Designing a Blue Prism (Version 6.0) Environment v1.0

Page:    1 / 3   
Exam contains 49 questions

What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Application Servers? (Select 2)

  • A. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource.
  • B. Consider deploying multiple Application Servers for each environment.
  • C. Consider the impact of maintenance schedules on the availability of the environment.
  • D. Deploy multiple instances of an application server service on a single VM.


Answer : BC

What factors should be considered, when designing the virtualization strategy for a Blue Prism environment? (Select 1)

  • A. Existing Data Center and Virtualization strategies
  • B. Support of the components
  • C. Desktop and Application Virtualization Strategies
  • D. Availability
  • E. All of the above


Answer : E

Which of the following statements is true, when considering the security of OPERATING connections between Blue Prism components, when using one of the recommended connection modes? (Select 1)

  • A. The encryption of the remoting connection always uses AES256.
  • B. The security of the connection is handled by WCF.
  • C. Any of the WCF modes will provide full encryption of the connection.
  • D. The security of the connection is handled by .NET remoting and the windows SSPI layer.


Answer : A

When process automations are designed appropriately, which connections between Blue Prism devices can support high-latency? (Select 1)

  • A. Interactive Clients to Runtime Resources
  • B. Application Server to Runtime Resources
  • C. Application Server to Database Server
  • D. Application Server to Interactive Client
  • E. No components can be supported over a high-latency connection


Answer : A

Which of the following are common reasons to deploy multiple Application Servers for a single environment? (Select 2)

  • A. Redundancy - e.g. to provide a level of continuity if one Application Server fails
  • B. To increase the overall security of the environment
  • C. The number of connected clients and runtime resources
  • D. The Application Server doubles up as a Web Server for a separate application


Answer : AC

What are the main factors that should be considered when virtualizing Runtime Resources? (Select 1)

  • A. An underlying disk subsystem which hosts many virtual devices can be a performance bottleneck.
  • B. Often shared hardware is over-allocated resulting in less than expected available capacity (e.g. 2 vCPUs may equate to 0.1 physical cores)
  • C. It is important to validate the actual performance of the Runtime Resources when operating on shared hardware
  • D. The performance of the Runtime Resource can impact processing throughput
  • E. All of the above


Answer : E

Which of the following statements is true, when considering the specifications of the Virtualized devices for the Blue Prism environment? (Select 2)

  • A. Only the minimum specifications for the Blue Prism components are required
  • B. The Virtual CPU to Physical core ratio on the Virtual host may have an impact on performance
  • C. The resource requirements of the automated applications should also be considered
  • D. All runtime resources should have identical resource profiles
  • E. Virtual devices will perform exactly the same as physical devices with similar specifications
  • F. A type 2 hypervisor should be used for production grade environments


Answer : BC

Which of the following should be taken into account, when considering Automating applications that are delivered via Application Virtualization or layering
Software (such as VMWare Horizon App Volumes, or Citrix XenDisk)? (Select 3)

  • A. There may be additional implications to the overall complexity of the architecture, due to the additional components involved in the virtualization technology
  • B. It will only ever be possible to use Surface Automation to Automate these applications
  • C. The Login Agent application must be available prior to User Login
  • D. The mapping between virtualized applications and users is often 1:1. This needs to be considered when designing the credential management approach for the Runtime Resources
  • E. Customizations to the application may be lost after the user is logged out or the system is rebooted, unless additional mechanisms are used to preserve them
  • F. Surface Automation will always need to be used in these scenarios


Answer : BCE

Within a PRODUCTION environment, which of the following tasks would an Interactive Client be used for? (Select 4)

  • A. Developing automated processes
  • B. Configuring Application models
  • C. Creating packages using Release Manager
  • D. Importing packages using Release Manager
  • E. Assigning Processes to Runtime Resources
  • F. Managing Active Queues
  • G. Managing Schedules


Answer : BEFG

How should Runtime Resources be sized? (Select 1)

  • A. Use Blue Prism's recommendation of 1 CPU, 2 GB RAM, 10 GB Hard Drive
  • B. Use Blue Prism's recommendation of 2 CPU. 4 GB RAM, 20 GB Hard Drive
  • C. Size based on the latest documented Blue Prism minimum recommended specifications, plus the hardware and software requirements to be able to use all of the applications that will be used by the automations
  • D. Runtime Resources should only be sized after 3 months of continued operation


Answer : C

Which of the following statements are true, when considering a remote access technology and strategy for monitoring and operation of the Blue Prism environment? (Select 3)

  • A. RDP is recommended as the default tool for remoting, as it is built into all Windows Operating systems
  • B. RDP is not suitable for remoting of production runtime resources, as it is an intrusive technology and may interfere with "in flight" process execution
  • C. Consideration should be given to the security of the remoting tool and whether it can be integrated with SSO
  • D. Remote Access to runtime resources should be limited to restrict access and visibility to data that may be used within a process


Answer : BCD

Which of the following is TRUE, when referring to establishing a connection between a V6 Application Server and Client? (Select 2)

  • A. One of the WCF connection modes should be used. .NET remoting is provided for legacy support purposes only.
  • B. Either WCF or .NET remoting may be selected. It does not matter which is used.
  • C. It is important to ensure that all Blue Prism clients are configured to use the same connection mode as the Blue Prism Server that they are expected to connect to
  • D. It is important to configure the Blue Prism certificate server prior to establishing a connection from a client


Answer : AD

Which of the following are supported connection modes within a V6 Blue Prism environment? (Select 2)

  • A. WCF: Soap with Message Encryption and Windows Authentication
  • B. WCF: Soap with Remote Encryption
  • C. WCF: Soap with Transport Encryption
  • D. .NET Remoting with Transport Encryption
  • E. HTTPS Connection mode


Answer : AC

What factors should be considered when designing the Blue Prism Database Server Environment? (Select 4)

  • A. Whether windows authentication or SQL Native authentication will be used for the Database Connection.
  • B. Backup and log truncation should be reviewed according to business criticality
  • C. Database and Log backup.
  • D. Ensuring that the application servers have full sysadmin rights to the database.
  • E. Proximity of the database server to the Blue Prism Application server.
  • F. Selection of the database platform, between SQL server and Oracle.
  • G. Ensuring that the database server can be accessed from all Runtime Resources within the network.


Answer : ACDF

Which of the following is TRUE, when referring to connections configured using the "SOAP with Transport Encryption and Windows Authentication" mechanism?
(Select 2)

  • A. Data is encrypted
  • B. Client and server can reside in separate Active Directory Network Infrastructures
  • C. Certificates are required
  • D. .NET remoting is used for Operating Communications
  • E. Data is only encrypted if you select the "Encryption=True" box in the configuration screen


Answer : AC

Page:    1 / 3   
Exam contains 49 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy