web analytics

Which two actions must an administrator perform to ensure that users are informed of the browser requirements? (Choose two.)

Scenario: A virtual server has been configured in the Content Switching node to provide multiple Web services using the full website path location. This website contains details that can only

What should a Citrix Administrator configure in a session profile so that users are able to use WorxWeb on their mobile devices?

What should a Citrix Administrator configure in a session profile so that users are able to use WorxWeb on their mobile devices? A. SSL VPN B. ICA Proxy C. Secure

Which deployment mode should the administrator use to implement the NetScaler?

Scenario: A Citrix Administrator is implementing a NetScaler appliance for the first time. All clients will connect from a public network and all servers will reside on a private network.

Which action could the administrator take to resolve this issue?

After restarting one node on a two-node NetScaler cluster, an administrator notices that the node that was restarted no longer accepts traffic. Which action could the administrator take to resolve

Which two actions should the administrator take to allow users to log on using mobile devices? (Choose two.)

A Citrix Administrator needs to set up two-factor authentication on NetScaler Gateway for mobile devices. Which two actions should the administrator take to allow users to log on using mobile

What does the administrator need to configure on the NetScaler Gateway to enable access through Citrix Receiver only?

Scenario: A Citrix Administrator is in the process of implementing StoreFront with NetScaler Gateway. Users in the environment will access resources through Citrix Receiver only. What does the administrator need

Which Server Logon Name Attribute should be used?

Scenario: A Citrix Administrator is configuring user authentication on the NetScaler Gateway. The administrator wants to use the same login name that is used to log into Windows-based domain joined

Which log file should a Citrix Administrator use to troubleshoot a cluster node in the INACTIVE state?

Which log file should a Citrix Administrator use to troubleshoot a cluster node in the INACTIVE state? A. ns.log B. http.log C. auth.log D. nscollect.log Answer: A

The administrator should use the __________ and bind it __________. (Choose the correct option to complete the sentence.)

A Citrix Administrator would like to use TCP Profiles to optimize NetScaler Gateway for ICA Access without affecting other load balanced traffic. The administrator should use the __________ and bind

Which two methods should be used for generating a configuration data and statistics report for evaluation by Citrix? (Choose two.)

Which two methods should be used for generating a configuration data and statistics report for evaluation by Citrix? (Choose two.) A. Run “show callhome” using the command-line interface. B. Run

Which two default key formats of SSL certificates could be installed by the NetScaler system? (Choose two.)

Which two default key formats of SSL certificates could be installed by the NetScaler system? (Choose two.) A. PFX B. P7B C. PEM D. DER Answer: CD

What should the administrator configure to receive notification of this event in the future, when the administrator is NOT logged on?

While logged on to the NetScaler Configuration Utility, a Citrix Administrator notices that CPU utilization is higher than expected. What should the administrator configure to receive notification of this event

A Citrix Administrator is replacing an expired SSL certificate bound to a virtual server. The established ICA connections to the virtual server will display as _______. (Choose the correct option to complete the sentence.)

A Citrix Administrator is replacing an expired SSL certificate bound to a virtual server. The established ICA connections to the virtual server will display as _______. (Choose the correct option

Which three parameters are required to create a new cluster instance? (Choose three.)

Which three parameters are required to create a new cluster instance? (Choose three.) A. IP address B. Instance ID C. Subnet mask D. Subnet IP address E. Backplane interface Answer:

Which monitor should a Citrix Administrator configure to monitor a StoreFront server group with SSL enabled?

Which monitor should a Citrix Administrator configure to monitor a StoreFront server group with SSL enabled? A. TCP B. SSL_TCP C. STOREFRONT with “Secure” checked D. CITRIX-WEB-INTERFACE with “Secure” checked

Which command should the administrator run at the command-line interface to create a monitor that will check the Web Interface by logging on to it with a test user’s credentials?

An administrator created a service for a Web Interface server that is encrypted by an SSL certificate. Which command should the administrator run at the command-line interface to create a

Which three features should the administrator configure for this scenario? (Choose three.)

Scenario: An administrator needs to configure a NetScaler to provide access to users on an Exchange platform. The users will only use the IMAP4 protocol. Which three features should the

Which action could the administrator take to prevent the members of the External_Contractors LDAP Group from logging on to NetScaler using SSH without affecting other users?

