Deck 2: Installing and Configuring a Blue Prism (Version 6.0) Environment

ملء الشاشة (f)
exit full mode
سؤال
What conditions must be met for a conventional Runtime Resource to be able to receive an instruction and start processing? (Select three.)

A) The device where the Runtime Resource is installed must be logged in
B) An Interactive Client must be logged in prior to starting the Runtime Resource
C) The Runtime Resource must be started
D) The network connectivity must be configured to allow the Runtime Resource to receive connections from all relevant Interactive Clients and Application Servers
E) All Application Server must be configured to process schedules
F) The SSLCert switch must be configured on the Application Server
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the Blue Prism Interactive Client used for? (Select three.)

A) It is responsible for automatically starting and stopping schedules
B) In non-production environments, it is where automated processes are designed and verified
C) In production environments, it is where automated processes are designed
D) In production environments, it is used to monitor and control the platform
E) In production environments, it is used to configure the platform and define scheduled
F) It is responsible for providing database connectivity to all connected devices
سؤال
Which of the following statements is correct? (Select two.)

A) Each Blue Prism environment (e.g. Dev/UAT/Prod) will have a single database
B) Each Blue Prism environment (e.g. Dev/UAT/Prod) will potentially have many databases
C) Each Blue Prism environment (e.g. Dev/UAT/Prod) can have many Application Servers but they will all connect to the same database
D) Each Blue Prism environment (e.g. Dev/UAT/Prod) can have may Application Servers but they will all connect to the same database
E) Each Blue Prism environment (e.g. Dev/UAT/Prod) can have one Application Server but can connect to many databases
سؤال
When settings should be used for the Connection Mode and Server port when configuring a connection from the Runtime Resource to the Application Server? (Select two.)

A) The Connection Mode on the Runtime Resource should be set to apply the appropriate encryption settings based on the processes that will be run on the device
B) The Connection Mode on the Runtime Resource should be set to On to allow the device to be controlled remotely. Set if to be Off to allow local control and connections only
C) The Connection Mode on the Runtime Resource must match the Connection Mode configured on the Blue Prism Server
D) The Server Mode on the Runtime Resource must match the Server Port configured on the Blue Prism Server
E) The Server Port only needs to be set if a port other than 8181 will be used
سؤال
Which of the following are common reasons why a Blue Prism Interactive Client is not be able to connect to an Application Server? (Select three.)

A) If the Application Server service is not started
B) It firewalls prevent the Application Server from receiving traffic on the appropriate port
C) If the Application Server is configured to use Transport Encryption but the certificate cannot be validated
D) Invalid user credentials
E) A user is logged into Blue Prism on the Application Server
سؤال
How can we ensure that all Runtime Resources in the environment are configured to establish a secure connection with the Blue Prism server? (Select one.)

A) Use the /SSLCert switch in the Runtime Resource start up parameters  
B) Under System -> Settings, enable the "Require secure resource connections" setting
C) Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text "insecure"
D) All of the above
سؤال
Which of the following statements are true in reference to the permissions required for the Blue Prism Application Server service log on user? (Select four.)

A) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Native Authentication, the service log on user needs SQL dbowner privileges
B) When the Blue Prism connection used by the server is configured to use SQL Native Authentication, the service log on user does not need any SQL privileges  
C) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Windows Authentication, the service log on user needs the minimum permissions on the appropriate Blue Prism SQL Server database as identified in the documentation
D) When using Single Sign on for the Blue Prism platform, the service log on user needs permission to query Active Directory Security Group membership
E) When using Single Sign on for the Blue Prism platform, the service log on user needs to be a Domain Administrator
F) When using Blue Prism native authentication for the Blue Prism platform, the service log on user needs to be a Domain administrator
G) When configured to use a connection mode that uses Transport encryption, the service log on user needs read-access to the associated certificate's private key
سؤال
What port does a Runtime Resource use to receive communication? (Select one.)

A) It receives instructional information on port 8181 by default but this is configurable using the /port switch
B) It receives instructional information on port 8199 by default but this is configurable using the /inbound switch
C) It receives instructional information using the selected WCF connection method exclusively on port 443
D) It receives instructional information using the selected WCF connection method exclusively on port 8080
سؤال
How can a Login Agent Runtime Resource be instructed to encrypt new inbound connections? (Select one.)

A) It can't - the Login Agent does not accept inbound connections
B) The configuration file for Login Agent can be manually updated to instruct it to specify the SSLCert switch when it starts
C) Login Agent automatically enforces encrypted communication
D) The connection to the Blue Prism Server should be set to use a WCF mode that provides Encryption
سؤال
What BPServer.exe profile name is the default Blue Prism Server service configured to use? (Select one.)

A) It will use the profile which is configured with the "Is Default" flag
B) It will use the first profile when ordered alphabetically
C) It will use the last profile when ordered alphabetically
D) It will use the profile named "Default"
سؤال
Which of the following MUST be considered when deploying Login Agent? (Select four.)

A) A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)
B) The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device
C) Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file
D) Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure  
E) Once a device has been logged in, a congenital Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)
سؤال
Is it possible to configure an Interactive Client to connect to multiple environments? (Select one.)

