web analytics

Where can the engineer change the cookie name?

Scenario: A Citrix Engineer configures the Application Firewall for protecting a sensitive website. The security team captures traffic between a client and the website and notes the following cookie: citrix_ns_id

Which policy expressions will help the engineer accomplish the requirement?

A Citrix Engineer needs to configure an Application Firewall policy. According to company policies, the engineer needs to ensure that all the requests made to the website are originating from

What could be the cause of this behavior?

Scenario: A Citrix Engineer is assigned applications using Role-based Access Control (RBAC) in NetScaler Management and Analytics Systems (NMAS). In the NMAS, the engineer can see all virtual servers under

which users report long response times when accessing a virtual desktop?

What can a Citrix Engineer use in NetScaler Management and Analytics System (NMAS) to troubleshoot an issue in which users report long response times when accessing a virtual desktop? A.

Which Application Firewall profile has blocked the URL?

A Citrix Engineer observes the following event in the ns.log: Aug 3 11:55:58 10.248.64.10 08/03/2015:15:55:58 GMT ATL0NS01 0-PPE-1: default APPFW APPFW_STARTURL 406856 0: 10.248.13.13 11152-PPE1 LG+hd4LkcYiOyQVWvOTsCtSyiv00001 SPI Disallow illegal URL:

A website hosts highly dynamic content that is frequently requested in bursts of high user access. Which configuration will reduce traffic to the origin server while optimizing client performance?

A website hosts highly dynamic content that is frequently requested in bursts of high user access. Which configuration will reduce traffic to the origin server while optimizing client performance? A.

What is causing the issue?

Scenario: A Citrix Engineer has enabled learning on Application Firewall for all the Security checks on a basic profile that is configured in a production environment. However, after a few

Which Markup Language is used along with NITRO API to create a StyleBook?

Which Markup Language is used along with NITRO API to create a StyleBook? A. YAML B. GML C. XML D. HTML Answer: A

What can the engineer configure on the NetScaler to enable data to be presented to the clients in real time?

Scenario: A Citrix Engineer has a project to enable Integrated Caching on a NetScaler for a Financial Consulting company whose clients monitor their stocks in real time. Clients are reporting

Which response header will be dropped by Application Firewall after this check is enabled?

A Citrix Engineer enabled Credit Card Security check in the Application Firewall Profile. Which response header will be dropped by Application Firewall after this check is enabled? A. Content-Encoding B.

How can a Citrix Engineer configure a specific LDAP attribute in the nFactor implementation?

How can a Citrix Engineer configure a specific LDAP attribute in the nFactor implementation? A. Specify the attribute in the LDAP server attributes field. B. Change the order of the

When the NetScaler marks a client connection as “non-trackable”, the default behavior of the NetScaler without making any change to the HTTP Profile is to ______. (Choose the correct option to complete the sentence.)

When the NetScaler marks a client connection as “non-trackable”, the default behavior of the NetScaler without making any change to the HTTP Profile is to ______. (Choose the correct option

What is causing this issue?

Scenario: A Citrix Engineer has configured Security Insight on NetScaler Management and Analytics System (NMAS) with Firmware version 12.0.41.16 to monitor the Application Firewall. The NetScaler ADC is running version

A Citrix Engineer needs to configure an AppQoE action to deliver content from an alternate service. Which three parameters should the engineer configure to meet this requirement? (Choose three.)

A Citrix Engineer needs to configure an AppQoE action to deliver content from an alternate service. Which three parameters should the engineer configure to meet this requirement? (Choose three.) A.

Which queue depth value must the Surge Queue be to trigger the “no-attack” mode?

Scenario: A Citrix Engineer configured an HTTP Denial-of-Service (DoS) protection policy by setting the Surge Queue depth to 300. The surge queue reaches a size of 308, triggering the NetScaler

What can the engineer modify to implement Signature rules?

Scenario: A Citrix Engineer has configured the Signature file with new patterns and log strings and uploaded the file to Application Firewall. However, after the upload, the Signature rules are

Which three protocols in a NetScaler Management and Analytics System (NMAS) can be used to back up the current state of the managed NetScaler instances? (Choose three.)

Which three protocols in a NetScaler Management and Analytics System (NMAS) can be used to back up the current state of the managed NetScaler instances? (Choose three.) A. Telnet B.

Which NetScaler feature can the engineer use to optimize the web application?

Scenario: A Citrix Engineer is trying to optimize a website that is load balanced on a NetScaler and is accessed by mobile users. The web application is complex and made

What could be causing this issue?

Scenario: A Citrix Engineer needs to set up a NetScaler Web Logging (NSWL) client system for logging. The engineer attempted to start the NSWL service on the client system and

Which requirement must be addressed to implement the IP Reputation feature on a NetScaler MPX appliance?

Which requirement must be addressed to implement the IP Reputation feature on a NetScaler MPX appliance? A. The NetScaler appliance must be able to connect to api.bcti.brightcloud.com on port 443.

Which security check can the engineer implement to protect the sensitive data?

A Citrix Engineer needs to protect a website that contains sensitive data such as employee ID numbers and customer ID numbers. Which security check can the engineer implement to protect

Which NetScaler Management and Analytics System (NMAS) feature will assist the Citrix Engineer in gathering the required data for issues with Endpoint Analysis?

Which NetScaler Management and Analytics System (NMAS) feature will assist the Citrix Engineer in gathering the required data for issues with Endpoint Analysis? A. Security Insight B. Web Insight C.

What criteria must be met in order to create a certificate bundle by linking multiple certificates in NetScaler Management and Analytics System (NMAS)?

What criteria must be met in order to create a certificate bundle by linking multiple certificates in NetScaler Management and Analytics System (NMAS)? A. The issuer of the first certificate

Which log should the engineer check on NMAS to ensure that the information is sent from NetScaler?

Scenario: A Citrix Engineer has enabled Security insight and Web insight on NetScaler Management and Analytics System (NMAS). The engineer is NOT able to see data under the Analytics on

Which security check on the Application Firewall can the engineer enable to prevent such attacks?

A Citrix Engineer needs to prevent an attack against insecure operating-system or web-server software. The attack can cause the system to crash or behave unpredictably when it receives a data

Which type of virtual server will NOT be automatically licensed by the NMAS on discovered instances?

Scenario: A Citrix Engineer has configured NetScaler Management and Analytics System (NMAS) with the default settings. In this configuration, the total number of virtual servers is lower than the number

Which method is used by NetScaler Management and Analytics System (NMAS) to gather licensing information from NetScaler?

Which method is used by NetScaler Management and Analytics System (NMAS) to gather licensing information from NetScaler? A. CFLOW B. APPFLOW C. NITRO D. IPFLOW Answer: C

Which two actions should be met before migrating the NetScaler Insight Center virtual appliance to NMAS? (Choose two.)

A Citrix Engineer needs to migrate the NetScaler Insight Center virtual appliance to NetScaler Management and Analytics System (NMAS). Which two actions should be met before migrating the NetScaler Insight

Which two checks can the engineer enable to prevent this attack? (Choose two.)

A Citrix Engineer has determined that users are able to access random URLs on a web site through bookmarks and by manually typing in the URLs to skip the pages

What can be the cause of the Application Firewall failing to block the attack?

Scenario: A Citrix Engineer configures an Application Firewall HTML SQL Injection Check and sets it to BLOCK and to use SQLSplCharANDKeyword as the SQL injection type. The engineer checks the

Which NetScaler owned IP address is used by NetScaler Management and Analytics System (NMAS) to communicate with NetScaler Instances?

Which NetScaler owned IP address is used by NetScaler Management and Analytics System (NMAS) to communicate with NetScaler Instances? A. VIP (Virtual IP) B. NSIP (NetScaler IP) C. CLIP (Cluster

Which two are prerequisite actions for PCI DSS compliance? (Choose two.)

A Citrix Engineer needs to ensure that infrastructure is PCI DSS compliant. Which two are prerequisite actions for PCI DSS compliance? (Choose two.) A. Use only vendor-supplied defaults for system

Why is the Learn Mode unavailable in this configuration?

