Citrix 1Y0-312 Practice Test - Questions Answers
List of questions
Related questions
Scenario: There are two domains in an organization: Domain A and DomainB. A Citrix Engineer configured SAML authentication for Domain A, without implementing Citrix Federated Authentication Service (FAS).
While launching the Citrix apps, the Single Sign-on will __________.
Scenario: A Citrix Engineer is managing a large environment with multiple locations. The setup is as follows:
- The setup has a single Citrix Virtual Apps and Desktops site with multiple zones such as a Primary zone and 3 Satellite zones.
-Virtual Delivery Agents (VDAs) are available for all applications in all 3 Satellite zones.
-An application 'app1' has its application database located in Satellite zone.
-As a sovereign mandate, it is desirable that this application database should NOT be accessible from zones 2 and 3.
-The application does NOT create any database cache and cannot work if the database is NOT reachable.
-The outage is acceptable for complying with the sovereign mandate.
Which zone preference should the engineer configure to achieve this setup?
Scenario: A Citrix Engineer noticed that a Citrix Virtual Apps and Desktops environment lost connection to the SQL servers where the Citrix databases are running. Due to this, the Site has become unmanaged and first-time users CANNOT connect to their Citrix Virtual Apps & Desktops resources. The setup was recently upgraded from Citrix Virtual Apps and Desktops 7.11 to Citrix Virtual Apps and Desktops 7.15 CU4. What should the engineer do to minimize the impact of the SQL outage?
A Citrix Engineer wants to enable the "Log Off Web Portal When Session is Launched" feature within Workspace Environment Management (WEM) transformer settings.
What does the engineer need to do prior to enabling this feature?
Which three layers can a Citrix Engineer include in an image template? (Choose three.)
Which two statements are true for a Workspace Environment Management (WEM) configuration set? (Choose two.)
Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking. Which two steps can the engineer take to minimize attacks without interfering with user productivity? (Choose two.)
Which command should a Citrix Engineer use to review recent connections and brokering attempts within a Citrix Virtual Apps and Desktops site?
What is a Citrix App Layering recipe?
Which file is used to store a subscription on the Storefront server?
Question