ExamGecko

Citrix 1Y0-440 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions

Scenario: A Citrix Architect has deployed two MPX devices, 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm. and the devices are installed behind a CISCO ASA 5585 firewall. The architect enables the following features on the Citrix ADC devices: Content Switching. SSL Offloading, Load Balancing, Citrix Gateway, Application Firewall in hybrid security, and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server. The following requirements were discussed during the implementation: All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration. All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS. Single Sign-on should be created for Microsoft Outlook web access (OWA). Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC, when users hit the Logoff button in Microsoft Outlook web access. Users should be able to authenticate using user principal name (UPN). The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers, and the monitor probes must be sent on SSL. <a target='_blank' href=' http://mail.citrix.com/'>Which Responder policy can be utilized to redirect the users from http://mail.citrix.com to https://mail.citrix.com/owa?</a>










Question 101

Report
Export
Collapse

Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion. They have captured the following requirements for the Citrix ADC design project:

* The Citrix Gateway virtual server is integrated with the Citrix Virtual Apps and Desktops environment.

<a target='_blank' href='http://workspacelab.com/'>* The authentication must be deployed for the users from the workspacelab.com and vendorlab.com domains.</a>

* The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP.

* The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS

* The vendorlab users should be authenticated using Active Directory Federation Service.

* The user credentials must NOT be shared between workspacelab and vendor) ab.

* Single Sign-on must be performed between F and Citrix Gateway.

* A domain drop down list must be provided if the user connects to the Citrix Gateway virtual server externally.

* The domain of the user connecting externally must be identified using the domain selected from the domain drop down.

At which bind point should the architect bind the domain drop-down schema policy?

A.
Citrix Gateway virtual server
A.
Citrix Gateway virtual server
Answers
B.
AAA User Group
B.
AAA User Group
Answers
C.
StoreFront Authentication
C.
StoreFront Authentication
Answers
D.
Authentication virtual server
D.
Authentication virtual server
Answers
E.
Global Authentication
E.
Global Authentication
Answers
Suggested answer: D
asked 16/09/2024
Mattie Hendricks
46 questions

Question 102

Report
Export
Collapse

Scenario: A Citrix Architect has deployed Citrix Gateway integration with the StoreFront server. The Vasco server is used to perform WebAUTH to authenticate users The configuration snippet is as follows:

Which parameter is utilized to calculate the content-length insert in the request sent to the server?

A.
successRule
A.
successRule
Answers
B.
Expl
B.
Expl
Answers
C.
POST expresston
C.
POST expresston
Answers
D.
Exp2
D.
Exp2
Answers
Suggested answer: D
asked 16/09/2024
Anu V
34 questions

Question 103

Report
Export
Collapse

A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a Citrix ADC____deployed________. (Choose the correct option to complete sentence:

A.
MPX; In high availability
A.
MPX; In high availability
Answers
B.
CPX: without partitions
B.
CPX: without partitions
Answers
C.
CPX; In high availability
C.
CPX; In high availability
Answers
D.
MPX; as a cluster Instance
D.
MPX; as a cluster Instance
Answers
E.
SDX; with more than 6 partitions
E.
SDX; with more than 6 partitions
Answers
Suggested answer: A
asked 16/09/2024
Veridjan Hoxha
36 questions

Question 104

Report
Export
Collapse

Scenario: A Citrix Architect and a team of Workspacelab members met to discuss requirements during the design discussion for a Citrix ADC design project. Specifically, the existing Citrix ADC Configuration must be modified to meet the following authentication conditions:

* Provide users with domain drop-down page

* If the users select workspacelab.com. perform single factor authentication using LDAP

* It the users select AAATM.COM, perform two factor authentication using LDAP and RADIUS

* If the users select NSI-TEST. COM. perform SAML authentication using ADFS

What should the architect use to bind the AAA virtual server to the Citrix Gateway virtual server?

A.
302 based redirect
A.
302 based redirect
Answers
B.
401 based binding
B.
401 based binding
Answers
C.
Form based binding
C.
Form based binding
Answers
D.
Authentication Profile
D.
Authentication Profile
Answers
Suggested answer: D
asked 16/09/2024
Osman Rana
38 questions

Question 105

Report
Export
Collapse

Scenario: A Citrix Architect needs to design a new multi-datacenter Citrix ADC deployment. The customer wants Citrix ADC to provide access to various backend resources by using Global Server Load Balancing (GSLB) in an Active-Active deployment. Click the Exhibit button to view additional requirements identified by the architect.

Which GSLB algorithm or method should the architect use for the deployment based on the stated requirements?

A.
Dynamic round trip time (RTT)
A.
Dynamic round trip time (RTT)
Answers
B.
Least response time
B.
Least response time
Answers
C.
Least packets
C.
Least packets
Answers
D.
Source IP hash
D.
Source IP hash
Answers
E.
Static proximity
E.
Static proximity
Answers
F.
Least connections
F.
Least connections
Answers
Suggested answer: E
asked 16/09/2024
Phuong Pham
40 questions

Question 106

Report
Export
Collapse

Which session parameter does the default authorization setting control when authentication, authorization, and auditing profiles are configured?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 107

Report
Export
Collapse

Scenario: A Citrix Architect needs to design a new Citrix Gateway deployment. During the design discussions, the architect documents the key requirements about when to provide VPN access for incoming connections to the Citrix Gateway virtual server. Click the Exhibit button to view the requirements.

Which policy expression will meet these requirements?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 108

Report
Export
Collapse

A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a Citrix ADC _________deployed_________. (Choose the correct option to complete sentence.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 109

Report
Export
Collapse

Which two methods can a Citrix Architect use to create a Heat Orchestration template? (Choose two)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 110

Report
Export
Collapse

Which two parameters must a Citrix Architect specify in the configuration job to replicate a specific configuration snippet from one Crtnx ADC instance to multiple instances? (Choose two.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 152 questions
Go to page: of 16