Questions for the ATA02 were updated on : Dec 01 ,2025
Page 1 out of 3. Viewing questions 1-15 out of 45
Question 1
What should be taken into account when considering the licensing of the Blue Prism environment? (select 3)
A. Blue Prism is licensed, based on the number of connections to the database
B. The number of processes executing in the production environment(s) at the same time.
C. The license implications of the software that will be automated by Blue Prism
D. The licensing of the SQL Server environment
E. The Blue Prism license includes everything that will be required for a production environment
Answer:
B, C, D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 2
Which of the following dictates the suitability of a Runtime Resource to execute a process? (select 2)
A. Whether the Runtime Resource is online and appropriately connected to the relevant environment □ B. The environment scheme (Inc. colour) configured for the environment
C. The clients and network access configured on the Runtime Resource
D. Whether the Runtime is a virtual device as processes cannot execute on physical devices
Answer:
A, C
User Votes:
A
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which of the following statements is true, when considering the Virtualization of Blue Prism1? (select 2)
A. Type 1 hypervisors. such as VMWare Vsphere and Citrix XenServer should be used for production grade deployments of Blue Prism
B. Type 2 hypervisors. such as Oracle Virtualbox and Vmware Workstation may be used for production grade deployments of Blue Prism
C. All desktop virtualization strategies are suitable for deployment of Runtime Resources
D. Consideration should be given to the system resource requirements of the automated applications, on top of the Blue Prism minimum specifications
E. The Blue Prism minimum specifications should be sufficient for all use cases
Answer:
A, D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 4
Which components of the Blue Prism solution may be supported via Presentation / Session Virtualization Software (such as Microsoft RDSH session virtualization)? (select 1)
A. Runtime Resource
B. Interactive Client (for Monitoring and Control)
C. Interactive Client (for development)
D. Application Server
E. All of the above
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 5
Which of the following should be taken into account, when considering using a Virtual desktop for the Runtime Resource using Virtual Desktop Infrastructure (VDI) or Hosted Virtual Desktop (HVD) Software (such as Citrix XenDesktop or Vmware Horizon View)? (select 2)
A. When using a non-persistent Virtual Desktop, the image may be refreshed and this could be problematic if not carefully managed.
B. It may be necessary to use the Blue Prism login agent or another automatic login method, to instantiate the Virtual Desktop session
C. The Runtime Resources should not be deployed on Virtual Desktop Infrastructure
D. It is always appropriate to use the same technology and strategy as is used for the human operators in the client environment
Answer:
B, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
What are the benefits of enabling direct network access from a Runtime to an end user application, as opposed to connecting via a component such as Citrix or RDSH? (select 2)
A. Network latency is circumvented
B. There are more options for interacting directly with the applications which accelerates time required to build automations
C. Automations built using direct object level instrumentation are likely to be more robust
D. It is then possible to record an automation directly using the spying tools
E. This enables the use of Surface Automation, which is faster to develop
Answer:
A, B
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 7
What are appropriate methods for designing high availability and disaster recovery scenarios for the Blue Prism Database? (select 3)
A. SQL Always on Availability Groups
B. Windows Clustering
C. Replication
D. Blue Prism Active Sync
E. Connect an application server to 2 Database Instances in parallel
Answer:
A, B, C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 8
What dictates whether it is appropriate to host Application Server services for different environments on a single device? (select 2)
A. Whether the different environments will be accessing the same processes
B. Whether there are any security related reasons to segregate services on to separate devices
C. Whether it is acceptable for product updates to be applied to all environments simultaneously
D. It is not possible to host multiple Application Server services on a single device
Answer:
B, C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Which of the following statements are true, when considering the security of INSTRUCTIONAL communications to runtime resources? (select 3)
A. By default the connection is native TCP and not encrypted
B. The runtime resource can be configured to use certificate-based encryption for all inbound communication
C. The login agent will automatically use a certificate if the runtime resource is configured to use one
D. The connection will be established via NET remoting and will be encrypted as long as the "Use Secure Connections" flag is set
E. A central setting within Blue Prism can be used to prevent all associated Runtime Resources from accepting any instructional communications which are not encrypted.
Answer:
B, D, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
Which of the following is most likely to have the BIGGEST impact on database growth? (select 2)
A. The level of session logging that is configured for each stage of each Business Object and Process
B. Session logging archiving policy
C. The number of Blue Prism users
D. The number of Runtime Resources that are registered
E. Whether Active Queues are used
Answer:
A, B
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 11
What devices may a Runtime Resource receive INSTRUCTIONAL communications from? (select 4)
A. Active Directory Domain Controllers
B. Blue Prism Interactive Clients
C. Blue Prism Application Server(s)
D. Other Blue Prism Runtime Resources
E. Third party systems accessing Blue Prism web services
F. Blue Prism Credential Manager
Answer:
B, C, D, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 12
Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (select 5)
A. Integration with Active Directory
B. The location of the credential store keys
C. Integration with an external LDAP service
D. The encryption method for the credential store
E. The encryption method for the operational communications between database server and runtimes
F. The separation of duties between roles and environments
G. Remote access to the Blue Prism components
Answer:
A, B, D, F, G
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
Discussions
0/ 1000
Question 13
Which of the following statements is true, when considering designing the monitoring for a Blue Prism environment? (select 3)
A. The Blue Prism interactive client can be used on its own to monitor the environment in its entirety
B. Monitoring of Blue Prism is not necessary
C. External Monitoring tools should be used to monitor system performance
D. Event logs should be monitored for application errors
E. Process execution related errors may need to be dealt with by a business operations team
F. Process related errors are automatically sent to the event log
Answer:
A, C, D,
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 14
What are benefits of using Active Directory Single Sign-on for Blue Prism? (select 2)
A. Policies applied by Active Directory such as multi-factor authentication and password complexity are applied to Blue Prism
B. It makes it possible to add custom security roles in Blue Prism
C. Users are assigned security roles based on their group membership in Active Directory
D. Data encryption between Blue Prism devices is provided by default
Answer:
C, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
What network connections should be considered, when deploying runtime resources on the other side of a firewall from the Application server? (select 2)
A. Remoting connections between Application server and runtime resource
B. Instructional communications between Interactive Clients and Runtime resource
C. Database connection between the database server and Runtime resource
D. Inbound web services connections from the Application server to Runtime resource