New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Blue Prism AIE02 Practice Exam with Questions & Answers

Questions 1

When settings should be used for the Connection Mode and Server port when configuring a connection from the Runtime Resource to the Application Server? (Select two.)

Options:
A.

The Connection Mode on the Runtime Resource should be set to apply the appropriate encryption settings based on the processes that will be run on the device

B.

The Connection Mode on the Runtime Resource should be set to On to allow the device to be controlled remotely. Set if to be Off to allow local control and connections only

C.

The Connection Mode on the Runtime Resource must match the Connection Mode configured on the Blue Prism Server

D.

The Server Mode on the Runtime Resource must match the Server Port configured on the Blue Prism Server

E.

The Server Port only needs to be set if a port other than 8181 will be used

Blue Prism AIE02 Premium Access
Questions 2

What can be done to prevent new or unexpected devices from registering as Runtime Resources? (Select one.)

Options:
A.

Implement firewall rules to prevent unexpected devices from establishing a connection with the Application Server

B.

Under System ->Settings, enable the “Prevent registration of new Resources” setting

C.

All of the above

Questions 3

Which of the following are valid steps to create a Blue Prism database? (Select two.)

Options:
A.

Using a Blue Prism device, create a device database connection to connect to the server, use the in-product “Create Database” functionality

B.

Using a Blue Prism device, connect to the Blue Prism Application Server, use the in-product “Create Database” functionality

C.

Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use in-product “Configure Database” functionality

D.

Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate to the database, then use the in-product “configure Database” functionality

Questions 4

What are common options for encrypting the communication with the Blue Prism database? (Select three.)

Options:
A.

Not required – All SQL Server implementations are configured to enforce encryption by default

B.

Configure the Blue Prism connection to the database to set encrypt=true; trustservercertificates=true

C.

Configure the SQL Server with an appropriate certificate and configure it to only accept secure connections

D.

Turn on IPsec for the network where the Application Server and SQL Server are deployed

E.

Deploy a certificate on the Application Server and use the SSLCert switch

Questions 5

When staring a Runtime Resource using the /sslcert switch, what reasons can prevent it from starting? (Select two.)

Options:
A.

If the name on the certificate does not match the name (or correct format) on the Runtime Resource

B.

If the thumbprint of the certificate is not for a valid certificate on the local device

C.

If the certificate has expired or been revoked

D.

If the certificate has not been issued by a certification authority that is trusted by device attempting to connect

Questions 6

How can a Login Agent Runtime Resource be instructed to encrypt new inbound connections? (Select one.)

Options:
A.

It can’t – the Login Agent does not accept inbound connections

B.

The configuration file for Login Agent can be manually updated to instruct it to specify the SSLCert switch when it starts

C.

Login Agent automatically enforces encrypted communication

D.

The connection to the Blue Prism Server should be set to use a WCF mode that provides Encryption

Questions 7

What port does a Runtime Resource use to receive communication? (Select one.)

Options:
A.

It receives instructional information on port 8181 by default but this is configurable using the /port switch

B.

It receives instructional information on port 8199 by default but this is configurable using the /inbound switch

C.

It receives instructional information using the selected WCF connection method exclusively on port 443

D.

It receives instructional information using the selected WCF connection method exclusively on port 8080

Questions 8

Which of the following MUST be considered when deploying Login Agent? (Select four.)

Options:
A.

A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)

B.

The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device

C.

Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file

D.

Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure

E.

Once a device has been logged in, a congenital Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)

Questions 9

Which of the following are steps that would normally be take on the local device when configuring a Runtime Resource? (Select four.)

Options:
A.

Configure a connection to a Blue Prism Application Server

B.

Configure the database maintenance procedures

C.

Configure the Runtime Resource to start automatically when the device is logged on with appropriate parameters

D.

Optionally configure the Runtime Resource start-up procedure with the thumbprint of a local certificate

E.

Optionally install and configure Login Agent

F.

Ensure the AutomateC.exe is accessible to the logged in user

G.

Disable all domain policies

Questions 10

What algorithm is used to encrypt Credentials stored within Blue Prism? (Select one.)

Options:
A.

It always uses AES-256 and a key that is randomly generated when the Application Server restarts

B.

It automatically uses the most cryptographically strong scheme that has been configured within the environment

C.

It uses the algorithm and key defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme

D.

It uses the algorithm defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme along with a key that is randomly generated when the Application Server restarts