Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What variable is returned when the String Operation's Split command is used?

A.

Array

B.

Password

C.

Value

D.

List

What is the default function of Excel Close Spreadsheet command?

A.

It closes all open sheet tabs of the spreadsheet

B.

It prompts the user whether to save the changes or not

C.

It closes the spreadsheet while saving the changes

D.

It closes the spreadsheet without saving the changes

Which of the following recorder/command is 'most' preferable to automate with if the application is web based?

A.

Managed Windows Control

B.

Image Recognition

C.

Smart Recorder/Object Cloning

D.

Web Recorder/ Managed Web Controls

Which of the following is an incorrect looping condition?

A.

Each folder within a folder

B.

Each node in a tree view

C.

Each file within a folder

D.

Each row in a CSV/Text

What does a counter variable always start with?

A.

0

B.

1

C.

2

D.

-1

____________________Serves as the centralized secured component within Automation Anywhere's architecture to save sensitive data

A.

SQL Database

B.

Credential Vault

C.

Version Control

D.

Control Room

Which three are valid Loop commands? (Choose three.)

A.

Each Folder in a Folder

B.

Each Node in an XML Dataset

C.

Each Row in an Excel Dataset

D.

Each Item In sfile

It is mandatory to associate a credential with locker before it can be consumed in a Bot.

A.

False

B.

True

A Control Room administrator has received an advisory from IT that security may be compromised for many Control Room systems. IT is concerned that there may be an attempt to load some harmful code into the Control Room.

What two steps can the Control Room administrator take to address this threat?(Choose two.)

A.

Under Administration > Settings- Whitelisted file extensions > Disallow extensions which could be a virus (BAT files, etc,)

B.

Put Control Room on a separate network, one not accessible by clients.

C.

Check the Audit Log for user logins that occur at unusual hours into the Control Room, share this information with their user's manager, and check the user's uploads for threats

D.

Ask IT to disable communication between the client and Control Room

A Control Room administrator has been notified of forthcoming downtime that will impact the ability of TaskBots to run.

What is the first thing the administrator should do the best prepare for this downtime?

A.

Deactivate impacted activities using the deactivate toggle in the Control Room user interface

B.

Go to Activity>Production, mouse over the Bot schedule to be deactivated and select the relegate toggle in the Control Room user interface

C.

Select a different Control Room for the impacted activities using the Update Service Location wizard

D.

Use the PowerShell cmdlet botsced.suspendscheduleupdates