web analytics

To which setting should the administrator change the configured method?

Scenario: A Citrix Administrator needs to ensure that a user request is redirected to the next available data center in order to ensure the best user experience based upon location.

Which Citrix ADC deployment mode should a Citrix Administrator use to achieve this requirement?

Scenario: The Director of network security in a financial organization wants to protect the enterprise network from any external malware threats. To do this, the director needs to gain visibility

Which two actions must be true for a client to connect to an SSL offload vServer without any SSL errors? (Choose two.)

Which two actions must be true for a client to connect to an SSL offload vServer without any SSL errors? (Choose two.) A. The Server Certificate is bound to the

Which log records detailed information such as statistics, metrics and debug information on the Citrix ADC in a proprietary binary format?

Which log records detailed information such as statistics, metrics and debug information on the Citrix ADC in a proprietary binary format? A. Syslog B. Nslog C. Nsconfig D. Nstrace Answer:

Which two configurations could the administrator have made to prevent this from happening? (Choose two.)

Scenario: A Citrix Administrator is configuring a Citrix ADC high availability (HA) pair with an existing Primary Citrix ADC with all resources configured. The administrator added the Secondary Citrix ADC

In which order will the policies be evaluated?

Scenario: A Citrix Administrator configured the rewrite policies below. bind Ib vserver VPN_http ­policyName POL_1 priority 120 ­gotoPriorityExpression END ­type REQUEST bind Ib vserver VPN_http ­policyName POL_2 priority 90 ­gotoPriorityExpression

What will be the outcome of this configuration?

Scenario: A Citrix Administrator has executed the following command: set csv server Vserver-CS-1 ­caseSensitive ON add cs action CS_Act_1 ­targetLBVserver MYVPN_http add cs policy CS_Pol_1 ­rule “http.REQ.HOSTNAME.CONTAINS (\ “server.citrix.lab\”)” ­action

What will be the effect of this command?

Scenario: A Citrix Administrator has executed the following command: set httpcallout1 ­cacheForSecs 120 What will be the effect of this command? A. The cache duration of the HTTP callout response

What can the administrator configure to resolve this issue?

Scenario: A Citrix Administrator has configured a Citrix ADC active-passive high availability (HA) pair. When the HA pair fails over, customers are unable to access the hosted websites. After some

What is the effect of the set csv server vserver-CS-1 ­redirectURL http://www.newdomain.com/mysite/ command?

What is the effect of the set csv server vserver-CS-1 ­redirectURL http://www.newdomain.com/mysite/ command? A. If the status of vserver-CS-1 is DOWN, then users will be redirected to http://www.newdomain.com/ mysite/ .

Which expression can the administrator use to meet this requirement?

A Citrix Administrator needs to confirm that all the client certificates presented to the authentication vServer are valid until year 2020. Which expression can the administrator use to meet this

Which built-in Command Policy permission level can the administrator use?

Scenario: A Citrix Administrator needs to create local user accounts for other administrators with limited privileges. The other administrators will need only: Read-only access The ability to enable and disable

Which two options would provide an end-to-end encryption of data, while allowing the Citrix ADC to optimize the responses? (Choose two.)

Which two options would provide an end-to-end encryption of data, while allowing the Citrix ADC to optimize the responses? (Choose two.) A. SSL Bridge protocol for the services B. HTTP

Which tool can a Citrix Administrator utilize to verify that a policy is bound and showing the number of hits?

Which tool can a Citrix Administrator utilize to verify that a policy is bound and showing the number of hits? A. nscollect B. nstrace.sh C. nstcpdump.sh D. nsconmsg Answer: D

What will be the effect of executing the above commands?

A Citrix Administrator has configured the Citrix ADC as a DNS Proxy Server. The administrator executed the following commands on the Citrix ADC using command-line interface: add rewrite action Act_1

What can the administrator do to add the partition information to the SNMP traps to avoid this from happening in the future?

Scenario: A Citrix Administrator configured Citrix ADC with multiple admin partitions, with different resources running one each. The administrator receives an SNMP alert stating `a Load Balanced vServer is down’.

Which tool can the administrator use to find data regarding time of failure and a list of users facing this issue?