A) Yes. Before a user signs in they can select which environment they wish to connect to
B) Yes. Before a user signs in they can select all the environments which they will be able to control simultaneously
C) No - an Interactive Client can only be configured to connect to a single environment
سؤال
What permissions are recommended for applying upgrade scripts to the Blue Prism Database? (Select one.)

A) Not Applicable - It is recommended that the Blue Prism client is used to apply the database upgrade script and this is automatically entitled to make all changes
B) dbowner
C) datareader, datawriter
D) datareader, datawriter, all roles named with a prefix of bp_dba
E) All of the above
سؤال
What format of machine name does an Interactive Client or Application Server use to establish a direct connection with a Runtime Resource? (Select one.)

A) It always uses the short machine name (e.g. robot001)
B) it always uses the fully qualified domain name (FQDN) (e.g.robot001.mydomain.local)
C) it depends on the system wide setting which indicates whether short name or FQDN will be used
D) It uses the format of the name specified on the certificate that is associated with the Runtime Resource
سؤال
Which of the following features are only available when using a Blue Prism Application Server? (Select three.)

A) Release manager
B) Credential manager where the key encryption key is stored in the database
C) Credential manager where the key encryption key is stored in a file
D) Single sign-on authentication for Blue Prism
E) Schedules
F) Database connection marshalling/proxy
سؤال
Which of the following statements are true? (Select two.)

A) All work queue items are automatically encrypted using the most cryptographically strong scheme that has been configured within the environment
B) Only Work Queue Items associated with Work Queues that have been associated with an Encryption Scheme will be encrypted
C) Work Queue Items will be encrypted using the algorithm and key on the Encryption Scheme associated with the Work Queue
D) Work Queue items will be encrypted using the algorithm on the Encryption Scheme associated with the Work
E) Queue and a key that is randomly generated when the Application Server restarts
F) Work Queue items cannot be encrypted
سؤال
What does the /SSLCert switch provide when starting a Runtime Resource? (Select two.)

A) It ensures that the Runtime Resource establishes a secure outbound connection with the Application Server or Database Server  
B) It ensures that inbound connections on the listening port (default 8181) will be encrypted
C) When hosting Web Services on the Runtime Resources, the inbound connections will need to use HTTPS
D) Only users who have used a domain account to log onto the device can launch Blue Prism
سؤال
What are benefits of Login Agent? (Select four.)

A) Provides a Login Agent Runtime Resource which can receive simple instructions prior to being in a logged in state  
B) Allows a Login Agent Runtime Resource to immediately automatically login using saved credentials as part of a device reboot
C) Removes the requirement for locally stored device credentials
D) Provides the ability to manually instruct a Login Agent Runtime Resource to login
E) Provides the ability to schedule when a Login Agent Runtime Resource will be logged in
F) Allows processes which interact with locally installed applications to be executed without the device being logged in
سؤال
Which of the following are steps that would normally be take on the local device when configuring a Runtime Resource? (Select four.)

A) Configure a connection to a Blue Prism Application Server
B) Configure the database maintenance procedures
C) Configure the Runtime Resource to start automatically when the device is logged on with appropriate parameters
D) Optionally configure the Runtime Resource start-up procedure with the thumbprint of a local certificate
E) Optionally install and configure Login Agent
F) Ensure the AutomateC.exe is accessible to the logged in user
G) Disable all domain policies
سؤال
Where is the information reported when a Blue Prism Server service fails to start? (Select one.)

A) In Control Panel under Resource Manager
B) Under System >Server Management
C) In the event logs on the local device. These can be accessed using Event Viewer
D) It is not reported but the troubleshooting guide provides useful tips to diagnose the issue
سؤال
What conditions must be met for a conventional Runtime Resource to be able to receive an instruction and start processing? (Choose three.)

A) The device where the Runtime Resource is installed must be logged in
B) An Interactive Client must be logged in prior to starting the Runtime Resource
C) The Runtime Resource must be started
D) The network connectivity must be configured to allow the Runtime Resource to receive connections from all relevant Interactive Clients and Application Servers
E) All Application Servers must be configured to process schedules
F) The SSLCert switch must be configured on the Application Server
سؤال
What settings should be used for the Connection Mode and Server port when configuring a connection from the Runtime Resource to the Application Server? (Choose two.)

A) The Connection Mode on the Runtime Resource should be set to apply the appropriate encryption settings based on the processes that will be run on the device
B) The Connection Mode on the Runtime Resource should be set to On to allow the device to be controlled remotely. Set it to be Off to allow local control and connections only
C) The Connection Mode on the Runtime Resource must match the Connection Mode configured on the Blue Prism Server
D) The Server Mode on the Runtime Resource must match the Server Port configured on the Blue Prism Server
E) The Server Port only needs to be set if a port other than 8181 will be used
سؤال
What can be done to prevent new or unexpected devices from registering as Runtime Resources?

A) Implement firewall rules to prevent unexpected devices from establishing a connection with the Application Server
B) Under System ->Settings, enable the "Prevent registration of new Resources" setting
C) All of the above
سؤال
Is it possible to configure an Interactive Client to connect to multiple environments?

