ExamGecko
Home Home / Citrix / 1Y0-440

Citrix 1Y0-440 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions







Scenario: A Citrix Architect has implemented two high availability pairs of MPX 5500 and MPX 11500 devices respectively with 12.0.53.13 nc version. The Citrix ADC devices are set up to handle Citrix Gateway. Load Balancing. Application Firewall, and Content Switching. The Workspacelab infrastructure is set up to be monitored with Citrix Application Delivery Management version 12.0.53.13 nc by the Workspacelab administrators. The Workspacelab team wants to implement one more pair(s) of Citrix ADC MPX 7500 devices with version 12.0.53.13 nc. The Citrix consulting team has assigned the task to implement these Citrix ADC devices in the infrastructure and set them up to be monitored and managed by Citrix ADC Management and Analytics {Citrix Application Delivery Management). The following are the requirements that were discussed during the project initiation call: Citrix Application Delivery Management should be configured to get the infrastructure information under sections such as HDX Insight, WEB Insight, and Security Insight. Configuration on the new MPX devices should be identical to that of MPX 11500 devices. Configuration changes after the deployment and initial setup should be optimized using Citrix Application Delivery Management. Citrix Application Delivery Management should be utilized to configure templates that can be utilized by the Workspacelab team in future deployments. As per the requirement from the Workspacelab team, Citrix Application Delivery Management should store the audited data for only 15 days. However, the architect is NOT able to view any Information under Analytics. What should the architect do to fix this issue?




Scenario: A Citrix Architect holds a design discussion with a team of Workspacelab members, and they capture the following requirements for the Citrix ADC design project:

A pair of Citrlx ADC MPX appliances will be deployed in the DMZ network and another pair in the internal network.

High availability will be accessible between the pair of Citrix ADC MPX appliances in the DMZ network.

Multi-factor authentication must be configured for the Citrix Gateway virtual server.

The Citrix Gateway virtual server is integrated with the StoreFront server.

Load balancing must be configured for the StoreFront server. *Authentication must be deployed for users from the workspacelab.com domain.

The Workspacelab users should be authenticated using Cert Policy and LDAP.

All the client certificates must be SHA 256-signed, 2048 bits, and have UserPrincipalName as the subject.

Single Sign-on must be performed between StoreFront and Citrix Gateway. After deployment the architect observes that LDAP authentication is failing.

Click the Exhibit button to review the output of aaad.debug and the configuration of the authentication policy.

What is causing this issue?

A.
IdapLoginName is set as sAMAccountName
A.
IdapLoginName is set as sAMAccountName
Answers
B.
UserNamefield is set as subjecticn
B.
UserNamefield is set as subjecticn
Answers
C.
Password used is incorrect
C.
Password used is incorrect
Answers
D.
User does NOT exist in database
D.
User does NOT exist in database
Answers
Suggested answer: B

Scenario: A Citrix Architect needs to design a new solution within Microsoft Azure. The architect would like to create a highly available Citrix ADC VPX pair to provide load balancing for applications hosted in the Azure deployment which will receive traffic arriving from the Internet. In order to maximize its investment, the organization would like both Citrix ADC VPX instances to actively load-balance connection requests. Which two approaches are possible solutions for the architect to use to design the solution? (Choose two.)

A.
Purchase two standalone Citrix ADC instances in the Microsoft Azure marketplace, then deploy them as a cluster.
A.
Purchase two standalone Citrix ADC instances in the Microsoft Azure marketplace, then deploy them as a cluster.
Answers
B.
Purchase two standalone Citrix ADC instances in the Microsoft Azure marketplace, deploy them, then use an external Azure load balancer to distribute client traffic across both instances.
B.
Purchase two standalone Citrix ADC instances in the Microsoft Azure marketplace, deploy them, then use an external Azure load balancer to distribute client traffic across both instances.
Answers
C.
Purchase a Citrix ADC HA Pair in the Microsoft Azure marketplace, then deploy them as an Active-Active GSLB configuration.
C.
Purchase a Citrix ADC HA Pair in the Microsoft Azure marketplace, then deploy them as an Active-Active GSLB configuration.
Answers
D.
Purchase two standalone Citrix ADC instances in the Microsoft Azure marketplace, then deploy them as an Active-Passive high availability pair.
D.
Purchase two standalone Citrix ADC instances in the Microsoft Azure marketplace, then deploy them as an Active-Passive high availability pair.
Answers
E.
Purchase a Citrix ADC HA Pair in the Microsoft Azure marketplace, then deploy them as an Active-Passive high availability pair.
E.
Purchase a Citrix ADC HA Pair in the Microsoft Azure marketplace, then deploy them as an Active-Passive high availability pair.
Answers
Suggested answer: B, C

Scenario: A Citrix Architect has configured two MPX devices in high availability mode with version 12.0.53.13 nc. After a discussion with the security team, the architect enabled the Application Firewall feature for additional protection.

In the initial deployment phase, the following security features were enabled:

IP address reputation

HTML SQL injection check

Start URL

HTML Cross-site scripting

Form-field consistency

After deployment in pre-production, the team identifies the following additional security features and changes as further requirements:

Application Firewall should retain the response of form field in its memory. When a client submits the form in the request, Application Firewall should check for inconsistencies in the request before sending it to the web server.

All the requests dropped by Application Firewall should get a pre-configured HTML error page with appropriate information.

The Application Firewall profile should be able to handle the data from the RSS feed and an ATOM-based site. Click the Exhibit button to view an excerpt of the existing configuration.

What should the architect do to meet these requirements?