Scenario: A Citrix Engineer is configuring a Buffer Overflow Security Check. When configuring the options, the engineer notices that the Learn Mode is unavailable. Why is the Learn Mode unavailable

Which security check can the engineer configure to counter the manipulation?

Scenario: A hacker accessed the HTML code from a product page and manipulated the HTML code as shown: Original Value: Manipulated Value: Which security check can the engineer configure to

Which Limit Identifier will meet this requirement?

A Citrix Engineer needs to implement a rate limiting policy to permit an average of one request in 40 ms using NetScaler. Which Limit Identifier will meet this requirement? A.

Which meta-character can be used as a wildcard to match a single character in a given position?

Which meta-character can be used as a wildcard to match a single character in a given position? A. A forward slash (/) B. A period (.) C. An asterisk (*)

Which two actions can a Citrix Engineer use to provide Denial of Service (DoS) protection with the AppQoE feature? (Choose two.)

Which two actions can a Citrix Engineer use to provide Denial of Service (DoS) protection with the AppQoE feature? (Choose two.) A. Simple Response B. HICResponse C. Denial Response D.

Which IP address will be configured on the external SNMP Manager to add the NMAS devices?

Scenario: A Citrix Engineer needs to configure an external SNMP server in a High Availability setup. The engineer configured the load-balancing virtual server to access the NetScaler Management and Analytics

What will be the effect of executing these commands?

A Citrix Engineer executed the below commands on the NetScaler command-line interface (CLI): add stream selector cacheStreamSelector http.req.url add ns limitidentifier cacheRateLimitIdentifier ­threshold 5 ­timeSlice 2000 ­selectorName cacheStreamSelector add cache

Which is a single-digit rating system that indicates the criticalness of attacks on the application, regardless of whether or NOT the application is protected by a NetScaler appliance?

Which is a single-digit rating system that indicates the criticalness of attacks on the application, regardless of whether or NOT the application is protected by a NetScaler appliance? A. App

Which three options can be used to specify the destination of an HTTP Callout? (Choose three.)

Which three options can be used to specify the destination of an HTTP Callout? (Choose three.) A. Load balancing Virtual server B. Global server load balancing Virtual server C. NetScaler

Which two resources can the engineer use to troubleshoot this integrated cache issue? (Choose two.)

A Citrix Engineer configures the integrated caching feature to cache both static and dynamic content, but the integrated cache feature does NOT work as expected. Which two resources can the

Which action resolves this problem?

Scenario: A Citrix Engineer has created a default admin user with username Admin1 and password `nsroot’ for the tenant example-online. However, the tenant administrator is unable to log in as

In PCRE, the only characters assumed to be literals are ___________ (Choose the correct option to complete the sentence.)

In PCRE, the only characters assumed to be literals are ___________ (Choose the correct option to complete the sentence.) A. A-Z B. a-z, A-Z C. a-z, A-Z, 0-9 D. 0-9

In which two locations is the StyleBook config pack saved? (Choose two.)

Scenario: A Citrix Engineer uses one StyleBook on a NetScaler Management and Analytics System (NMAS) to create multiple load-balanced virtual server configurations for NetScaler instances. The configuration is saved in

Which two settings can the engineer configure to make sure that clients receive a fresh response when it is needed? (Choose two.)

A Citrix Engineer needs to ensure that clients always receive a fresh answer from the integrated cache for positive responses (response of 200). Which two settings can the engineer configure

Which type of Application Profile type can be configured to protect the application which supports both HTML and XML data?

Which type of Application Profile type can be configured to protect the application which supports both HTML and XML data? A. Web 2.0 Application Profile B. Web Application Profile C.

Which type of Application Firewall security check can the engineer configure to block this type of attack?

Scenario: A Citrix Engineer discovers a security vulnerability in one of its websites. The engineer takes a header trace and checks the Application Firewall logs. The following was found in

Which option can the engineer use to accomplish CSS optimization?

A Citrix Engineer needs to optimize the Cascading Style Sheets (CSS) content sent from the backend server before being forwarded to the client. Which option can the engineer use to

Which security check can the engineer enable to meet this requirement?

A Citrix Engineer needs to implement Application Firewall to prevent the following tampering and vulnerabilities: -If web server does NOT send a field to the user, the check should NOT