Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

AIE02 Blue Prism Installing and Configuring a Blue Prism (Version 6.0) Environment (EN) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Blue Prism AIE02 Installing and Configuring a Blue Prism (Version 6.0) Environment (EN) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 45 questions

How can a Login Agent Runtime be instructed to login and immediately launch a target thick-client application and start processing work from a work queue? (Select one.)

A.

It can’t. Once Login Agent has logged a device in, a conventional Runtime Resource must be started and be appropriately instructed to carry out further processing

B.

This is configured within the process that instructs the device to orchestrate a login through use of a wait stage

C.

This is configured within the process that instructs the device to orchestrate a login through use of a navigate stage

D.

This is configured within the business object that instructs the device to orchestrate a login through use of a wait stage

Which of the following reasons would prevent the Blue Prism Server service from being started? (Select four.)

A.

If it can’t find a BPServer.exe profile with the name that is expects

B.

If the BPServer.exe profile is not configured with the expected encryption schemes

C.

If the user that the server is attempting to use cannot access the Blue Prism database

D.

If there are no Blue Prism devices configured to connect to the server service

E.

There is a problem with the Blue Prism license key in the environment

F.

If the server service has nothing to process (e.g. if there are no schedules configured)

Which of the following are valid steps to create a Blue Prism database? (Select two.)

A.

Using a Blue Prism device, create a device database connection to connect to the server, use the in-product “Create Database” functionality

B.

Using a Blue Prism device, connect to the Blue Prism Application Server, use the in-product “Create Database” functionality

C.

Using SQL Management Studio create a database, manually run the CreateScript provided by Blue Prism, then use in-product “Configure Database” functionality

D.

Using SQL Management Studio manually run the CreateScript provided by Blue Prism to generate to the database, then use the in-product “configure Database” functionality

Which of the following are steps that would normally be taken on the local device when configuring a Blue Prism Application Server? (Select four.)

A.

Use the Blue Prism Client to configure a connection to a supported database server

B.

Use BPServer.exe to create and configure a connection to a supported database server

C.

Use BPServer.exe to create or configure a profile for the server service that uses a configured database connection

D.

Use BPServer.exe to select an appropriate connection mode and, if required, to select a certificate to use

E.

Use BPServer.exe to configure which users can log into Blue Prism

F.

Use BPServer.exe to configure all encryption schemes for the environment that will use an Application Server key store

How can we ensure that all Runtime Resources in the environment are configured to only receive inbound INSTRUCTIONAL connections over SSL? (Select two.)

A.

Use the /SSLCert switch in the Runtime Resource start up parameters

B.

Under System ->Settings, enable the “Require secure resource connections” setting

C.

Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text “Insecure”

D.

Write an Application Server process which periodically polls all of the connected devise to evaluate the encryption that is being enforced

What are common options for encrypting the communication with the Blue Prism database? (Select three.)

A.

Not required – All SQL Server implementations are configured to enforce encryption by default

B.

Configure the Blue Prism connection to the database to set encrypt=true; trustservercertificates=true

C.

Configure the SQL Server with an appropriate certificate and configure it to only accept secure connections

D.

Turn on IPsec for the network where the Application Server and SQL Server are deployed

E.

Deploy a certificate on the Application Server and use the SSLCert switch

Which of the following are steps that would normally be take on the local device when configuring a Runtime Resource? (Select four.)

A.

Configure a connection to a Blue Prism Application Server

B.

Configure the database maintenance procedures

C.

Configure the Runtime Resource to start automatically when the device is logged on with appropriate parameters

D.

Optionally configure the Runtime Resource start-up procedure with the thumbprint of a local certificate

E.

Optionally install and configure Login Agent

F.

Ensure the AutomateC.exe is accessible to the logged in user

G.

Disable all domain policies

What can be done to prevent new or unexpected devices from registering as Runtime Resources? (Select one.)

A.

Implement firewall rules to prevent unexpected devices from establishing a connection with the Application Server

B.

Under System ->Settings, enable the “Prevent registration of new Resources” setting

C.

All of the above

What steps can be useful to identify why a Blue Prism Server service is failing to start? (Select three.)

A.

Review the message across all tabs within appropriate profile via BPServer.exe

B.

Review the device Windows Application Event Logs

C.

Review the server status panel in Control Room

D.

Use a configured Blue Prism process to interrogate each connected server in turn

E.

Review messages when starting the service manually using BPServer.exe

F.

Use BPDiagnostics to start out a Server Diagnostics and Repair task

What are benefits of Login Agent? (Select four.)

A.

Provides a Login Agent Runtime Resource which can receive simple instructions prior to being in a logged in state

B.

Allows a Login Agent Runtime Resource to immediately automatically login using saved credentials as part of a device reboot

C.

Removes the requirement for locally stored device credentials

D.

Provides the ability to manually instruct a Login Agent Runtime Resource to login

E.

Provides the ability to schedule when a Login Agent Runtime Resource will be logged in

F.

Allows processes which interact with locally installed applications to be executed without the device being logged in

Which of the following MUST be considered when deploying Login Agent? (Select four.)

A.

A number of security settings need to be appropriately configured/disabled on each device where it runs (e.g. ctrl +alt+del prior to login must be disabled)

B.

The Login Agent Runtime Resource is configured to use on of the Blue Prism connections configured on the local device

C.

Editing the configuration of the Login Agent Runtime Resource can be done within the appropriate configuration file

D.

Login Agent can only be used on devices that are members of an Active Directory Domain Network Infrastructure

E.

Once a device has been logged in, a congenital Runtime Resource needs to be configured to start automatically (which will automatically shut-down the Login Agent Runtime Resource)

What does the /SSLCert switch provide when starting a Runtime Resource? (Select two.)

A.

It ensures that the Runtime Resource establishes a secure outbound connection with the Application Server or Database Server

B.

It ensures that inbound connections on the listening port (default 8181) will be encrypted

C.

When hosting Web Services on the Runtime Resources, the inbound connections will need to use HTTPS

D.

Only users who have used a domain account to log onto the device can launch Blue Prism

How can we ensure that all Runtime Resources in the environment are configured to establish a secure connection with the Blue Prism server? (Select one.)

A.

Use the /SSLCert switch in the Runtime Resource start up parameters

B.

Under System -> Settings, enable the “Require secure resource connections” setting

C.

Within the configuration for the Blue Prism Server select a Connection Mode that does not contain the text “insecure”

D.

All of the above

Page: 1 / 1
Total 45 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved