Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)

A.

Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.

B.

Consider deploying multiple Application Servers for each environment.

C.

Consider the impact of maintenance schedules on the availability of the environment.

D.

Deploy multiple instances of an application server service on a single VM.

Which of the following is TRUE, when referring to establishing a connection between a V6 Application Server and Client? (Select 2)

A.

One of the WCF connection modes should be used. .NET remoting is provided for legacy support purposes only.

B.

Either WCF or .NET remoting may be selected. It does not matter which is used.

C.

It is important to ensure that all Blue Prism clients are configured to use the same connection mode as the Blue Prism Server that they are expected to connect to

D.

It is important to configure the Blue Prism certificate server prior to establishing a connection from a client

Which components of the Blue Prism solution may be supported via Presentation / Session Virtualization Software (such as Microsoft RDSH session virtualization)? (Select 1)

A.

Runtime Resource

B.

Interactive Client (for Monitoring and Control)

C.

Interactive Client (for development)

D.

Application Server

E.

All of the above

Why is it important to control remote console access to the Runtime Resources? (Select 1)

A.

Because runtime resources are used to control the scheduling of processes

B.

Because runtime Resources will always have administrative level access to the Blue Prism database

C.

Because Runtime Resources will always have administrative level access to the Blue Prism control room

D.

Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with

What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)

A.

The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft

B.

The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key

C.

The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application

D.

Credential Management is handled using session variables and security is applied based on the process logic that is defined.

What are appropriate methods for designing high availability and disaster recovery scenarios for the Blue Prism Database? (Select 3)

A.

SQL Always on Availability Groups

B.

Windows Clustering

C.

Replication

D.

Blue Prism Active Sync

E.

Connect an application server to 2 Database Instances in parallel

Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)

A.

Integration with Active Directory

B.

The location of the credential store keys

C.

Integration with an external LDAP service

D.

The encryption method for the credential store

E.

The encryption method for the operational communications between database server and runtimes

F.

The separation of duties between roles and environments

G.

Remote access to the Blue Prism components

What restrictions should be considered if using XenDesktop for delivery of the Runtime Resources? (Select 2)

A.

Login Agent must be used to initiate the login to the device vs the Citrix Client.

B.

Only version 5 of Blue Prism is supported with XenDesktop.

C.

Login Agent is only supported from version 7.6 of XenDesktop, due torestrictions on 3rd party credential provider support prior to this.

D.

XenDesktop is not a supported platform for the Runtime Resource.

E.

Surface Automation will need to be used for all automations.

Which of the following is TRUE, when referring to connections configured using the “SOAP with Transport Encryption and Windows Authentication” mechanism? (Select 2)

A.

Data is encrypted

B.

Client and server can reside in separate Active Directory Network Infrastructures

C.

Certificates are required

D.

.NET remoting is used for Operating Communications

E.

Data is only encrypted if you select the “Encryption=True” box in the configuration screen

Which of the following statements are true, when considering a remote access technology and strategy for monitoring and operation of the Blue Prism environment? (Select 3)

A.

RDP is recommended as the default tool for remoting, as it is built into all Windows Operating systems

B.

RDP is not suitable for remoting of production runtime resources, as it is an intrusive technology and may interfere with “in flight” process execution

C.

Consideration should be given to the security of the remoting tool and whether it can be integrated with SSO

D.

Remote Access to runtime resources should be limited to restrict access and visibility to data that may be used within a process