A Citrix Administrator receives complaints from some users that authentication for the Citrix ADC Gateway site fails, Which tool can the administrator use to find data regarding time of failure

Which Citrix ADC Access Control List (ACL) command can a Citrix Administrator use to bridge traffic originating from 192.168.10.200?

Which Citrix ADC Access Control List (ACL) command can a Citrix Administrator use to bridge traffic originating from 192.168.10.200? A. add ns acl B. add ns acl6 C. add ns

What can the administrator do to increase bandwidth on the Citrix ADC?

Scenario: A Citrix ADC MPX is using one of four 10G ports available in an environment. A Citrix Administrator found a traffic bottleneck at the Citrix ADC. What can the

What will be the effect of this command to the default service monitoring behavior on the remote site?

A Citrix Administrator executed the following command in the Global Server Load Balancing (GSLB) environment: set gslb site SiteB ­triggerMonitor MEPDOWN What will be the effect of this command to

What can the administrator do to fix the issue?

Scenario: A Citrix Administrator has received user complaints about issues connecting to the domain through the Citrix ADC using AAA. The administrator investigated the issue and found that the domain

What could be the cause of this issue with the Citrix ADCs?

Scenario: A Citrix Administrator is performing a disaster recovery test and decided to fail over the Citrix ADC high availability (HA) pair appliances. The administrator noticed that the failover is

What is used to source the traffic when connection is proxied?

In a Global Server Load Balancing (GSLB) Active/Active environment, the connection proxy is used as the site persistence method. What is used to source the traffic when connection is proxied?

What can the administrator recommend to management in order to cost effectively handle the growth?

Scenario: A Citrix Administrator currently manages a Citrix ADC environment in a retail company that is growing quickly and may soon double its volume of business. Currently, a Citrix ADC

Which two options can the administrator use to complete the command? (Choose two.)

Scenario: A Citrix Administrator configured the “-denySSLReneg” Parameter using the below command on Citrix ADC to enhance security. set ssl parameter ­denySSLReneg Which two options can the administrator use to

What will the Citrix ADC do with the packets in this scenario?

Scenario: A Citrix ADC receives packets that are destined for a MAC address owned by the Citrix ADC. The destination IP address of the packets does NOT belong to the

What does the administrator need to do to recover the configuration quickly?

Scenario: A Citrix Administrator has made changes to the Citrix ADC, deleting parts of the configuration, and then saved the new configurations. The changes caused an outage which needs to

What can be the cause of this issue?

Scenario: A Citrix Administrator has given permissions to team members to access their own admin partition, so they can add resources for different departments and manage them without making changes

What are two advantages of using Content Switching for Global Server Load Balancing (GSLB) service selection? (Choose two.)

What are two advantages of using Content Switching for Global Server Load Balancing (GSLB) service selection? (Choose two.) A. Apply different load balancing methods on the different subsets of GSLB

What could be the reason the SSL vServer is in a down state?

Scenario: A Citrix Administrator created an SSL vServer using only the following commands: add lb vserver sslvserver SSL 10.102.29.133 444 add service sslsvc1 192.168.0.14 SSL 443 add service sslsvc2 192.168.0.15

What can the administrator perform to resolve this issue?

Scenario: A Citrix Administrator has a Citrix ADC SDX appliance with several instances configured. The administrator needs one instance with two interfaces connected to forward packets that are NOT destined

Which type of Citrix ADC monitor can a Citrix Administrator use to check the authentication service of the Active Directory Domain Controller?

Which type of Citrix ADC monitor can a Citrix Administrator use to check the authentication service of the Active Directory Domain Controller? A. The TCP monitor with the LDAP Base

What is the effect of the set gslb parameter ­ IdnsprobeOrder DNS PING TCP command in an Active/ Active Global Server Load Balancing (GSLB) setup?

What is the effect of the set gslb parameter ­ IdnsprobeOrder DNS PING TCP command in an Active/ Active Global Server Load Balancing (GSLB) setup? A. The order to calculate

How does the Citrix ADC communicate that IP-to-MAC address bindings have changed to the switches and routers on the network, when a Citrix ADC high availability (HA) pair failover occurs?

