Blue Prism Technical Architect Certification v6 ( ATA02) Sample questions

  1. Home
  2. Blue Prism Technical Architect Certification v6 ( ATA02) Sample questions
Blue Prism Technical Architect Certification v6 ( ATA02) Sample questions

A Blue Prism (Version 6.0) (ATA02) Technical Architect Exam is a high level of the Designing a Blue Prism (Version 5.0) Environment certificate test. Up-and-comers will realize every one of precisely the same key perspectives which incorporate progressed instruments that are useful to establish a proper climate for Blue Prism. Planning a Blue Prism (Version 6.0) (ATA02) Technical Architect Exam goals incorporates learning Workflow Design progressed instruments and automation Process. Planning a Blue Prism (Version 6.0) Environment Certification test is accessible in English. The percentage required for successfully passing this test is 70%. Let’s begin with some of the important sample questions which will help you prepare in a better way-

1.) Which of the accompanying strategies could be a legitimate approach for catching deal with execution mistakes? (Select 3)

A. Calling an external program to send SNMP traps.
B. Logging to the event log and gathering by means of an outer device.
C. Choosing “send to external monitoring device” from the Blue Prism process designer.
D. Producing emails from the process.

Right Answer: ABD

2.) What should be considered prior to work with different Runtime Resources on a solitary Windows desktop? (Select 1)

A. There are no circumstances, just a single Runtime Resource can be set to listen per Windows meeting.
B. Each Runtime Resource should tune in on an alternate port and the cycles which run on the gadget should not affect different cycles on a similar gadget.
C. Each Runtime Resource should tune in on a similar port and the cycles which run on the gadget should not affect different cycles on a similar gadget.
D. Each Runtime Resource should tune in on an alternate port.

Right Answer: B

3.) What limitations ought to be thought of if involving XenDesktop for the conveyance of the Runtime Resources? (Select 2)

A. Login Agent should be utilized to start the login to the gadget versus the Citrix Client.
B. Just adaptation 5 of Blue Prism is upheld with XenDesktop.
C. Login Agent is just upheld from adaptation 7.6 of XenDesktop, because of limitations on outsider accreditation supplier support preceding this.
D. XenDesktop is certainly not an upheld stage for the Runtime Resource.
E. Surface Automation should be utilized for all computerization.

Right Answer: AC

4.) What ought to be thought about while arranging high accessibility and fiasco recuperation situations for the accessibility of Business Processes oversaw by Blue Prism? (Select 2)

A. Asset pools and Active Queues can be utilized to disperse work to Runtime Resources which are on the web
B. The Runtime Resources are “stateful” gadgets, thusly any disappointment or support occasion ought to likewise be considered in the process plan and booking procedure
C. Utilizing a heap balancer and 2 application servers will guarantee high accessibility of a robotized interaction
D. Utilize the setting inside a Blue Prism Process to drive a cycle to failover to an option Runtime Resource in case of a disappointment.

Right Answer: AC

5.) When is virtualization of a devoted Interactive Client System generally suitable? (Select 2)

A. Intuitive Clients ought to never be virtualized
B. For Process Development – it assists with guaranteeing the Interactive Client has a similar setup as the virtualized Runtime Resources
C. Where the engineers are geologically isolated from the Blue Prism climate
D. To guarantee a high-inertness association between the Interactive Client and the Application Server
E. At whatever point runtime assets are virtualized

Right Answer: CD

6.) What security is applied to information that is scrambled by the Credential Manager when put away? (Select 1)

A. The certifications are overseen by the Windows Credential store and the security applied is exclusive to Microsoft
B. The certifications are scrambled by the Application Server for capacity in the data set utilizing either 3DES or AES-256 and a client-produced key
C. The certifications are scrambled by the Application Server for capacity in the data set utilizing either 3DES or AES-256 and a protected key hard-coded inside the application
D. Qualification Management is taken care of utilizing meeting factors and security is applied in light of the handling rationale that is characterized.

Right Answer: B

7.) What ought to be thought about while arranging high accessibility and fiasco recuperation situations for the Blue Prism Runtime Resources? (Select 2)

A. Giving high accessibility to the Runtime Resource will ensure the SLAs for business interaction.
B. Outer Load adjusting arrangements might be utilized to guide associations from a runtime asset to a suitable application waiter.
C. DNS cooperative effort with a low Time to live (TTL) setting might be utilized as a basic instrument for dispersing associations between various application servers.
D. Set each Runtime Resource to highlight somewhere around 2 application servers in its design record.

