Unit 6 - Practice Quiz

INT346 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary function of the Automation Anywhere Control Room?

A. To write the code for the bots locally
B. To serve as a centralized management and control unit for the entire RPA architecture
C. To record user actions on the client machine only
D. To act as a database for non-relational data storage

2 Which of the following components allows a user to create and edit bots within the Automation Anywhere ecosystem?

A. Bot Creator
B. Bot Runner
C. Bot Insight
D. Control Room Dashboard

3 In the context of Automation Anywhere security, what is the Credential Vault?

A. A centralized, secure storage facility for managing sensitive information like usernames and passwords
B. A folder on the Windows desktop where passwords are saved in text files
C. A temporary cache for browser cookies
D. A backup drive for storing bot logs

4 Which encryption standard is typically used by the Automation Anywhere Credential Vault to secure data?

A. MD5
B. RSA-1024
C. AES-256
D. DES

5 What is the purpose of Role-Based Access Control (RBAC) in the Control Room?

A. To automate the creation of Windows user accounts
B. To assign specific permissions to users based on their roles within the organization
C. To allow all users unlimited access to all features
D. To control the speed of bot execution based on processor roles

6 Which Control Room feature provides real-time operational intelligence and business analytics?

A. Credential Vault
B. Workload Management
C. Bot Insight
D. Bot Farm

7 In the User Management section, what acts as a logical container to group credentials in the Credential Vault?

A. Folder
B. Safe
C. Locker
D. Cabinet

8 What is the difference between an Attended Bot Runner and an Unattended Bot Runner?

A. Attended bots are slower; Unattended bots are faster
B. There is no difference; the terms are interchangeable
C. Attended bots run on a server; Unattended bots run on a mobile phone
D. Attended bots require human intervention/triggering; Unattended bots run automatically on a schedule without human interaction

9 Which user role typically has the permission to create and manage Lockers in the Credential Vault?

A. Bot Runner
B. Bot Insight Consumer
C. Guest User
D. Locker Administrator

10 When a bot is moved from a local environment to the Control Room (public repository), this action is called:

A. Check Out
B. Download
C. Import
D. Check In

11 To edit a bot that is currently in the public repository of the Control Room, a developer must first perform which action?

A. Check In
B. Check Out
C. Audit
D. Deploy

12 Which section of the Control Room allows administrators to view a chronological record of all user and system actions for compliance?

A. Audit Log
B. Bot Store
C. Dashboards
D. My Devices

13 Which of the following is NOT a status of a bot in the Control Room Activity tab?

A. Failed
B. Completed
C. Decompiled
D. In Progress

14 What is a Device Pool in the context of Workload Management?

A. A group of Bot Runners executing automation tasks dynamically
B. A collection of Bot Creators used for coding
C. A storage area for discarded hardware
D. A list of printers connected to the network

15 In the Credential Vault, an Attribute refers to:

A. The physical location of the server
B. The license key of the software
C. The color of the UI theme
D. A specific data field within a Credential (e.g., Username, Password)

16 Which dashboard widget in the Control Room gives an overview of bot execution success and failure rates?

A. Bot Health / Bot Status
B. License Manager
C. Credential Health
D. User Session Log

17 What does WLM stand for in Automation Anywhere?

A. Windows Lock Mechanism
B. Workload Management
C. Web Login Manager
D. Work Logic Module

18 If a bot is scheduled to run on a specific trigger, which trigger type would execute the bot when a new email arrives?

A. Folder Trigger
B. Window Trigger
C. Email Trigger
D. File Trigger

19 In User Management, what happens when a user is deactivated?

A. The user is permanently deleted from the database
B. The user cannot log in, but their data and history are preserved
C. The user's password is reset to 'admin'
D. The user can still log in but cannot run bots

20 To securely use a password from the Credential Vault inside a bot logic, the developer should:

A. Write the password in a text file and read it
B. Copy the password and paste it into a string variable
C. Take a screenshot of the password
D. Use the Get Credential action or select the Credential variable type to reference the locker attribute

21 Which of the following is a system-created role in Automation Anywhere?

A. AAE_Basic
B. Super_Bot_User
C. Cyber_Admin
D. Bot Master

22 What is the mathematical definition of ROI in the context of Bot Insights, where is Value generated and is Cost incurred?

A.
B.
C.
D.

23 When configuring a Schedule for a bot, which option allows the bot to run immediately if it missed its start time due to system downtime?

A. Run Now
B. Priority Queue
C. Missed Schedule Support / Run after reconnection
D. Force Start

24 Which component is responsible for ensuring the separation of duties in the Credential Vault?

A. Bot Insight
B. Locker Consumers vs. Locker Owners
C. The Windows Registry
D. The Network Switch

25 What is the maximum priority value usually assignable to a Workload Item in a queue (where a lower number means higher priority)?