A) Yes. Before a user signs in they can select which environment they wish to connect to
B) Yes. Before a user signs in they can select all the environments which they will be able to control simultaneously
C) No - an Interactive Client can only be configured to connect to a single environment
سؤال
Which of the following reasons would prevent the Blue Prism Server service from being started? (Choose four.)

A) If it can't find a BPServer.exe profile with the name that it expects
B) If the BPServer.exe profile is not configured with the expected encryption schemes
C) If the user that the server is attempting to use cannot access the Blue Prism database
D) If there are no Blue Prism devices configured to connect to the server service
E) There is a problem with the Blue Prism license key in the environment  
F) If the server service has nothing to process (e.g. if there are no schedules configured)
سؤال
Is it possible to configure a Blue Prism environment without an Application Server?

A) No, every environment must have an Application Server
B) Yes, although this is not recommended production environments, or environments intended to be reflective of production environments (e.g. Dev/Test)
سؤال
What are the options for configuring a Blue Prism Runtime Resource to automatically start when the device is logged in? (Choose three.)

A) As part of the installation, Blue Prism automatically configures the Runtime Resource to start when the device is logged in
B) Use a scheduled task to start a Blue Prism Runtime Resource with appropriate parameters
C) Use a policy login script to start a Blue Prism Runtime Resource with appropriate parameters
D) Put an appropriate batch (*.bat) in the appropriate Start-up Programs folder
سؤال
What does the Server Services tab within BPServer.exe provide?

A) It allows you to select which logon account will be used when the server service is started
B) It allows you to select whether the service account will be started automatically and configure the behavior if the service fails to start
C) It checks that the service logon account is allowed to start a listener for the configured binding
D) It checks that the service logon account is allowed to start a listener for the configured binding and provides the option to manage the permissions
E) It validates that there is a service associated with the profile, and if not, provides the option to create a new service. It also checks that the service logon account is allowed to start a listener for the configured binding and provides the option to manage the permissions.
سؤال
When starting a Runtime Resource using the /sslcert switch, what reasons can prevent it from starting? (Choose two.)

A) If the name on the certificate does not match the name (or correct format) of the Runtime Resource
B) If the thumbprint of the certificate is not for a valid certificate on the local device
C) If the certificate has expired or been revoked
D) If the certificate has not been issued by a certification authority that is trusted by device attempting to connect
سؤال
When a Runtime Resource has been started using the /sslcert switch, why might it not be able to receive connections? (Choose three.)

A) If the name on the certificate does not match the name being used to connect to the Runtime Resource
B) If the thumbprint of the certificate is not for a valid certificate on the local device
C) If the certificate has expired or been revoked
D) If the certificate has not been issued by a certification authority that is trusted by the device attempting to connect
E) If the context user of the Runtime Resource does not have read-only access to the certificate's private key
سؤال
Which of the following are valid steps to create a Blue Prism database? (Select two.)

A) Using a Blue Prism device, create a device database connection to connect to the server, use the in-product "Create Database" functionality
B) Using a Blue Prism device, connect to the Blue Prism Application Server, use the in-product "Create Database" functionality
C) Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use in-product "Configure Database" functionality
D) Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate to the database, then use the in-product "configure Database" functionality
سؤال
What are the minimum permissions required for business as usual access to the Blue Prism Database? (Select one.)

A) dbowner
B) datareader, datawriter
C) datareader, datawriter, all roles named with a prefix of bp_dba
D) sysowner
E) all of the above
سؤال
What BPServer.exe profile name is the default Blue Prism Server service configured to use?

A) It will use the profile which is configured with the "Is Default" flag
B) It will use the first profile when ordered alphabetically
C) It will use the last profile when ordered alphabetically
D) It will use the profile named "Default"
سؤال
What format of machine name does an Interactive Client or Application Server use to establish a direct connection with a Runtime Resource?

A) It always uses the short machine name (e.g. robot001)
B) It always uses the fully qualified domain name (FQDN) (e.g. robot001.mydomain.local)
C) It depends on the system wide setting which indicates whether short name or FQDN will be used
D) It uses the format of the name specified on the certificate that is associated with the Runtime Resource
سؤال
Which of the following statements are true in reference to the permissions required for the Blue Prism Application Server service log on user? (Choose four.)

A) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Native Authentication, the service log on user needs SQL dbowner privileges
B) When the Blue Prism connection used by the server is configured to use SQL Native Authentication, the service log on user does not need any SQL privileges  
C) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Windows Authentication, the service log on user needs the minimum permissions on the appropriate Blue Prism SQL Server database as identified in the documentation
D) When using Single Sign on for the Blue Prism platform, the service log on user needs permission to query Active Directory Security Group membership
E) When using Single Sign on for the Blue Prism platform, the service log on user needs to be a Domain Administrator
F) When using Blue Prism native authentication for the Blue Prism platform, the service log on user needs to be a Domain Administrator
G) When configured to use a connection mode that uses Transport encryption, the service log on user needs read-access to the associated certificate's private key
سؤال
What does the /SSLCert switch provide when starting a Runtime Resource? (Choose two.)

A) It ensures that the Runtime Resource establishes a secure outbound connection with the Application Server or Database Server  
B) It ensures that inbound connections on the listening port (default 8181) will be encrypted
C) When hosting Web Services on the Runtime Resources, the inbound connections will need to use HTTPS
D) Only users who have used a domain account to log onto the device can launch Blue Prism
سؤال
How can we ensure that all Runtime Resources in the environment are configured to establish a secure connection with the Blue Prism server?

A) Use the /SSLCert switch in the Runtime Resource start up parameters  
B) Under System -> Settings, enable the "Require secure resource connections" setting
C) Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text "insecure"
D) All of the above
سؤال
What are the steps required to create a Blue Prism Database that will support Blue Prism Single Sign-on? (Select two.)

A) When using the in-product Create Database functionality select to create a database that will use Blue Prism single sign-on
B) After using the in-product Create Database functionality, use the Configure Database functionality to configure it for single sign-on
C) Use SQL Management Studio, use the CreateScript that is specific to SSO environments to create the database
D) Using SQL Management Studio create a database, manually run the CreateScript provided by BluePrism, then use the in-product "Configure Database" functionality
سؤال
How can we ensure that all Runtime Resources in the environment are configured to only receive inbound INSTRUCTIONAL connections over SSL? (Choose two.)

A) Use the /SSLCert switch in the Runtime Resource start up parameters
B) Under System ->Settings, enable the "Require secure resource connections" setting
C) Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text "Insecure"
D) Write an Application Server process which periodically polls all of the connected devices to evaluate the encryption that is being enforced
سؤال
Why can't Blue Prism be configured to lock out users after 5 failed attempts?

A) When using Blue Prism native authentication this is not necessary as the client runs on a Windows operating system
B) It can. When using Blue Prism native authentication password security and lock out options are configurable
C) It is expected that all deployments will use Single Sign-on which negates this requirement
سؤال
Which of the following MUST be considered when deploying Login Agent? (Choose four.)

A) A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)
B) The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device
C) Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file
D) Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure  
E) Once a device has been logged in, a conventional Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)
سؤال
How can a Login Agent Runtime Resource be instructed to encrypt new inbound connections?

A) It can't - the Login Agent does not accept inbound connections
B) The configuration file for Login Agent can be manually updated to instruct it to specify the SSLCert switch when it starts
C) Login Agent automatically enforces encrypted communication
D) The connection to the Blue Prism Server should be set to use a WCF mode that provides Encryption
سؤال
What are the minimum permissions required for business as usual access to the Blue Prism Database?

A) dbowner
B) datareader, datawriter
C) datareader, datawriter, all roles named with a prefix of bp_dba
D) sysowner
E) all of the above
سؤال
What algorithm is used to encrypt Credentials stored within Blue Prism?

A) It always uses AES-256 and a key that is randomly generated when the Application Server restarts
B) It automatically uses the most cryptographically strong scheme that has been configured within the environment
C) It uses the algorithm and key defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme
D) It uses the algorithm defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme along with a key that is randomly generated when the Application Server restarts
سؤال
What is the Blue Prism Interactive Client used for? (Choose three.)

A) It is responsible for automatically starting and stopping schedules
B) In non-production environments, it is where automated processes are designed and verified
C) In production environments, it is where automated processes are designed
D) In production environments, it is used to monitor and control the platform
E) In production environments, it is used to configure the platform and define schedules
F) It is responsible for providing database connectivity to all connected devices
سؤال
What are benefits of Login Agent? (Choose four.)

A) Provides a Login Agent Runtime Resource which can receive simple instructions prior to being in a logged in state  
B) Allows a Login Agent Runtime Resource to immediately automatically login using saved credentials as part of a device reboot
C) Removes the requirement for locally stored device credentials
D) Provides the ability to manually instruct a Login Agent Runtime Resource to login
E) Provides the ability to schedule when a Login Agent Runtime Resource will be logged in
F) Allows processes which interact with locally installed applications to be executed without the device being logged in
سؤال
Which of the following are valid steps to create a Blue Prism database? (Choose two.)

A) Using a Blue Prism device, create a device database connection to connect to the server, use the in-product "Create Database" functionality
B) Using a Blue Prism device, connect to the Blue Prism Application Server, use the in-product "Create Database" functionality
C) Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use in-product "Configure Database" functionality
D) Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate the database, then use the in-product "Configure Database" functionality
سؤال
What permissions are recommended for applying upgrade scripts to the Blue Prism Database?

A) Not Applicable - It is recommended that the Blue Prism client is used to apply the database upgrade script and this is automatically entitled to make all changes
B) dbowner
C) datareader, datawriter
D) datareader, datawriter, all roles named with a prefix of bp_dba
E) All of the above
سؤال
Which of the following statements is correct in relation to Blue Prism Runtime Resources, Interactive Clients and Application Servers?

A) There is a separate installer for each component
B) A single installer is used irrespective of which component is required. The configuration after install defines what component(s) will be available on the device
C) Once the Application Server has been installed, all other components can be configured to self-install
D) All of the above
سؤال
Is it possible to install a Runtime Resource, an Interactive Client, an Application Server and the Blue Prism database on a single device?

