Unit 6 - Practice Quiz

INT346

1 What is the primary function of the Automation Anywhere Control Room?

A. To write the code for the bots locally
B. To serve as a centralized management and control unit for the entire RPA architecture
C. To record user actions on the client machine only
D. To act as a database for non-relational data storage

2 Which of the following components allows a user to create and edit bots within the Automation Anywhere ecosystem?

A. Bot Runner
B. Bot Creator
C. Control Room Dashboard
D. Bot Insight

3 In the context of Automation Anywhere security, what is the Credential Vault?

A. A folder on the Windows desktop where passwords are saved in text files
B. A centralized, secure storage facility for managing sensitive information like usernames and passwords
C. A backup drive for storing bot logs
D. A temporary cache for browser cookies

4 Which encryption standard is typically used by the Automation Anywhere Credential Vault to secure data?

A. DES
B. RSA-1024
C. AES-256
D. MD5

5 What is the purpose of Role-Based Access Control (RBAC) in the Control Room?

A. To assign specific permissions to users based on their roles within the organization
B. To allow all users unlimited access to all features
C. To control the speed of bot execution based on processor roles
D. To automate the creation of Windows user accounts

6 Which Control Room feature provides real-time operational intelligence and business analytics?

A. Bot Farm
B. Bot Insight
C. Workload Management
D. Credential Vault

7 In the User Management section, what acts as a logical container to group credentials in the Credential Vault?

A. Folder
B. Locker
C. Cabinet
D. Safe

8 What is the difference between an Attended Bot Runner and an Unattended Bot Runner?

A. Attended bots run on a server; Unattended bots run on a mobile phone
B. Attended bots require human intervention/triggering; Unattended bots run automatically on a schedule without human interaction
C. Attended bots are slower; Unattended bots are faster
D. There is no difference; the terms are interchangeable

9 Which user role typically has the permission to create and manage Lockers in the Credential Vault?

A. Bot Runner
B. Locker Administrator
C. Bot Insight Consumer
D. Guest User

10 When a bot is moved from a local environment to the Control Room (public repository), this action is called:

A. Check Out
B. Check In
C. Import
D. Download

11 To edit a bot that is currently in the public repository of the Control Room, a developer must first perform which action?

A. Check In
B. Check Out
C. Deploy
D. Audit

12 Which section of the Control Room allows administrators to view a chronological record of all user and system actions for compliance?

A. Audit Log
B. Bot Store
C. My Devices
D. Dashboards

13 Which of the following is NOT a status of a bot in the Control Room Activity tab?

A. In Progress
B. Completed
C. Failed
D. Decompiled

14 What is a Device Pool in the context of Workload Management?

A. A collection of Bot Creators used for coding
B. A group of Bot Runners executing automation tasks dynamically
C. A list of printers connected to the network
D. A storage area for discarded hardware

15 In the Credential Vault, an Attribute refers to:

A. The physical location of the server
B. A specific data field within a Credential (e.g., Username, Password)
C. The color of the UI theme
D. The license key of the software

16 Which dashboard widget in the Control Room gives an overview of bot execution success and failure rates?

A. Bot Health / Bot Status
B. User Session Log
C. License Manager
D. Credential Health

17 What does WLM stand for in Automation Anywhere?

A. Work Logic Module
B. Workload Management
C. Web Login Manager
D. Windows Lock Mechanism

18 If a bot is scheduled to run on a specific trigger, which trigger type would execute the bot when a new email arrives?

A. File Trigger
B. Folder Trigger
C. Email Trigger
D. Window Trigger

19 In User Management, what happens when a user is deactivated?

A. The user is permanently deleted from the database
B. The user cannot log in, but their data and history are preserved
C. The user can still log in but cannot run bots
D. The user's password is reset to 'admin'

20 To securely use a password from the Credential Vault inside a bot logic, the developer should:

A. Copy the password and paste it into a string variable
B. Use the Get Credential action or select the Credential variable type to reference the locker attribute
C. Write the password in a text file and read it
D. Take a screenshot of the password

21 Which of the following is a system-created role in Automation Anywhere?

A. AAE_Basic
B. Bot Master
C. Super_Bot_User
D. Cyber_Admin

22 What is the mathematical definition of ROI in the context of Bot Insights, where is Value generated and is Cost incurred?

A.
B.
C.
D.

23 When configuring a Schedule for a bot, which option allows the bot to run immediately if it missed its start time due to system downtime?

A. Run Now
B. Missed Schedule Support / Run after reconnection
C. Force Start
D. Priority Queue

24 Which component is responsible for ensuring the separation of duties in the Credential Vault?

A. Bot Insight
B. Locker Consumers vs. Locker Owners
C. The Windows Registry
D. The Network Switch

25 What is the maximum priority value usually assignable to a Workload Item in a queue (where a lower number means higher priority)?