Scenario: An administrator configured an LDAP authentication policy and bound it globally. The only system group configured on the Netscaler is NS_Admins. After reviewing the security logs, the administrator notices

Which NetScaler feature will a Citrix Administrator configure in order to redirect all HTTP requests to HTTPS?

Which NetScaler feature will a Citrix Administrator configure in order to redirect all HTTP requests to HTTPS? A. Rewrite B. SSL VPN C. Content Switching D. Cache Redirection Answer: A

What should the administrator configure to achieve this goal?

Scenario: A Citrix Administrator has configured two virtual servers (VServer1 and VServer2). The administrator would like to set up the virtual servers so that only when VServer1 is offline, VServer2

Where should a Citrix Administrator implement an Endpoint Analysis expression?

Where should a Citrix Administrator implement an Endpoint Analysis expression? A. Session profile B. Authorization policy C. Authentication policy D. Preauthentication policy Answer: D

Which two pieces of information are required to create a virtual server? (Choose two.)

Which two pieces of information are required to create a virtual server? (Choose two.) A. Port B. Protocol C. Subnet Mask D. Gateway Address Answer: AB

Which script should a Citrix Administrator use when creating an Active Directory load balance monitor through the NetScaler?

Which script should a Citrix Administrator use when creating an Active Directory load balance monitor through the NetScaler? A. nsldap.pl B. nssnmp.pl C. nsntlm-lwp.pl D. nsbmradius.pl Answer: A

In order to load balance the Web Interface traffic and comply with company policy, the administrator should add services for __________ and create an __________. (Choose the correct set of options to complete the sentence.)

Scenario: An administrator plans to implement NetScaler to load balance Web Interface traffic. The Web Interface servers are using standard non-secure ports. Company policy states that all external traffic must

Which action could the administrator take to meet the needs of the scenario without affecting the connected users?

Scenario: An administrator implemented RADIUS with NetScaler Gateway as a two-factor authentication solution for a XenDesktop implementation. A planned outage is scheduled in wake of a software upgrade on the

What should the administrator configure on the NetScaler to view these events and identify the cause?

A Citrix Administrator receives information that users are having difficulty logging into the NetScaler Gateway Portal, where they access published resources, applications and desktops. What should the administrator configure on

Which protocol could an administrator apply with rate-based monitor?

Which protocol could an administrator apply with rate-based monitor? A. FTP B. ARP C. DNS D. HTTPS Answer: A

What is a possible reason why the administrator is still able to connect from a disallowed subnet?

Scenario: A Citrix Administrator added an Access Control List (ACL) to restrict access to the management IP address of the NetScaler. The administrator is still able to connect from a

Which action could an administrator take to configure auditing of logon events for all the employees who connected through the NetScaler Gateway for the current day?

Which action could an administrator take to configure auditing of logon events for all the employees who connected through the NetScaler Gateway for the current day? A. Run “df -h”

Which action could the administrator take to meet this requirement?

An administrator must configure a NetScaler system to be compliant with security policies that require the Security Team to have the ability to provide the identity of all the connected

How much traffic is being passed through the public IP address based on the output displayed above?

An administrator is reviewing the following output: VIP(141.128.58.149:80:UP:WEIGHTEDRR): Hits(38200495, 18/sec) Mbps(1.02) Pers(OFF) Err(0) Pkt(186/sec, 610 bytes) actSvc(4) DefPol(NONE) override(0) Conn: Clt(253, 1/sec, OE[252\]) Svr(3) S(141.128.49.40:80:UP) Hits(9443063, 4/sec, P[2602342, 0/sec\]) ATr(5)

In which format should an administrator save the AppExpert Template files in order to import and upload to the NetScaler?

In which format should an administrator save the AppExpert Template files in order to import and upload to the NetScaler? A. XML B. ASP C. CSV D. HTML Answer: A

What should the administrator configure to accomplish this requirement?

Scenario: A Citrix Administrator needs to restrict access to sensitive financial applications. The applications should be accessible within the internal network, but NOT accessible externally through the NetScaler Gateway. What

In which two ways can the administrator set the protocol to meet the requirements? (Choose two.)