A) No -components cannot co-exist and must be installed on separate devices
B) It is possible to install the Runtime Resource and Interactive Client on the same device, but these cannot share a device with the Blue Prism Server
C) Only the Application Server and Blue Prism database can co-exist on a single device
D) Yes, although this not a recommended configuration
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Installing and Configuring a Blue Prism (Version 6.0) Environment
1
What conditions must be met for a conventional Runtime Resource to be able to receive an instruction and start processing? (Select three.)

A) The device where the Runtime Resource is installed must be logged in
B) An Interactive Client must be logged in prior to starting the Runtime Resource
C) The Runtime Resource must be started
D) The network connectivity must be configured to allow the Runtime Resource to receive connections from all relevant Interactive Clients and Application Servers
E) All Application Server must be configured to process schedules
F) The SSLCert switch must be configured on the Application Server
D,E,F
2
What is the Blue Prism Interactive Client used for? (Select three.)

A) It is responsible for automatically starting and stopping schedules
B) In non-production environments, it is where automated processes are designed and verified
C) In production environments, it is where automated processes are designed
D) In production environments, it is used to monitor and control the platform
E) In production environments, it is used to configure the platform and define scheduled
F) It is responsible for providing database connectivity to all connected devices
A,E,F
3
Which of the following statements is correct? (Select two.)

A) Each Blue Prism environment (e.g. Dev/UAT/Prod) will have a single database
B) Each Blue Prism environment (e.g. Dev/UAT/Prod) will potentially have many databases
C) Each Blue Prism environment (e.g. Dev/UAT/Prod) can have many Application Servers but they will all connect to the same database
D) Each Blue Prism environment (e.g. Dev/UAT/Prod) can have may Application Servers but they will all connect to the same database
E) Each Blue Prism environment (e.g. Dev/UAT/Prod) can have one Application Server but can connect to many databases
A,E
4
When settings should be used for the Connection Mode and Server port when configuring a connection from the Runtime Resource to the Application Server? (Select two.)

A) The Connection Mode on the Runtime Resource should be set to apply the appropriate encryption settings based on the processes that will be run on the device
B) The Connection Mode on the Runtime Resource should be set to On to allow the device to be controlled remotely. Set if to be Off to allow local control and connections only
C) The Connection Mode on the Runtime Resource must match the Connection Mode configured on the Blue Prism Server
D) The Server Mode on the Runtime Resource must match the Server Port configured on the Blue Prism Server
E) The Server Port only needs to be set if a port other than 8181 will be used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following are common reasons why a Blue Prism Interactive Client is not be able to connect to an Application Server? (Select three.)

A) If the Application Server service is not started
B) It firewalls prevent the Application Server from receiving traffic on the appropriate port
C) If the Application Server is configured to use Transport Encryption but the certificate cannot be validated
D) Invalid user credentials
E) A user is logged into Blue Prism on the Application Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
How can we ensure that all Runtime Resources in the environment are configured to establish a secure connection with the Blue Prism server? (Select one.)

A) Use the /SSLCert switch in the Runtime Resource start up parameters  
B) Under System -> Settings, enable the "Require secure resource connections" setting
C) Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text "insecure"
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following statements are true in reference to the permissions required for the Blue Prism Application Server service log on user? (Select four.)

A) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Native Authentication, the service log on user needs SQL dbowner privileges
B) When the Blue Prism connection used by the server is configured to use SQL Native Authentication, the service log on user does not need any SQL privileges  
C) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Windows Authentication, the service log on user needs the minimum permissions on the appropriate Blue Prism SQL Server database as identified in the documentation
D) When using Single Sign on for the Blue Prism platform, the service log on user needs permission to query Active Directory Security Group membership
E) When using Single Sign on for the Blue Prism platform, the service log on user needs to be a Domain Administrator
F) When using Blue Prism native authentication for the Blue Prism platform, the service log on user needs to be a Domain administrator
G) When configured to use a connection mode that uses Transport encryption, the service log on user needs read-access to the associated certificate's private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What port does a Runtime Resource use to receive communication? (Select one.)

A) It receives instructional information on port 8181 by default but this is configurable using the /port switch
B) It receives instructional information on port 8199 by default but this is configurable using the /inbound switch
C) It receives instructional information using the selected WCF connection method exclusively on port 443
D) It receives instructional information using the selected WCF connection method exclusively on port 8080
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
How can a Login Agent Runtime Resource be instructed to encrypt new inbound connections? (Select one.)

A) It can't - the Login Agent does not accept inbound connections
B) The configuration file for Login Agent can be manually updated to instruct it to specify the SSLCert switch when it starts
C) Login Agent automatically enforces encrypted communication
D) The connection to the Blue Prism Server should be set to use a WCF mode that provides Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What BPServer.exe profile name is the default Blue Prism Server service configured to use? (Select one.)

A) It will use the profile which is configured with the "Is Default" flag
B) It will use the first profile when ordered alphabetically
C) It will use the last profile when ordered alphabetically
D) It will use the profile named "Default"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following MUST be considered when deploying Login Agent? (Select four.)