A. 100
B. 0
C. There is no priority setting
D. It depends on the configuration, but typically higher urgency items are processed first

26 In the context of Bot Insights, what are Tagged Variables?

A. Variables that are encrypted
B. Variables that are shared between bots
C. Variables that contain syntax errors
D. Variables flagged to be logged for analytics and dashboard generation

27 Which tab in the Control Room allows you to manage licenses?

A. Administration / Settings
B. Automations
C. Activity
D. Devices

28 What is the function of the 'Run Now' button in the Control Room?

A. It immediately triggers a bot deployment to selected runners
B. It installs the software on the client
C. It validates the bot code without running it
D. It shuts down the Control Room

29 Regarding Security, what does MFA stand for, which is often supported by the Control Room?

A. Main File Access
B. Manual Fix Automation
C. Multiple Folder Authorization
D. Multi-Factor Authentication

30 If a Bot Runner is listed as 'Disconnected' in the Control Room, what is the most likely cause?

A. The bot logic has a syntax error
B. The Control Room database is full
C. The user forgot to save the bot
D. The Bot Agent service on the client machine is not running or has network issues

31 Which of the following is a Best Practice for naming bots in the repository?

A. Name the bot after the developer's pet
B. Use only special characters
C. Bot1, Bot2, Bot3
D. Use a consistent naming convention like ProcessName_Role_Task (e.g., InvoiceProcessing_Main_v1)

32 Can a Bot Creator license be used to schedule and run bots in an unattended production environment?

A. Only on weekends
B. Yes, always
C. Yes, if the bot is small
D. No, Bot Creators are for development; Unattended Bot Runners are for production scheduling

33 What is the primary benefit of Centralized Logging in the Control Room?

A. It increases the speed of the bot
B. It makes the logs harder to find
C. It simplifies troubleshooting and compliance by aggregating logs from all bots in one location
D. It eliminates the need for any logging

34 Which permission is required to view the dashboards in Bot Insight?

A. Create Locker
B. Upload Bot
C. Manage Licenses
D. View Dashboard / Consumer

35 In a High Availability (HA) Control Room setup, what is the purpose of a Load Balancer?

A. To delete old bots
B. To balance the bank accounts
C. To distribute incoming network traffic across multiple Control Room servers to ensure reliability
D. To reduce the encryption level

36 When creating a Queue in Workload Management, what defines the structure of the data items (e.g., Invoice Number, Amount)?

A. Work Item Structure / Model
B. The Excel Header
C. The Bot Runner Name
D. The Email Subject

37 Which of the following describes a File Trigger?

A. The bot starts when a user clicks a desktop icon
B. The bot starts when a PDF is printed
C. The bot starts when the hard drive is full
D. The bot starts when a file is created, modified, or deleted in a specific folder

38 How does the Control Room ensure Version Control?

A. It deletes old versions immediately
B. It keeps a history of Checked-In bots, allowing users to compare or rollback to previous versions
C. It only keeps the latest version
D. It renames every file with a random number

39 What is the role of an External Key Vault (e.g., CyberArk) in Automation Anywhere?

A. It is used to store video tutorials
B. It allows Automation Anywhere to retrieve credentials from a third-party secure vault instead of the internal Credential Vault
C. It is a virus scanner
D. It replaces the Control Room database

40 If a bot fails halfway through a process, which Control Room feature allows an admin to see exactly which line of code caused the error?

A. Credential Vault
B. Historical Activity / Bot execution logs
C. User Management
D. License Manager

41 Which option allows a bot to handle a dynamic number of transactions efficiently?

A. Hard coding the loop count
B. Using Workload Management (Queues)
C. Running the bot once per day
D. Using a static delay

42 Real-world Use Case: A bank needs to process loan applications that arrive via email at random times 24/7. Which deployment method is best?

A. Use an Email Trigger on an Unattended Bot Runner
B. Schedule the bot to run every Monday morning
C. Have a human manually run the bot whenever they see an email
D. Run the bot on the developer's laptop

43 Security Best Practice: Why should 'Generic' or 'Shared' accounts be avoided for Control Room access?

A. They make it impossible to trace actions back to a specific individual in the Audit Log
B. They are too expensive
C. They cannot use the Credential Vault
D. They have too many permissions

44 In the 'My Devices' list, a green checkmark next to a device usually indicates:

A. The device is infected with a virus
B. The device needs an update
C. The device is turned off
D. The device is connected and ready to run bots

45 What is the purpose of 'Dependency' management during bot export/import?

A. To check if the user is dependent on the bot
B. To remove all variables
C. To link the bot to the internet
D. To ensure all sub-tasks and invoked scripts required by the main bot are included in the package

46 Which specific report would a manager look at to see the total hours saved by automation across the department?

A. Device Connectivity Report
B. User Login History
C. Bot Insight Business Dashboard (ROI Widget)
D. Bot Audit Log

47 What is the function of the Recycle Bin in the Control Room repository?

A. To store deleted bots temporarily, allowing for restoration if deleted by mistake
B. To store unused credentials
C. To store spam emails
D. To permanently delete files immediately

48 In a Client-Server architecture for RPA, where does the 'Client' reside?

A. On the machine (desktop/VM) where the Bot Creator or Bot Runner is installed
B. On the Load Balancer
C. On the Control Room Server
D. In the Credential Vault

49 When configuring SMTP in the Control Room Settings, what functionality is being enabled?

A. The ability to browse the web
B. The ability to play sounds
C. The ability to encrypt files
D. The ability for the Control Room to send automated system emails (e.g., password resets, alerts)

50 If bots are running in parallel using a Device Pool, and the total workload is items, the theoretical time to complete is proportional to:

A.
B.
C.
D.