Automation Anywhere mock

1. A developer logged into a client Machine has recently completed designing a new taskbot and needs to evaluate the bot

Views 272 Downloads 13 File size 564KB

Report DMCA / Copyright

DOWNLOAD FILE

Recommend stories

Citation preview

1. A developer logged into a client Machine has recently completed designing a new taskbot and needs to evaluate the bot outcome for purpose of meeting the project requirement. If the evaluation is successful, the task bot will then be uploaded to the control room. Which three actions could the developer take, to execute the task bot for evaluation? (Choose three) A. Execute the bot from the administration login at the Control Room B. Execute the bot from the client login at the control Room C. Double -Click the shortcut of the Bot created on the desktop. D. open the TaskBot in the Workbench and execute it E. Provide the complete Path of the TaskBot ATMX file in the CLI window 2. The Locker administrator informs the developer to use the credentials from the locker that the developer has been provided access to. The developer logs into the control room to learn the names of the variables and used them during development but finds nothing created inside the locker. The Developer creates their own credential variables inside the locker but is unable to use these credential variables during development. What will resolve the issue? A. The Developer’s user account needs to be provided “Consumer” access inside the locker B. The Developer’s user account needs to be provided “Manager” access for the locker C. A role mapped with “Consumer” access inside the locker needs to be assigned to the developer’s user account D. The developer needs to be updated the “Request Status” of the credentials to reflect as available inside the locker 3. A control Room administrator is advised imminent, unplanned, essential maintenance will temporarily interrupt running activities. How can automations sent to a workload queue be interrupted in a controlled manner and started again after the work is complete? A. Go to Activity > In Progress and put the Workload Service task in ‘maintenance mode’ (check this one also) B. Stop and start the Control Room scheduling service in Windows C. Pause and resume the automations using Workload > Queues D. Hold and release the automations in Activity > Monitor4. 4. A Control Room scheduled automation has a status of failed. What should the administrator do to find the error message and details of the precise location in the task that the error occurred? A. Select View Activity from the ellipsis for the failed activity listed in the Activity > Historical > View historical activity page of the Control Room interface B. Lookup the error description for the status code of the error for the failed activity listed in the Activity > Historical > View historical activity page of the Control Room interface C. Log on remotely to the bot runner device and check the client log. D. Launch the Troubleshooting Wizard from the Automation Anywhere administration console and select the JobID of the failed automation5.

5. The locker administrator wants to ensure that developers having access to a locker and its corresponding variables, can map the password variable to only fields tagged as password. What can the locker administrator do to achieve this? A. Define the password variable as “This is Password”. B. Modifying the access privileges of the role. C. Define the password variable as “Mask” and “Standard” D. Define the password variable as “Password Only” 6. A user from human resources wants to access all records that are in the employee database. The user is not comfortable editing databases but is comfortable working in Excel. What are two methods that an administrator can provide the information to the user in the desired format? (choose two.) A. The user can iterate over the SQL query result set generated by SQL query command, one row at a time, fetching column values of current row using the “Excel column” system variable, and write the result to a CSV file row by row. B. Using Database Command and SQL query to export the data from the database and store it in a CSV. C. The user can iterate over the SQL query result set generated by SQL query command, one row at a time, fetching column values of current row using the “File Data Column” system variable, and write the result to a CSV file row by row. D. Using Database Command to export the results of “Run Stored Procedure” Command to CSV. 7. After logging in from the client system, a developer wants to review the task bot activities that have occurred at the client system over the last four weeks. What would help the developer with this information? A. The administrator from the control room accesses the system logs at the client machine and shares this information with developer B. The developer logged in at the client machine, accesses the control room central log file for this information C. The developer logged in at the client machine, accesses the client machine system logs for this information D. The developer can log in at another client machine and access the control room central log file for this information. 8. Which among the following should be checked prior to ensuring that the task performed is devoid of any errors in a Web Recorder? A. The IE 11 plugin is installed and enabled B. The zoom factor in IE browser should be 125 % C. The zoom factor in IE browser should be 100 % D. Flash plug-in is installed 9. Which of the following system variables are associated with Arrays? A. ArrayColumns B. ArrayRows C. ArraySize D. ArrayElements

