ExamGecko
Home Home / Citrix / 1Y0-440

Citrix 1Y0-440 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions







Scenario: A Citrix Architect has implemented two high availability pairs of MPX 5500 and MPX 11500 devices respectively with 12.0.53.13 nc version. The Citrix ADC devices are set up to handle Citrix Gateway. Load Balancing. Application Firewall, and Content Switching. The Workspacelab infrastructure is set up to be monitored with Citrix Application Delivery Management version 12.0.53.13 nc by the Workspacelab administrators. The Workspacelab team wants to implement one more pair(s) of Citrix ADC MPX 7500 devices with version 12.0.53.13 nc. The Citrix consulting team has assigned the task to implement these Citrix ADC devices in the infrastructure and set them up to be monitored and managed by Citrix ADC Management and Analytics {Citrix Application Delivery Management). The following are the requirements that were discussed during the project initiation call: Citrix Application Delivery Management should be configured to get the infrastructure information under sections such as HDX Insight, WEB Insight, and Security Insight. Configuration on the new MPX devices should be identical to that of MPX 11500 devices. Configuration changes after the deployment and initial setup should be optimized using Citrix Application Delivery Management. Citrix Application Delivery Management should be utilized to configure templates that can be utilized by the Workspacelab team in future deployments. As per the requirement from the Workspacelab team, Citrix Application Delivery Management should store the audited data for only 15 days. However, the architect is NOT able to view any Information under Analytics. What should the architect do to fix this issue?




A Citrix Architect has deployed NetScaler Management and Analytics System (NMAS) to monitor a high availability pair of NetScaler VPX devices.

The architect needs to deploy automated configuration backup to meet the following requirements:

The configuration backup file must be protected using a password.

The configuration backup must be performed each day at 8:00 AM GMT.

The configuration backup must also be performed if any changes are made in the ns.conf file.

Once the transfer is successful, auto-delete the configuration file from the NMAS.

Which SNMP trap will trigger the configuration file backup?

A.
netScalerConfigSave
A.
netScalerConfigSave
Answers
B.
sysTotSaveConfigs
B.
sysTotSaveConfigs
Answers
C.
netScalerConfigChange
C.
netScalerConfigChange
Answers
D.
sysconfigSave
D.
sysconfigSave
Answers
Suggested answer: A

A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a NetScaler_________deployed_________. (Choose the correct option to complete sentence.)

A.
CPX; as part of a high availability pair
A.
CPX; as part of a high availability pair
Answers
B.
CPX; as a stand alone device
B.
CPX; as a stand alone device
Answers
C.
SDX; with less than 6 partitions and dedicated management interface
C.
SDX; with less than 6 partitions and dedicated management interface
Answers
D.
MPX; as part of the cluster but Cluster IP is NOT configured
D.
MPX; as part of the cluster but Cluster IP is NOT configured
Answers
E.
SDX; with no partitions as a stand alone device
E.
SDX; with no partitions as a stand alone device
Answers
Suggested answer: C

Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.

The requirements captured during the design discussion held for a NetScaler design project are as follows:

Two (2) pairs of NetScaler MPX appliances deployed in the DMZ and internal network.

High Availability will be accessible for each NetScaler MPX

The external NetScaler MPX appliance will be deployed in multi-arm mode.

The internal NetScaler MPX will be deployed in single-arm mode wherein it will be connected to Cisco ACI Fabric.

All three (3) Workspacelab sites: Dc, NDR and DR, will have similar NetScaler configurations and design.

How many NetScaler MPX appliances should the architect deploy at each site to meet the design requirements above?

A.
4
A.
4
Answers
B.
12
B.
12
Answers
C.
6
C.
6
Answers
D.
2
D.
2
Answers
Suggested answer: C

Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a NetScaler design project. They captured the following requirements from this design discussion:

A pair of NetScaler MPX appliances will be deployed in the DMZ network.

High Availability will be accessible in the NetScaler MPX in the DMZ Network.

Load balancing should be performed for the internal network services like Microsoft Exchange Client Access Services and Microsoft App-V.

The load balancing should be performed for StoreFront.

The NetScaler Gateway virtual server will be utilizing the StoreFront load-balancing virtual server.

The NetScaler Gateway virtual server and StoreFront.

The NetScaler Gateway virtual service and StoreFront and load-balancing services are publicly accessible.

The traffic for internal and external services must be isolated.

Click the Exhibit button to review the logical network diagram.

Which two design decisions are incorrect based on these requirements? (Choose two.)

A.
LB StoreFront bound to traffic Domain 0
A.
LB StoreFront bound to traffic Domain 0
Answers
B.
NetScaler Gateway VIP bound to Traffic Domain 1
B.
NetScaler Gateway VIP bound to Traffic Domain 1
Answers
C.
LB APP-V bound to Traffic Domain 1
C.
LB APP-V bound to Traffic Domain 1
Answers
D.
SNIP 192.168.20.2 bound to Traffic Domain 1
D.
SNIP 192.168.20.2 bound to Traffic Domain 1
Answers
Suggested answer: A, B

Scenario: A Citrix Architect needs to plan for a customer environment in which more than 10,000 users will need access. The networking infrastructure needs to be able to handle the expected usage.

Which business driver should be prioritized based on the customer's requirement?

A.
Increase flexibility
A.
Increase flexibility
Answers
B.
Enable mobile work styles
B.
Enable mobile work styles
Answers
C.
Simplify management
C.
Simplify management
Answers
D.
Increase Scalability
D.
Increase Scalability
Answers
E.
Reduce Costs
E.
Reduce Costs
Answers
F.
Increase Security
F.
Increase Security
Answers
Suggested answer: D

Scenario: A Citrix Architect needs to deploy SAML integration between NetScaler (Identity Provider) and ShareFile (Service Provider). The design requirements for SAML setup are as follows:

NetScaler must be deployed as the Identity Provider (IDP).

