0% found this document useful (0 votes)
3 views23 pages

Pass

The document contains a series of exam questions related to Blue Prism, covering topics such as application models, automation techniques, and best practices. Each question includes multiple-choice answers with the correct answer indicated, along with explanations and references. The exam appears to assess knowledge on various aspects of using Blue Prism for process automation.

Uploaded by

mssdtechl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views23 pages

Pass

The document contains a series of exam questions related to Blue Prism, covering topics such as application models, automation techniques, and best practices. Each question includes multiple-choice answers with the correct answer indicated, along with explanations and references. The exam appears to assess knowledge on various aspects of using Blue Prism for process automation.

Uploaded by

mssdtechl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

APD01

Number: APD01
Passing Score: 800
Time Limit: 120 min
File Version: 1

APD01

https://www.gratisexam.com/

https://www.gratisexam.com/
Exam A

QUESTION 1
Which of the following Application Models follow Blue Prism Best Practice:

A.

https://www.gratisexam.com/

https://www.gratisexam.com/
B.

C.

https://www.gratisexam.com/
D.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
While automating a process involving a browser based application a popup window from the browser application appears that you need to work with. When you try
to spy the popup window and its elements, Blue Prism throws the following error: “There was an error during the spying operation.” Which of the following would be
the most appropriate workaround?

A. Set the HKEY CURRENT USER\Software\Microsoft\Internet Explorer\Main\TabProcGrowth Registry key to 2


B. Change the scope of the process so that the popup window does not need to be automated
C. Create a new separate object that attaches to the running instance of the popup and attempt to spy elements with this object instead.
D. Use Surface Automation techniques to interface with the popup window

Correct Answer: D

https://www.gratisexam.com/
Section: (none)
Explanation

Explanation/Reference:
Reference: https://subscription.packtpub.com/book/business/9781789610444/6/ch06lvl1sec53/surface-automation-with-region-mode

QUESTION 3
A PDD has been created which includes a requirement to log in to an application called CDS. The CDS application only allows a user account to be logged into the
application on one machine at a time. The client wishes to hold the credentials for logging into CDS in the Blue Prism Credential store.

It has been calculated that the automated solution will require 3 resource PC's to enable the case volume to be worked within SLA’s.

Which is the most appropriate design decision to accommodate the above requirements?

A. Create user accounts and sets of Credentials per Resource PC in the Blue Prism Credential Manager for the CDS Application.
B. Ask IT to enable concurrent logins to the CDS application for Blue Prism User Accounts
C. Login in to the CDS application manually and let Blue Prism take over once the login is complete
D. Create a single Credential in the Blue Prism Credential Manager for the CDS Application. Use a Blue Prism Environment Lock to ensure that only one Resource
PC can be logged in to the CDS application at a time

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Reference: https://dotnetbasic.com/2019/04/blue-prism-credential-manager.html

QUESTION 4
Which of the following are examples of a Business Exception?

1. A Business Requirement states that Blue Prism should not work on any accounts with a balance greater than £1,000,000. Blue Prism has successfully read the
balance field and it has returned a value of £1,100,000.
2. Blue Prism has detected an unexpected pop up
3. A Blue Prism wait stage has timed out waiting for a Web page to load
4. The data input to the process has been validated and failed

A. All of them
B. 2 and 3
C. 1 and 4
D. None of them

https://www.gratisexam.com/
Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
When using Control Room, which of the following statements are correct? (Choose three.)

A. A process can be run on multiple resources at the same time


B. A resource can run multiple processes at the same time
C. Only one instance of each process can run at any one time
D. A resource PC can only run one process at time
E. A process must be published before it can be run in Control Room

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
An Insurance company has created 4 Blue Prism processes:
Change of Address
Claims Processing
Renewals
Order Letter

The Order Letter process is not a published process but is called as a sub process by each of the 3 other processes.

Each day at 6am a scheduler starts:


2 instances of the Renewals process on the same virtual machine
9 instances of the Claims Processing process on 3 different virtual machines
1 instance of the Change of Address process on its own virtual machine

How many robot licenses will be consumed by the running processes?

https://www.gratisexam.com/
A. 5
B. 12
C. 6
D. 3

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
A retail bank has promoted 5 Blue Prism processes to production:

Email Poller
Customer Onboarding
Amend Contact Details
Direct Debit Cancellations
Onboarding Reporting

One instance of the email Poller process will run 24/7 feeding work queues for the other two processes.
Two concurrent instances of the Customer Onboarding process will run between 6am and 11pm each day on the same VM.
Two concurrent instances of the Amend Contact Details process will run between 8am and 8pm each day on two VMs.
One instance of the Direct Debit Cancellations process will run between 6am and 4pm each day on the same VM as the Email Poller process. The scheduler that
starts the Direct Debit Cancellations process is configured to run the Onboarding Reporting process when the Direct Debit Cancellations process has successfully
completed.