10. While working on a WebCR, the Dashboard Component displays the number of registered clients. What does this indicate? A. Number of BotRunners B. Number of BotCreators C. Total number of user accounts created on the WebCR D. Total number of BotCreators and BotRunners 11. An Automation Anywhere Control Room Administrator has developed several bots which contain some potentially sensitive information. The administrator’s manager is concerned about protecting this information while the bots are exported off the control room. What should the administrator do to ally the managers concern? A. Encrypt the task Bots in the Control Room B. Compile the TaskBots with the Security Level set to high C. The “Password’ should be entered in the Control Room ‘Export bots + files’ tool D. Use the upload tool in the AAE Client with the Encryption enabled 12. An owner of a credential vault locker has accepted a position in another part of the company. The control room administrator has disabled the account in the control room. An existing bot developer has been promoted to the open position. What should the control room administrator do to ensure the promoted bot developer has the proper access to the credential vault locker? A. Add the promoted bot developer as a locker manager B. Transfer Locker ownership to the promoted bot developer C. Advise the promoted bot developer to create a new locker in the credential vault D. Advise the Locker administrator of the change so that ownership can 13. The website administrator has a new website launch in a few days. Prior to the launch, the administrator wants to verify that all links in the website are functional and there are no gaps in terms of any unconnected links. How can this be accomplished in a minimal amount of time? A. The administrator can use the Web Recorder > Find Broken links command B. The administrator can use the Web Recorder > Navigate URL command to check if every URL is navigable. C. The administrator can have the project team go over the website repeatedly until all such issues are resolved can open every link in their website using web. 14. A designer has created a MetaBot and has confirmed the application is running, but when adding the first Screen Assets, the designer is presented with an “Open Screens” dialogue box that does not include the Internet Explorer web application. What does the designed need to do to overcome this? A. Re-calibrate the open screen B. Recreate the MetaBot with the correct application specific selection C. Click ‘Refresh’ in the ‘Open Screens’ dialogue box D. Close and re-open the web-application 15. The developer wants to map the task bot variables with corresponding metabot for integrating a task bot with the metabot However the developer is notable to find the metabot variables showing in the mapping window. How can the developer resolve the issue? A. The developer needs to define the parameter type of all the MetaBot variables B. The developer needs to correctly assign the variable type for all the defined variables C. The developer needs to initiate the MetaBot, variable before the mapping process D. The developer needs to use variable operation command to map two variables

16. How to insert a new node in XML using AA? select one A. Start XML session-> Get Nodes->insert Nodes-> Save session data-> End XML session B. Open XML file-> Start XML session->insert Nodes->End XML session C. Start XML session-> insert Nodes-> Save session data-> End XML session D. Open XML file-> Start XML session-> update Nodes-> End XML session 17. Which of the following removes leading and trailing spaces from a text string? A. Remove B. Trim C. Delete D. Cut 18. Which of the following enables you to Add Assets screen and DLLs to the metabots? A. Web control room B. Client C. Metabot designer D. Report Designer 19. Which of the following helps to closely manage TaskBots, Metabots and IQBots uploaded in the server? A. Clients B. Audit trails C. user management D. Repository Manager 20. Which of the following can be performed by the user with Bot Runner role? A. Create and run the tasks B. Run the task using the "one time only" schedule option C. Run the task D. Add, edit and delete schedule for tasks on your client machine 21. What is the right way to read excel or csv data? (Answer---->Other options like Text, Other options) A. Recorder B. CSV C. Object Cloning D. Excel 22. If there any dynamic change in window title, which of the following should be done? (Answer: insert a wild card character (*) at the start or end of the window title) A. Convert the Window title as a variable B. Use the variable operation C. Use the wild card character while capturing D. Convert the window title alone 23. Which of the following plays an important role in maintaining or calculating information when building automated task? A. Task Editor C. Variables C. Command Library D. Web Recorder

23. Which of the following allow access, control default, and DOS-based action of remote terminals? A. Error Handling Command B. PGP Command C. FTP command D. Terminal Emulator Command 24. The Automation Anywhere tool supports Active Directory integration. State True or False. A. True B. False 25. Identify the system defined variable used for deploying a task globally? A. Current Directory B. System C. Control room repository D. AA Application Path 26. In AA, what option is used to read the entire cell in Excel? A. Get multiple cells. B. Get Cell C. Go to Cell D. Get all cells. 27. Which of the following reads the content of the specified cell on the active spreadsheet? A. Go to cell B. Set cell C. Open spreadsheet D. Get cell 28. A password protected spreadsheet can be opened using open spreadsheet feature of AA. State True or False. A. True B. False 29. Which command is used to read a check box in flattened PDF? A. Extract from field (Extracts all form field data and selected text, and stores the data in variables.) B. Extract text (used to extract text from pdf file to text file) C. OCR D. Check box cannot be extracted 30. You need to extract name, SSN number, and address from 20 PDFs which are of the same category in a folder. What is the action required? A. Use extract from fields in PDFB. B. Use object cloning C. Use wildcard character in window title of PDF D. Use extract from fields in PDF for each file in a folder 31. Automation Anywhere supports what kind of browser, by default? A. Internet explorer B. Google Chrome C. Mozilla Firefox D. Both A and B Google Chrome: Standard > ScreenCapture option is not supported for MetaBots. Use the Object Cloning command instead. Microsoft Edge: Microsoft Windows 10 machine only. MetaBot is not supported on Microsoft Edge.

