blue prism ATA02 Exam Questions

Questions for the ATA02 were updated on : Dec 01 ,2025

Page 1 out of 3. Viewing questions 1-15 out of 45

Question 1

What should be taken into account when considering the licensing of the Blue Prism environment?
(select 3)

  • A. Blue Prism is licensed, based on the number of connections to the database
  • B. The number of processes executing in the production environment(s) at the same time.
  • C. The license implications of the software that will be automated by Blue Prism
  • D. The licensing of the SQL Server environment
  • E. The Blue Prism license includes everything that will be required for a production environment
Answer:

B, C, D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Which of the following dictates the suitability of a Runtime Resource to execute a process? (select 2)

  • A. Whether the Runtime Resource is online and appropriately connected to the relevant environment □ B. The environment scheme (Inc. colour) configured for the environment
  • C. The clients and network access configured on the Runtime Resource
  • D. Whether the Runtime is a virtual device as processes cannot execute on physical devices
Answer:

A, C

User Votes:
A
50%
C
50%
D
50%
Discussions
vote your answer:
A
C
D
0 / 1000

Question 3

Which of the following statements is true, when considering the Virtualization of Blue Prism1?
(select 2)

  • A. Type 1 hypervisors. such as VMWare Vsphere and Citrix XenServer should be used for production grade deployments of Blue Prism
  • B. Type 2 hypervisors. such as Oracle Virtualbox and Vmware Workstation may be used for production grade deployments of Blue Prism
  • C. All desktop virtualization strategies are suitable for deployment of Runtime Resources
  • D. Consideration should be given to the system resource requirements of the automated applications, on top of the Blue Prism minimum specifications
  • E. The Blue Prism minimum specifications should be sufficient for all use cases
Answer:

A, D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

Which components of the Blue Prism solution may be supported via Presentation / Session
Virtualization Software (such as Microsoft RDSH session virtualization)? (select 1)

  • A. Runtime Resource
  • B. Interactive Client (for Monitoring and Control)
  • C. Interactive Client (for development)
  • D. Application Server
  • E. All of the above
Answer:

E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 5

Which of the following should be taken into account, when considering using a Virtual desktop for
the Runtime Resource using Virtual Desktop Infrastructure (VDI) or Hosted Virtual Desktop (HVD)
Software (such as Citrix XenDesktop or Vmware Horizon View)? (select 2)

  • A. When using a non-persistent Virtual Desktop, the image may be refreshed and this could be problematic if not carefully managed.
  • B. It may be necessary to use the Blue Prism login agent or another automatic login method, to instantiate the Virtual Desktop session
  • C. The Runtime Resources should not be deployed on Virtual Desktop Infrastructure
  • D. It is always appropriate to use the same technology and strategy as is used for the human operators in the client environment
Answer:

B, D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

What are the benefits of enabling direct network access from a Runtime to an end user application,
as opposed to connecting via a component such as Citrix or RDSH? (select 2)

  • A. Network latency is circumvented
  • B. There are more options for interacting directly with the applications which accelerates time required to build automations
  • C. Automations built using direct object level instrumentation are likely to be more robust
  • D. It is then possible to record an automation directly using the spying tools
  • E. This enables the use of Surface Automation, which is faster to develop
Answer:

A, B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

What are appropriate methods for designing high availability and disaster recovery scenarios for the
Blue Prism Database? (select 3)

  • A. SQL Always on Availability Groups
  • B. Windows Clustering
  • C. Replication
  • D. Blue Prism Active Sync
  • E. Connect an application server to 2 Database Instances in parallel
Answer:

A, B, C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

What dictates whether it is appropriate to host Application Server services for different
environments on a single device? (select 2)

  • A. Whether the different environments will be accessing the same processes
  • B. Whether there are any security related reasons to segregate services on to separate devices
  • C. Whether it is acceptable for product updates to be applied to all environments simultaneously
  • D. It is not possible to host multiple Application Server services on a single device
Answer:

B, C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following statements are true, when considering the security of INSTRUCTIONAL
communications to runtime resources? (select 3)

  • A. By default the connection is native TCP and not encrypted
  • B. The runtime resource can be configured to use certificate-based encryption for all inbound communication
  • C. The login agent will automatically use a certificate if the runtime resource is configured to use one
  • D. The connection will be established via NET remoting and will be encrypted as long as the "Use Secure Connections" flag is set
  • E. A central setting within Blue Prism can be used to prevent all associated Runtime Resources from accepting any instructional communications which are not encrypted.
Answer:

B, D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Which of the following is most likely to have the BIGGEST impact on database growth? (select 2)

  • A. The level of session logging that is configured for each stage of each Business Object and Process
  • B. Session logging archiving policy
  • C. The number of Blue Prism users
  • D. The number of Runtime Resources that are registered
  • E. Whether Active Queues are used
Answer:

A, B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 11

What devices may a Runtime Resource receive INSTRUCTIONAL communications from? (select 4)

  • A. Active Directory Domain Controllers
  • B. Blue Prism Interactive Clients
  • C. Blue Prism Application Server(s)
  • D. Other Blue Prism Runtime Resources
  • E. Third party systems accessing Blue Prism web services
  • F. Blue Prism Credential Manager
Answer:

B, C, D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 12

Which of the following should be taken into account, when designing the security model for a Blue
Prism environment? (select 5)

  • A. Integration with Active Directory
  • B. The location of the credential store keys
  • C. Integration with an external LDAP service
  • D. The encryption method for the credential store
  • E. The encryption method for the operational communications between database server and runtimes
  • F. The separation of duties between roles and environments
  • G. Remote access to the Blue Prism components
Answer:

A, B, D, F, G

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
0 / 1000

Question 13

Which of the following statements is true, when considering designing the monitoring for a Blue
Prism environment? (select 3)

  • A. The Blue Prism interactive client can be used on its own to monitor the environment in its entirety
  • B. Monitoring of Blue Prism is not necessary
  • C. External Monitoring tools should be used to monitor system performance
  • D. Event logs should be monitored for application errors
  • E. Process execution related errors may need to be dealt with by a business operations team
  • F. Process related errors are automatically sent to the event log
Answer:

A, C, D,

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 14

What are benefits of using Active Directory Single Sign-on for Blue Prism? (select 2)

  • A. Policies applied by Active Directory such as multi-factor authentication and password complexity are applied to Blue Prism
  • B. It makes it possible to add custom security roles in Blue Prism
  • C. Users are assigned security roles based on their group membership in Active Directory
  • D. Data encryption between Blue Prism devices is provided by default
Answer:

C, D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

What network connections should be considered, when deploying runtime resources on the other
side of a firewall from the Application server? (select 2)

  • A. Remoting connections between Application server and runtime resource
  • B. Instructional communications between Interactive Clients and Runtime resource
  • C. Database connection between the database server and Runtime resource
  • D. Inbound web services connections from the Application server to Runtime resource
Answer:

A, B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2