blue prism ata02 practice test

Exam Title: Designing a Blue Prism (Version 6.0) Environment

Last update: Nov 27 ,2025
Question 1

Which of the following statements is true, when considering Virtualizing the Blue Prism Database
Server? (Select 1)

  • A. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
  • B. The Database server should never be virtualized
  • C. Virtualization is only supported on Vmware Hypervisor technology
  • D. Virtualization should be considered only in very small environments
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

By default what port does a Runtime Resource listen on? (select 1)

  • A. 8181 - but it is configurable
  • B. 8199-this is fixed and cannot be changed
  • C. 443
  • D. There is no default
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What should be considered when designing the Network design and placement of Blue Prism
components (and the proximity to target applications)? (select 4)

  • A. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  • B. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure. Transport Encryption connection mode must be used to secure the operating communications
  • C. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  • D. The communication between components requires the ability to resolve the IP address of the target machine by name
  • E. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Answer:

A, B D, E

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 4

Where can the key used by the Credential Manager be stored? (select 1)

  • A. The key is always stored in the database
  • B. The key is always stored within the config file on the Application Server
  • C. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  • D. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  • E. The key can only be stored in the database or in the config file on the Application Server
Answer:

C

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 5

What is a common way of supporting geographically disparate users of a Blue Prism environment?
(Controllers / Developers)? (select 1)

  • A. Provide a high performance MPLS connection between sites
  • B. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  • C. Provide fully replicated Blue Prism environments in each geographic region where users are based
  • D. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

What should be considered when configuring high availability and disaster recovery scenarios for the
Blue Prism Application Servers? (select 2)

  • A. Blue Prism application natively provides fail over between multiple application servers for a Runtime Resource
  • B. Consider deploying multiple Application Servers for each environment
  • C. Consider the impact of maintenance schedules on the availability of the environment
  • D. Deploy multiple instances of an application server service on a single VM
Answer:

B, C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

What factors should be considered, when designing the virtualization strategy for a Blue Prism
environment? (Select 1)

  • A. Existing Data Center and Virtualization strategies
  • B. Support of the components
  • C. Desktop and Application Virtualization Strategies
  • D. Availability
  • E. All of the above
Answer:

E

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 8

Which of the following statements is true, when considering the security of OPERATING connections
between Blue Prism components, when using one of the recommended connection modes? (select
1)

  • A. The encryption of the remoting connection always uses AES256
  • B. The security of the connection is handled by WCF
  • C. Any of the WCF modes will provide full encryption of the connection
  • D. The security of the connection is handled by NET remoting and the windows SSPI layer
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

When process automations are designed appropriately, which connections between Blue Prism
devices can support high-latency (select 1)

  • A. Interactive Clients to Runtime Resources
  • B. Application Server to Runtime Resources
  • C. Application Server to Database Server
  • D. Application Server to Interactive Client
  • E. No components can be supported over a high-latency connection
Answer:

B

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 10

Which of the following are common reasons to deploy multiple Application Servers for a single
environment? (select 2)

  • A. Redundancy – e.g. to provide a level of continuity if one Application Server fails
  • B. To increase the overall security of the environment
  • C. The number of connected clients and runtime resources
  • D. The Application Server doubles up as a Web Server for a separate application
Answer:

A, C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 4
Viewing questions 1-10 out of 45
Go To
page 2