32. Which of the following support Secure Recording mode? A. Excel B. Image Recognition C. PDF D. Object cloning E. OCR 33. When you use Google Chrome browser, how do you select a dropdown value? A. In object cloning, set the value of textbox to be selected B. Click the textbox and keystroke the value to be selected C. Use manage control activity D. In object cloning, click the item. 34. Which of the following capture Window Object and control? A. Screen Recorder B. Smart Recorder C. Smart and Screen Recorder D. Web Recorder 35. How can we open a browser in AA? A. Open Program file B. Launch website C. Web Recorder D. Screen Recorder E. Smart Recorder 36. How to capture an image for selection, using Image Recognition? A. Select the window title for the both images (Image 1 and Image 2) and capture the Image for Image 2. B. Select the window title and only capture the Image for Image 1 C. Select the window title in both Image 1 and Image 2 and capture image in both windows D. Select the window title and only capture the Image for Image 2 37. Which mode is used to recognize multicolored text on a multi colored background? A. Gray Scale B. Normal C. Monochrome D. RGB38. 38. We can use a single metabot for different applications. state true or false. A. True B. False 39. To identify changes for modification in the source application, what metabot option is used to instantly compare an existing screen with a new screen? A. Capture B. Synchronize C. Calibrate D. Configure 40. Name the types of frameworks used in Automation Anywhere software? A. Ans: There are mainly four types of frameworks, and they are: Modular automation framework Hybrid automation framework Data-driven framework Keyword-driven framework

41. RPA stores data and enable automation. A. True 42. Which of the following is the best option to extract the data from Flattened PDF in Automation Anywhere? A. Extract Text 43. Choose the commands that support Secure Recording mode select one or more in AA A. App Integration, Delay/Wait, Error Handling, IF/ELSE, Image Recognition, Manage Windows Controls Mouse Command, Object Cloning/Smart Recorder, OCR, Screen Capture, Web Recorder, Workbench. 44. which option in Automation Anywhere is used to read entire cells in excel? A. Get all cells 45. What are the actions that can be performed in image recognition once the image is found in AA. A. Double Click, Left Click, Right Click. 46. To compare, find, split and join strings which feature in Automation Anywhere can be used? A. String operation. 47. If at all the Credential information needs to be stored in a centralized location, then what are all the options available Automation Anywhere? A. Automation Anywhere Credential Manager. 48. RPA interacts with multiple applications at the Layer in AA. A. Presentation. 49. Is it possible to check broken links using a web recorder in Automation Anywhere? A. True. 50. The sequence of user action is captured to speed up the process definition using . A. Process Recorder 51. Which of the below options are available in Automation Anywhere to activate sheet in excel? A. Sheet By Index, Sheet By Name 52. Does the PDF integration command support to extract the structured text in AA? A. Extract text 53. Which of the following activities can be performed using Read From CSV-Text Command in Automation Anywhere? A. Read multiple lines in CSV or text files B. Use encoding options: ANSI, UNICODE, and UTF8. C. Read List Separated or Tab-delimited data from a CSV file. 54. Do all the RPA tools provide both front and back-office automation? A. False. 55. PDF Integration in Automation Anywhere supports both encrypted and unencrypted files? A. True 56. Greater resilience is achieved in RPA through in AA? A. Functional approach 57. Which of the following privileged user can run the bots in AA? A. Bot runner, Bot Creator 58. How do we allocate an existing license from one user to another user in the same Machine in AA? A. Deactivate the existing user, create a new user and login with the credentials 59. Is the master repository of jobs in AA? A. Robot Controller 60. What is a Default mode of Credential Manager in AA?