How many robot licenses are required?

A. 3
B. 4
C. 5
D. 6

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 8
Which of the following is an alternative to the usual method of spying application elements when spying issues are encountered?

A. Application Model
B. Application Navigator
C. Highlight
D. System Navigator

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Reference: https://www.tutorialspoint.com/blue_prism/blue_prism_tutorial.pdf

QUESTION 9
Which of the following attributes should be checked in order to improve the performance of interaction with a Java element?

A. Java Text
B. Ancestor Count
C. Role
D. Allowed Actions

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
Which of the following statements is true regarding the automation of Java applications? (Choose two.)

A. Java Access Bridge is always required to automate applications using Java spy mode.
B. Spy modes cannot be mixed when automating a Java application. All objects called by the process must use the same interface.
C. Surface Automation is not compatible with Java applications.
D. Active Accessibility spy mode can be used on Java applications

https://www.gratisexam.com/
Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
Which of the following does the Blue Prism Login Agent functionality support? (Choose three.)

A. Log into Windows on a Resource PC


B. Log into Business Applications
C. Lock a Resource PC
D. Determine if a Resource PC is logged in

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
What is the correct mnemonic keyword for the Enter key in an Attachmate mainframe application?

A. @e
B. {enter}
C. [enter]
D. {E}

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Reference: https://www.ibm.com/support/knowledgecenter/en/SSEQ5Y_6.0.0/com.ibm.pcomm.doc/books/html/host_access11.htm

QUESTION 13

https://www.gratisexam.com/
When spying an element how does Application Manager work out the best selection of element attributes?

A. It uses the application details entered in the Application Manager set up.
B. It learns from the elements spied previously to determine the best choice of attributes.

https://www.gratisexam.com/

C. The application informs Application Manager how the element should be identified.
D. It cannot, the developer must determine the ideal selection.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
An application needs to be interfaced with as part of a business process your team has been asked to automate using Blue Prism. The business process uses 30
different screens in the application.

When thinking of your Object Design which of these statements are true? (Select all that apply.)

A. Your object design should have multiple Blue Prism Objects for this one application to allow multiple developers to develop the application object layer at the
same time.
B. Your object design should have one object for your application to make change control and reuse easier.
C. An object design is not required if an Agile delivery methodology is being used. Agile methodology does not require design documents.
D. Your object design should have multiple Blue Prism Objects for this one application to reduce the risk of future changes that are made.
E. To ensure your actions have the correct level of granularity your object design would contain at least 30 actions.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 15
Which of the following techniques is most suitable for extracting text from a PDF Document which is a scan of a hand written document?

A. Use Global Mouse Clicks and Global Send Keys to extract the PDF text to the Windows clipboard and use Blue Prism utilities or functions to extract the text
from the clipboard
B. Use the Adobe Acrobat API to export or convert the PDF document into another format such as XML or Microsoft Word
C. Use the ‘Read Text with OCR’ option of a Blue Prism Read Stage on Regions
D. None of these options

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Reference: https://www.quora.com/How-can-you-work-with-PDF-files-in-Blue-Prism

QUESTION 16
Which of the following techniques is most suitable for extracting text from a PDF Document which originated as a Microsoft Word Document and was saved as a
read only PDF?

A. Use Global Mouse Clicks and Global Send Keys to extract the PDF text to the Windows clipboard and use Blue Prism utilities or functions to extract the text
from the clipboard
B. Use the ‘Read Text with OCR’ option of a Blue Prism Read Stage on Win32 Elements
C. Use the ‘Get Text’ option of a Blue Prism Read Stage on Regions
D. None of these options

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Reference: https://www.quora.com/How-can-you-work-with-PDF-files-in-Blue-Prism

QUESTION 17
Using Surface Automation there is requirement to enter a note in the Note field on the screen below:

https://www.gratisexam.com/
The Note Box element has been spied as a Region:

https://www.gratisexam.com/
On Launching the Add Note screen, the cursor is in the Name field and the Notes field will be empty.
Which of the following is the most appropriate sequence of stages to enter the note into the Note field?

A. Send a Global Mouse Click Centre to the Note Box element, followed by a tiny unconditional wait stage, followed by a Global Send Keys to the application.
B. Use a Write stage to write data to the Note Box element
C. Send a Global Mouse Click Centre to the Note Box element, followed by a tiny unconditional wait stage, followed by a Write Stage to the Note Box element
D. Send a Global Mouse Click Centre to the Note Box element, followed by a tiny unconditional wait stage, followed by a Global Send Keys to the Note Box
element

Correct Answer: C
Section: (none)
Explanation

https://www.gratisexam.com/
Explanation/Reference:

QUESTION 18
Which of the following are correct? (Choose three.)

