ATA02 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest ATA02 Exam Questions and Practice Tests 2024 - Killexams.com
ATA02 Dumps ATA02 Braindumps
ATA02 Real Questions ATA02 Practice Test ATA02 Actual Questions
Blue-Prism
ATA02
BluePrism Technical Architect Certification
https://killexams.com/pass4sure/exam-detail/ATA02
Question: 71
Which of the following methods would be a valid approach for capturing process execution errors? (Select 3)
Calling an external program to send SNMP traps.
Logging to event log and collecting via an external tool.
Selecting âsend to external monitoring toolâ from the Blue Prism process designer.
Generating emails from the process.
Answer: A,B,D Question: 72
What must be considered before operating multiple Runtime Resources on a single Windows desktop? (Select 1)
There are no conditions, only one Runtime Resource can be set to listen per Windows session.
Each Runtime Resource must listen on a different port and the processes which run on the device must not impact other processes on the same device.
Each Runtime Resource must listen on the same port and the processes which run on the device must not impact other processes on the same device.
Each Runtime Resource must listen on a different port.
Answer: B Question: 73
What restrictions should be considered if using XenDesktop for delivery of the Runtime Resources? (Select 2)
Login Agent must be used to initiate the login to the device vs the Citrix Client.
Only version 5 of Blue Prism is supported with XenDesktop.
Login Agent is only supported from version 7.6 of XenDesktop, due torestrictions on 3rd party credential provider support prior to this.
XenDesktop is not a supported platform for the Runtime Resource.
Surface Automation will need to be used for all automations.
Answer: A,C Question: 74
What should be considered when configuring high availability and disaster recovery scenarios for availability of Business Processes managed by Blue Prism? (Select 2)
Resource pools and Active Queues can be used to distribute work to Runtime Resources which are online
The Runtime Resources are âstatefulâ devices, therefore any failure or maintenance event should also be taken into account in the process design and scheduling methodology
Using a load balancer and 2 application servers will ensure high availability of an automated process
Use the setting within a Blue Prism Process to force a process to fail over to an alternative Runtime Resource in the event of a failure.
Answer: A,C Question: 75
When is virtualization of a dedicated Interactive Client System most appropriate? (Select 2)
Interactive Clients should never be virtualized
For Process Development - it helps to ensure the Interactive Client has the same configuration as the virtualized Runtime Resources
Where the developers are geographically separate to the Blue Prism environment
To ensure a high-latency connection between the Interactive Client and the Application Server
Whenever runtime resources are virtualized
Answer: A,C,D Question: 76
What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)
The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft
The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key
The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application
Credential Management is handled using session variables and security is applied based on the process logic that is defined.
Answer: B Question: 77
What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Runtime Resources? (Select 2)
Providing high availability for the Runtime Resource will guarantee the SLAs for a business process.
External Load balancing solutions may be used to direct connections from a runtime resource to an appropriate application server.
DNS round robin with a low Time to live (TTL) setting may be employed as a simple mechanism for distributing connections between multiple application servers.
Set each Runtime Resource to point to at least 2 application servers in its configuration file.
Answer: A,B,C Question: 78
What are the primary reasons for regularly backing up Blue Prism production databases (Select 2)
To assure performance
To maintain the latest copy of live process automations and configuration
To maintain an accurate record of the processing history
To maintain a copy of the base VM image that is used to generate Runtime Resources
To avoid losing the configuration of applications on the Runtime Resources
Answer: A,B,C Question: 79
What is the difference between a Runtime Resource and a Process? (Select 1)
There is no difference, the terms are synonymous
A Process represents a definition of the automation steps and logic; Runtime Resources execute the steps defined within a Process
A Process represents a definition of the automation steps and logic; and a Runtime Resource is an executable containing all of the logic within a single process.
A Runtime Resource represents a collection of Processes which is used as part of Release Management
Answer: B Question: 80
Why is it important to control remote console access to the Runtime Resources? (Select 1)
Because runtime resources are used to control the scheduling of processes
Because runtime Resources will always have administrative level access to the Blue Prism database
Because Runtime Resources will always have administrative level access to the Blue Prism control room
Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Answer: D Question: 81
Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)
Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
The Database server should never be virtualized
Virtualization is only supported on Vmware Hypervisor technology
Virtualization should be considered only in very small environments
Answer: A Question: 82
By default what port does a Runtime Resource listen on? (Select 1)
8181 - but it is configurable
8199 - this is fixed and cannot be changed
443
There is no default
Answer: A Question: 83
What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)
If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
The communication between components requires the ability to resolve the IP address of the target machine by name
If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Answer: A,B,C,D,E Question: 84
Where can the key used by the Credential Manager be stored? (Select 1)
The key is always stored in the database
The key is always stored within the config file on the Application Server
The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
The key can only be stored in the database or in the config file on the Application Server
Answer: C Question: 85
What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)
Provide a high performance MPLS connection between sites
Provide virtualized Interactive Clients within the same network as the Blue Prism environment
Provide fully replicated Blue Prism environments in each geographic region where users are based
Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Answer: B
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »