Pass the Blue Prism Technical Architect ATA02 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What are the main factors that should be considered when virtualizing Runtime Resources? (Select 1)

Options:

A.

An underlying disk subsystem which hosts many virtual devices can be a performance bottleneck.


B.

Often shared hardware is over-allocated resulting in less than expected available capacity (e.g. 2 vCPUs may equate to 0.1 physical cores)


C.

It is important to validate the actual performance of the Runtime Resources when operating on shared hardware


D.

The performance of the Runtime Resource can impact processing throughput


E.

All of the above


Questions # 2:

Which of the following is TRUE, when referring to establishing a connection between a V6 Application Server and Client? (Select 2)

Options:

A.

One of the WCF connection modes should be used. .NET remoting is provided for legacy support purposes only.


B.

Either WCF or .NET remoting may be selected. It does not matter which is used.


C.

It is important to ensure that all Blue Prism clients are configured to use the same connection mode as the Blue Prism Server that they are expected to connect to


D.

It is important to configure the Blue Prism certificate server prior to establishing a connection from a client


Questions # 3:

When process automations are designed appropriately, which connections between Blue Prism devices can support high-latency? (Select 1)

Options:

A.

Interactive Clients to Runtime Resources


B.

Application Server to Runtime Resources


C.

Application Server to Database Server


D.

Application Server to Interactive Client


E.

No components can be supported over a high-latency connection


Questions # 4:

Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)

Options:

A.

Integration with Active Directory


B.

The location of the credential store keys


C.

Integration with an external LDAP service


D.

The encryption method for the credential store


E.

The encryption method for the operational communications between database server and runtimes


F.

The separation of duties between roles and environments


G.

Remote access to the Blue Prism components


Questions # 5:

Which of the following methods would be a valid approach for capturing process execution errors? (Select 3)

Options:

A.

Calling an external program to send SNMP traps.


B.

Logging to event log and collecting via an external tool.


C.

Selecting “send to external monitoring tool” from the Blue Prism process designer.


D.

Generating emails from the process.


Questions # 6:

Which of the following statements are true, when considering the security of INSTRUCTIONAL communications to runtime resources? (Select 3)

Options:

A.

By default the connection is native TCP and not encrypted


B.

The runtime resource can be configured to use certificate-based encryption for all inbound communication


C.

The login agent will automatically use a certificate if the runtime resource is configured to use one


D.

The connection will be established via .NET remoting and will be encrypted as long as the “Use Secure Connections” flag is set


E.

A central setting within Blue Prism can be used to prevent all associated Runtime Resources from accepting any instructional communications which are not encrypted.


Questions # 7:

What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)

Options:

A.

Provide a high performance MPLS connection between sites


B.

Provide virtualized Interactive Clients within the same network as the Blue Prism environment


C.

Provide fully replicated Blue Prism environments in each geographic region where users are based


D.

Nominate a user in the central location who will receive releases from each remote user and apply them to the system


Questions # 8:

Which of the following should be taken into account, when considering using a Virtual desktop for the Runtime Resource using Virtual Desktop Infrastructure (VDI) or Hosted Virtual Desktop (HVD) Software (such as Citrix XenDesktop or Vmware Horizon View)? (Select 2)

Options:

A.

When using a non-persistent Virtual Desktop, the image may be refreshed and this could be problematic if not carefully managed.


B.

It may be necessary to use the Blue Prism login agent or another automatic login method, to instantiate the Virtual Desktop session.


C.

The Runtime Resources should not be deployed on Virtual Desktop Infrastructure.


D.

It is always appropriate to use the same technology and strategy as is used for the human operators in the client environment.


Questions # 9:

How should Runtime Resources be sized? (Select 1)

Options:

A.

Use Blue Prism's recommendation of 1 CPU, 2 GB RAM, 10 GB Hard Drive


B.

Use Blue Prism's recommendation of 2 CPU. 4 GB RAM, 20 GB Hard Drive


C.

Size based on the latest documented Blue Prism minimum recommended specifications, plus the hardware and software requirements to be able to use all of the applications that will be used by the automations


D.

Runtime Resources should only be sized after 3 months of continued operation


Questions # 10:

What are benefits of using Active Directory Single Sign-on for Blue Prism? (Select 2)

Options:

A.

Policies applied by Active Directory such as multi-factor authentication and password complexity are applied to Blue Prism


B.

It makes it possible to add custom security roles in Blue Prism


C.

Users are assigned security roles based on their group membership in Active Directory


D.

Data encryption between Blue Prism devices is provided by default


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions