ExamGecko
Home Home / Citrix / 1Y0-341

Citrix 1Y0-341 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which build-in TCP profile can a Citrix Engineer assign to a virtual server to improve performance for users who access an application from a secondary campus building over a fiber optic connection?

A.
nstcp_default_tcp_lfp
A.
nstcp_default_tcp_lfp
Answers
B.
nstcp_default_tcp_lan
B.
nstcp_default_tcp_lan
Answers
C.
nstcp_default_tcp_interactive_stream
C.
nstcp_default_tcp_interactive_stream
Answers
D.
nstcp_default_tcp_lnp
D.
nstcp_default_tcp_lnp
Answers
Suggested answer: C

Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. The engineer enables the Learn action for the Start URL, HTML, Cross-Site Scripting, and HTML SQL Injection protections. The engineer assigns this profile to a policy, which is then bound to the virtual server.

Which two items can the engineer check to determine that the Learn action is NOT capturing any rules? (Choose two.)

A.
The HTML Error Object is configured for the profile.
A.
The HTML Error Object is configured for the profile.
Answers
B.
Enough space is left on the /flash file system.
B.
Enough space is left on the /flash file system.
Answers
C.
The aslearn process is running on the Citrix ADC appliance.
C.
The aslearn process is running on the Citrix ADC appliance.
Answers
D.
The Learn database is less than 20 MB.
D.
The Learn database is less than 20 MB.
Answers
Suggested answer: A, C

Scenario: A Citrix Engineer wants to use Citrix Application Delivery Management (ADM) to monitor a single Citrix ADC VPX with eight web applications and one Citrix Gateway. It is important that the collected data be protected.

Which deployment will satisfy the requirements?

A.
A single Citrix ADM with database replication to a secondary storage repository.
A.
A single Citrix ADM with database replication to a secondary storage repository.
Answers
B.
A pair of Citrix ADM virtual appliances configured for High Availability.
B.
A pair of Citrix ADM virtual appliances configured for High Availability.
Answers
C.
A single Citrix ADM imported onto the same hypervisor as the Citrix ADC VPX.
C.
A single Citrix ADM imported onto the same hypervisor as the Citrix ADC VPX.
Answers
D.
A pair of Citrix ADM virtual appliances, each working independently.
D.
A pair of Citrix ADM virtual appliances, each working independently.
Answers
Suggested answer: A

A manager for a hospital billing system wants to display the last four digits of a credit card number when printing invoices.

Which credit card security action does this?

A.
X-Out
A.
X-Out
Answers
B.
Log
B.
Log
Answers
C.
Transform
C.
Transform
Answers
D.
Block
D.
Block
Answers
Suggested answer: A

Explanation:

Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/application-firewall/dataleak-prevention/creditcard-check.html

Which protection can a Citrix Engineer implement to prevent a hacker from extracting a customer list from the company website?

A.
Cross-Site Request Forgeries (CSRF)
A.
Cross-Site Request Forgeries (CSRF)
Answers
B.
Form Field Consistency
B.
Form Field Consistency
Answers
C.
HTML Cross-Site Scripting (XSS)
C.
HTML Cross-Site Scripting (XSS)
Answers
D.
HTML SQL Injection
D.
HTML SQL Injection
Answers
Suggested answer: B

Scenario: A Citrix Engineer needs to forward the Citrix Web App Firewall log entries to a central management service. This central management service uses an open log file standard.

Which log file format should the engineer use in the Citrix Web App Firewall engine settings to designate the open log file standard?

A.
CEF
A.
CEF
Answers
B.
IIS
B.
IIS
Answers
C.
W3C
C.
W3C
Answers
D.
TLA
D.
TLA
Answers
Suggested answer: A

Explanation:

Reference: https://support.citrix.com/article/CTX136146

Scenario: A Citrix Engineer is monitoring the environment with Citrix Application Delivery Management (ADM). Management has asked for a report of high-risk traffic to protected internal websites.

Which dashboard can the engineer use to generate the requested report?

A.
App Security
A.
App Security
Answers
B.
Transactions
B.
Transactions
Answers
C.
Users & Endpoints
C.
Users & Endpoints
Answers
D.
App
D.
App
Answers
Suggested answer: B

Scenario: A Citrix Engineer has a pair of Citrix ADC VPX appliances configured as a High-Availability (HA) pair and hosted on a Citrix Hypervisor. The engineer wants to use Citrix Application Delivery Management (ADM) to monitor and manage the 35 web applications on the appliances. The engineer has imported Citrix ADM virtual appliance to Citrix Hypervisor. The engineer has also configured the management IP address settings and has added the 35 instances. However, some of the instances are NOT reporting any data.

Which two areas can the engineer check to determine the cause of the issue? (Choose two.)

A.
A Premium platform license must be configured on each instance.
A.
A Premium platform license must be configured on each instance.
Answers
B.
AppFlow must be enabled on each instance.
B.
AppFlow must be enabled on each instance.
Answers
C.
The Citrix ADM license must be installed.
C.
The Citrix ADM license must be installed.
Answers
D.
An SSL certificate must be installed on the Citrix ADM appliance.
D.
An SSL certificate must be installed on the Citrix ADM appliance.
Answers
Suggested answer: C, D

Which Front End Optimization technique overcomes the parallel download limitation of web browsers?

A.
Domain Sharding
A.
Domain Sharding
Answers
B.
Minify
B.
Minify
Answers
C.
Extend Page Cache
C.
Extend Page Cache
Answers
D.
Lazy Load
D.
Lazy Load
Answers
Suggested answer: A

Explanation:

Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/optimization/front-end-optimization.html

Statistics for which three types of violations are presented on the App Security Dashboard?

(Choose three.)

A.
Web App Firewall protection
A.
Web App Firewall protection
Answers
B.
IP Reputation
B.
IP Reputation
Answers
C.
SSL Enterprise Policy
C.
SSL Enterprise Policy
Answers
D.
Signature
D.
Signature
Answers
E.
AAA
E.
AAA
Answers
Suggested answer: A, B, D

Explanation:

Reference: https://docs.citrix.com/en-us/citrix-application-delivery-management-service/analytics/security/security-violations.html

Total 68 questions
Go to page: of 7