Filters
Question type

Study Flashcards

What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications) ? (Select 4)


A) If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
B) If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications
C) A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
D) The communication between components requires the ability to resolve the IP address of the target machine by name
E) If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.

Correct Answer

verifed

verified

What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers) ? (Select 1)


A) Provide a high performance MPLS connection between sites
B) Provide virtualized Interactive Clients within the same network as the Blue Prism environment
C) Provide fully replicated Blue Prism environments in each geographic region where users are based
D) Nominate a user in the central location who will receive releases from each remote user and apply them to the system

Correct Answer

verifed

verified

Which of the following should be taken into account, when considering using a Virtual desktop for the Runtime Resource using Virtual Desktop Infrastructure (VDI) or Hosted Virtual Desktop (HVD) Software (such as Citrix XenDesktop or Vmware Horizon View) ? (Select 2)


A) When using a non-persistent Virtual Desktop, the image may be refreshed and this could be problematic if not carefully managed.
B) It may be necessary to use the Blue Prism login agent or another automatic login method, to instantiate the Virtual Desktop session.
C) The Runtime Resources should not be deployed on Virtual Desktop Infrastructure.
D) It is always appropriate to use the same technology and strategy as is used for the human operators in the client environment.

Correct Answer

verifed

verified

Which of the following statements is true, when considering the specifications of the Virtualized devices for the Blue Prism environment? (Select 2)


A) Only the minimum specifications for the Blue Prism components are required
B) The Virtual CPU to Physical core ratio on the Virtual host may have an impact on performance
C) The resource requirements of the automated applications should also be considered
D) All runtime resources should have identical resource profiles
E) Virtual devices will perform exactly the same as physical devices with similar specifications
F) A type 2 hypervisor should be used for production grade environments

Correct Answer

verifed

verified

Why is it important to control remote console access to the Runtime Resources? (Select 1)


A) Because runtime resources are used to control the scheduling of processes
B) Because runtime Resources will always have administrative level access to the Blue Prism database
C) Because Runtime Resources will always have administrative level access to the Blue Prism control room
D) Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with

Correct Answer

verifed

verified

Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)


A) Integration with Active Directory
B) The location of the credential store keys
C) Integration with an external LDAP service
D) The encryption method for the credential store
E) The encryption method for the operational communications between database server and runtimes
F) The separation of duties between roles and environments
G) Remote access to the Blue Prism components

Correct Answer

verifed

verified

Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)


A) The encryption of the remoting connection always uses AES256.
B) The security of the connection is handled by WCF.
C) Any of the WCF modes will provide full encryption of the connection.
D) The security of the connection is handled by .NET remoting and the windows SSPI layer.

Correct Answer

verifed

verified

Showing 21 - 27 of 27

Related Exams

Show Answer