A.
Configure a new profile with web 2.0 and use the previously used Application Firewall security checks.
A.
Configure a new profile with web 2.0 and use the previously used Application Firewall security checks.
Answers
B.
Configure a new HTML profile and use previously used Application Firewall security checks.
B.
Configure a new HTML profile and use previously used Application Firewall security checks.
Answers
C.
Configure a new profile with XML and use previously used Application Firewall security checks.
C.
Configure a new profile with XML and use previously used Application Firewall security checks.
Answers
D.
Modify an existing HTML profile and disable 'Drop invalid security check'
D.
Modify an existing HTML profile and disable 'Drop invalid security check'
Answers
Suggested answer: A

Which response is returned by the Citrix ADC, if a negative response is present in the local cache?

A.
NXDOMAIN
A.
NXDOMAIN
Answers
B.
NXDATA
B.
NXDATA
Answers
C.
NODOMAIN
C.
NODOMAIN
Answers
D.
NO DATA
D.
NO DATA
Answers
Suggested answer: A

Which statement is applicable to Citrix Gateway split tunneling?

A.
If you set split tunneling to reverse, the Citrix ADC Gateway plug-in sends only traffic destined for networks protected by Citrix ADC Gateway through the VPN tunnel. The Citrix ADC Gateway plug-in does NOT send network traffic destined for unprotected networks to Citrix ADC Gateway.
A.
If you set split tunneling to reverse, the Citrix ADC Gateway plug-in sends only traffic destined for networks protected by Citrix ADC Gateway through the VPN tunnel. The Citrix ADC Gateway plug-in does NOT send network traffic destined for unprotected networks to Citrix ADC Gateway.
Answers
B.
If you set split tunneling to reverse, the intranet applications define the network traffic that Citrix ADC Gateway does NOT intercept.
B.
If you set split tunneling to reverse, the intranet applications define the network traffic that Citrix ADC Gateway does NOT intercept.
Answers
C.
If you enable split tunneling, the intranet applications define the network traffic that Citrix ADC Gateway does NOT intercept.
C.
If you enable split tunneling, the intranet applications define the network traffic that Citrix ADC Gateway does NOT intercept.
Answers
D.
If you enable split tunneling, the Citrix ADC Gateway plug-in captures all network traffic originating from a user device and sends the traffic through the VPN tunnel to Citrix ADC Gateway.
D.
If you enable split tunneling, the Citrix ADC Gateway plug-in captures all network traffic originating from a user device and sends the traffic through the VPN tunnel to Citrix ADC Gateway.
Answers
E.
If you set split tunneling to reverse, the Citrix ADC Gateway plug-in captures all network traffic originating from a user device and sends the traffic through the VPN tunnel to Citrix ADC Gateway.
E.
If you set split tunneling to reverse, the Citrix ADC Gateway plug-in captures all network traffic originating from a user device and sends the traffic through the VPN tunnel to Citrix ADC Gateway.
Answers
Suggested answer: B

Scenario: A Citrix Architect needs to assess an existing Citrix ADC configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production Citrix ADC appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production Citrix ADC deployment.

To align the command policy configuration with the security requirements of the organization, the__________for________________should change. (Choose the correct option to complete the sentence.)

A.
command spec; Item 6
A.
command spec; Item 6
Answers
B.
priority; Item 5
B.
priority; Item 5
Answers
C.
command spec; Item 3
C.
command spec; Item 3
Answers
D.
action; Item 4
D.
action; Item 4
Answers
E.
priority; Item 2
E.
priority; Item 2
Answers
F.
action; Item 1
F.
action; Item 1
Answers
Suggested answer: E

Scenario: A Citrix Architect needs to plan for a customer environment in which more than 10,000 users will need access. The networking infrastructure needs to be able to handle the expected usage.

Which business driver should be prioritized based on the customer's requirement?

A.
Increase flexibility
A.
Increase flexibility
Answers
B.
Enable mobile work styles
B.
Enable mobile work styles
Answers
C.
Simplify management
C.
Simplify management
Answers
D.
Increase Scalability
D.
Increase Scalability
Answers
E.
Reduce Costs
E.
Reduce Costs
Answers
F.
Increase Security
F.
Increase Security
Answers
Suggested answer: A, E

Scenario: A Citrix Architect needs to assess an existing Citrix ADC configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production Citrix ADC appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production Citrix ADC deployment.

To align the command policy configuration with the security requirements of the organization, the__________for________________should change. (Choose the correct option to complete the sentence.)

A.
command spec; Item 6
A.
command spec; Item 6
Answers
B.
priority; Item 5
B.
priority; Item 5
Answers
C.
command spec; Item 3
C.
command spec; Item 3
Answers
D.
action; Item 4
D.
action; Item 4
Answers
E.
priority; Item 2
E.
priority; Item 2
Answers
F.
action; Item 1
F.
action; Item 1
Answers
Suggested answer: A

Which four parameters can a Citrix Architect change after the initial creation of a session profile? (Choose four.)

A.
Credential Index
A.
Credential Index
Answers
B.
Default Authorization Action
B.
Default Authorization Action
Answers
C.
ICA Proxy Migration
C.
ICA Proxy Migration
Answers
D.
Session Timeout
D.
Session Timeout
Answers
E.
Expression
E.
Expression
Answers
F.
Name
F.
Name
Answers
G.
Enable Persistent Cookie
G.
Enable Persistent Cookie
Answers
Suggested answer: A, B, D, G

A Citrix Architect needs to evaluate and define the architecture and operational processes required to implement and maintain the production environment. In which two phases of the Citrix Methodology will the architect define this? (Choose two.)

A.
Design
A.
Design
Answers
B.
Define
B.
Define
Answers
C.
Manage
C.
Manage
Answers
D.
Deploy
D.
Deploy
Answers
E.
Assess
E.
Assess
Answers
Suggested answer: A, C
Total 152 questions
Go to page: of 16