11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ATA02 Exam Dumps - Designing a Blue Prism (Version 6.0) Environment

Question # 4

Which of the following is TRUE, when referring to establishing a connection between a V6 Application Server and Client? (Select 2)

A.

One of the WCF connection modes should be used. .NET remoting is provided for legacy support purposes only.

B.

Either WCF or .NET remoting may be selected. It does not matter which is used.

C.

It is important to ensure that all Blue Prism clients are configured to use the same connection mode as the Blue Prism Server that they are expected to connect to

D.

It is important to configure the Blue Prism certificate server prior to establishing a connection from a client

Full Access
Question # 5

What factors should be considered when designing the Blue Prism Database Server Environment? (Select 4)

A.

Whether windows authentication or SQL Native authentication will be used for the Database Connection.

B.

Backup and log truncation should be reviewed according to business criticality

C.

Database and Log backup.

D.

Ensuring that the application servers have full sysadmin rights to the database.

E.

Proximity of the database server to the Blue Prism Application server.

F.

Selection of the database platform, between SQL server and Oracle.

G.

Ensuring that the database server can be accessed from all Runtime Resources within the network.

Full Access
Question # 6

Which of the following statements is true, when considering designing the monitoring for a Blue Prism environment? (Select 3)

A.

The Blue Prism interactive client can be used on its own to monitor the environment in its entirety

B.

Monitoring of Blue Prism is not necessary

C.

External Monitoring tools should be used to monitor system performance

D.

Event logs should be monitored for application errors

E.

Process execution related errors may need to be dealt with by a business operations team

F.

Process related errors are automatically sent to the event log

Full Access