Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)
What network connections should be considered, when deploying runtime resources on the other side of a firewall from the Application server? (Select 2)