Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 13 questions
Exam Code: ATA02                Update: Nov 18, 2025
Exam Name: Designing a Blue Prism (Version 6.0) Environment

Blue Prism Designing a Blue Prism (Version 6.0) Environment ATA02 Exam Dumps: Updated Questions & Answers (November 2025)

Question # 1

What devices may a Runtime Resource receive INSTRUCTIONAL communications from? (Select 4)

A.

Blue Prism Interactive Clients

B.

Blue Prism Application Server(s)

C.

Other Blue Prism Runtime Resources

D.

Third party systems accessing Blue Prism web services

E.

Blue Prism Credential Manager

Question # 2

What dictates whether it is appropriate to host Application Server services for different environments on a single device? (Select 2)

A.

Whether the different environments will be accessing the same processes

B.

Whether there are any security related reasons to segregate services on to separate devices

C.

Whether it is acceptable for product updates to be applied to all environments simultaneously

D.

It is not possible to host multiple Application Server services on a single device

Question # 3

Which of the following is TRUE, when referring to establishing a connection between a V6 Application Server and Client? (Select 2)

A.

One of the WCF connection modes should be used. .NET remoting is provided for legacy support purposes only.

B.

Either WCF or .NET remoting may be selected. It does not matter which is used.

C.

It is important to ensure that all Blue Prism clients are configured to use the same connection mode as the Blue Prism Server that they are expected to connect to

D.

It is important to configure the Blue Prism certificate server prior to establishing a connection from a client

Question # 4

Which of the following statements is true, when considering designing the monitoring for a Blue Prism environment? (Select 3)

A.

The Blue Prism interactive client can be used on its own to monitor the environment in its entirety

B.

Monitoring of Blue Prism is not necessary

C.

External Monitoring tools should be used to monitor system performance

D.

Event logs should be monitored for application errors

E.

Process execution related errors may need to be dealt with by a business operations team

F.

Process related errors are automatically sent to the event log

Question # 5

What are appropriate methods for designing high availability and disaster recovery scenarios for the Blue Prism Database? (Select 3)

A.

SQL Always on Availability Groups

B.

Windows Clustering

C.

Replication

D.

Blue Prism Active Sync

E.

Connect an application server to 2 Database Instances in parallel

Question # 6

What should be considered when configuring high availability and disaster recovery scenarios for availability of Business Processes managed by Blue Prism? (Select 2)

A.

Resource pools and Active Queues can be used to distribute work to Runtime Resources which are online

B.

The Runtime Resources are “stateful” devices, therefore any failure or maintenance event should also be taken into account in the process design and scheduling methodology

C.

Using a load balancer and 2 application servers will ensure high availability of an automated process

D.

Use the setting within a Blue Prism Process to force a process to fail over to an alternative Runtime Resource in the event of a failure.

Question # 7

Which of the following should be taken into account, when considering Automating applications that are delivered via Application Virtualization or layering Software (such as VMWare Horizon App Volumes, or Citrix XenDisk)? (Select 3)

A.

There may be additional implications to the overall complexity of the architecture, due to the additional components involved in the virtualization technology

B.

It will only ever be possible to use Surface Automation to Automate these applications

C.

The Login Agent application must be available prior to User Login

D.

The mapping between virtualized applications and users is often 1:1. This needs to be considered when designing the credential management approach for the Runtime Resources

E.

Customizations to the application may be lost after the user is logged out or the system is rebooted, unless additional mechanisms are used to preserve them

F.

Surface Automation will always need to be used in these scenarios

Question # 8

Which of the following are common reasons to deploy multiple Application Servers for a single environment? (Select 2)

A.

Redundancy - e.g. to provide a level of continuity if one Application Server fails

B.

To increase the overall security of the environment

C.

The number of connected clients and runtime resources

D.

The Application Server doubles up as a Web Server for a separate application

Question # 9

Which of the following statements is true, when considering Virtualizing the Blue Prism Database Server? (Select 1)

A.

Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version

B.

The Database server should never be virtualized

C.

Virtualization is only supported on Vmware Hypervisor technology

D.

Virtualization should be considered only in very small environments

Question # 10

Where can the key used by the Credential Manager be stored? (Select 1)

A.

The key is always stored in the database

B.

The key is always stored within the config file on the Application Server

C.

The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server

D.

The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection

E.

The key can only be stored in the database or in the config file on the Application Server

Page: 1 / 2
Total 13 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 18 Nov 2025