Automation Quiz
Automation Quiz
AAE Client
AAE Control Room
AAE Send Email Command
↑ Change this answer CORRECT
2. A locker administrator needs to take a long leave and wants to assign a back-up
to perform Locker administrator tasks in their absence. The locker administrator
does not want the back-up to add users to the existing lockers, but is comfortable
with the back-up adding and editing existing credential variables of the lockers.
The back-up can also change access levels of existing users inside the lockers. How
can the locker administrator achieve this?
3. The IT Department is concerned that bot creators are using passwords that do not
adhere to their password requirements. The control room administrator has responded
that each user is responsible to conform to IT standards, and as the control room
has email enabled, the administrator cannot change bot developer passwords. Which
of these can the administrator do to best assist with meeting IT requirements?
Align the Control Room Settings > General > Security settings to conform to IT
requirements
↑ Change this answer
4. A Control Room administrator has received an advisory from IT that security may
be compromised for many Control Room systems. IT is concerned that there may be an
attempt to load some harmful code into the Control Room. What two steps can the
Control Room administrator take to address this threat? (Choose two.)
Check the Audit Log for user logins that occur at unusual hours into the Control
Room, share this information with their user's manager, and check the user's
uploads for threats.
Put Control Room on a separate network, one not accessible by clients.
Under Administration > Settings - Whitelisted file extensions > Disallow extensions
which could be a virus (BAT files, etc,)
↑ Change this answer
5. During UAT, a client learns that Automation Anywhere software takes screen shots
of all surfaces that it encounters and wants to stop this from occurring while
recording. What can be done to prevent this?
6. The locker administrator informs the developer to use the credentials from the
locker that the developer has been provided access to. The developer logs into the
control room to learn the names of the variables and use them during development
but finds nothing created inside the locker. The developer creates their own
credential variables inside the locker but is unable to use these credential
variables during development. What will resolve the issue?
Workload Management
↑ Change this answer
9. The control room administrator is overwhelmed by new user requests resulting
from recent acquisitions. What two things can the administrator do to lighten the
creation of new user accounts and aligning proper roles? (Choose two.)
Assign responsible business users a role that has Create User and Manage Roles
permissions enabled
Create a role and delegate User and Role creation permissions to the new role
↑ Change this answer
10. A control room administrator wants to create users and have them create their
own passwords. Which is the best way to do this within a control room environment?
Pull in Bots into the Control Room via the Bots > Import Bots command
↑ Change this answer
12. The administrator of an Automation Anywhere Enterprise server has noticed that
in the last few days, there has been an unusually high volume of events. What
should the administrator do to get more information about these events?
Devices
↑ Change this answer
15. An administrator with administrative access in an Automation Anywhere Control
room is reviewing the Devices Dashboard. A group of user's devices are showing
as"offline" status. Why is this occurring?
This group of users are not logged into the client UI on the device
↑ Change this answer
16. A company has a policy that no individual should know the credential of the any
other individual in the organization. This policy prevents the Locker administrator
from setting credential values to any credential variables that developers will be
able to access. How can the Locker administrator enable adding of values to a pair
of credential variables (Username and Password), that are assigned to a single
locker, that 100 developers will have access to but with individual identity?
The Locker Administrator can define the credential variables as user defined
credentials
↑ Change this answer
17. While editing a task, the screenshots are not appearing under the Visualize
Tab. What could be the possible reason?
The task was created with the Secure Recording option enabled in CR
↑ Change this answer
18. An organization has 30 task bots running that transfer data from one
application to the other within the organization. The organization now wants to
update the interfaces of all the application. This means that the task bots need to
be reworked again. How can the bots be re-created this time so that they can
automatically adapt to any changes in the interface of the application in future?
Create MetaBots to implement business function as they work on the blueprint of the
application surface
↑ Change this answer
19. A developer at an organization created a MetaBot that enters data into several
text fields of an application. The entry is done using local MetaBot variables.
Other developers in the organization also want to use this MetaBot to enter a
different set of values into the same fields of the application. How can they share
and reuse the MetaBot?
Share the MetaBot code via control room and then map data read using task bot
variables to MetaBot variables
↑ Change this answer
20. An administrator is tasked to consume work items from a given queue in the
Control Room instance in an existing connection. In the Variable Manager panel,
what must the administrator first add in the Bot?
Queue Category
↑ Change this answer
21. What is an extension of a Metabot file?
MBOT
↑ Change this answer
22. After logging in from the client system, a developer wants to review the task
bot activities that have occurred at the client system over the last four weeks.
What would help the developer with this information?
The administrator from the control room accesses the system logs at the client
machine and shares this information with developer
↑ Change this answer
23. A developer uploads a Bot to the Control Room for enterprise-wide deployment.
The administrator sets up a schedule for deploying the Bot across all enterprise
clients connected to the Control Room. However, for two of the Bot Runner clients
this deployment fails, and the run Bot deployment failure is logged to the Audit
log. Which two of the following could be the reason?
Task Failure
Task Run
↑ Change this answer
26. Which mode of Information Capture is supported by Smart Recorder?
Command Mode
↑ Change this answer
27. User information Name and Address are being stored in an XML document. What two
steps would a user take to reflect a change of Address in the XML document? (Choose
two.)
Modify the Address through the XML > Update Node command
Save changes using XML > Save Session Data command
↑ Change this answer
28. A user is using Error handling in their code. The user feels that the values of
System Error Handling Variables are getting carried forward from one Error Handling
block to another resulting in issues. What does the user need to do to resolve
this?
29. What three options allow a user to download multiple email messages that all
contain attachments, where the message is saved in text format and the attachments
are saved in a pre-defined folder? (Choose three.)
Choose"Message Format" as Plain Text and specify the folder location to download
attachments
Use the"Email Automation - Get All Messages" command to loop over the mail box
Use the"Loop Each Email Message on Mail Server" command to loop over the mail box
↑ Change this answer
30. An administrator writes a query which returns 10,000 rows. However, the
administrator only wants to return a maximum of 500 rows. What command should be
used to provide the desired result?
31. A user wants a shell script to execute as soon as cursor moves to a certain
location in the Terminal Emulator Window. How can the user accomplish this?
Use the Terminal Emulator -"Wait till Cursor Moves out of position" and then call
the Shell Script.
Use the Terminal Emulator -"Wait till Cursor Moves to Position" and then call the
Shell Script.
↑ Change this answer
32. What String Operation sub-commands is used to get the number of characters in a
given source string?
Length
↑ Change this answer
33. In Workbench, what command allows Bots to be configured to process each data
record from one queue and push the outcome as a work item into another queue?
Insert Keystrokes
↑ Change this answer
35. Which two variable types are available in the workbench? (Choose two.)
Array
List
↑ Change this answer
36. PDF Integration- Extract Text command allows output in what two different text-
types?
37. $Filedata Column$ variable allows the reading of column wise information from
which two file types? (Choose two.)
CSV
TXT
↑ Change this answer
38. Which three actions can be performed using the PDF Integration commands?
(Choose three.)
40. What are two valid Error Handling options? (Choose two.)
Continue
Stop
↑ Change this answer