Documente Academic
Documente Profesional
Documente Cultură
The developer logged in at the client machine, accesses the client machine system logs for this
information.
An automation anywhere control room administrator has developed several bots which contain some
The password should be entered in the control room export bots + files tool
An owner of a credential vault locker has accepted a position in another part of the company.
The developer wants to map the task bot variables with corresponding
The developer needs to define the parameter type of all the metabot variables.
1. A developer logged into a client machine has recently completed designing a new TaskBot
and needs to evaluate the Bot outcome for purpose of meeting the project requirement. If the
evaluation is successful, the TaskBot will then be uploaded to the control room. Which three
actions could the developer take, to execute the TaskBot for the evaluation? (Choose three.)
The administrator of automation anywhere enterprise server has noticed that in the last few days, there
has been an unusually high volume of events.
Review the bots dashboard.
A developer has made a change to an automation anywhere taskbot using the enterprise client
interface.when running the bot from the control room, the developer is surprised to see the previous
version of the taskbot . What must be done to overcome the issue.
Copy the task bot from the client device to the control room server.
The administrator wants to create a locker and store a set of credential variables that the administrator
created inside the control room, that are to be made available to a set of developers with a specific role.
What steps are necessary to achieve this task.
A user with “AAE_lockerAdmin” role prevledges needs to create the locker in the control room and
assign the administrator as the manager of the locker.
An administrator in the control room is looking for the number of devices that earlier crossed, did not
achieve or are equal to the threshold of CPU , memory ad HDD utilization over the past three weeks.As a
first step , the administrator plans to export the data from various widgets of the devices dashboard.In
what three file formats , out of the option provided below, will the widget data be exported.
Data in csv chart format file
Data in excel chart format file
Image in pdf format file
An administrator has schedule a bot from the bots section. The administrator’s manager feels that the
schedule is incorrect. In control room , where would the administrator go to show the schedule.
Devices
↑ Change this answer
One of the department of a client organization has logically grouped similar type of devices on which
bots would run as work
Development
What dashboard displays the graphical information like device pools by FTE and device pools by
backlog
Devices.
The locker administrator of an organization is worried that giving developers “consumer” access
The locker administrator can encrypt the credentials and then store them inside the credentials
variables.
The administer of an automation anywhere enterprise installation needs to review the most
frequently occurring reasons why bots associated with the control room have failed.
Top failure reasons
How can an administrator pull in some bots into the control room which were received via email
attachment.
Drag and drop the bots into the control room > bots section
When creating a new metabots , the fields of a internet explorer application screen are not mapping
correctly.
Other applications running on the development system are in contention with the target web
applications.
A user is developing a new task bot and discovered it will require functionality already provided by
an existing metabot
Call the existing metabot from the new tasbot.
Create a role and delegate User and Role creation permissions to the new role
Enable Active Directory integration for the control room
Control room scheduled automation has a status of failed.what should the administrator do to find
the error message and detail of the precise location In the task that the error occurred.
Lookup the error description for the status code of the error for the failed activity > historical >view
historical activity page of the control room interface.
Heartbeat widget
↑ Change this answer
8. A bot creator has added a credential to the control room but cannot add the new credential
to a locker. What should the Locker administrator do to assist the bot creator?
Go to Activity > Production, mouse over the Bot schedule to be deactivated and select the 'relegate'
toggle in the Control Room user interface
↑ Change this answer
10. The Bot development team manager has approached the data base administrator (DBA) to
share details of a database server with the team. The team needs to work on the server for
their current assignment. The DBA needs to ensure that the team's work can be
accomplished without compromising confidential information on the database server. What
approach should the DBA follow?
The DBA can contribute a Credential Variable having database connection details on the Control
Room, which can be accessed by relevant Bot developers on their systems.
↑ Change this answer
11. Which option allows an administrator to identify the location of a Control Room
repository?
The manager can store their application credentials in credentials variables inside a locker in the
control room and then assign the consumer access of the locker to a role mapped to the developers
↑ Change this answer
13. The IT Department is concerned that bot creators are using passwords that do not adhere
to their password requirements. The control room administrator has responded that each
user is responsible to conform to IT standards, and as the control room has email enabled,
the administrator cannot change bot developer passwords. What can the administrator do to
assist with meeting IT requirements?
Align the Control Room Settings > General > Security settings to conform to IT requirements
↑ Change this answer
14. A Control Room administrator is advised imminent, unplanned, essential maintenance will
temporarily interrupt running activities. How can automations sent to a Workload Queue be
interrupted in a controlled manner and started again after the work is complete?
Locker administrator informs the developer to use the credentials from the locker
A role mapped with “consumer” access inside the locker needs to be assigned to the developers
user account.