A) A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)
B) The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device
C) Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file
D) Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure  
E) Once a device has been logged in, a congenital Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Is it possible to configure an Interactive Client to connect to multiple environments? (Select one.)

A) Yes. Before a user signs in they can select which environment they wish to connect to
B) Yes. Before a user signs in they can select all the environments which they will be able to control simultaneously
C) No - an Interactive Client can only be configured to connect to a single environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What permissions are recommended for applying upgrade scripts to the Blue Prism Database? (Select one.)

A) Not Applicable - It is recommended that the Blue Prism client is used to apply the database upgrade script and this is automatically entitled to make all changes
B) dbowner
C) datareader, datawriter
D) datareader, datawriter, all roles named with a prefix of bp_dba
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What format of machine name does an Interactive Client or Application Server use to establish a direct connection with a Runtime Resource? (Select one.)

A) It always uses the short machine name (e.g. robot001)
B) it always uses the fully qualified domain name (FQDN) (e.g.robot001.mydomain.local)
C) it depends on the system wide setting which indicates whether short name or FQDN will be used
D) It uses the format of the name specified on the certificate that is associated with the Runtime Resource
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following features are only available when using a Blue Prism Application Server? (Select three.)

A) Release manager
B) Credential manager where the key encryption key is stored in the database
C) Credential manager where the key encryption key is stored in a file
D) Single sign-on authentication for Blue Prism
E) Schedules
F) Database connection marshalling/proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following statements are true? (Select two.)

A) All work queue items are automatically encrypted using the most cryptographically strong scheme that has been configured within the environment
B) Only Work Queue Items associated with Work Queues that have been associated with an Encryption Scheme will be encrypted
C) Work Queue Items will be encrypted using the algorithm and key on the Encryption Scheme associated with the Work Queue
D) Work Queue items will be encrypted using the algorithm on the Encryption Scheme associated with the Work
E) Queue and a key that is randomly generated when the Application Server restarts
F) Work Queue items cannot be encrypted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
What does the /SSLCert switch provide when starting a Runtime Resource? (Select two.)

A) It ensures that the Runtime Resource establishes a secure outbound connection with the Application Server or Database Server  
B) It ensures that inbound connections on the listening port (default 8181) will be encrypted
C) When hosting Web Services on the Runtime Resources, the inbound connections will need to use HTTPS
D) Only users who have used a domain account to log onto the device can launch Blue Prism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What are benefits of Login Agent? (Select four.)

A) Provides a Login Agent Runtime Resource which can receive simple instructions prior to being in a logged in state  
B) Allows a Login Agent Runtime Resource to immediately automatically login using saved credentials as part of a device reboot
C) Removes the requirement for locally stored device credentials
D) Provides the ability to manually instruct a Login Agent Runtime Resource to login
E) Provides the ability to schedule when a Login Agent Runtime Resource will be logged in
F) Allows processes which interact with locally installed applications to be executed without the device being logged in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following are steps that would normally be take on the local device when configuring a Runtime Resource? (Select four.)

A) Configure a connection to a Blue Prism Application Server
B) Configure the database maintenance procedures
C) Configure the Runtime Resource to start automatically when the device is logged on with appropriate parameters
D) Optionally configure the Runtime Resource start-up procedure with the thumbprint of a local certificate
E) Optionally install and configure Login Agent
F) Ensure the AutomateC.exe is accessible to the logged in user
G) Disable all domain policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Where is the information reported when a Blue Prism Server service fails to start? (Select one.)

A) In Control Panel under Resource Manager
B) Under System >Server Management
C) In the event logs on the local device. These can be accessed using Event Viewer
D) It is not reported but the troubleshooting guide provides useful tips to diagnose the issue
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What conditions must be met for a conventional Runtime Resource to be able to receive an instruction and start processing? (Choose three.)

A) The device where the Runtime Resource is installed must be logged in
B) An Interactive Client must be logged in prior to starting the Runtime Resource
C) The Runtime Resource must be started
D) The network connectivity must be configured to allow the Runtime Resource to receive connections from all relevant Interactive Clients and Application Servers
E) All Application Servers must be configured to process schedules
F) The SSLCert switch must be configured on the Application Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What settings should be used for the Connection Mode and Server port when configuring a connection from the Runtime Resource to the Application Server? (Choose two.)

A) The Connection Mode on the Runtime Resource should be set to apply the appropriate encryption settings based on the processes that will be run on the device
B) The Connection Mode on the Runtime Resource should be set to On to allow the device to be controlled remotely. Set it to be Off to allow local control and connections only
C) The Connection Mode on the Runtime Resource must match the Connection Mode configured on the Blue Prism Server
D) The Server Mode on the Runtime Resource must match the Server Port configured on the Blue Prism Server
E) The Server Port only needs to be set if a port other than 8181 will be used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What can be done to prevent new or unexpected devices from registering as Runtime Resources?

A) Implement firewall rules to prevent unexpected devices from establishing a connection with the Application Server
B) Under System ->Settings, enable the "Prevent registration of new Resources" setting
C) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Is it possible to configure an Interactive Client to connect to multiple environments?