How does the Citrix ADC communicate that IP-to-MAC address bindings have changed to the switches and routers on the network, when a Citrix ADC high availability (HA) pair failover occurs?

What upgrading flexibility does SDX provide in this scenario?

Scenario: A Citrix Administrator is managing a Citrix ADC SDX running eight Citrix ADC instances. The administrator first needs to upgrade the firmware on the instances. However, the administrator is

What is the effect of the set cmp parameter ­cmpBypassPct 70 below command if compression is enabled on the Citrix ADC?

What is the effect of the set cmp parameter ­cmpBypassPct 70 below command if compression is enabled on the Citrix ADC? A. Compression will be bypassed if the Citrix ADC

Which proxy mode of the Secure Web Gateway should be used in this case?

Scenario: An organization has a `bring your own device’ (BYOD) policy, so it is NOT feasible to set up proxy settings on each device in the network. They need to

Which set of commands does the administrator need to run to correctly configure the rate limiting policy?

A Citrix Administrator needs to configure a rate limiting policy for the DNS requests to a threshold of 1000 DNS requests per second. Which set of commands does the administrator

The administrator can use the set gslb vserver ________________ parameter to avoid this behavior. (Choose the correct option to complete the sentence.)

A Citrix Administrator notices that the Citrix ADC is sending the IP addresses of all the active services in the DNS response. The administrator can use the set gslb vserver

Which mode should the administrator disable on the Citrix ADC to facilitate the addition of the new router and successfully route the packets?

Scenario: A Citrix ADC is configured with the following modes: MBF USIP USNIP Layer 3 mode A Citrix Administrator configured a new router and now requires some of the incoming

What could be causing the vServer to use Round Robin load-balancing algorithm?

Scenario: A Citrix Administrator has configured an HTTP load-balancing vServer with Least Response Time as the load-balancing algorithm. The administrator notices that requests to the vServer appear to be using

Which three authentication types can a Citrix Administrator use for Citrix ADC AAA dual-factor authentication? (Choose three.)

Which three authentication types can a Citrix Administrator use for Citrix ADC AAA dual-factor authentication? (Choose three.) A. TACACS+ B. RADIUS C. ADFS D. LINUX E. LDAP Answer: ABE

What is causing the Secondary state to be `Unknown’?

Scenario: A Citrix Administrator manages an environment that has a Citrix ADC high availability (HA) pair running on two MPX appliances. The administrator notices that the state of the Secondary

Which three statements are true when comparing a Simple Access Control List (ACL) to an Extended ACL? (Choose three.)

Which three statements are true when comparing a Simple Access Control List (ACL) to an Extended ACL? (Choose three.) A. Simple ACLs can be modified. B. Extended ACLs have priorities.

What will be the effect of these commands?

Scenario: A Citrix Administrator is executing the following commands on the Citrix ADC: add policy dataset Admin_group ipv4 bind policy dataset Admin_group 192.168.149.10 ­index 11 bind policy dataset Admin_group 192.168.149.39

To ensure that only the 10 new servers are receiving twice the connections of the old servers without changing the load balancing to the rest of the environment, the administrator needs to add a weight of ______________ to the services attached to the ______________ servers. (Choose the correct option to complete the sentence.)

Scenario: A Citrix Administrator needs to add 10 new web servers to an existing server farm. The new servers are configured to serve the same applications and connections and are

Which policy expression will allow all users access through the vServer?

Scenario: A Citrix Administrator has configured an Authentication, Authorization, and Auditing (AAA) action policy to allow users access through the Citrix ADC. The administrator bound the policy to a specific

What could be the reason for this?

Scenario: A Citrix Administrator has configured the following Access Control List (ACL) to block traffic from the IP address 10.102.29.5. add simpleacl rule1 DENY ­srcIP 10.102.29.5 A week later, the

Which two tools can the administrator use to gather information about WAN Latency, DC Latency and Host Delay? (Choose two.)

Scenario: External users are currently experiencing delays while accessing Citrix Virtual Apps and Desktops through the Citrix ADC. A Citrix Administrator needs to monitor the ICA connections to gather the

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.) A. Configure the HA status of the Primary Node