A.
B. 100
C. There is no priority setting
D. It depends on the configuration, but typically higher urgency items are processed first

26 In the context of Bot Insights, what are Tagged Variables?

A. Variables that contain syntax errors
B. Variables flagged to be logged for analytics and dashboard generation
C. Variables that are shared between bots
D. Variables that are encrypted

27 Which tab in the Control Room allows you to manage licenses?

A. Automations
B. Activity
C. Administration / Settings
D. Devices

28 What is the function of the 'Run Now' button in the Control Room?

A. It installs the software on the client
B. It immediately triggers a bot deployment to selected runners
C. It shuts down the Control Room
D. It validates the bot code without running it

29 Regarding Security, what does MFA stand for, which is often supported by the Control Room?

A. Main File Access
B. Multi-Factor Authentication
C. Multiple Folder Authorization
D. Manual Fix Automation

30 If a Bot Runner is listed as 'Disconnected' in the Control Room, what is the most likely cause?

A. The bot logic has a syntax error
B. The Bot Agent service on the client machine is not running or has network issues
C. The user forgot to save the bot
D. The Control Room database is full

31 Which of the following is a Best Practice for naming bots in the repository?

A. Bot1, Bot2, Bot3
B. Use a consistent naming convention like ProcessName_Role_Task (e.g., InvoiceProcessing_Main_v1)
C. Use only special characters
D. Name the bot after the developer's pet

32 Can a Bot Creator license be used to schedule and run bots in an unattended production environment?

A. Yes, always
B. No, Bot Creators are for development; Unattended Bot Runners are for production scheduling
C. Only on weekends
D. Yes, if the bot is small

33 What is the primary benefit of Centralized Logging in the Control Room?

A. It makes the logs harder to find
B. It eliminates the need for any logging
C. It simplifies troubleshooting and compliance by aggregating logs from all bots in one location
D. It increases the speed of the bot

34 Which permission is required to view the dashboards in Bot Insight?

A. View Dashboard / Consumer
B. Create Locker
C. Upload Bot
D. Manage Licenses

35 In a High Availability (HA) Control Room setup, what is the purpose of a Load Balancer?

A. To delete old bots
B. To distribute incoming network traffic across multiple Control Room servers to ensure reliability
C. To balance the bank accounts
D. To reduce the encryption level

36 When creating a Queue in Workload Management, what defines the structure of the data items (e.g., Invoice Number, Amount)?

A. Work Item Structure / Model
B. The Excel Header
C. The Email Subject
D. The Bot Runner Name

37 Which of the following describes a File Trigger?

A. The bot starts when a user clicks a desktop icon
B. The bot starts when a file is created, modified, or deleted in a specific folder
C. The bot starts when the hard drive is full
D. The bot starts when a PDF is printed

38 How does the Control Room ensure Version Control?

A. It renames every file with a random number
B. It keeps a history of Checked-In bots, allowing users to compare or rollback to previous versions
C. It deletes old versions immediately
D. It only keeps the latest version

39 What is the role of an External Key Vault (e.g., CyberArk) in Automation Anywhere?

A. It replaces the Control Room database
B. It allows Automation Anywhere to retrieve credentials from a third-party secure vault instead of the internal Credential Vault
C. It is used to store video tutorials
D. It is a virus scanner

40 If a bot fails halfway through a process, which Control Room feature allows an admin to see exactly which line of code caused the error?

A. Historical Activity / Bot execution logs
B. User Management
C. Credential Vault
D. License Manager

41 Which option allows a bot to handle a dynamic number of transactions efficiently?

A. Hard coding the loop count
B. Using Workload Management (Queues)
C. Running the bot once per day
D. Using a static delay

42 Real-world Use Case: A bank needs to process loan applications that arrive via email at random times 24/7. Which deployment method is best?

A. Schedule the bot to run every Monday morning
B. Use an Email Trigger on an Unattended Bot Runner
C. Have a human manually run the bot whenever they see an email
D. Run the bot on the developer's laptop

43 Security Best Practice: Why should 'Generic' or 'Shared' accounts be avoided for Control Room access?

A. They are too expensive
B. They make it impossible to trace actions back to a specific individual in the Audit Log
C. They have too many permissions
D. They cannot use the Credential Vault

44 In the 'My Devices' list, a green checkmark next to a device usually indicates:

A. The device is infected with a virus
B. The device is connected and ready to run bots
C. The device is turned off
D. The device needs an update

45 What is the purpose of 'Dependency' management during bot export/import?

A. To ensure all sub-tasks and invoked scripts required by the main bot are included in the package
B. To check if the user is dependent on the bot
C. To link the bot to the internet
D. To remove all variables

46 Which specific report would a manager look at to see the total hours saved by automation across the department?

A. Bot Audit Log
B. Bot Insight Business Dashboard (ROI Widget)
C. User Login History
D. Device Connectivity Report

47 What is the function of the Recycle Bin in the Control Room repository?

A. To permanently delete files immediately
B. To store deleted bots temporarily, allowing for restoration if deleted by mistake
C. To store spam emails
D. To store unused credentials

48 In a Client-Server architecture for RPA, where does the 'Client' reside?

A. On the Control Room Server
B. On the machine (desktop/VM) where the Bot Creator or Bot Runner is installed
C. In the Credential Vault
D. On the Load Balancer

49 When configuring SMTP in the Control Room Settings, what functionality is being enabled?

A. The ability for the Control Room to send automated system emails (e.g., password resets, alerts)
B. The ability to browse the web
C. The ability to encrypt files
D. The ability to play sounds

50 If bots are running in parallel using a Device Pool, and the total workload is items, the theoretical time to complete is proportional to:

A.
B.
C.
D.