Unit 4 - Practice Quiz

INT346 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary purpose of a Credential Vault in an RPA architecture?

A. To manage the deployment schedules of bots
B. To store bot code versions and history
C. To analyze the Return on Investment (ROI) of processes
D. To secure sensitive information such as usernames and passwords

2 In the context of the Credential Vault, what is a Locker?

A. A physical server where the database resides
B. A mechanism to lock the bot runner during execution
C. A type of variable that stores integer values
D. A logical grouping of credentials used to control access permissions

3 Which standard is typically used to encrypt sensitive data within an enterprise-grade Credential Vault?

A. AES-256 (Advanced Encryption Standard)
B. Base64 Encoding
C. ROT13
D. MD5 Hashing

4 What is the main security risk of hardcoding credentials directly into bot scripts?

A. It increases the file size of the bot
B. It prevents the bot from running on virtual machines
C. It exposes sensitive data to anyone with access to the source code
D. It makes the bot execute slower

5 Which role in a Locker has the permission to add or remove other users but cannot necessarily see the password values?

A. Locker Participant
B. Locker Consumer
C. Credential Viewer
D. Locker Manager/Owner

6 Who are Locker Consumers?

A. Administrators who maintain the database
B. Users or Roles that can view/use the credentials in their bots
C. The developers who created the credentials
D. External APIs requesting data

7 When creating a credential, what is an Attribute?

A. The expiry date of the bot license
B. The encryption key used for the vault
C. A specific data field within a credential (e.g., Username, Password)
D. The name of the locker it belongs to

8 Which of the following is a best practice for secure data handling in RPA?

A. Using the Credential Vault and masking sensitive variables in logs
B. Logging sensitive variables to the audit trail for debugging
C. Sharing one admin account across all bots
D. Storing passwords in a text file on the desktop

9 What is the difference between a User-defined Credential and a Standard Credential in some RPA tools?

A. User-defined are for testing only
B. User-defined credentials do not require a locker
C. Standard credentials are not encrypted
D. Standard are shared across the organization; User-defined are specific to a user

10 How does separating Development and Production lockers contribute to security?

A. It makes the bots run faster in production
B. It ensures developers do not have access to live production data/passwords
C. It saves storage space on the server
D. It allows the use of weaker passwords in production

11 In a robust RPA script, what is the primary purpose of a Try-Catch block?

A. To loop through a dataset
B. To handle exceptions and prevent the bot from crashing unexpectedly
C. To capture screenshots for documentation
D. To try different passwords until one works

12 What constitutes a Business Exception in RPA?

A. Data failing validation rules (e.g., Invoice amount exceeds limit)
B. The application failing to load due to a server crash
C. The bot runner running out of memory
D. A selector not being found on the screen

13 What is the purpose of the Finally block in a Try-Catch-Finally structure?

A. It executes only if no error occurs
B. It executes only if an error occurs
C. It restarts the bot from the beginning
D. It executes regardless of whether an exception occurred or not

14 Which of the following creates a Resilient Bot?

A. Ignoring pop-up windows
B. Using dynamic waits (e.g., Wait for window/object to exist)
C. Hardcoding screen coordinates
D. Using static delays (e.g., Wait 10 seconds)

15 To handle an unexpected 'Update Available' pop-up window during execution, which logic is most appropriate?

A. Increase the delay time before the next step
B. Use an 'If Window Exists' condition to close it, then proceed
C. Manually intervene every time
D. Restart the computer immediately

16 What is the concept of Snapshot Logging in error handling?

A. Backing up the bot code daily
B. Logging the memory usage of the server
C. Recording the screen state at the moment a failure occurs
D. Taking a picture of the developer

17 When designing for Scalability, what is the role of a Workload Manager (Queue)?

A. To slow down the bots to prevent server overload
B. To store credentials for the bots
C. To compress data files
D. To distribute work items across multiple bots dynamically

18 Which technique improves bot performance regarding UI interactions?

A. Interacting with the backend API or Database directly when possible
B. Taking a screenshot after every step
C. maximizing the window size every time
D. Using 'Mouse Click' at coordinates

19 In the context of scalability, what is Vertical Scaling?

A. increasing the number of process steps
B. Writing longer code
C. Adding more bot runners (machines)
D. Adding more resources (CPU/RAM) to a single machine to handle heavier tasks

20 Which variable type is most appropriate for assigning a value retrieved from a Credential Vault?

A. Dictionary
B. List
C. Credential / SecureString
D. Boolean

21 Why is logging critical for bot maintenance?

A. It is required by the operating system
B. It helps in calculating the electricity cost of the server
C. It automatically fixes errors in the code
D. It provides an audit trail and helps diagnose root causes of failures

22 What is the purpose of User Acceptance Testing (UAT) in RPA deployment?

A. To verify the bot operates correctly in the business environment and meets user requirements
B. To check if the code compiles without syntax errors
C. To install the RPA software on the server
D. To stress test the server hardware

23 A bot fails because a website takes 30 seconds to load, but the bot only waits 10 seconds. This is an example of:

A. A Credential Failure
B. A Logic Error
C. A Synchronization/Timing Issue
D. A Syntax Error

24 To ensure high availability and resilience, how should a bot handle a 'System Down' scenario?

A. Keep clicking until the system comes back
B. Delete the input file
C. Log the error, send an alert to the admin, and stop or retry later
D. Abort immediately without notification

25 What is a config file (Configuration File) used for in resilient bot design?

A. To keep a backup of the bot script
B. To store the bot's execution logs
C. To store passwords in plain text
D. To store dynamic variables (file paths, URLs, email addresses) outside the code

26 In the context of Credentials, what is FIPS 140-2?

A. A licensing model for RPA vendors
B. A coding language for RPA
C. A U.S. government computer security standard for cryptographic modules
D. A file format for storing bots

27 If a bot needs to access an external Credential Vault (like CyberArk) instead of the built-in one, how is this typically handled?

