blue prism ata02 practice test

Designing a Blue Prism (Version 6.0) Environment

Last exam update: Nov 18 ,2025
Page 1 out of 3. Viewing questions 1-15 out of 45

Question 1

Which of the following methods would be a valid approach for capturing process execution errors?
(Select 3)

  • A. Calling an external program to send SNMP traps
  • B. Logging to event log and collecting via an external tool
  • C. Selecting "send to external monitoring tool" from the Blue Prism process designer
  • D. Generating emails from the process
Mark Question:
Answer:

A, B, D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

What must be considered before operating multiple Runtime Resources on a single Windows
desktop? (select 1)

  • A. There are no conditions, only one Runtime Resource can be set to listen per Windows session.
  • B. Each Runtime Resource must listen on a different port and the processes which run on the device must not impact other processes on the same device.
  • C. Each Runtime Resource must listen on the same port and the processes which run on the device must not impact other processes on the same device.
  • D. Each Runtime Resource must listen on a different port.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What restrictions should be considered if using XenDesktop for delivery of the Runtime Resources?

  • A. Login Agent must be used to initiate the login to the device vs the Citrix Client
  • B. Only version 5 of Blue Prism is supported with Xendesktop
  • C. Login Agent is only supported from version 76 of Xendesktop, due to restrictions on 3rd party credential provider support prior to this.
  • D. XenDesktop is not a supported platform for the Runtime Resource
  • E. Surface Automation will need to be used for all automations
Mark Question:
Answer:

A, C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

What should be considered when configuring high availability and disaster recovery scenarios for
availability of Business Processes managed by Blue Prism? (select 2)

  • A. Resource pools and Active Queues can be used to distribute work to Runtime Resources which are online
  • B. The Runtime Resources are "stateful" devices, therefore any failure or maintenance event should also be taken into account in the process design and scheduling methodology
  • C. Using a load balancer and 2 application servers will ensure high availability of an automated process
  • D. Use the setting within a Blue Prism Process to force a process to fail over to an alternative Runtime Resource in the event of a failure
Mark Question:
Answer:

A, C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

When is virtualization of a dedicated Interactive Client System most appropriate? (select 2)

  • A. Interactive Clients should never be virtualized
  • B. For Process Development - it helps to ensure the Interactive Client has the same configuration as the virtualized Runtime Resources
  • C. Where the developers are geographically separate to the Blue Prism environment
  • D. To ensure a high-latency connection between the Interactive Client and the Application Server
  • E. Whenever runtime resources are virtualized
Mark Question:
Answer:

B, C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

What security is applied to data that is encrypted by Credential Manager when stored? (select 1)

  • A. The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft
  • B. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key
  • C. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application
  • D. Credential Management is handled using session variables and security is applied based on the process logic that is defined.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What should be considered when configuring high availability and disaster recovery scenarios for the
Blue Prism Runtime Resources? (select 2)

  • A. Providing high availability for the Runtime Resource will guarantee the SLAs for a business process
  • B. External Load balancing solutions may be used to direct connections from a runtime resource to an appropriate application server
  • C. DNS round robin with a low Time to live (TTL) setting may be employed as a simple mechanism for distributing connections between multiple application servers
  • D. Set each Runtime Resource to point to at least 2 application servers in its configuration file
Mark Question:
Answer:

B, C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What are the primary reasons for regularly backing up Blue Prism production databases (select 2)

  • A. To assure performance
  • B. To maintain the latest copy of live process automations and configuration
  • C. To maintain an accurate record of the processing history
  • D. To maintain a copy of the base VM image that is used to generate Runtime Resources
  • E. To avoid losing the configuration of applications on the Runtime Resources
Mark Question:
Answer:

B, C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 9

What is the difference between a Runtime Resource and a Process? (select 1)

  • A. There is no difference, the terms are synonymous
  • B. A Process represents a definition of the automation steps and logic: Runtime Resources execute the steps defined within a Process
  • C. A Process represents a definition of the automation steps and logic: and a Runtime Resource is an executable containing all of the logic within a single process.
  • D. A Runtime Resource represents a collection of Processes which is used as part of Release Management
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Why is it important to control remote console access to the Runtime Resources? (select 1)

  • A. Because runtime resources are used to control the scheduling of processes
  • B. Because Runtime Resources will always have administrative level access to the Blue Prism database
  • C. Because Runtime Resources will always have administrative level access to the Blue Prism control room
  • D. Because Runtime Resources will be executing automations, where data may be visible or a transaction could be manually interfered with
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following statements is true, when considering Virtualizing the Blue Prism Database
Server? (Select 1)

  • A. Virtualization of the database server should only be considered after fully reviewing the specific vendor recommendations for the Hypervisor and SQL server version
  • B. The Database server should never be virtualized
  • C. Virtualization is only supported on Vmware Hypervisor technology
  • D. Virtualization should be considered only in very small environments
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

By default what port does a Runtime Resource listen on? (select 1)

  • A. 8181 - but it is configurable
  • B. 8199-this is fixed and cannot be changed
  • C. 443
  • D. There is no default
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What should be considered when designing the Network design and placement of Blue Prism
components (and the proximity to target applications)? (select 4)

  • A. If runtime resources will be deployed centrally, the outbound network connectivity and latency to the instrumented applications must be considered.
  • B. If the runtime resource and application server will be deployed outside of a common Active Directory network infrastructure. Transport Encryption connection mode must be used to secure the operating communications
  • C. A runtime resource can be deployed remotely, and connections secured, even if the runtime is not within the same Active Directory Network Infrastructure
  • D. The communication between components requires the ability to resolve the IP address of the target machine by name
  • E. If the runtime resource will be deployed remotely to the application server, certificate-based encryption may need to be considered, as instructional communications are not encrypted by default.
Mark Question:
Answer:

A, B D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 14

Where can the key used by the Credential Manager be stored? (select 1)

  • A. The key is always stored in the database
  • B. The key is always stored within the config file on the Application Server
  • C. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  • D. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  • E. The key can only be stored in the database or in the config file on the Application Server
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 15

What is a common way of supporting geographically disparate users of a Blue Prism environment?
(Controllers / Developers)? (select 1)

  • A. Provide a high performance MPLS connection between sites
  • B. Provide virtualized Interactive Clients within the same network as the Blue Prism environment
  • C. Provide fully replicated Blue Prism environments in each geographic region where users are based
  • D. Nominate a user in the central location who will receive releases from each remote user and apply them to the system
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2