A. The default mode of the credential manager is express mode. There are two modes Express and Manual. Both modes are for Credential Vault. 61. What is the use and meaning of wildcard in Automation anywhere? A. You can use wildcard character (*) when specifying values for all properties except Path and DOMX Path. 62. Which if the following allows to enable or disable the version control system in Web A. Administration >Settings> General Tabb) B. Administration> Settings> Credentials Tab C. Administration> Settings> Bots Tab D. Administration> Settings> Client Application Tab 63. A user with Basic role has logged into the Control Room. By Default, what two activities can the user perform from the control room? (Choose Two) A. Open Control Room > Bots Section and Run a Bot by double -clicking on it, which will automatically run on all BOT runners. B. Open Control Room > Bots Section and Run bots through Bots Runners C. Open Control Room > Bots Section and schedule bots through Bot Runners D. Open Control Room > Bots Section and schedule bots on Bot Creators

1. Which three options in Automation Anywhere Enterprise framework support the email notification feature? (Choose three.) AAE Client AAE Control Room AAE Send Email Command ↑ Change this answer CORRECT 2. A locker administrator needs to take a long leave and wants to assign a back-up to perform Locker administrator tasks in their absence. The locker administrator does not want the back-up to add users to the existing lockers, but is comfortable with the back-up adding and editing existing credential variables of the lockers. The back-up can also change access levels of existing users inside the lockers. How can the locker administrator achieve this? Assign a user as Manager to all the existing lockers ↑ Change this answer NOT SURE 3. The IT Department is concerned that bot creators are using passwords that do not adhere to their password requirements. The control room administrator has responded that each user is responsible to conform to IT standards, and as the control room has email enabled, the administrator cannot change bot developer passwords. Which of these can the administrator do to best assist with meeting IT requirements? Align the Control Room Settings > General > Security settings to conform to IT requirements ↑ Change this answer 4. A Control Room administrator has received an advisory from IT that security may be compromised for many Control Room systems. IT is concerned that there may be an attempt to load some harmful code

into the Control Room. What two steps can the Control Room administrator take to address this threat? (Choose two.) Check the Audit Log for user logins that occur at unusual hours into the Control Room, share this information with their user's manager, and check the user's uploads for threats. Put Control Room on a separate network, one not accessible by clients. Under Administration > Settings - Whitelisted file extensions > Disallow extensions which could be a virus (BAT files, etc,) ↑ Change this answer 5. During UAT, a client learns that Automation Anywhere software takes screen shots of all surfaces that it encounters and wants to stop this from occurring while recording. What can be done to prevent this? In Administration > Settings, the Control Room administrator can turn"Secure Recording - On" ↑ Change this answer 6. The locker administrator informs the developer to use the credentials from the locker that the developer has been provided access to. The developer logs into the control room to learn the names of the variables and use them during development but finds nothing created inside the locker. The developer creates their own credential variables inside the locker but is unable to use these credential variables during development. What will resolve the issue? The developer needs to be update the"Request Status" of the credentials to reflect as available inside the Locker ↑ Change this answer 7. A Control Room administrator is advised imminent, unplanned, essential maintenance will temporarily interrupt running activities. How can automations sent to a Workload Queue be interrupted in a controlled manner and started again after the work is complete? Pause and resume the automations using Workload > Queues ↑ Change this answer 8. What feature allows an administrator to manage items by dividing them into small, logical modules to be processed simultaneously? Workload Management ↑ Change this answer 9. The control room administrator is overwhelmed by new user requests resulting f rom recent acquisitions. What two things can the administrator do to lighten the creation of new user accounts and aligning proper roles? (Choose two.) Assign responsible business users a role that has Create User and Manage Roles permissions enabled Create a role and delegate User and Role creation permissions to the new role ↑ Change this answer 10. A control room administrator wants to create users and have them create their own passwords. Which is the best way to do this within a control room environme nt? Enable Domain integration to manage credentials in Active Directory ↑ Change this answer

11. How can an administrator pull in some bots into the Control Room which were received via email attachment? Pull in Bots into the Control Room via the Bots > Import Bots command ↑ Change this answer 12. The administrator of an Automation Anywhere Enterprise server has noticed that in the last few days, there has been an unusually high volume of events. What should the administrator do to get more information about these events? Review the Bots Dashboard ↑ Change this answer 13. An administrator has scheduled a bot from the Bots section. The administrator's manager feels that the schedule is incorrect. In Control Room, where would the administrator go to see the schedule? Activity > Scheduled ↑ Change this answer 14. What dashboard provides information on 'Total Users'? Devices ↑ Change this answer 15. An administrator with administrative access in an Automation Anywhere Control room is reviewing the Devices Dashboard. A group of user's devices are showing as"offline" status. Why is this occurring? This group of users are not logged into the client UI on the device ↑ Change this answer 16. A company has a policy that no individual should know the credential of the any other individual in the organization. This policy prevents the Locker administrator from setting credential values to any credential variables that developers will be able to access. How can the Locker administrator enable adding of values to a pair of credential variables (Username and Password), that are assigned to a single locker, that 100 developers will have access to but with individual identity? The Locker Administrator can define the credential variables as user defined credentials ↑ Change this answer 17. While editing a task, the screenshots are not appearing under the Visualize Tab. What could be the possible reason? The task was created with the Secure Recording option enabled in CR ↑ Change this answer 18. An organization has 30 task bots running that transfer data from one application to the other within the organization. The organization now wants to update the interfaces of all the application. This means that the task bots need to be reworked again. How can the bots be re -created this time so that they can automatically adapt to any changes in the interface of the application in future? Create MetaBots to implement business function as they work on the blueprint of the application surface