A. The bot manually opens the CyberArk website
B. By copy-pasting the database files
C. It is not possible
D. Through built-in integrations or APIs provided by the RPA platform

28 What is the Wait for Screen Change command used for?

A. To wait for the user to move the mouse
B. To pause the bot for a fixed 5 minutes
C. To check if the screen resolution has changed
D. To verify that a specific UI update has occurred before proceeding

29 Which practice helps in optimizing the performance of a loop processing 10,000 records?

A. Logging every variable in every iteration
B. Updating the UI/Excel file after every single row
C. Adding a 1-second delay in every loop
D. Using bulk updates or memory data tables and writing once at the end

30 What is Hypervisor-level security in the context of Unattended Bots?

A. Security ensuring the virtual machine runs in an isolated, secure environment
B. A password required to open the bot studio
C. Security that prevents the bot from running
D. A method to encrypt Excel files

31 When defining a Locker, what does the 'Participant' role usually signify?

A. Someone who can add credentials to the locker but cannot view others' credentials
B. The supreme administrator
C. A bot that is running the process
D. Someone who can view the locker but cannot see credentials

32 Which of the following is a key component of a Deployment Checklist?

A. Ensuring the developer's music playlist is saved
B. Checking if the monitor resolution is 4K
C. Verifying environment variables and config files match the Production environment
D. Ensuring the bot is hardcoded with developer passwords

33 How should a bot handle variable cleanup at the end of execution?

A. Leave all applications open for the next run
B. It is not necessary
C. Reboot the server
D. Close all applications and clear sensitive data from memory

34 What is the formula for Bot Success Rate?

A.
B.
C.
D.

35 To ensure Credential Vault integrity, where should the Master Key be stored?

A. In a separate, secure location (e.g., Hardware Security Module or separate server)
B. Inside the bot code
C. On a sticky note on the server
D. In the same database as the credentials

36 Which exception type covers Selector Not Found?

A. Data Exception
B. User Exception
C. Business Exception
D. System / Application Exception

37 What is the benefit of Modular Bot Design (using sub-tasks/sub-bots)?

A. It forces all code to be in one file
B. It makes reuse difficult
C. It allows for easier maintenance and reusability of common components (like Login/Logout)
D. It increases the complexity of the code

38 When creating a credential for a banking site, which two Attributes are essential?

A. Username and Password
B. Server IP and Port
C. Height and Width
D. Date and Time

39 What is the risk of using wildcards (*) excessively in window titles during bot development?

A. It uses more license credits
B. The bot might attach to the wrong window if multiple similar windows are open
C. The bot will run too fast
D. Wildcards are not supported in RPA

40 Which feature allows a bot to run on a locked screen or without a monitor attached?

A. Attended Automation
B. Headless Mode / Unattended Automation (via RDP)
C. Snapshot Mode
D. Debug Mode

41 What is the purpose of Version Control in bot maintenance?

A. To control the speed of the bot
B. To track changes, manage revisions, and allow rollback to previous working states
C. To prevent the bot from being deleted
D. To control who can log in to the machine

42 If a Locker Manager leaves the company, how is access continuity maintained?

A. Ownership should be transferred or shared with a service account/backup admin
B. The bot code must be rewritten
C. All credentials are lost
D. The Admin creates a new locker

43 What does Re-throwing an exception mean in a Catch block?

A. Catching the error, logging it, and then passing it up to the parent bot/main handler
B. Ignoring the error
C. Fixing the error automatically
D. Deleting the error log

44 In performance optimization, why should you avoid placing 'Send Email' inside a tight loop?

A. It consumes too much internet bandwidth
B. SMTP servers may block the bot for spamming
C. It makes the code unreadable
D. Emails cannot be sent from bots

45 Which of the following best describes Role-Based Access Control (RBAC) in Credential Vaults?

A. Everyone has access to everything
B. Access is based on the time of day
C. Access is granted by a random algorithm
D. Access is granted based on the user's job function and necessity

46 When mapping a credential attribute to a bot variable, what happens if the variable is not type 'Credential'?

A. The vault will refuse to release the password
B. The variable is automatically converted to an integer
C. The value might be exposed as plain text in logs or debug mode
D. The bot will fail to compile

47 What is the 'Retry' pattern in error handling?

A. Attempting the failed action a specific number of times before throwing a final exception
B. Giving up immediately
C. Restarting the computer
D. Asking the user for help

48 Which phase of the RPA lifecycle focuses on Bug Fixes and Minor Enhancements?

A. Design
B. Development
C. Discovery
D. Maintenance / Support

49 Why is it important to have unique credentials for bots rather than using a personal user's login?

A. It isn't important
B. Robots get discounts on accounts
C. To prevent the bot from being traced
D. To ensure auditability and prevent the bot's actions from being attributed to a human

50 In the context of scaling, what does 'Decoupling' the Producer and Consumer mean?

A. The Producer and Consumer run on the same machine simultaneously
B. The Producer bot puts work items into a Queue, and Consumer bots process them independently
C. The Consumer waits for the Producer to finish all items before starting
D. The Producer deletes the data after reading