You are on page 1of 3

 'AAE_Bot Insight Admin', AAE_Bot Insight Expert and 'AAE_Bot Insight Consumer'

 'AAE_Bot Insight Expert' and 'AAE_Bot Insight Consumer'correct


Question was not answered

25. The administrator is trying to create a pool of devices on to distribute the execution of
a bot. After logging into the Control Room, the administrator fails to find any option to
create a pool.

What should the administrator do to resolve the issue?


 The administrator needs to be allocated the AAE_Pool Administrator role
 The administrator can do it by going into Workload and then select Create Pool
 The administrator needs to have the Pool Administrator create the pool.correct
 The AA plugin should be enabled on the browser
Question was not answered

26. The locker administrator of an organization is worried that giving developers


"Consumer" access to a locker will compromise the integrity of the credentials. The
developer can login into the control room and using the consumer access can view the
values of the credential variables.

What can the administrator do to stop this?


 The Locker administrator can encrypt the credentials and then store them inside the credential
variablescorrect
 The Locker administrator can use audit logs to check who viewed the credentials and then take
necessary action if there is a violation
 The Locker administrator can give developers "guest" role inside a locker to stip them to view the
credentials
 The Locker administrator can enable masking before entering values inside the credential
variables
Question was not answered

27. A developer uploads a Bot to the Control Room for enterprise-wide deployment. The
administrator sets up a schedule for deploying the Bot across all enterprise clients
connected to the Control Room. However, for two of the Bot Runner clients this
deployment fails, and the run Bot deployment failure is logged to the Audit log.

Which two of the following could be the reason?


 The two Bot Runners do not have access to the Audit log file
 The two Bot Runner do not have Client login access to the Control Roomcorrect
 The two Bot Runner are disable during executioncorrect
 The two Bot Runners could not be reached or appear as disconnected
 The two Bot Runners could not download the deployed package
Question was not answered

28. Which two commands can be used to download a file?


 FTPcorrect
 Web Recordercorrect
 App Integration
 Pattern Data
Question was not answered

29. Which option allows an administrator to identify the location of a Control Room
repository?
 Administration > Settings> Client Application Tab
 Administration > Settings > General Tabcorrect
 Administration >Settings > Bots Tab
 Administration >Settings > Credentials Tab
Question was not answered

30. What is the FTP- Change Folder command do?


 Set the upload target to a different folder on an FTP servercorrect
 Transfer file(s) to a different folder on an FTP server
 Transfer file(s) to a different folder on a local system
 Set the download target to a different folder on a local system
Question was not answered

31. An Automation Anywhere administrator has received a notification that the latest
version of AAE is available.

What is the first step the administrator would take in installing the newest version?
 Ensure all outstanding work items are processedcorrect
 Ensure all Bot Devices are disconnected
 Ensure all outstanding work items are active
 Ensure all Bot Devices are online and connected
Question was not answered

32. A user is working in a spreadsheet and wants to close the spreadsheet, retaining all
data intact after completing the work.

What command(s) will meet this request?


 First save the spreadsheet then close the spreadsheetcorrect
 Close the spreadsheet and then save the spreadsheet
 Close the spreadsheet
 Save the spreadsheet
Question was not answered

33. It is possible to run/execute a task by pressing a pre-assigned Hot Key combination


which has been associated with the task beforehand (True/False)?
 Truecorrect
 False
Question was not answered

34. In the loop associated with Database command, which system variable is used to
extract column values from the database table?
 $ArrayColumns$
 $Filedata Column$
 $DataSet Column$correct
 $Table Column$
Question was not answered

35. Which three email-based triggers does Control Room support by default? (Choose
three.)
 A BLM package is exported/imported
 User activated/deactivatedcorrect
 User information updatedcorrect
 A TaskBot stopped running because it is unsuccessfulcorrect
Question was not answered
36. A user is using Error handling in their code. The user feels that the values of System
Error Handling Variables are getting carried forward from one Error Handling block to
another resulting in issues.

What does the user need to do to resolve this?


 The user needs to manually reset the system defined Error Handling variables after every Error
Handling Block.correct
 The values don not get carried forward, as they are automatically reset after each block.
 The action can be trigger to reset the values of the variables.
 The action can be scheduled to reset the values of the variables.
Question was not answered

37. A user with AAE_Locker Admin role has left the company. The Administrator of the
control room is trying to delete this user account but is not able to do so.

How can this account be deleted?


 Ownership of all existing lockers need to be transferred to other locker administrator and then we
can delete the user account
 The administrator must reset the password and reuse the account
 Ownership of all existing credentials need to be transferred to other locker administrator and then
we can delete the user accountcorrect
 Delete the lockers created by this user using another Locker admin account and transfer all
credentials ownership to other users
Question was not answered

38. A user scans multiple documents into individual PDF documents and stores them on
their hard drive. The user attempts to upload the documents individually but is told to
send one large PDF document containing the individual documents instead.

How can the user accomplish this request?


 Combine the multiple PDF documents into a single document using the PDF Integration > Merge
Documents commandcorrect
 The user can combine all the PDF documents by using PDF Integration > Decrypt command
 All the PDF documents can be combined into one using the PDF Integration > Mail Merge
command
 The user can combine all the PDF documents by using PDF Integration > Encrypt command
Question was not answered

39. Which three are valid Loop commands? (Choose three.)


 Each Folder in a Foldercorrect
 Each Node in an XML Datasetcorrect
 Each Row in an Excel Datasetcorrect
 Each Item In sfile
Question was not answered

40. Stephanie has been assigned a task to export and classify the Historical Activities in
Web Control Room. She need help in understanding all possible status of the activities
under this feature.

Which of the following is an invalid status of the bot in Historical Feature?


 Not Startedcorrect
 Completed
 Unknown
 Failed

You might also like