Scenario: A Citrix Administrator is required to set up SSL Offloading for all virtual servers. External communication will come in as HTTPS traffic. Communication from the NetScaler to backend web

Which configuration should the administrator verify?

Scenario: A Citrix Administrator created a new NetScaler Gateway virtual server. During testing, users are unable to access XenApp applications through iOS and Android devices. Which configuration should the administrator

What should the administrator do prior to the upgrade to avoid losing the customizations?

Scenario: A Citrix Administrator has customized some NetScaler configuration files. The administrator now plans on upgrading the NetScaler Gateway from NetScaler 10.1 to NetScaler 10.5. What should the administrator do

Which two policies should the administrator configure to enable this feature? (Choose two.)

A Citrix Administrator needs to configure two-factor authentication for mobile devices with RSA tokens. Which two policies should the administrator configure to enable this feature? (Choose two.) A. SSL B.

Which action must the administrator perform to meet the objectives of this implementation?

An administrator must configure SmartAccess policies within an existing NetScaler Gateway implementation. Which action must the administrator perform to meet the objectives of this implementation? A. Upgrade Citrix XenApp from

Which two settings must the administrator configure in the NetScaler Gateway Global settings under “Configure Domains for Clientless Access”? (Choose two.)

A Citrix Administrator is configuring MicroVPN with MDX wrapped apps to support StoreFront. Which two settings must the administrator configure in the NetScaler Gateway Global settings under “Configure Domains for

Which component is required to allow users to launch Worx Home through a NetScaler Gateway?

Which component is required to allow users to launch Worx Home through a NetScaler Gateway? A. App Controller B. Citrix Receiver C. Citrix StoreFront D. NetScaler Gateway Plug-in Answer: C

In which file would the administrator modify the hostname to resolve this issue?

Scenario: While troubleshooting a license issue on NetScaler, a Citrix Administrator notes the following entry as the root cause: “1:47:12 (CITRIX) SERVER line says HOSTNAME=cag, hostid is HOSTNAME=ns” In which

What should an administrator enable to support secure LDAP?

A company plans to deploy secure LDAP authentication to their existing NetScaler Gateway implementation. What should an administrator enable to support secure LDAP? A. SSL security on the virtual server

Which command can a Citrix Administrator use to see a specific auditing Syslog policy binding?

Which command can a Citrix Administrator use to see a specific auditing Syslog policy binding? A. show log B. show audit C. show syslog D. show attribute Answer: B

To meet the needs of the scenario, the administrator must ensure that __________ is included in the plan.

Scenario: An administrator is planning to implement NetScaler Gateway. The administrator must ensure that users are able to change their passwords when the passwords have expired. To meet the needs

How should the administrator proceed on the Citrix NetScaler?

Scenario: A Citrix Administrator would like to delegate administration of the Citrix NetScaler to a Microsoft Active Directory group called “Citrix-NetScaler-Admins”. The group already exists in Active Directory. The Citrix-NetScaler-Admins

Which object does the administrator need to modify to allow traffic on port 80?

Scenario: There are two physical servers listening on port 8080. A Citrix Administrator added a third physical server to listen on port 80. The administrator is adding the third server

Which type of reporting or monitoring tool should an administrator use to meet the requirements of this scenario?

Scenario: Management has requested monthly detailed performance reports for an online Web application. Management has also requested real-time monitoring of the environment with the possibility of exporting historical reports. Which

Where in the NetScaler Configuration Utility should a Citrix Administrator configure a load balancing virtual server?

Where in the NetScaler Configuration Utility should a Citrix Administrator configure a load balancing virtual server? A. System B. AppExpert C. Optimization D. Traffic Management Answer: A

Which command should a Citrix Administrator run at the command-line interface to display the NetScaler certificate days to expiration?

Which command should a Citrix Administrator run at the command-line interface to display the NetScaler certificate days to expiration? A. show certFile B. show ssl stats C. show ssl certKey

Which two options could the administrator configure for the two NetScaler devices? (Choose two.)

Scenario: After an infrastructure service review, an administrator needs to improve the availability of core Web applications for customers. The administrator needs to place two recently purchased NetScalers in two