Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is a recommend tip for dealing with problems when launching and attaching to Browser Applications?

A.

Use the Start Process action of the Utility - Environment Object to launch the application followed by an attach stage to attach to the application

B.

Hold the target URL in a data item as opposed to it being configured in the Application Modeller Wizard

C.

Set the HKEY CURRENT USER\Software\Microsoft\Internet Explorer\Main\TabProcGrowth Registry key to 2

D.

Use Surface Automation to automate the application

A Process Definition Document, for a new process to open ISA accounts, specifies that the value “2008 Cash ISA” is to be entered into the Product Selection field of the following screen:

The Product Selection field is a drop down menu with the following options available:

According to Best Practice, which of the following design options are correct for populating the Product Selection field with the value 2008 Cash ISA:

A.

The Product Selection value should be hard coded as 2008 Cash ISA in the stage that will populate the field.

B.

A text data item, with an initial value of 2008 Cash ISA should be configured. This data item should be used as the input value to the stage that will populate the Product Selection field.

C.

An input parameter should be configured in the start stage allowing the calling process to determine what value to be populated into the Product Selection number field

D.

All of the above

A PDD has been created which includes a requirement to log in to an application called CDS. The CDS application only allows a user account to be logged into the application on one machine at a time. The client wishes to hold the credentials for logging into CDS in the Blue Prism Credential store.

It has been calculated that the automated solution will require 3 resource PC's to enable the case volume to be worked within SLA’s.

Which is the most appropriate design decision to accommodate the above requirements?

A.

Create user accounts and sets of Credentials per Resource PC in the Blue Prism Credential Manager for the CDS Application.

B.

Ask IT to enable concurrent logins to the CDS application for Blue Prism User Accounts

C.

Login in to the CDS application manually and let Blue Prism take over once the login is complete

D.

Create a single Credential in the Blue Prism Credential Manager for the CDS Application. Use a Blue Prism Environment Lock to ensure that only one Resource PC can be logged in to the CDS application at a time

A Process is fed cases to work from a spreadsheet held in a shared drive. The location of the shared drive is different between Development and Production environments. How should this be managed?

A.

During the build and test phase, hold the ‘Development’ path to the spreadsheet in a data item within a Process. When the Process is imported into Production it will be opened and the data item will be amended to hold the ‘Production’ path.

B.

During the build and test phase, hold the ‘Development’ path to the spreadsheet in a data item within a Process. Expose this data item as a Session Variable. When the Process is run in Production, this Session Variable value can be set in Control Room

C.

Hold the Path to the spreadsheet as an Environment Variable

D.

Pass the Path as a Startup Parameter when the process starts

Which of the following accurately describes best practice when work is sourced from an application's workflow system?

A.

There is no need to use a Blue Prism queue as workflow is managed within the application

B.

Even though there is a workflow system managing and allocating work, a Blue Prism Work Queue should still be used

C.

Blue Prism cannot source work from an application's workflow system

D.

When sourcing work from an applications workflow system, case data should be stored in an excel document

Study the process flow below:

The initial values for the Loop Count and Max Loop data items are 0 and 5 respectively.

How many times will the Business Objects Action ‘Screen AO1 – Enter Data’ be read into memory during the execution of the Process?

A.

4

B.

5

C.

1

D.

0

A retail bank has promoted 5 Blue Prism processes to production:

Email Poller

Customer Onboarding

Amend Contact Details

Direct Debit Cancellations

Onboarding Reporting

One instance of the email Poller process will run 24/7 feeding work queues for the other two processes.

Two concurrent instances of the Customer Onboarding process will run between 6am and 11pm each day on the same VM.

Two concurrent instances of the Amend Contact Details process will run between 8am and 8pm each day on two VMs.

One instance of the Direct Debit Cancellations process will run between 6am and 4pm each day on the same VM as the Email Poller process. The scheduler that starts the Direct Debit Cancellations process is configured to run the Onboarding Reporting process when the Direct Debit Cancellations process has successfully completed.

How many robot licenses are required?

A.

3

B.

4

C.

5

D.

6

Which of the following statements, about interfacing with browser applications are true? (Choose three.)

A.

To read or write to an HTML element, the element does not have to actually be visible on the screen. As long as the element exists on the currently loaded page reading or writing to it will work.

B.

Having the Parent URL attribute checked will result in a faster, more reliable identification of an element

C.

Elements within a Web Application can be spied using Active Accessibility mode

D.

Win32 mode can be used to identify the Internet Explorer Window

E.

HTML spy mode can be used to identify HTML elements in any browser application

Which of the following are correct? (Choose three.)

A.

Blue Prism web services are secured using HTTP authentication.

B.

Recursive definitions within WSDLs are supported by Blue Prism.

C.

Blue Prism can consume third-party web services presented over HTTPs assuming the runtime resources are configured to trust the certificate that is used to secure the web service

D.

Blue Prism supports binary data as inputs and outputs for web services.

Which of the following does the Blue Prism Login Agent functionality support? (Choose three.)

A.

Log into Windows on a Resource PC

B.

Log into Business Applications

C.

Lock a Resource PC

D.

Determine if a Resource PC is logged in