ShareFile server must be deployed as the SAML Service Provider (SP).

The users in domain workspacelab.com must be able to perform Single Sign-on to ShareFile after authenticating at the NetScaler.

The User ID must be UserPrincipalName.

The User ID and Password must be evaluated by NetScaler against the Active Directory servers SFO-ADS-001 and SFO-ADS-002.

After successful authentication, NetScaler creates a SAML Assertion and passes it back to ShareFile.

Single Sign-on must be performed.

SHA 1 algorithm must be utilized.

The verification environment details are as follows:

Domain Name: workspacelab.com

NetScaler AAA virtual server URL https://auth.workspacelab.com

ShareFile URL https://sharefile.workspacelab.com

Which SAML IDP action will meet the design requirements?

A.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL ''https://auth.workspacelab.com/samIIssueName auth.workspacelab.com -signatureAlg RSA-SHA256-digestMethod SHA256-encryptAssertion ON -serviceProviderUD sharefile.workspacelad.com
A.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL ''https://auth.workspacelab.com/samIIssueName auth.workspacelab.com -signatureAlg RSA-SHA256-digestMethod SHA256-encryptAssertion ON -serviceProviderUD sharefile.workspacelad.com
Answers
B.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs'' --samIIssuerName sharefile.workspacelab.com --signatureAlg RSA-SHA256 --digestMethod SHA256 --serviceProviderID sharefile.workspacelab.com
B.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs'' --samIIssuerName sharefile.workspacelab.com --signatureAlg RSA-SHA256 --digestMethod SHA256 --serviceProviderID sharefile.workspacelab.com
Answers
C.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs'' --samIIssuerName auth.workspacelab.com --signatureAlg RSA-SHA1-digestMethod SHA1 --encryptAssertion ON --serviceProviderID sharefile.workspacelab.com
C.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs'' --samIIssuerName auth.workspacelab.com --signatureAlg RSA-SHA1-digestMethod SHA1 --encryptAssertion ON --serviceProviderID sharefile.workspacelab.com
Answers
D.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs'' --samIIssuerName sharefile.workspacelab.com --signatureAlg RSA-SHA1 --digestMethod SHA1 --encryptAssertion ON --serviceProviderID sharefile.workspacelab.com
D.
add authentication samIIdPProfile SAMI-IDP --samISPCertName Cert_1 --samIIdPCertName Cert_2 --assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs'' --samIIssuerName sharefile.workspacelab.com --signatureAlg RSA-SHA1 --digestMethod SHA1 --encryptAssertion ON --serviceProviderID sharefile.workspacelab.com
Answers
Suggested answer: C

What can help a Citrix Architect prepare to discuss time scales and resource requirements?

A.
Creating a high-level project plan.
A.
Creating a high-level project plan.
Answers
B.
Meeting with each member of the project team to assign tasks.
B.
Meeting with each member of the project team to assign tasks.
Answers
C.
Designing the new environment.
C.
Designing the new environment.
Answers
D.
Setting expectations with the project's key stakeholders.
D.
Setting expectations with the project's key stakeholders.
Answers
E.
Identifying challenges associated with the project.
E.
Identifying challenges associated with the project.
Answers
Suggested answer: A

Scenario: A Citrix Architect holds a design discussion with a team of Workspacelab members, and they capture the following requirements for the NetScaler design project.

A pair of NetScaler MPX appliances will be deployed in the DMZ network and another pair in the internal network.

High availability will be accessible between the pair of NetScaler MPX appliances in the DMZ network.

Multi-factor authentication must be configured for the NetScaler Gateway virtual server.

The NetScaler Gateway virtual server is integrated with the StoreFront server.

Load balancing must be deployed for users from the workspacelab.com domain.

The workspacelab users should be authenticated using Cert Policy and LDAP.

All the client certificates must be SHA 256-signed, 2048 bits, and have UserPrincipalName as the subject.

Single Sign-on must be performed between StoreFront and NetScaler Gateway.

After deployment, the architect observes that LDAP authentication is failing.

Click the Exhibit button to review the output of aaad debug and the configuration of the authentication policy.

Exhibit 1

Exhibit 2

What is causing this issue?

A.
UserNamefield is set as subjection
A.
UserNamefield is set as subjection
Answers
B.
Password used is incorrect
B.
Password used is incorrect
Answers
C.
User does NOT exist in database
C.
User does NOT exist in database
Answers
D.
IdapLoginName is set as sAMAccountName
D.
IdapLoginName is set as sAMAccountName
Answers
Suggested answer: A

Which markup language can a Citrix use along with NITRO API to create a StyleBook?

A.
GML
A.
GML
Answers
B.
XML
B.
XML
Answers
C.
HTML
C.
HTML
Answers
D.
YAML
D.
YAML
Answers
Suggested answer: D

Explanation:


Scenario: The Workspacelab team has configured their NetScaler Management and Analytics (NMAS) environment. A Citrix Architect needs to log on to the NMAS to check the settings.

Which two authentication methods are supported to meet this requirement? (Choose two.)

A.
Certificate
A.
Certificate
Answers
B.
RADIUS
B.
RADIUS
Answers
C.
TACACS
C.
TACACS
Answers
D.
Director
D.
Director
Answers
E.
SAML
E.
SAML
Answers
F.
AAA
F.
AAA
Answers
Suggested answer: B, C
Total 152 questions
Go to page: of 16