A) Yes. Before a user signs in they can select which environment they wish to connect to
B) Yes. Before a user signs in they can select all the environments which they will be able to control simultaneously
C) No - an Interactive Client can only be configured to connect to a single environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following reasons would prevent the Blue Prism Server service from being started? (Choose four.)

A) If it can't find a BPServer.exe profile with the name that it expects
B) If the BPServer.exe profile is not configured with the expected encryption schemes
C) If the user that the server is attempting to use cannot access the Blue Prism database
D) If there are no Blue Prism devices configured to connect to the server service
E) There is a problem with the Blue Prism license key in the environment  
F) If the server service has nothing to process (e.g. if there are no schedules configured)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Is it possible to configure a Blue Prism environment without an Application Server?

A) No, every environment must have an Application Server
B) Yes, although this is not recommended production environments, or environments intended to be reflective of production environments (e.g. Dev/Test)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the options for configuring a Blue Prism Runtime Resource to automatically start when the device is logged in? (Choose three.)

A) As part of the installation, Blue Prism automatically configures the Runtime Resource to start when the device is logged in
B) Use a scheduled task to start a Blue Prism Runtime Resource with appropriate parameters
C) Use a policy login script to start a Blue Prism Runtime Resource with appropriate parameters
D) Put an appropriate batch (*.bat) in the appropriate Start-up Programs folder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What does the Server Services tab within BPServer.exe provide?

A) It allows you to select which logon account will be used when the server service is started
B) It allows you to select whether the service account will be started automatically and configure the behavior if the service fails to start
C) It checks that the service logon account is allowed to start a listener for the configured binding
D) It checks that the service logon account is allowed to start a listener for the configured binding and provides the option to manage the permissions
E) It validates that there is a service associated with the profile, and if not, provides the option to create a new service. It also checks that the service logon account is allowed to start a listener for the configured binding and provides the option to manage the permissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
When starting a Runtime Resource using the /sslcert switch, what reasons can prevent it from starting? (Choose two.)

A) If the name on the certificate does not match the name (or correct format) of the Runtime Resource
B) If the thumbprint of the certificate is not for a valid certificate on the local device
C) If the certificate has expired or been revoked
D) If the certificate has not been issued by a certification authority that is trusted by device attempting to connect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
When a Runtime Resource has been started using the /sslcert switch, why might it not be able to receive connections? (Choose three.)

A) If the name on the certificate does not match the name being used to connect to the Runtime Resource
B) If the thumbprint of the certificate is not for a valid certificate on the local device
C) If the certificate has expired or been revoked
D) If the certificate has not been issued by a certification authority that is trusted by the device attempting to connect
E) If the context user of the Runtime Resource does not have read-only access to the certificate's private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following are valid steps to create a Blue Prism database? (Select two.)

A) Using a Blue Prism device, create a device database connection to connect to the server, use the in-product "Create Database" functionality
B) Using a Blue Prism device, connect to the Blue Prism Application Server, use the in-product "Create Database" functionality
C) Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use in-product "Configure Database" functionality
D) Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate to the database, then use the in-product "configure Database" functionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What are the minimum permissions required for business as usual access to the Blue Prism Database? (Select one.)

A) dbowner
B) datareader, datawriter
C) datareader, datawriter, all roles named with a prefix of bp_dba
D) sysowner
E) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What BPServer.exe profile name is the default Blue Prism Server service configured to use?

A) It will use the profile which is configured with the "Is Default" flag
B) It will use the first profile when ordered alphabetically
C) It will use the last profile when ordered alphabetically
D) It will use the profile named "Default"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
What format of machine name does an Interactive Client or Application Server use to establish a direct connection with a Runtime Resource?

A) It always uses the short machine name (e.g. robot001)
B) It always uses the fully qualified domain name (FQDN) (e.g. robot001.mydomain.local)
C) It depends on the system wide setting which indicates whether short name or FQDN will be used
D) It uses the format of the name specified on the certificate that is associated with the Runtime Resource
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following statements are true in reference to the permissions required for the Blue Prism Application Server service log on user? (Choose four.)

A) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Native Authentication, the service log on user needs SQL dbowner privileges
B) When the Blue Prism connection used by the server is configured to use SQL Native Authentication, the service log on user does not need any SQL privileges  
C) When a Blue Prism Server is configured with a SQL Server database connection that uses SQL Windows Authentication, the service log on user needs the minimum permissions on the appropriate Blue Prism SQL Server database as identified in the documentation
D) When using Single Sign on for the Blue Prism platform, the service log on user needs permission to query Active Directory Security Group membership
E) When using Single Sign on for the Blue Prism platform, the service log on user needs to be a Domain Administrator
F) When using Blue Prism native authentication for the Blue Prism platform, the service log on user needs to be a Domain Administrator
G) When configured to use a connection mode that uses Transport encryption, the service log on user needs read-access to the associated certificate's private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What does the /SSLCert switch provide when starting a Runtime Resource? (Choose two.)