15. What dashboard provides information on 'Total Users'?
Home
↑ Change this answer
What is a pre defined system role associated with the “credentials vault” feature in control room.
AAE_Credential Administrator
What is the pre defined system role associated with bot insight dashboards
AAE_bot_insight_expert and AAE_bot_insight_consumer
16. A bot developer wants to copy a bot from the development environment to the testing
environment. Which option should the developer perform?
Export the bot from the development control room then import the package to the UAT control room
↑ Change this answer
17. While editing a task, the screenshots are not appearing under the Visualize Tab. What
could be the possible reason?
The task was created with the Secure Recording option enabled in CR
↑ Change this answer
18. What option helps in searching for a web control based on the index number of the
control stored while recording a web page?
Control ID
CONTROL INDEX
↑ Change this answer
19. An administrator is tasked to consume work items from a given queue in the Control
Room instance in an existing connection. In the Variable Manager panel, what must the
administrator first add in the Bot?
Queue cATEGORY
Queue Variables
↑ Change this answer
20. In an organization, the application on which the MetaBot will work has to navigate through
22 different screens in the application to reach to the page where data needs to be
processed. What is the most efficient way to capture these 22 screens as assets?
Recalibrate the page in the metabot designer because the web page field tags have changed.
If the application is web based. What is the preferred recorder/command to automate.
Web recorder/managed web controls.
Task Run
Task failure
Which if the following methods is used to assign a new set of permissions to a group of users.
Create a new role under security tab.
What three options allow a user to download multiple email messages that all contain attachments,
Choose “message format” as plain text and specify the folder location to download attachments.
Use the email automation – get all messages command to loop over the mail box.
Use the loop each email message on mail server command to loop over the mail box.
An administrator is writing into a database and received an error detailed in the exhibit.
Move the execute sql statement to be between connect and disconnect.
Move the prompt message to be before the disconnect statements.
An administrator captures the value of $Error Line Number$ variable in a log file and find that the
value of $Error Line Number$
Use a"Loop Each Folder in a Folder" loop to loop over the directory"c:\Prospects", then choose the
folders to delete by displaying the name of the folder via $folder name$ variable
↑ Change this answer
26. A user scheduled some tasks on the local client and left for the day. The next day, the
user finds that none of the tasks were executed. The event log shows that the machine did
not shut down or restart. Which of these are possible reasons that the command did not
execute? (Choose two.)
A user has a critical task which must be executed at a scheduled time.this task must be prioritized
over any other tasks that may be
The user can assign critical task a higher priority through properties > General > priority in the client.
↑ Change this answer
27. A user wants to reduce the time spent on reading emails by only glancing through the
mails not yet viewed first thing in the morning. How would the user get the desired results?
Create an Email Trigger that will launch a task that to show a mail as soon as it comes via email
automation command.
↑ Change this answer
28. A user wants a shell script to execute as soon as cursor moves to a certain location in the
Terminal Emulator Window. How can the user accomplish this?
Use the Terminal Emulator -"Control - Set Cursor to position" and then call the Shell Script.
Wait till curson move to position
↑ Change this answer
29. A user scans multiple documents into individual PDF documents and stores them on their
hard drive. The user attempts to upload the documents individually but is told to send one
large PDF document containing the individual documents instead. How can the user
accomplish this request?
Combine the multiple PDF documents into a single document using the PDF Integration > Merge
Documents command
↑ Change this answer
30. User information Name and Address are being stored in an XML document. What two
steps would a user take to reflect a change of Address in the XML document? (Choose two.)
Delete Existing Address using the XML > Delete Node/Attribute command
Update node and save session
↑ Change this answer
31. A user from human resources wants to access all records that are in the employee
database. The user is not comfortable editing databases but is comfortable working in Excel.
What are two methods that an administrator can provide the information to the user in the
desired format?(Choose two.)
Continue
Stop
↑ Change this answer
33. Where does the PGP command allow the encryption/decryption of a file using keys?
Passphrase is used.
Public Key is used for encryption and Passphrase is used for the decryption of encrypted file
↑ Change this answer
34. Which two system variables are associated with Arrays? (Choose two.)
ArrayColumns
ArrayRows
↑ Change this answer
35. In Workbench, what command allows Bots to be configured to process each data record
from one queue and push the outcome as a work item into another queue?
Insert keystrokes
What string operation sub-commands is used to get the number of charcaters in a given source
string.
Length
Date
↑ Change this answer
37. Which system variable can be used in the required command to access the work item
attributes from a queue category?
$List Item$
$Work Item$
$Filedata Column$
$Table column$
↑ Change this answer
39. Which three options are valid in Error Handling? (Choose three.)
The administrator can use the Web Recorder > Find Broken links command
↑ Change this answer