Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)
A) Integration with Active Directory
B) The location of the credential store keys
C) Integration with an external LDAP service
D) The encryption method for the credential store
E) The encryption method for the operational communications between database server and runtimes
F) The separation of duties between roles and environments
G) Remote access to the Blue Prism components
Correct Answer:
Verified
Q6: Where can the key used by the
Q7: Which of the following are common reasons
Q8: What should be considered when designing the
Q9: What are the main factors that should
Q10: When process automations are designed appropriately, which
Q12: Which of the following should be taken
Q13: By default what port does a Runtime
Q14: What should be considered when configuring high
Q15: What is a common way of supporting
Q16: What factors should be considered, when designing
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents