Questions for the AIE02 were updated on : Nov 21 ,2025
Page 1 out of 3. Viewing questions 1-15 out of 45
Question 1
Which of the following ate valid steps to create a Blue Prism database? (select two)
A. Using a Blue Prism device, create a direct database connection to connect to the server. use the in- product "Create database" functionality
B. Using a Blue Prism device, connect to the Blue Prism Application Server, use the m-product "Create Database' functionality
C. Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use the n-product "Configure Database' functionality
D. Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate the database, then use the m-product 'configure Database* functionality.
Answer:
AC
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
What are the minimum permissions required for business as usual access to the Blue Prism Database? (select one)
A. dbowner
B. datareader. datawrter
C. datareader. dalawrter. al roles named with a prefix of bp_dba
D. sysownec
E. all of the above
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 3
What are the steps required to create a Blue Prism database that will support Blue Prism Single Sign- on? (select two)
A. When using the m-product Create Database functionality select to create a database that will use Blue Prism single sign-on
B. After using the m-product Create Database functionality, use the Configure Database functionality to configure it for single sign-on
C. Use SQL Management Studio, use the CreateScript that is specific to SSO environment to create the database
D. Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism. then use the m-product "Configure Database" functionality
Answer:
B, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
What permissions are recommended lot applying upgrade scripts to the Blue Prism Database? (select one)
A. Not Applicable - It is recommended that the Blue Prism client is used to apply the database upgrade script and the is atomically entitled to make all changes
B. dbowner
C. datareader. datawrrier
D. datareader. datawnter. all roles named vrth a prefix of bp_dba
E. All of the above
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 5
What are common options for encrypting the communication with the Blue Prism database? (select three)
A. Not required - AX SQL Server implementations »e configured to enforce encryption by default
B. Configure the Blue Prism connection to the database to set encrypt-true. trustservercertificate=true
C. Configure the SQL Server with an appropriate certificate and configure to only accept secure connections
D. Turn on IPsec for the network where the Application Server and SQL Server are deployed
E. Deploy a certificate on the Application Server and use the SSLCert switch
Answer:
BCE
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 6
How can a login Agent Runtime Resources be instructed to encrypt new inbounds connection
A. It can't- the Agent does not accept inbound connections
B. The configurations file for Login Agent can be manually updates to instruct it to specify the SSLCert switch when it starts
C. Login Agent automatically enforces encrypted communication
D. The connection to the Blue Prism Server should be set to use a WCF mode that provides Encryption
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
How can a Login Agent Runtime Resources be instructed to login and immediately launch a target think-client application and start processing work from a work queue? (select one)
A. It can't Login Agent has logged a device in, a conventional Runtime Resource must be started and be appropriately instructed to carry out further processing
B. This is configured within the process that instructs the devices to orchestrate a login use of a wait of a stage
C. This is configured within the process that instructs the device to orchestrate a login use of a navigate stage
D. This is configured within the business objects that instructs the device to orchestrate a login through use of a wait stage
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Which of the following MUST be considered when deploying Login Agent? (select four)
A. A number of security settings need to be appropriately configure/disabled on each device where a runs (e. g ctrl + alt + del prior to login must be disabled)
B. The Login Agent Runtime Resource is configured lo use one of the Blue Prism connections configured on the local device
C. Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file
D. Login Agent can only be used on devices that are members of a" Active Directory Dom*n Network Infrastructure
E. Once a device has been logged in, a conventional Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)
Answer:
ABC
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 9
Which of the following statements are correct in relation to Blue Prism Runtime Resources. Interactive Clients and Application Servers? (select one)
A. There is a separate installer for each component
B. A angle installer is used irrespective of which component is required. The configuration after install defines what component(s) will be available on the device
C. Once the Application Server has been installed, all other components can be configured to self- install
D. All of the above
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
Where an environment has Blue Application Server(s) deployed, can Runtime Resources and Interactive Client be connected directory to the database? (select one)
A. Yes it is potentially possible but this is not generally recommended. Devices connected directly to the database may be limited in terms of managing or leveraging Credentials
B. No. all Runtime Resources and Interactive Clients must be connected to the database «a a Blue Prism Application Server
C. Yes. but Runtime Resources that are connected directly to the database cannot be instructed to start processes by the scheduler
Answer:
A
User Votes:
A
50%
B
50%
C
50%
Discussions
0/ 1000
Question 11
Which of the following statements is correct? (select two)
A. Each Blue Prism environment (e g Dev/UATProd) will have a Single database
B. Each Blue Prism environment (e g Dev/UATProd)will potentially have many databases
C. Each Blue Prism environment (e g Dev/UATProd) can have many Application Servers but they will all connect to the same database
D. Each Blue From environment (e g Dev/UATProd) can have marry Application Servers but they will all connect separate databases
E. Each Blue Prism environment (e g Dev/UATProd)can nave one Application Server but can connect to many databases
Answer:
BD
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 12
What is the Blue Prism interactive Client used for? (select three)
A. It is responsible for automatically starting and stopping schedules
B. In non-production environment. it is where automated processes are designed and verified
C. In production environments, it is where automated processes are designed
D. In production environments, it is used to monitor and control the platform
E. In production environment, it is used to configure the platform and define schedules
F. It is responsible for providing database connectivity to at connected devices
Answer:
ABD
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 13
Which of the following components responsible for executing the automated processes? (select one)
A. Blue Prism Runtime Resource
B. Blue Prism Application Server
C. Blue Prism Database
D. All of the above
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
What algorithm is used to encrypt Credentials stored within Blue Prism? (select one)
A. It always uses AES-256 and a key that is randomly generated when the Application Server restarts
B. It automatically uses the most cryptographically strong scheme that has been configured within the environment
C. It uses the algorithm and key defined on the encryption scheme that« currently selected as the Credentials Encryption Scheme
D. It uses the algorithm defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme along with a key that is randomly generated when the Application Server restarts
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
Is it possible to install a Runtime Resource, an Interactive Client, an Application Server and the Blue Prism database on a single device? (select one)
A. No - components cannot co-exist and must be installed on separate devices
B. It is possible to instated the Runtime Resource and Interactive Client on the same device, but these cannot share a device with the Blue Prism Server
C. Only the Application Server and Blue Prism database can co-exist on a single device
D. Yes although this not a recommended configuration