Free ATA02 Exam Braindumps

Which of the following statements are true, when considering the security of INSTRUCTIONAL communications to runtime resources? (select 3)

  1. By default the connection is native TCP and not encrypted
  2. The runtime resource can be configured to use certificate-based encryption for all inbound communication
  3. The login agent will automatically use a certificate if the runtime resource is configured to use one
  4. The connection will be established via NET remoting and will be encrypted as long as the "Use Secure Connections" flag is set
  5. A central setting within Blue Prism can be used to prevent all associated Runtime Resources from accepting any instructional communications which are not encrypted.

Answer(s): B,D,E



What devices may a Runtime Resource receive INSTRUCTIONAL communications from? (select 4)

  1. Active Directory Domain Controllers
  2. Blue Prism Interactive Clients
  3. Blue Prism Application Server(s)
  4. Other Blue Prism Runtime Resources
  5. Third party systems accessing Blue Prism web services
  6. Blue Prism Credential Manager

Answer(s): B,C,D,E



Where can the key used by the Credential Manager be stored? (select 1)

  1. The key is always stored in the database
  2. The key is always stored within the config file on the Application Server
  3. The key can either be stored in the database, in the config file on the Application Server, or in a separate securable file on the Application Server
  4. The key is hard-coded and stored securely within the Application. It is subjected to obfuscation to ensure it's protection
  5. The key can only be stored in the database or in the config file on the Application Server

Answer(s): C



What dictates whether it is appropriate to host Application Server services for different environments on a single device? (select 2)

  1. Whether the different environments will be accessing the same processes
  2. Whether there are any security related reasons to segregate services on to separate devices
  3. Whether it is acceptable for product updates to be applied to all environments simultaneously
  4. It is not possible to host multiple Application Server services on a single device

Answer(s): B,C



What security is applied to data that is encrypted by Credential Manager when stored? (select 1)

  1. The credentials are managed by the Windows Credential store and the security applied is proprietary to Microsoft
  2. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a user generated key
  3. The credentials are encrypted by the Application Server for storage in the database using either 3DES or AES-256 and a secure key hardcoded within the application
  4. Credential Management is handled using session variables and security is applied based on the process logic that is defined.

Answer(s): B