New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Blue Prism ATA02 Practice Exam with Questions & Answers | Set: 2

Questions 11

NO: 22

Which of the following statements is true, when considering the specifications of the Virtualized devices for the Blue Prism environment? (Select 2)

Options:
A.

Only the minimum specifications for the Blue Prism components are required

B.

The Virtual CPU to Physical core ratio on the Virtual host may have an impact on performance

C.

The resource requirements of the automated applications should also be considered

D.

All runtime resources should have identical resource profiles

E.

Virtual devices will perform exactly the same as physical devices with similar specifications

F.

A type 2 hypervisor should be used for production grade environments

Blue Prism ATA02 Premium Access
Questions 12

What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)

Options:
A.

If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.

B.

If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications

C.

A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure

D.

The communication between components requires the ability to resolve the IP address of the target machine by name

E.

If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.

Questions 13

Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)

Options:
A.

Integration with Active Directory

B.

The location of the credential store keys

C.

Integration with an external LDAP service

D.

The encryption method for the credential store

E.

The encryption method for the operational communications between database server and runtimes

F.

The separation of duties between roles and environments

G.

Remote access to the Blue Prism components