Unit 4 - Practice Quiz

INT346

1 What is the primary purpose of a Credential Vault in an RPA architecture?

A. To store bot code versions and history
B. To secure sensitive information such as usernames and passwords
C. To manage the deployment schedules of bots
D. To analyze the Return on Investment (ROI) of processes

2 In the context of the Credential Vault, what is a Locker?

A. A physical server where the database resides
B. A logical grouping of credentials used to control access permissions
C. A type of variable that stores integer values
D. A mechanism to lock the bot runner during execution

3 Which standard is typically used to encrypt sensitive data within an enterprise-grade Credential Vault?

A. Base64 Encoding
B. ROT13
C. AES-256 (Advanced Encryption Standard)
D. MD5 Hashing

4 What is the main security risk of hardcoding credentials directly into bot scripts?

A. It makes the bot execute slower
B. It increases the file size of the bot
C. It exposes sensitive data to anyone with access to the source code
D. It prevents the bot from running on virtual machines

5 Which role in a Locker has the permission to add or remove other users but cannot necessarily see the password values?

A. Locker Consumer
B. Locker Participant
C. Locker Manager/Owner
D. Credential Viewer

6 Who are Locker Consumers?

A. Users or Roles that can view/use the credentials in their bots
B. External APIs requesting data
C. Administrators who maintain the database
D. The developers who created the credentials

7 When creating a credential, what is an Attribute?

A. The name of the locker it belongs to
B. A specific data field within a credential (e.g., Username, Password)
C. The encryption key used for the vault
D. The expiry date of the bot license

8 Which of the following is a best practice for secure data handling in RPA?

A. Storing passwords in a text file on the desktop
B. Logging sensitive variables to the audit trail for debugging
C. Using the Credential Vault and masking sensitive variables in logs
D. Sharing one admin account across all bots

9 What is the difference between a User-defined Credential and a Standard Credential in some RPA tools?

A. User-defined are for testing only
B. Standard are shared across the organization; User-defined are specific to a user
C. Standard credentials are not encrypted
D. User-defined credentials do not require a locker

10 How does separating Development and Production lockers contribute to security?

A. It saves storage space on the server
B. It ensures developers do not have access to live production data/passwords
C. It makes the bots run faster in production
D. It allows the use of weaker passwords in production

11 In a robust RPA script, what is the primary purpose of a Try-Catch block?

A. To loop through a dataset
B. To handle exceptions and prevent the bot from crashing unexpectedly
C. To try different passwords until one works
D. To capture screenshots for documentation

12 What constitutes a Business Exception in RPA?

A. The application failing to load due to a server crash
B. A selector not being found on the screen
C. Data failing validation rules (e.g., Invoice amount exceeds limit)
D. The bot runner running out of memory

13 What is the purpose of the Finally block in a Try-Catch-Finally structure?

A. It executes only if an error occurs
B. It executes only if no error occurs
C. It executes regardless of whether an exception occurred or not
D. It restarts the bot from the beginning

14 Which of the following creates a Resilient Bot?

A. Using static delays (e.g., Wait 10 seconds)
B. Using dynamic waits (e.g., Wait for window/object to exist)
C. Hardcoding screen coordinates
D. Ignoring pop-up windows

15 To handle an unexpected 'Update Available' pop-up window during execution, which logic is most appropriate?

A. Restart the computer immediately
B. Use an 'If Window Exists' condition to close it, then proceed
C. Increase the delay time before the next step
D. Manually intervene every time

16 What is the concept of Snapshot Logging in error handling?

A. Taking a picture of the developer
B. Recording the screen state at the moment a failure occurs
C. Logging the memory usage of the server
D. Backing up the bot code daily

17 When designing for Scalability, what is the role of a Workload Manager (Queue)?

A. To slow down the bots to prevent server overload
B. To distribute work items across multiple bots dynamically
C. To store credentials for the bots
D. To compress data files

18 Which technique improves bot performance regarding UI interactions?

A. Using 'Mouse Click' at coordinates
B. Interacting with the backend API or Database directly when possible
C. maximizing the window size every time
D. Taking a screenshot after every step

19 In the context of scalability, what is Vertical Scaling?

A. Adding more bot runners (machines)
B. Adding more resources (CPU/RAM) to a single machine to handle heavier tasks
C. increasing the number of process steps
D. Writing longer code

20 Which variable type is most appropriate for assigning a value retrieved from a Credential Vault?

A. List
B. Dictionary
C. Credential / SecureString
D. Boolean

21 Why is logging critical for bot maintenance?

A. It helps in calculating the electricity cost of the server
B. It provides an audit trail and helps diagnose root causes of failures
C. It automatically fixes errors in the code
D. It is required by the operating system

22 What is the purpose of User Acceptance Testing (UAT) in RPA deployment?

A. To check if the code compiles without syntax errors
B. To verify the bot operates correctly in the business environment and meets user requirements
C. To install the RPA software on the server
D. To stress test the server hardware

23 A bot fails because a website takes 30 seconds to load, but the bot only waits 10 seconds. This is an example of:

A. A Logic Error
B. A Synchronization/Timing Issue
C. A Credential Failure
D. A Syntax Error

24 To ensure high availability and resilience, how should a bot handle a 'System Down' scenario?

A. Keep clicking until the system comes back
B. Abort immediately without notification
C. Log the error, send an alert to the admin, and stop or retry later
D. Delete the input file

25 What is a config file (Configuration File) used for in resilient bot design?

A. To store passwords in plain text
B. To store dynamic variables (file paths, URLs, email addresses) outside the code
C. To store the bot's execution logs
D. To keep a backup of the bot script

26 In the context of Credentials, what is FIPS 140-2?

A. A file format for storing bots
B. A U.S. government computer security standard for cryptographic modules
C. A coding language for RPA
D. A licensing model for RPA vendors

27 If a bot needs to access an external Credential Vault (like CyberArk) instead of the built-in one, how is this typically handled?