Right Answer: BC

8.) What are the essential purposes behind routinely backing up Blue Prism creation data sets (Select 2)

A. To guarantee execution
B. To keep up with the most recent duplicate of live interaction mechanization and design
C. To keep an exact record of the handling history
D. To keep a duplicate of the base VM picture that is utilized to create Runtime Resources
E. To try not to lose the setup of utilizations on the Runtime Resources

Right Answer: BC

9.) What is the distinction between a Runtime Resource and a Process? (Select 1)

A. There is no distinction, the terms are interchangeable
B. A Process addresses the meaning of the robotization steps and rationale; Runtime Resources execute the means characterized inside a Process
C. A Process addresses the meaning of the mechanization steps and rationale, and a Runtime Resource is an executable holding all of the rationale inside a solitary interaction.
D. A Runtime Resource addresses an assortment of Processes that is utilized as a feature of Release Management

Right Answer: C

10.) For what reason is it essential to control remote support admittance to the Runtime Resources? (Select 1)

A. Since runtime assets are utilized to control the planning of cycles
B. Since runtime Resources will continuously have regulatory level admittance to the Blue Prism information base
C. Since Runtime Resources will constantly have regulatory level admittance to the Blue Prism control room
D. Since Runtime Resources will execute mechanization, where information might be noticeable or exchange could be physically impeded

Right Answer: D

11.) Which of the accompanying assertions is valid, while thinking about Virtualizing the Blue Prism Database Server? (Select 1)

A. Virtualization of the information base server ought to just be considered after completely checking on the particular merchant proposals for the Hypervisor and SQL server variant
B. The Database server ought to never be virtualized
C. Virtualization is just upheld on Vmware Hypervisor innovation
D. Virtualization ought to be viewed as just in tiny conditions

Right Answer: A

12.) Naturally what port does a Runtime Resource tune in on? (Select 1)

A. 8181 – yet it is configurable
B. 8199 – this is fixed and can’t be changed
C. 443
D. There is no default

Right Answer: A

13.) What ought to be thought about while planning the Network design and arrangement of Blue Prism parts (and the nearness to target applications)? (Select 4)

A. If runtime assets will be sent halfway, the outbound organization network and inertness to the instrumented applications should be thought of.
B. If the runtime asset and application server will be conveyed beyond a typical Active Directory network foundation, Transport Encryption association mode should be utilized to get the working interchanges
C. A runtime asset can be conveyed from a distance, and associations got, regardless of whether the runtime isn’t inside a similar Active Directory Network Infrastructure
D. The correspondence between parts requires the capacity to determine the IP address of the objective machine by name
E. If the runtime asset will be conveyed from a distance to the application server, endorsement-based encryption might should be thought of, as informative interchanges are not scrambled as a matter of course.

Right Answer: BCDE

14.) Where might the key utilized by the Credential Manager at any point be put away? (Select 1)

A. The key is constantly put away in the data set
B. The key is constantly put away inside the config document on the Application Server
C. The key can either be put away in the data set, in the config document on the Application Server, or in a different securable record on the Application Server
D. The key is hard-coded and put away safely inside the Application. It is exposed to jumbling to guarantee its insurance
E. The key must be put away in the data set or in the config document on the Application Server

Right Answer: C

15.) What is a typical approach to supporting geologically different clients of a Blue Prism climate? (Regulators/Developers)? (Select 1)

A. Give an elite presentation on MPLS association between locales
B. Give virtualized Interactive Clients inside a similar organization as the Blue Prism climate
C. Give completely repeated Blue Prism conditions in each geographic district where clients are based
D. Designate a client in the focal area who will get lets out of every far-off client and apply them to the framework

Right Answer: B

16.) What ought to be thought about while designing high accessibility and debacle recuperation situations for the Blue Prism Application Servers? (Select 2)

A. Blue Prism application locally gives failover between various application servers for a Runtime Resource.
B. Consider sending numerous Application Servers for every climate.
C. Consider the effect of upkeep plans on the accessibility of the climate.
D. Send different occurrences of an application server administration on a solitary VM.

Right Answer: BC

17.) What variables ought to be thought of, while planning the virtualization technique for a Blue Prism climate? (Select 1)

A. Existing Data Center and Virtualization techniques
B. Backing of the parts
C. Work area and Application Virtualization Strategies
D. Accessibility
E. The entirety of the abovementioned

Right Answer: E

18.) Which of the accompanying assertions is valid, while thinking about the security of OPERATING associations between Blue Prism parts, while utilizing one of the suggested association modes? (Select 1)

A. The encryption of the remoting association generally utilizes AES256.
B. The security of the association is taken care of by WCF.
C. Any of the WCF modes will give full encryption of the association.
D. The security of the association is dealt with by .NET remoting and the windows SSPI layer.

Right Answer: A

19.) When process mechanization is planned fittingly, which associations between Blue Prism gadgets can uphold high inactivity? (Select 1)

A. Interactive Clients to Runtime Resources
B. Application Server to Runtime Resources
C. Application Server to Database Server
D. Application Server to Interactive Client
E. No parts can be upheld over a high-dormancy association

Right Answer: A

20.) Which of coming up next is normal motivation to send numerous Application Servers for a solitary climate? (Select 2)

A. Overt repetitiveness – for example, to give a degree of coherence in the event that one Application Server comes up short
B. To build the general security of the climate
C. The number of associated clients and runtime assets
D. The Application Server bends over as a Web Server for a different application

Right Answer: AC

Blue Prism Technical Architect Certification v6 ( ATA02) practice tests
Menu