↑ Change this answer 19. A developer at an organization created a MetaBot that enters data into several text fields of an application. The entry is done using local MetaBot variables. Other developers in the organization also want to use this MetaBot to enter a different set of values into the same fields of the application. How can they share and reuse the MetaBot? Share the MetaBot code via control room and then map data read using task bot variables to MetaBot variables ↑ Change this answer 20. An administrator is tasked to consume work items from a given queue in the Control Room instance in an existing connection. In the Variable Manager panel, what must the administrator first add in the Bot? Queue Category ↑ Change this answer 21. What is an extension of a Metabot file? MBOT ↑ Change this answer 22. After logging in from the client system, a developer wants to review the task bot activities that have occurred at the client system over the last four weeks. What would help the developer with this information? The administrator from the control room accesses the system logs at the client machine and shares this information with developer ↑ Change this answer 23. A developer uploads a Bot to the Control Room for enterprise-wide deployment. The administrator sets up a schedule for deploying the Bot across all enterprise clients connected to the Control Room. However, for two of the Bot Runner clients this deployment fails, and the run Bot deployment failure is logged to the Audit log. Which two of the following could be the reason? The two Bot Runners could not be reached or appear as disconnected The two Bot Runners could not download the deployed package ↑ Change this answer 24. If the application is web based, what is the preferred recorder/command to automate? Web Recorder/Managed Web Controls ↑ Change this answer 25. Which two reports are generated by the Report Designer? (Choose two.) Task Failure Task Run ↑ Change this answer 26. Which mode of Information Capture is supported by Smart Recorder? Command Mode ↑ Change this answer

27. User information Name and Address are being stored in an XML document. What two steps would a user take to reflect a change of Address in the XML document? (Choose two.) Modify the Address through the XML > Update Node command Save changes using XML > Save Session Data command ↑ Change this answer 28. A user is using Error handling in their code. The user feels that the values of System Error Handling Variables are getting carried forward from one Error Handling block to another resulting in issues. What does the user need to do to resolve this? The action can be trigger to reset the values of the variables. ↑ Change this answer 29. What three options allow a user to download multiple email messages that all contain attachments, where the message is saved in text format and the attachments are save d in a pre-defined folder? (Choose three.) Choose"Message Format" as Plain Text and specify the folder location to download attachments Use the"Email Automation - Get All Messages" command to loop over the mail box Use the"Loop Each Email Message on Mail Server" command to loop over the mail box ↑ Change this answer 30. An administrator writes a query which returns 10,000 rows. However, the administrator only wants to return a maximum of 500 rows. What command should be used to provide the desired result? The"Maximum number of records to fetch" in Database - SQL Query command ↑ Change this answer 31. A user wants a shell script to execute as soon as cursor moves to a certain location in the Terminal Emulator Window. How can the user accomplish this? Use the Terminal Emulator -"Wait till Cursor Moves out of position" and then call the Shell Script. Use the Terminal Emulator -"Wait till Cursor Moves to Position" and then call the Shell Script. ↑ Change this answer 32. What String Operation sub-commands is used to get the number of characters in a given source string? Length ↑ Change this answer 33. In Workbench, what command allows Bots to be configured to process each data record from one queue and push the outcome as a work item into another queue? Insert Keystrokes ↑ Change this answer 34. What is the default function of Excel 'Close Spreadsheet' command?

It closes the spreadsheet while saving the changes ↑ Change this answer 35. Which two variable types are available in the workbench? (Choose two.) Array List ↑ Change this answer 36. PDF Integration- Extract Text command allows output in what two different text-types? Structured and Tabular ↑ Change this answer 37. $Filedata Column$ variable allows the reading of column wise information from which two file types? (Choose two.) CSV TXT ↑ Change this answer 38. Which three actions can be performed using the PDF Integration commands? (Choose three.) Conversion of PDF into Image Extraction of text from PDF ↑ Change this answer 39. What is true about the PGP command? It is used for encryption and decryption of all types of files ↑ Change this answer 40. What are two valid Error Handling options? (Choose two.) Continue Stop ↑ Change this answer