Active Directory

D.

Data encryption between Blue Prism devices is provided by default

Question 2

Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)

Options:

A.

Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version

B.

The Database server should never be virtualized

C.

Virtualization is only supported on Vmware Hypervisor technology

D.

Virtualization should be considered only in very small environments

Question 3

Which of the following should be taken into account, when considering Automating applications that are delivered via Application Virtualization or layering Software (such as VMWare Horizon App Volumes, or Citrix XenDisk)? (Select 3)

Options:

A.

There may be additional implications to the overall complexity of the architecture, due to the additional components involved in the virtualization technology

B.

It will only ever be possible to use Surface Automation to Automate these applications

C.

The Login Agent application must be available prior to User Login

D.

The mapping between virtualized applications and users is often 1:1. This needs to be considered when designing the credential management approach for the Runtime Resources

E.

Customizations to the application may be lost after the user is logged out or the system is rebooted, unless additional mechanisms are used to preserve them

F.

Surface Automation will always need to be used in these scenarios

Question 4

Which of the following are supported connection modes within a V6 Blue Prism environment? (Select 2)

Options:

A.

WCF: Soap with Message Encryption and Windows Authentication

B.

WCF: Soap with Remote Encryption

C.

WCF: Soap with Transport Encryption

D.

.NET Remoting with Transport Encryption

E.

HTTPS Connection mode

Question 5

What network connections should be considered, when deploying runtime resources on the other side of a firewall from the Application server? (Select 2)

Options:

A.

Remoting connections between Application server and runtime resource

B.

Instructional communications between Interactive Clients and Runtime resource

C.

Database connection between the database server and Runtime resource

D.

Inbound web services connections from the Application server to Runtime resource

Question 6

What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)

Options:

A.

The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft

B.

The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key

C.

The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application

D.

Credential Management is handled using session variables and security is applied based on the process logic that is defined.

Demo: 6 questions
Total 45 questions