ExamGecko
Home / Citrix / 1Y0-440 / List of questions
Ask Question

Citrix 1Y0-440 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

Scenario: A Citrix Architect holds a design discussion with a team of Workspacelab members, and they capture the following requirements for the Citrix ADC design project:

A pair of Citrlx ADC MPX appliances will be deployed in the DMZ network and another pair in the internal network.

High availability will be accessible between the pair of Citrix ADC MPX appliances in the DMZ network.

Multi-factor authentication must be configured for the Citrix Gateway virtual server.

The Citrix Gateway virtual server is integrated with the StoreFront server.

Load balancing must be configured for the StoreFront server. *Authentication must be deployed for users from the workspacelab.com domain.

The Workspacelab users should be authenticated using Cert Policy and LDAP.

All the client certificates must be SHA 256-signed, 2048 bits, and have UserPrincipalName as the subject.

Single Sign-on must be performed between StoreFront and Citrix Gateway. After deployment the architect observes that LDAP authentication is failing.

Click the Exhibit button to review the output of aaad.debug and the configuration of the authentication policy.

Citrix 1Y0-440 image Question 111 21703 09162024192802000000

Citrix 1Y0-440 image Question 111 21703 09162024192802000000

What is causing this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 112

Report Export Collapse

Scenario: A Citrix Architect needs to design a new solution within Microsoft Azure. The architect would like to create a highly available Citrix ADC VPX pair to provide load balancing for applications hosted in the Azure deployment which will receive traffic arriving from the Internet. In order to maximize its investment, the organization would like both Citrix ADC VPX instances to actively load-balance connection requests. Which two approaches are possible solutions for the architect to use to design the solution? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 113

Report Export Collapse

Scenario: A Citrix Architect has configured two MPX devices in high availability mode with version 12.0.53.13 nc. After a discussion with the security team, the architect enabled the Application Firewall feature for additional protection.

In the initial deployment phase, the following security features were enabled:

IP address reputation

HTML SQL injection check

Start URL

HTML Cross-site scripting

Form-field consistency

After deployment in pre-production, the team identifies the following additional security features and changes as further requirements:

Application Firewall should retain the response of form field in its memory. When a client submits the form in the request, Application Firewall should check for inconsistencies in the request before sending it to the web server.

All the requests dropped by Application Firewall should get a pre-configured HTML error page with appropriate information.

The Application Firewall profile should be able to handle the data from the RSS feed and an ATOM-based site. Click the Exhibit button to view an excerpt of the existing configuration.

Citrix 1Y0-440 image Question 113 21705 09162024192802000000

What should the architect do to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 114

Report Export Collapse

Which response is returned by the Citrix ADC, if a negative response is present in the local cache?

Become a Premium Member for full access
  Unlock Premium Member

Question 115

Report Export Collapse

Which statement is applicable to Citrix Gateway split tunneling?

Become a Premium Member for full access
  Unlock Premium Member

Question 116

Report Export Collapse

Scenario: A Citrix Architect needs to assess an existing Citrix ADC configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production Citrix ADC appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production Citrix ADC deployment.

Citrix 1Y0-440 image Question 116 21708 09162024192802000000

To align the command policy configuration with the security requirements of the organization, the__________for________________should change. (Choose the correct option to complete the sentence.)

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

Scenario: A Citrix Architect needs to plan for a customer environment in which more than 10,000 users will need access. The networking infrastructure needs to be able to handle the expected usage.

Which business driver should be prioritized based on the customer's requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

Scenario: A Citrix Architect needs to assess an existing Citrix ADC configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production Citrix ADC appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production Citrix ADC deployment.

Citrix 1Y0-440 image Question 118 21710 09162024192802000000

To align the command policy configuration with the security requirements of the organization, the__________for________________should change. (Choose the correct option to complete the sentence.)

Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

Which four parameters can a Citrix Architect change after the initial creation of a session profile? (Choose four.)

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

A Citrix Architect needs to evaluate and define the architecture and operational processes required to implement and maintain the production environment. In which two phases of the Citrix Methodology will the architect define this? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 152 questions
Go to page: of 16
Search

Related questions

Scenario: A Citrix Architect has deployed two MPX devices, 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm. and the devices are installed behind a CISCO ASA 5585 firewall. The architect enables the following features on the Citrix ADC devices: Content Switching. SSL Offloading, Load Balancing, Citrix Gateway, Application Firewall in hybrid security, and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server. The following requirements were discussed during the implementation: All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration. All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS. Single Sign-on should be created for Microsoft Outlook web access (OWA). Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC, when users hit the Logoff button in Microsoft Outlook web access. Users should be able to authenticate using user principal name (UPN). The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers, and the monitor probes must be sent on SSL. <a target='_blank' href=' http://mail.citrix.com/'>Which Responder policy can be utilized to redirect the users from http://mail.citrix.com to https://mail.citrix.com/owa?</a>