Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ATA02 Sample Questions Answers

Questions 4

Which components of the Blue Prism solution may be supported via Presentation / Session Virtualization Software (such as Microsoft RDSH session virtualization)? (Select 1)

Options:

A.

Runtime Resource

B.

Interactive Client (for Monitoring and Control)

C.

Interactive Client (for development)

D.

Application Server

E.

All of the above

Buy Now
Questions 5

What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)

Options:

A.

Provide a high performance MPLS connection between sites

B.

Provide virtualized Interactive Clients within the same network as the Blue Prism environment

C.

Provide fully replicated Blue Prism environments in each geographic region where users are based

D.

Nominate a user in the central location who will receive releases from each remote user and apply them to the system

Buy Now
Questions 6

What are benefits of using Active Directory Single Sign-on for Blue Prism? (Select 2)

Options:

A.

Policies applied by Active Directory such as multi-factor authentication and password complexity are applied to Blue Prism

B.

It makes it possible to add custom security roles in Blue Prism

C.

Users are assigned security roles based on their group membership in Active Directory

D.

Data encryption between Blue Prism devices is provided by default

Buy Now
Questions 7

Where can the key used by the Credential Manager be stored? (Select 1)

Options:

A.

The key is always stored in the database

B.

The key is always stored within the config file on the Application Server

C.

The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server

D.

The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection

E.

The key can only be stored in the database or in the config file on the Application Server

Buy Now
Questions 8

Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)

Options:

A.

Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version

B.

The Database server should never be virtualized

C.

Virtualization is only supported on Vmware Hypervisor technology

D.

Virtualization should be considered only in very small environments

Buy Now
Questions 9

Which of the following are common reasons to deploy multiple Application Servers for a single environment? (Select 2)

Options:

A.

Redundancy - e.g. to provide a level of continuity if one Application Server fails

B.

To increase the overall security of the environment

C.

The number of connected clients and runtime resources

D.

The Application Server doubles up as a Web Server for a separate application

Buy Now
Questions 10

Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)

Options:

A.

Integration with Active Directory

B.

The location of the credential store keys

C.

Integration with an external LDAP service

D.

The encryption method for the credential store

E.

The encryption method for the operational communications between database server and runtimes

F.

The separation of duties between roles and environments

G.

Remote access to the Blue Prism components

Buy Now
Questions 11

Which of the following methods would be a valid approach for capturing process execution errors? (Select 3)

Options:

A.

Calling an external program to send SNMP traps.

B.

Logging to event log and collecting via an external tool.

C.

Selecting “send to external monitoring tool” from the Blue Prism process designer.

D.

Generating emails from the process.

Buy Now
Questions 12

What are the main factors that should be considered when virtualizing Runtime Resources? (Select 1)

Options:

A.

An underlying disk subsystem which hosts many virtual devices can be a performance bottleneck.

B.

Often shared hardware is over-allocated resulting in less than expected available capacity (e.g. 2 vCPUs may equate to 0.1 physical cores)

C.

It is important to validate the actual performance of the Runtime Resources when operating on shared hardware

D.

The performance of the Runtime Resource can impact processing throughput

E.

All of the above

Buy Now
Questions 13

Which of the following statements are true, when considering the security of INSTRUCTIONAL communications to runtime resources? (Select 3)

Options:

A.

By default the connection is native TCP and not encrypted

B.

The runtime resource can be configured to use certificate-based encryption for all inbound communication

C.

The login agent will automatically use a certificate if the runtime resource is configured to use one

D.

The connection will be established via .NET remoting and will be encrypted as long as the “Use Secure Connections” flag is set

E.

A central setting within Blue Prism can be used to prevent all associated Runtime Resources from accepting any instructional communications which are not encrypted.

Buy Now
Exam Code: ATA02
Exam Name: Designing a Blue Prism (Version 6.0) Environment
Last Update: Nov 21, 2024
Questions: 45
$64  $159.99
$48  $119.99
$40  $99.99
buy now ATA02