Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Blue Prism AIE02 - Installing and Configuring a Blue Prism (Version 6.0) Environment (EN)

Page: 1 / 2
Total 45 questions

What are common options for encrypting the communication with the Blue Prism database? (Select three.)

A.

Not required – All SQL Server implementations are configured to enforce encryption by default

B.

Configure the Blue Prism connection to the database to set encrypt=true; trustservercertificates=true

C.

Configure the SQL Server with an appropriate certificate and configure it to only accept secure connections

D.

Turn on IPsec for the network where the Application Server and SQL Server are deployed

E.

Deploy a certificate on the Application Server and use the SSLCert switch

Which of the following MUST be considered when deploying Login Agent? (Select four.)

A.

A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)

B.

The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device

C.

Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file

D.

Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure

E.

Once a device has been logged in, a congenital Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)

Which of the following are common reasons why a Blue Prism Interactive Client is not be able to connect to an Application Server? (Select three.)

A.

If the Application Server service is not started

B.

It firewalls prevent the Application Server from receiving traffic on the appropriate port

C.

If the Application Server is configured to use Transport Encryption but the certificate cannot be validated

D.

Invalid user credentials

E.

A user is logged into Blue Prism on the Application Server

Which of the following are steps that would normally be taken on the local device when configuring a Blue Prism Application Server? (Select four.)

A.

Use the Blue Prism Client to configure a connection to a supported database server

B.

Use BPServer.exe to create and configure a connection to a supported database server

C.

Use BPServer.exe to create or configure a profile for the server service that uses a configured database connection

D.

Use BPServer.exe to select an appropriate connection mode and, if required, to select a certificate to use

E.

Use BPServer.exe to configure which users can log into Blue Prism

F.

Use BPServer.exe to configure all encryption schemes for the environment that will use an Application Server key store

Which of the following are components within a Blue Prism Architecture? (Select four.)

A.

Blue Prism Consolidation Provider

B.

Blue Prism Runtime Resource

C.

Blue Prism Interactive Client

D.

Blue Prism Application Server

E.

Blue Prism Database

When staring a Runtime Resource using the /sslcert switch, what reasons can prevent it from starting? (Select two.)

A.

If the name on the certificate does not match the name (or correct format) on the Runtime Resource

B.

If the thumbprint of the certificate is not for a valid certificate on the local device

C.

If the certificate has expired or been revoked

D.

If the certificate has not been issued by a certification authority that is trusted by device attempting to connect

What can be done to prevent new or unexpected devices from registering as Runtime Resources? (Select one.)

A.

Implement firewall rules to prevent unexpected devices from establishing a connection with the Application Server

B.

Under System ->Settings, enable the “Prevent registration of new Resources” setting

C.

All of the above

When should the Blue Prism setting ‘Start the process engine on this machine when users sign in’ be disabled? (Select one.)

A.

Not Applicable – This setting does not exist

B.

When the Interactive Client will only be used for controlling and monitoring a Blue Prism environment (rather than running automations locally)

C.

When the Interactive Client will be used to run automations locally

D.

It should always be disabled for all environments

What are the minimum permissions required for business as usual access to the Blue Prism Database? (Select one.)

A.

dbowner

B.

datareader, datawriter

C.

datareader, datawriter, all roles named with a prefix of bp_dba

D.

sysowner

E.

all of the above

Which of the following statements is correct? (Select two.)

A.

Each Blue Prism environment (e.g. Dev/UAT/Prod) will have a single database

B.

Each Blue Prism environment (e.g. Dev/UAT/Prod) will potentially have many databases

C.

Each Blue Prism environment (e.g. Dev/UAT/Prod) can have many Application Servers but they will all connect to the same database

D.

Each Blue Prism environment (e.g. Dev/UAT/Prod) can have may Application Servers but they will all connect to the same database

E.

Each Blue Prism environment (e.g. Dev/UAT/Prod) can have one Application Server but can connect to many databases