Blue-Prism ATA02 Questions & Answers

Full Version: 85 Q&A


Latest ATA02 Exam Questions and Practice Tests 2025 - Killexams.com


ATA02 Dumps ATA02 Braindumps

ATA02 Real Questions ATA02 Practice Test ATA02 Actual Questions


killexams.com Blue-Prism ATA02


BluePrism Technical Architect Certification


https://killexams.com/pass4sure/exam-detail/ATA02

Question: 71


Which of the following methods would be a valid approach for capturing process execution errors? (Select 3)


  1. Calling an external program to send SNMP traps.

  2. Logging to event log and collecting via an external tool.

  3. Selecting âsend to external monitoring toolâ from the Blue Prism process designer.

  4. Generating emails from the process.


Answer: A,B,D Question: 72

What must be considered before operating multiple Runtime Resources on a single Windows desktop? (Select 1)

  1. There are no conditions, only one Runtime Resource can be set to listen per Windows session.

  2. Each Runtime Resource must listen on a different port and the processes which run on the device must not impact other processes on the same device.

  3. Each Runtime Resource must listen on the same port and the processes which run on the device must not impact other processes on the same device.

  4. Each Runtime Resource must listen on a different port.


Answer: B Question: 73

What restrictions should be considered if using XenDesktop for delivery of the Runtime Resources? (Select 2)

  1. Login Agent must be used to initiate the login to the device vs the Citrix Client.

  2. Only version 5 of Blue Prism is supported with XenDesktop.

  3. Login Agent is only supported from version 7.6 of XenDesktop, due torestrictions on 3rd party credential provider support prior to this.

  4. XenDesktop is not a supported platform for the Runtime Resource.

  5. Surface Automation will need to be used for all automations.


Answer: A,C Question: 74

What should be considered when configuring high availability and disaster recovery scenarios for availability of Business Processes managed by Blue Prism? (Select 2)

  1. Resource pools and Active Queues can be used to distribute work to Runtime Resources which are online

  2. The Runtime Resources are âstatefulâ devices, therefore any failure or maintenance event should also be taken into account in the process design and scheduling methodology

  3. Using a load balancer and 2 application servers will ensure high availability of an automated process

  4. Use the setting within a Blue Prism Process to force a process to fail over to an alternative Runtime Resource in the event of a failure.


Answer: A,C Question: 75

When is virtualization of a dedicated Interactive Client System most appropriate? (Select 2)


  1. Interactive Clients should never be virtualized

  2. For Process Development - it helps to ensure the Interactive Client has the same configuration as the virtualized Runtime Resources

  3. Where the developers are geographically separate to the Blue Prism environment

  4. To ensure a high-latency connection between the Interactive Client and the Application Server

  5. Whenever runtime resources are virtualized


Answer: A,C,D Question: 76

What security is applied to data that is encrypted by Credential Manager when stored? (Select 1)


  1. The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft

  2. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key

  3. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application

  4. Credential Management is handled using session variables and security is applied based on the process logic that is defined.


Answer: B Question: 77

What should be considered when configuring high availability and disaster recovery scenarios for the Blue Prism Runtime Resources? (Select 2)


  1. Providing high availability for the Runtime Resource will guarantee the SLAs for a business process.

  2. External Load balancing solutions may be used to direct connections from a runtime resource to an appropriate application server.

  3. DNS round robin with a low Time to live (TTL) setting may be employed as a simple mechanism for distributing connections between multiple application servers.

  4. Set each Runtime Resource to point to at least 2 application servers in its configuration file.


Answer: A,B,C Question: 78

What are the primary reasons for regularly backing up Blue Prism production databases (Select 2)


  1. To assure performance

  2. To maintain the latest copy of live process automations and configuration

  3. To maintain an accurate record of the processing history

  4. To maintain a copy of the base VM image that is used to generate Runtime Resources

  5. To avoid losing the configuration of applications on the Runtime Resources


Answer: A,B,C Question: 79

What is the difference between a Runtime Resource and a Process? (Select 1)


  1. There is no difference, the terms are synonymous

  2. A Process represents a definition of the automation steps and logic; Runtime Resources execute the steps defined within a Process

  3. A Process represents a definition of the automation steps and logic; and a Runtime Resource is an executable containing all of the logic within a single process.

  4. A Runtime Resource represents a collection of Processes which is used as part of Release Management


Answer: B Question: 80

Why is it important to control remote console access to the Runtime Resources? (Select 1)


  1. Because runtime resources are used to control the scheduling of processes

  2. Because runtime Resources will always have administrative level access to the Blue Prism database

  3. Because Runtime Resources will always have administrative level access to the Blue Prism control room

  4. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with


Answer: D Question: 81

Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)


  1. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version

  2. The Database server should never be virtualized

  3. Virtualization is only supported on Vmware Hypervisor technology

  4. Virtualization should be considered only in very small environments


Answer: A Question: 82

By default what port does a Runtime Resource listen on? (Select 1)


  1. 8181 - but it is configurable

  2. 8199 - this is fixed and cannot be changed

  3. 443

  4. There is no default


Answer: A Question: 83

What should be considered when designing the Network design and placement of Blue Prism components (and the proximity to target applications)? (Select 4)


  1. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.

  2. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure, Transport Encryption connection mode must be used to secure the operating communications

  3. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure

  4. The communication between components requires the ability to resolve the IP address of the target machine by name

  5. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.


Answer: A,B,C,D,E Question: 84

Where can the key used by the Credential Manager be stored? (Select 1)


  1. The key is always stored in the database

  2. The key is always stored within the config file on the Application Server

  3. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server

  4. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection

  5. The key can only be stored in the database or in the config file on the Application Server


Answer: C Question: 85

What is a common way of supporting geographically disparate users of a Blue Prism environment? (Controllers / Developers)? (Select 1)

  1. Provide a high performance MPLS connection between sites

  2. Provide virtualized Interactive Clients within the same network as the Blue Prism environment

  3. Provide fully replicated Blue Prism environments in each geographic region where users are based

  4. Nominate a user in the central location who will receive releases from each remote user and apply them to the system


Answer: B


User: Mischka*****

Initially, I was unsure if I would pass my ata02 exam and almost gave up. However, I decided to register at Killexams.com for exam coaching just a week before the exam. To my surprise, the topics that I usually avoided studying became interesting, and I eventually passed with flying colors thanks to Killexams.com Questions and Answers.
User: Saasha*****

I recently passed my ATA02 exam, and I owe it all to the exam prep material provided by Killexams.com. A few months ago, I failed the exam the first time I took it, but this time around, I found that the questions were very similar to the real ones, which made passing the exam a breeze. I am incredibly grateful for the help that Killexams.com provided me.
User: Zoe*****

When I decided to take the ATA02 exam, I found a reliable source of preparation in killexams.com. Their practice tests were comprehensive and provided me with a good support system. I was able to assess myself before feeling confident in my abilities to perform well in the exam. Thanks to killexams.com, I was well-prepared and scored well.
User: Mike*****

I am still in disbelief that I passed the ata02 exam, and I owe it all to Killexams.com. Without their help, I would never have achieved such a high score. I am extremely grateful to them for their invaluable assistance.
User: Lida*****

I have renewed my membership with killexams.com for the Blue-Prism ata02 exam because their assistance is vital to my success. I am confident that their practice exams will help me obtain my accreditation and secure more than 95% marks. The team at killexams.com is doing an outstanding job, and I hope they continue to maintain their high standards.

Features of iPass4sure ATA02 Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

All Blue-Prism Exams

Blue-Prism Exams

Certification and Entry Test Exams

Complete exam list