ExamGecko
Home Home / Citrix / 1Y0-341

Citrix 1Y0-341 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Which Citrix Web App Firewall profile setting can a Citrix Engineer configure to provide a response when a violation occurs?

A.
Default Request
A.
Default Request
Answers
B.
Redirect URL
B.
Redirect URL
Answers
C.
Return URL
C.
Return URL
Answers
D.
Default Response
D.
Default Response
Answers
Suggested answer: D

Explanation:

Reference: https://docs.citrix.com/en-us/netscaler/11-1/application-firewall/profiles/configuring-profiles.html

A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.

Which action should the engineer enable to achieve this?

A.
Stats
A.
Stats
Answers
B.
Block
B.
Block
Answers
C.
Log
C.
Log
Answers
D.
Learn
D.
Learn
Answers
Suggested answer: C

Which protection ensures that links to sensitive pages can only be reached from within an application?

A.
Form Field Consistency Check
A.
Form Field Consistency Check
Answers
B.
Buffer Overflow Check
B.
Buffer Overflow Check
Answers
C.
URL Closure
C.
URL Closure
Answers
D.
Deny URL
D.
Deny URL
Answers
Suggested answer: D

Explanation:

Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/application-firewall/url-protections/denyurl-check.html

Which three items does Citrix Application Delivery Management (ADM) require when adding an instances? (Choose three.)

A.
Site
A.
Site
Answers
B.
Tags
B.
Tags
Answers
C.
IP address
C.
IP address
Answers
D.
Agent
D.
Agent
Answers
E.
Profile
E.
Profile
Answers
Suggested answer: C, D, E

Explanation:

Reference: https://docs.citrix.com/en-us/citrix-application-delivery-management-software/current-release/configure/add-instances.html

Which Citrix Application Delivery Management (ADM) feature can a Citrix Engineer use to narrow a list of Citrix ADC devices based on pre-defined criteria?

A.
AutoScale Groups
A.
AutoScale Groups
Answers
B.
Instance Groups
B.
Instance Groups
Answers
C.
Configuration Template
C.
Configuration Template
Answers
D.
Tags
D.
Tags
Answers
E.
Agent
E.
Agent
Answers
Suggested answer: D

Which action ensures that content is retrieved from the server of origin?

A.
CACHE
A.
CACHE
Answers
B.
MAY_CACHE
B.
MAY_CACHE
Answers
C.
NOCACHE
C.
NOCACHE
Answers
D.
MAY_NOCACHE
D.
MAY_NOCACHE
Answers
Suggested answer: C

Explanation:

Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/optimization/integrated-caching/configure-cookies-headers-and-polling.html

Scenario: A Citrix Engineer is implementing Citrix Web App Firewall to protect a new web application. The engineer has created a profile, configured the relaxation rules, and applied signature protections. Additionally, the engineer has assigned the profile to a policy and bound the policy to the application.

What is the next step for the engineer in protecting the web application?

A.
Update the global default Citrix Wed App Firewall profile with the new signature file.
A.
Update the global default Citrix Wed App Firewall profile with the new signature file.
Answers
B.
Enable the Signature Auto-Update feature.
B.
Enable the Signature Auto-Update feature.
Answers
C.
Enable logging on key protections.
C.
Enable logging on key protections.
Answers
D.
Test the web application protections with a group of trusted users.
D.
Test the web application protections with a group of trusted users.
Answers
Suggested answer: B

Explanation:

Reference: https://docs.citrix.com/en-us/tech-zone/learn/poc-guides/citrix-waf-deployment.html

Scenario: A Citrix Engineer needs to ensure that the flow of traffic to a web application does NOT overwhelm the server. After thorough testing, the engineer determines that the application can handle a maximum of 3,000 requests per minute. The engineer builds a limit identifier, rl_maxrequests, to enforce this limitation.

Which advanced expression can the engineer write in the Responder policy to invoke rate limiting?

A.
SYS.CHECK_LIMIT(“rl_maxrequests”)
A.
SYS.CHECK_LIMIT(“rl_maxrequests”)
Answers
B.
SYS.CHECK_LIMIT(“rl_maxrequests”).CONTAINS(“Busy”)
B.
SYS.CHECK_LIMIT(“rl_maxrequests”).CONTAINS(“Busy”)
Answers
C.
SYS.CHECK_LIMIT(“rl_maxrequests”).IS_VALID
C.
SYS.CHECK_LIMIT(“rl_maxrequests”).IS_VALID
Answers
D.
SYS.CHECK_LIMIT(“rl_maxrequests”).GE(3000)
D.
SYS.CHECK_LIMIT(“rl_maxrequests”).GE(3000)
Answers
Suggested answer: A

Explanation:

Reference: https://support.citrix.com/article/CTX134009

Scenario: A Citrix Engineer is asked to implement multi-factor authentication for Citrix Gateway. The engineer creates the authentication policies and binds the policies to the appropriate bind points. The engineer creates a custom form using Notepad++ to format the page which will capture the user’s credentials.

What is the first step the engineer must perform to assign this form to the authentication process?

A.
Create a login schema policy and bind it to the authentication virtual server.
A.
Create a login schema policy and bind it to the authentication virtual server.
Answers
B.
Bind the authentication policy to the primary authentication bank of the Citrix Gateway
B.
Bind the authentication policy to the primary authentication bank of the Citrix Gateway
Answers
C.
Create a login schema profile and select the uploaded file.
C.
Create a login schema profile and select the uploaded file.
Answers
D.
Create an authentication policy label and bind it to an authentication policy.
D.
Create an authentication policy label and bind it to an authentication policy.
Answers
Suggested answer: D

What should a Citrix Engineer do when using the Learn feature for Start URL relaxation?

A.
Ensure that only valid or correct traffic is directed to the protected web application while in Learn mode.
A.
Ensure that only valid or correct traffic is directed to the protected web application while in Learn mode.
Answers
B.
Invite at least 10 test users to collect sufficient data for the Learn feature.
B.
Invite at least 10 test users to collect sufficient data for the Learn feature.
Answers
C.
Create a Web App Firewall policy that blocks unwanted traffic.
C.
Create a Web App Firewall policy that blocks unwanted traffic.
Answers
D.
Ensure that the /var file system has at least 10 MB free.
D.
Ensure that the /var file system has at least 10 MB free.
Answers
Suggested answer: A
Total 68 questions
Go to page: of 7