Download Designing a Blue Prism (Version 6-0) Environment.PracticeTest.ATA02.2018-10-25.1e.17q.vcex

Download Dump

File Info

Exam Designing a Blue Prism (Version 6.0) Environment
Number ATA02
File Name Designing a Blue Prism (Version 6-0) Environment.PracticeTest.ATA02.2018-10-25.1e.17q.vcex
Size 14 Kb
Posted October 25, 2018
Downloaded 2



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
What should be considered when configuring high availability and disaster recovery scenarios for availability of Business Processes managed by Blue Prism? (Select 2)

  • A: Resource pools and Active Queues can be used to distribute work to Runtime Resources which are online
  • B: The Runtime Resources are “stateful” devices, therefore any failure or maintenance event should also be taken into account in the process design and scheduling methodology
  • C: Using a load balancer and 2 application servers will ensure high availability of an automated process
  • D: Use the setting within a Blue Prism Process to force a process to fail over to an alternative Runtime Resource in the event of a failure.



Question 2
When is virtualization of a dedicated Interactive Client System most appropriate? (Select 2)

  • A: Interactive Clients should never be virtualized
  • B: For Process Development - it helps to ensure the Interactive Client has the same configuration as the virtualized Runtime Resources
  • C: Where the developers are geographically separate to the Blue Prism environment
  • D: To ensure a high-latency connection between the Interactive Client and the Application Server
  • E: Whenever runtime resources are virtualized



Question 3
What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)

  • A: The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft
  • B: The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key
  • C: The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application
  • D: Credential Management is handled using session variables and security is applied based on the process logic that is defined.



Question 4
What is the difference between a Runtime Resource and a Process? (Select 1)

  • A: There is no difference, the terms are synonymous
  • B: A Process represents a definition of the automation steps and logic; Runtime Resources execute the steps defined within a Process
  • C: A Process represents a definition of the automation steps and logic; and a Runtime Resource is an executable containing all of the logic within a single process.
  • D: A Runtime Resource represents a collection of Processes which is used as part of Release Management



Question 5
Why is it important to control remote console access to the Runtime Resources? (Select 1)

  • A: Because runtime resources are used to control the scheduling of processes
  • B: Because runtime Resources will always have administrative level access to the Blue Prism database
  • C: Because Runtime Resources will always have administrative level access to the Blue Prism control room
  • D: Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with



Question 6
By default what port does a Runtime Resource listen on? (Select 1)

  • A: 8181 - but it is configurable
  • B: 8199 - this is fixed and cannot be changed
  • C: 443
  • D: There is no default



Question 7
What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)

  • A: If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  • B: If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
  • C: A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  • D: The communication between components requires the ability to resolve the IP address of the target machine by name
  • E: If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.



Question 8
What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)

  • A: Provide a high performance MPLS connection between sites
  • B: Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  • C: Provide fully replicated Blue Prism environments in each geographic region where users are based
  • D: Nominate a user in the central location who will receive releases from each remote user and apply them to the system



Question 9
What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)

  • A: Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  • B: Consider deploying multiple Application Servers for each environment.
  • C: Consider the impact of maintenance schedules on the availability of the environment.
  • D: Deploy multiple instances of an application server service on a single VM.



Question 10
What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)

  • A: Existing Data Center and Virtualization strategies
  • B: Support of the components
  • C: Desktop and Application Virtualization Strategies
  • D: Availability
  • E: All of the above









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset