Download Designing a Blue Prism (Version 6.0) Environment.ATA02.CertKiller.2018-10-01.27q.vcex

Vendor: Blue Prism
Exam Code: ATA02
Exam Name: Designing a Blue Prism (Version 6.0) Environment
Date: Oct 01, 2018
File Size: 20 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Why is it important to control remote console access to the Runtime Resources? (Select 1)
  1. Because runtime resources are used to control the scheduling of processes
  2. Because runtime Resources will always have administrative level access to the Blue Prism database
  3. Because Runtime Resources will always have administrative level access to the Blue Prism control room
  4. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Correct answer: A
Question 2
Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)
  1. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
  2. The Database server should never be virtualized
  3. Virtualization is only supported on Vmware Hypervisor technology
  4. Virtualization should be considered only in very small environments
Correct answer: C
Question 3
By default what port does a Runtime Resource listen on? (Select 1)
  1. 8181 - but it is configurable
  2. 8199 - this is fixed and cannot be changed
  3. 443
  4. There is no default
Correct answer: A
Question 4
What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)
  1. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  2. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
  3. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  4. The communication between components requires the ability to resolve the IP address of the target machine by name
  5. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Correct answer: BCDE
Question 5
Where can the key used by the Credential Manager be stored? (Select 1)
  1. The key is always stored in the database
  2. The key is always stored within the config file on the Application Server
  3. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  4. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  5. The key can only be stored in the database or in the config file on the Application Server
Correct answer: D
Question 6
What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)
  1. Provide a high performance MPLS connection between sites
  2. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  3. Provide fully replicated Blue Prism environments in each geographic region where users are based
  4. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Correct answer: A
Question 7
What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)
  1. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  2. Consider deploying multiple Application Servers for each environment.
  3. Consider the impact of maintenance schedules on the availability of the environment.
  4. Deploy multiple instances of an application server service on a single VM.
Correct answer: BD
Question 8
What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)
  1. Existing Data Center and Virtualization strategies
  2. Support of the components
  3. Desktop and Application Virtualization Strategies
  4. Availability
  5. All of the above
Correct answer: C
Question 9
Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)
  1. The encryption of the remoting connection always uses AES256.
  2. The security of the connection is handled by WCF.
  3. Any of the WCF modes will provide full encryption of the connection.
  4. The security of the connection is handled by .NET remoting and the windows SSPI layer.
Correct answer: A
Question 10
When process automations are designed appropriately, which connections between Blue Prism devices can support high-latency? (Select 1)
  1. Interactive Clients to Runtime Resources
  2. Application Server to Runtime Resources
  3. Application Server to Database Server
  4. Application Server to Interactive Client
  5. No components can be supported over a high-latency connection
Correct answer: A
Question 11
Why is it important to control remote console access to the Runtime Resources? (Select 1)
  1. Because runtime resources are used to control the scheduling of processes
  2. Because runtime Resources will always have administrative level access to the Blue Prism database
  3. Because Runtime Resources will always have administrative level access to the Blue Prism control room
  4. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Correct answer: A
Question 12
Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)
  1. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
  2. The Database server should never be virtualized
  3. Virtualization is only supported on Vmware Hypervisor technology
  4. Virtualization should be considered only in very small environments
Correct answer: C
Question 13
By default what port does a Runtime Resource listen on? (Select 1)
  1. 8181 - but it is configurable
  2. 8199 - this is fixed and cannot be changed
  3. 443
  4. There is no default
Correct answer: A
Question 14
What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)
  1. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  2. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
  3. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  4. The communication between components requires the ability to resolve the IP address of the target machine by name
  5. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Correct answer: BCDE
Question 15
Where can the key used by the Credential Manager be stored? (Select 1)
  1. The key is always stored in the database
  2. The key is always stored within the config file on the Application Server
  3. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  4. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  5. The key can only be stored in the database or in the config file on the Application Server
Correct answer: D
Question 16
What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)
  1. Provide a high performance MPLS connection between sites
  2. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  3. Provide fully replicated Blue Prism environments in each geographic region where users are based
  4. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Correct answer: A
Question 17
What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)
  1. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  2. Consider deploying multiple Application Servers for each environment.
  3. Consider the impact of maintenance schedules on the availability of the environment.
  4. Deploy multiple instances of an application server service on a single VM.
Correct answer: BD
Question 18
What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)
  1. Existing Data Center and Virtualization strategies
  2. Support of the components
  3. Desktop and Application Virtualization Strategies
  4. Availability
  5. All of the above
Correct answer: C
Question 19
Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)
  1. The encryption of the remoting connection always uses AES256.
  2. The security of the connection is handled by WCF.
  3. Any of the WCF modes will provide full encryption of the connection.
  4. The security of the connection is handled by .NET remoting and the windows SSPI layer.
Correct answer: A
Question 20
When process automations are designed appropriately, which connections between Blue Prism devices can support high-latency? (Select 1)
  1. Interactive Clients to Runtime Resources
  2. Application Server to Runtime Resources
  3. Application Server to Database Server
  4. Application Server to Interactive Client
  5. No components can be supported over a high-latency connection
Correct answer: A
Question 21
Why is it important to control remote console access to the Runtime Resources? (Select 1)
  1. Because runtime resources are used to control the scheduling of processes
  2. Because runtime Resources will always have administrative level access to the Blue Prism database
  3. Because Runtime Resources will always have administrative level access to the Blue Prism control room
  4. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Correct answer: A
Question 22
Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)
  1. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
  2. The Database server should never be virtualized
  3. Virtualization is only supported on Vmware Hypervisor technology
  4. Virtualization should be considered only in very small environments
Correct answer: C
Question 23
By default what port does a Runtime Resource listen on? (Select 1)
  1. 8181 - but it is configurable
  2. 8199 - this is fixed and cannot be changed
  3. 443
  4. There is no default
Correct answer: A
Question 24
What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)
  1. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  2. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
  3. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  4. The communication between components requires the ability to resolve the IP address of the target machine by name
  5. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Correct answer: BCDE
Question 25
Where can the key used by the Credential Manager be stored? (Select 1)
  1. The key is always stored in the database
  2. The key is always stored within the config file on the Application Server
  3. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  4. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  5. The key can only be stored in the database or in the config file on the Application Server
Correct answer: D
Question 26
What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)
  1. Provide a high performance MPLS connection between sites
  2. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  3. Provide fully replicated Blue Prism environments in each geographic region where users are based
  4. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Correct answer: A
Question 27
What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)
  1. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  2. Consider deploying multiple Application Servers for each environment.
  3. Consider the impact of maintenance schedules on the availability of the environment.
  4. Deploy multiple instances of an application server service on a single VM.
Correct answer: BD
Question 28
What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)
  1. Existing Data Center and Virtualization strategies
  2. Support of the components
  3. Desktop and Application Virtualization Strategies
  4. Availability
  5. All of the above
Correct answer: C
Question 29
Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)
  1. The encryption of the remoting connection always uses AES256.
  2. The security of the connection is handled by WCF.
  3. Any of the WCF modes will provide full encryption of the connection.
  4. The security of the connection is handled by .NET remoting and the windows SSPI layer.
Correct answer: A
Question 30
When process automations are designed appropriately, which connections between Blue Prism devices can support high-latency? (Select 1)
  1. Interactive Clients to Runtime Resources
  2. Application Server to Runtime Resources
  3. Application Server to Database Server
  4. Application Server to Interactive Client
  5. No components can be supported over a high-latency connection
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!