A) It ensures that the Runtime Resource establishes a secure outbound connection with the Application Server or Database Server  
B) It ensures that inbound connections on the listening port (default 8181) will be encrypted
C) When hosting Web Services on the Runtime Resources, the inbound connections will need to use HTTPS
D) Only users who have used a domain account to log onto the device can launch Blue Prism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
How can we ensure that all Runtime Resources in the environment are configured to establish a secure connection with the Blue Prism server?

A) Use the /SSLCert switch in the Runtime Resource start up parameters  
B) Under System -> Settings, enable the "Require secure resource connections" setting
C) Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text "insecure"
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the steps required to create a Blue Prism Database that will support Blue Prism Single Sign-on? (Select two.)

A) When using the in-product Create Database functionality select to create a database that will use Blue Prism single sign-on
B) After using the in-product Create Database functionality, use the Configure Database functionality to configure it for single sign-on
C) Use SQL Management Studio, use the CreateScript that is specific to SSO environments to create the database
D) Using SQL Management Studio create a database, manually run the CreateScript provided by BluePrism, then use the in-product "Configure Database" functionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
How can we ensure that all Runtime Resources in the environment are configured to only receive inbound INSTRUCTIONAL connections over SSL? (Choose two.)

A) Use the /SSLCert switch in the Runtime Resource start up parameters
B) Under System ->Settings, enable the "Require secure resource connections" setting
C) Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text "Insecure"
D) Write an Application Server process which periodically polls all of the connected devices to evaluate the encryption that is being enforced
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Why can't Blue Prism be configured to lock out users after 5 failed attempts?

A) When using Blue Prism native authentication this is not necessary as the client runs on a Windows operating system
B) It can. When using Blue Prism native authentication password security and lock out options are configurable
C) It is expected that all deployments will use Single Sign-on which negates this requirement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following MUST be considered when deploying Login Agent? (Choose four.)

A) A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)
B) The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device
C) Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file
D) Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure  
E) Once a device has been logged in, a conventional Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
How can a Login Agent Runtime Resource be instructed to encrypt new inbound connections?

A) It can't - the Login Agent does not accept inbound connections
B) The configuration file for Login Agent can be manually updated to instruct it to specify the SSLCert switch when it starts
C) Login Agent automatically enforces encrypted communication
D) The connection to the Blue Prism Server should be set to use a WCF mode that provides Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the minimum permissions required for business as usual access to the Blue Prism Database?

A) dbowner
B) datareader, datawriter
C) datareader, datawriter, all roles named with a prefix of bp_dba
D) sysowner
E) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What algorithm is used to encrypt Credentials stored within Blue Prism?

A) It always uses AES-256 and a key that is randomly generated when the Application Server restarts
B) It automatically uses the most cryptographically strong scheme that has been configured within the environment
C) It uses the algorithm and key defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme
D) It uses the algorithm defined on the encryption scheme that is currently selected as the Credentials Encryption Scheme along with a key that is randomly generated when the Application Server restarts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is the Blue Prism Interactive Client used for? (Choose three.)

A) It is responsible for automatically starting and stopping schedules
B) In non-production environments, it is where automated processes are designed and verified
C) In production environments, it is where automated processes are designed
D) In production environments, it is used to monitor and control the platform
E) In production environments, it is used to configure the platform and define schedules
F) It is responsible for providing database connectivity to all connected devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are benefits of Login Agent? (Choose four.)

A) Provides a Login Agent Runtime Resource which can receive simple instructions prior to being in a logged in state  
B) Allows a Login Agent Runtime Resource to immediately automatically login using saved credentials as part of a device reboot
C) Removes the requirement for locally stored device credentials
D) Provides the ability to manually instruct a Login Agent Runtime Resource to login
E) Provides the ability to schedule when a Login Agent Runtime Resource will be logged in
F) Allows processes which interact with locally installed applications to be executed without the device being logged in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following are valid steps to create a Blue Prism database? (Choose two.)

A) Using a Blue Prism device, create a device database connection to connect to the server, use the in-product "Create Database" functionality
B) Using a Blue Prism device, connect to the Blue Prism Application Server, use the in-product "Create Database" functionality
C) Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use in-product "Configure Database" functionality
D) Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate the database, then use the in-product "Configure Database" functionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What permissions are recommended for applying upgrade scripts to the Blue Prism Database?

A) Not Applicable - It is recommended that the Blue Prism client is used to apply the database upgrade script and this is automatically entitled to make all changes
B) dbowner
C) datareader, datawriter
D) datareader, datawriter, all roles named with a prefix of bp_dba
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following statements is correct in relation to Blue Prism Runtime Resources, Interactive Clients and Application Servers?

A) There is a separate installer for each component
B) A single installer is used irrespective of which component is required. The configuration after install defines what component(s) will be available on the device
C) Once the Application Server has been installed, all other components can be configured to self-install
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Is it possible to install a Runtime Resource, an Interactive Client, an Application Server and the Blue Prism database on a single device?

A) No -components cannot co-exist and must be installed on separate devices
B) It is possible to install the Runtime Resource and Interactive Client on the same device, but these cannot share a device with the Blue Prism Server
C) Only the Application Server and Blue Prism database can co-exist on a single device
D) Yes, although this not a recommended configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.