Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 13 questions
Exam Code: AIE02                Update: Sep 13, 2025
Exam Name: Installing and Configuring a Blue Prism (Version 6.0) Environment (EN)

Blue Prism Installing and Configuring a Blue Prism (Version 6.0) Environment (EN) AIE02 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

What format of machine name does an Interactive Client or Application Server use to establish a direct connection with a Runtime Resource? (Select one.)

A.

It always uses the short machine name (e.g. robot001)

B.

it always uses the fully qualified domain name (FQDN) (e.g.robot001.mydomain.local)

C.

it depends on the system wide setting which indicates whether short name or FQDN will be used

D.

It uses the format of the name specified on the certificate that is associated with the Runtime Resource

Question # 2

Is it possible to configure a Blue Prism environment without an Application Server? (Select one.)

A.

No, every environment must have an Application Server

B.

Yes, although this is not recommended production environments, or environments intended to be reflective of production environments (e.g. Dev/Test)

Question # 3

What are the options for configuring a Blue Prism Runtime Resource to automatically start when the device is logged in? (Select three.)

A.

As part of the installation, Blue Prism automatically configures the Runtime Resource to start when the device is logged in

B.

Use a scheduled task to start a Blue Prism Runtime Resource with appropriate parameters

C.

Use a policy login script to start a Blue Prism Runtime Resource with appropriate parameters

D.

Put an appropriate batch (*.bat) in the appropriate Start-up Programs folder

Question # 4

How can a Login Agent Runtime be instructed to login and immediately launch a target thick-client application and start processing work from a work queue? (Select one.)

A.

It can’t. Once Login Agent has logged a device in, a conventional Runtime Resource must be started and be appropriately instructed to carry out further processing

B.

This is configured within the process that instructs the device to orchestrate a login through use of a wait stage

C.

This is configured within the process that instructs the device to orchestrate a login through use of a navigate stage

D.

This is configured within the business object that instructs the device to orchestrate a login through use of a wait stage

Question # 5

How can we ensure that all Runtime Resources in the environment are configured to establish a secure connection with the Blue Prism server? (Select one.)

A.

Use the /SSLCert switch in the Runtime Resource start up parameters

B.

Under System -> Settings, enable the “Require secure resource connections” setting

C.

Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text “insecure”

D.

All of the above

Question # 6

What is the Blue Prism Interactive Client used for? (Select three.)

A.

It is responsible for automatically starting and stopping schedules

B.

In non-production environments, it is where automated processes are designed and verified

C.

In production environments, it is where automated processes are designed

D.

In production environments, it is used to monitor and control the platform

E.

In production environments, it is used to configure the platform and define scheduled

F.

It is responsible for providing database connectivity to all connected devices

Question # 7

Which of the following MUST be considered when deploying Login Agent? (Select four.)

A.

A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)

B.

The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device

C.

Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file

D.

Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure

E.

Once a device has been logged in, a congenital Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)

Question # 8

Why can’t Blue Prism be configured to lock out users after 5 failed attempts? (Select one.)

A.

When using Blue Prism native authentication this is not necessary as the client runs on a Windows operating system

B.

It can. When using Blue Prism native authentication password security and lock out options are configurable

C.

It is expected that all deployments will use Single Sign-on which negates this requirement

Question # 9

Which of the following are common reasons why a Blue Prism Interactive Client is not be able to connect to an Application Server? (Select three.)

A.

If the Application Server service is not started

B.

It firewalls prevent the Application Server from receiving traffic on the appropriate port

C.

If the Application Server is configured to use Transport Encryption but the certificate cannot be validated

D.

Invalid user credentials

E.

A user is logged into Blue Prism on the Application Server

Question # 10

Which of the following statements are true in reference to the permissions required for the Blue Prism Application Server service log on user? (Select four.)

A.

When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Native Authentication, the service log on user needs SQL dbowner privileges

B.

When the Blue Prism connection used by the server is configured to use SQL Native Authentication, the service log on user does not need any SQL privileges

C.

When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Windows Authentication, the service log on user needs the minimum permissions on the appropriate Blue Prism SQL Server database as identified in the documentation

D.

When using Single Sign on for the Blue Prism platform, the service log on user needs permission to query Active Directory Security Group membership

E.

When using Single Sign on for the Blue Prism platform, the service log on user needs to be a Domain Administrator

F.

When using Blue Prism native authentication for the Blue Prism platform, the service log on user needs to be a Domain administrator

G.

When configured to use a connection mode that uses Transport encryption, the service log on user needs read-access to the associated certificate’s private key

Page: 1 / 2
Total 13 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 13 Sep 2025