Which of the following statements are true, when considering a remote access technology and strategy for monitoring and operation of the Blue Prism environment? (select 3)
Answer : B, C, D
What must be considered before operating multiple Runtime Resources on a single Windows desktop? (select 1)
Answer : B
Where can the key used by the Credential Manager be stored? (select 1)
Answer : C
Which of the following dictates the suitability of a Runtime Resource to execute a process? (select 2)
Answer : A, C
By default what port does a Runtime Resource listen on? (select 1)
Answer : A
Which of the following is TRUE, when referring to connections configured using the "SOAP with Transport Encryption and Windows Authentication" mechanism? (select 2)
Answer : A, B
What restrictions should be considered if using XenDesktop for delivery of the Runtime Resources?
Answer : A, C