A. Blue Prism web services are secured using HTTP authentication.


B. Recursive definitions within WSDLs are supported by Blue Prism.
C. Blue Prism can consume third-party web services presented over HTTPs assuming the runtime resources are configured to trust the certificate that is used to
secure the web service
D. Blue Prism supports binary data as inputs and outputs for web services.

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
Which of the following statements about Blue Prism Web Service parameters are correct? (Choose two.)

A. Flag is a valid output parameter


B. Binary is a valid output parameter
C. Duration is a valid output parameter
D. Blue Prism Web Services cannot have output parameters

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
Reference: https://usermanual.wiki/Pdf/Blue20Prism20User20Guide2020Web20Services.795353567/html

QUESTION 20
Which of the following statements about Blue Prism and Web Services are correct? (Choose three.)

A. Blue Prism web services are executed on Blue Prism Runtime Resources
B. Only Blue Prism Processes can be exposed as a Web Service

https://www.gratisexam.com/
C. A Blue Prism Business Object is exposed as a Web Service in the System Manager area of Blue Prism
D. Both Blue Prism Processes or Business Objects can be exposed as a Web Service

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which of the following statements about setting and using Work Queue priority are correct?

1. The Blue Prism Work Queue business object can be used to change the priority of an item after it has been added to the queue.
2. Items are worked in order of lowest priority number first.
3. The default priority setting is 1.
4. Setting the priority for a Work Queue item is done when the item is first added to the queue using the Add To Queue action.

A. 2 only
B. 2 and 4
C. 1, 2 and 4
D. All of them

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Reference: https://codingcompiler.com/blue-prism-interview-questions-experienced/

QUESTION 22
Which of the following accurately describes best practice when work is sourced from an application's workflow system?

A. There is no need to use a Blue Prism queue as workflow is managed within the application
B. Even though there is a workflow system managing and allocating work, a Blue Prism Work Queue should still be used
C. Blue Prism cannot source work from an application's workflow system
D. When sourcing work from an applications workflow system, case data should be stored in an excel document

Correct Answer: B

https://www.gratisexam.com/
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
Which of the following statements about Tagging of Work Queues are correct? (Choose three.)

A. Tags can only be added to a Work Queue case at the time the case is added to the queue
B. Tags can be used to categorise the ‘Completion Type’ of a case.
C. Tags can be used to filter the items retrieved from a work queue
D. Tags can be used to categorise the source of a work queue item

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which of the following comments about Wait Stages are correct?

1. After a Navigate stage which moves an application from one screen to another, it is good practice to configure a Wait Stage to detect the screen change has
successfully completed.
2. It is good practice to hold the timeout values to be used in Wait Stages as a set of global data items on a Business Object’ initialise page
3. It is good practice to ensure that a Wait Stage times out to another stage - normally an Exception Stage
4. There is no need to configure a Wait Stage, at the start of a Business Object action, to validate the application is on the correct, screen if the previous action
called by the Process has validated a successful screen change.

A. 1 only
B. 1 and 2
C. 1, 2 and 3
D. All of the above

Correct Answer: A
Section: (none)
Explanation

https://www.gratisexam.com/
Explanation/Reference:

QUESTION 25
When using Surface Automation Blue Prism is required to read the text contained within the Notes field below:

To do this, the field must be highlighted and the Keystrokes CTRL & C must be sent to the application to copy the text to the clipboard.

The Note Box has been identified as a Region within the following Application Model.

https://www.gratisexam.com/
Assuming all the text in the Notes field has been successfully highlighted, which of the following stages will successfully send CTRL & C to the application to copy
the highlighted text to the Clipboard?

https://www.gratisexam.com/
A.

https://www.gratisexam.com/
B.

https://www.gratisexam.com/
C.

https://www.gratisexam.com/
D.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 26
Which of the following statements regarding Blue Prism Login Agent are true? (Select all that apply.)

A. Windows passwords can be changed using Login Agent Functionality


B. It is possible to use a SAS (Secure Attention Sequence) service with Login Agent to traverse the ‘Press CTRL + ALT + DELETE to log on’ screen
C. Blue Prism Login Agent can be used to lock a Resource PC
D. You cannot configure the Blue Prism scheduler to login via Login Agent and then run a business process once it has logged in

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

https://www.gratisexam.com/

https://www.gratisexam.com/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy