Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Blue Prism ATA02 Designing a Blue Prism (Version 6.0) Environment Exam Practice Test

Page: 1 / 5
Total 45 questions

Designing a Blue Prism (Version 6.0) Environment Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)

Options:

A.

Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.

B.

Consider deploying multiple Application Servers for each environment.

C.

Consider the impact of maintenance schedules on the availability of the environment.

D.

Deploy multiple instances of an application server service on a single VM.

Question 2

What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)

Options:

A.

If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.

B.

If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications

C.

A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure

D.

The communication between components requires the ability to resolve the IP address of the target machine by name

E.

If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.

Question 3

How should Runtime Resources be sized? (Select 1)

Options:

A.

Use Blue Prism's recommendation of 1 CPU, 2 GB RAM, 10 GB Hard Drive

B.

Use Blue Prism's recommendation of 2 CPU. 4 GB RAM, 20 GB Hard Drive

C.

Size based on the latest documented Blue Prism minimum recommended specifications, plus the hardware and software requirements to be able to use all of the applications that will be used by the automations

D.

Runtime Resources should only be sized after 3 months of continued operation

Question 4

Which of the following should be taken into account, when considering using a Virtual desktop for the Runtime Resource using Virtual Desktop Infrastructure (VDI) or Hosted Virtual Desktop (HVD) Software (such as Citrix XenDesktop or Vmware Horizon View)? (Select 2)

Options:

A.

When using a non-persistent Virtual Desktop, the image may be refreshed and this could be problematic if not carefully managed.

B.

It may be necessary to use the Blue Prism login agent or another automatic login method, to instantiate the Virtual Desktop session.

C.

The Runtime Resources should not be deployed on Virtual Desktop Infrastructure.

D.

It is always appropriate to use the same technology and strategy as is used for the human operators in the client environment.

Question 5

What factors should be considered when designing the Blue Prism Database Server Environment? (Select 4)

Options:

A.

Whether windows authentication or SQL Native authentication will be used for the Database Connection.

B.

Backup and log truncation should be reviewed according to business criticality

C.

Database and Log backup.

D.

Ensuring that the application servers have full sysadmin rights to the database.

E.

Proximity of the database server to the Blue Prism Application server.

F.

Selection of the database platform, between SQL server and Oracle.

G.

Ensuring that the database server can be accessed from all Runtime Resources within the network.

Question 6

Which of the following methods would be a valid approach for capturing process execution errors? (Select 3)

Options:

A.

Calling an external program to send SNMP traps.

B.

Logging to event log and collecting via an external tool.

C.

Selecting “send to external monitoring tool” from the Blue Prism process designer.

D.

Generating emails from the process.

Page: 1 / 5
Total 45 questions