A. It is not possible
B. The bot manually opens the CyberArk website
C. Through built-in integrations or APIs provided by the RPA platform
D. By copy-pasting the database files

28 What is the Wait for Screen Change command used for?

A. To pause the bot for a fixed 5 minutes
B. To verify that a specific UI update has occurred before proceeding
C. To check if the screen resolution has changed
D. To wait for the user to move the mouse

29 Which practice helps in optimizing the performance of a loop processing 10,000 records?

A. Updating the UI/Excel file after every single row
B. Using bulk updates or memory data tables and writing once at the end
C. Adding a 1-second delay in every loop
D. Logging every variable in every iteration

30 What is Hypervisor-level security in the context of Unattended Bots?

A. Security that prevents the bot from running
B. Security ensuring the virtual machine runs in an isolated, secure environment
C. A password required to open the bot studio
D. A method to encrypt Excel files

31 When defining a Locker, what does the 'Participant' role usually signify?

A. Someone who can view the locker but cannot see credentials
B. Someone who can add credentials to the locker but cannot view others' credentials
C. The supreme administrator
D. A bot that is running the process

32 Which of the following is a key component of a Deployment Checklist?

A. Ensuring the developer's music playlist is saved
B. Verifying environment variables and config files match the Production environment
C. Ensuring the bot is hardcoded with developer passwords
D. Checking if the monitor resolution is 4K

33 How should a bot handle variable cleanup at the end of execution?

A. It is not necessary
B. Leave all applications open for the next run
C. Close all applications and clear sensitive data from memory
D. Reboot the server

34 What is the formula for Bot Success Rate?

A.
B.
C.
D.

35 To ensure Credential Vault integrity, where should the Master Key be stored?

A. On a sticky note on the server
B. In the same database as the credentials
C. In a separate, secure location (e.g., Hardware Security Module or separate server)
D. Inside the bot code

36 Which exception type covers Selector Not Found?

A. Business Exception
B. System / Application Exception
C. Data Exception
D. User Exception

37 What is the benefit of Modular Bot Design (using sub-tasks/sub-bots)?

A. It increases the complexity of the code
B. It makes reuse difficult
C. It allows for easier maintenance and reusability of common components (like Login/Logout)
D. It forces all code to be in one file

38 When creating a credential for a banking site, which two Attributes are essential?

A. Height and Width
B. Username and Password
C. Date and Time
D. Server IP and Port

39 What is the risk of using wildcards (*) excessively in window titles during bot development?

A. The bot will run too fast
B. The bot might attach to the wrong window if multiple similar windows are open
C. It uses more license credits
D. Wildcards are not supported in RPA

40 Which feature allows a bot to run on a locked screen or without a monitor attached?

A. Attended Automation
B. Headless Mode / Unattended Automation (via RDP)
C. Debug Mode
D. Snapshot Mode

41 What is the purpose of Version Control in bot maintenance?

A. To control the speed of the bot
B. To track changes, manage revisions, and allow rollback to previous working states
C. To prevent the bot from being deleted
D. To control who can log in to the machine

42 If a Locker Manager leaves the company, how is access continuity maintained?

A. All credentials are lost
B. The Admin creates a new locker
C. Ownership should be transferred or shared with a service account/backup admin
D. The bot code must be rewritten

43 What does Re-throwing an exception mean in a Catch block?

A. Ignoring the error
B. Fixing the error automatically
C. Catching the error, logging it, and then passing it up to the parent bot/main handler
D. Deleting the error log

44 In performance optimization, why should you avoid placing 'Send Email' inside a tight loop?

A. It consumes too much internet bandwidth
B. SMTP servers may block the bot for spamming
C. It makes the code unreadable
D. Emails cannot be sent from bots

45 Which of the following best describes Role-Based Access Control (RBAC) in Credential Vaults?

A. Access is granted based on the user's job function and necessity
B. Everyone has access to everything
C. Access is based on the time of day
D. Access is granted by a random algorithm

46 When mapping a credential attribute to a bot variable, what happens if the variable is not type 'Credential'?

A. The bot will fail to compile
B. The value might be exposed as plain text in logs or debug mode
C. The vault will refuse to release the password
D. The variable is automatically converted to an integer

47 What is the 'Retry' pattern in error handling?

A. Giving up immediately
B. Attempting the failed action a specific number of times before throwing a final exception
C. Restarting the computer
D. Asking the user for help

48 Which phase of the RPA lifecycle focuses on Bug Fixes and Minor Enhancements?

A. Discovery
B. Design
C. Development
D. Maintenance / Support

49 Why is it important to have unique credentials for bots rather than using a personal user's login?

A. It isn't important
B. To prevent the bot from being traced
C. To ensure auditability and prevent the bot's actions from being attributed to a human
D. Robots get discounts on accounts

50 In the context of scaling, what does 'Decoupling' the Producer and Consumer mean?

A. The Producer bot puts work items into a Queue, and Consumer bots process them independently
B. The Producer and Consumer run on the same machine simultaneously
C. The Producer deletes the data after reading
D. The Consumer waits for the Producer to finish all items before starting