ExamGecko
Home Home / Citrix / 1Y0-440

Citrix 1Y0-440 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions







Scenario: A Citrix Architect has implemented two high availability pairs of MPX 5500 and MPX 11500 devices respectively with 12.0.53.13 nc version. The Citrix ADC devices are set up to handle Citrix Gateway. Load Balancing. Application Firewall, and Content Switching. The Workspacelab infrastructure is set up to be monitored with Citrix Application Delivery Management version 12.0.53.13 nc by the Workspacelab administrators. The Workspacelab team wants to implement one more pair(s) of Citrix ADC MPX 7500 devices with version 12.0.53.13 nc. The Citrix consulting team has assigned the task to implement these Citrix ADC devices in the infrastructure and set them up to be monitored and managed by Citrix ADC Management and Analytics {Citrix Application Delivery Management). The following are the requirements that were discussed during the project initiation call: Citrix Application Delivery Management should be configured to get the infrastructure information under sections such as HDX Insight, WEB Insight, and Security Insight. Configuration on the new MPX devices should be identical to that of MPX 11500 devices. Configuration changes after the deployment and initial setup should be optimized using Citrix Application Delivery Management. Citrix Application Delivery Management should be utilized to configure templates that can be utilized by the Workspacelab team in future deployments. As per the requirement from the Workspacelab team, Citrix Application Delivery Management should store the audited data for only 15 days. However, the architect is NOT able to view any Information under Analytics. What should the architect do to fix this issue?




Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose Two)

A.
The Service is receiving more than 480 requests per second
A.
The Service is receiving more than 480 requests per second
Answers
B.
The new service request rate is slower than the actual request rate
B.
The new service request rate is slower than the actual request rate
Answers
C.
The Service does not receive traffic for four successive increment intervals
C.
The Service does not receive traffic for four successive increment intervals
Answers
D.
The request rate has been incremented 200 times
D.
The request rate has been incremented 200 times
Answers
E.
The percentage of traffic that the new service must receive is greater than or equal to 100.
E.
The percentage of traffic that the new service must receive is greater than or equal to 100.
Answers
Suggested answer: D, E

Scenario: A Citrix Architect has deployed an authentication setup for the load balancing virtual server for the SAP application. The authentication is being performed using RADIUS and LDAP. RADIUS is the first factor, and LDAP is the second factor in the authentication. The Single Sign-on with SAP application should be performed using LDAP credentials. Which session profile should be used to perform the Single Sign-on?

A.
add tm sessionAction prof -sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential PRIMARY -httpOnlyCookie NO
A.
add tm sessionAction prof -sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential PRIMARY -httpOnlyCookie NO
Answers
B.
add vpn sessionAction prof-sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential SECONDARY -httpOnlyCookie NO
B.
add vpn sessionAction prof-sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential SECONDARY -httpOnlyCookie NO
Answers
C.
add vpn sessionAction prof -sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential PRIMARY -httpOnlyCookie NO
C.
add vpn sessionAction prof -sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential PRIMARY -httpOnlyCookie NO
Answers
D.
add tm sessionAction prof -sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential SECONDARY -httpOnlyCookie NO
D.
add tm sessionAction prof -sessTimeout 30 -defaultAuthorizationAction ALLOW -SSO ON -ssoCredential SECONDARY -httpOnlyCookie NO
Answers
Suggested answer: D

Which three steps should a Citrix Architect complete to configure session settings for different user accounts or groups? (Choose three.)

A.
Bind a profile to the authentication virtual server that handles the traffic to which the architect wants to apply the policy.
A.
Bind a profile to the authentication virtual server that handles the traffic to which the architect wants to apply the policy.
Answers
B.
Create policies to select the connections to which to apply particular profiles and bind the policies to users or groups.
B.
Create policies to select the connections to which to apply particular profiles and bind the policies to users or groups.
Answers
C.
Create a profile for each user account or group for which the architect wants to configure custom session settings.
C.
Create a profile for each user account or group for which the architect wants to configure custom session settings.
Answers
D.
Customize the default settings for sessions with the global session settings.
D.
Customize the default settings for sessions with the global session settings.
Answers
E.
Bind a policy to the authentication virtual server that handles the traffic to which the architect wants to apply the profile.
E.
Bind a policy to the authentication virtual server that handles the traffic to which the architect wants to apply the profile.
Answers
Suggested answer: B, C, E

Scenario: A Citrix Architect needs to deploy Single Sign-on form-based authentication through Citrix ADC for Outlook Web Access (OWA) 2013 for the users of the domain workspacelab com The Single Sign-on (SSO) must be performed based on sAMAccountName.

Which SSO action can the architect use to meet this requirement?

A.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa' -userField username -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIE(V,cadata\M).VALUE(\Mcadata\').LENGTH.GT(70)M -responsesize 15000000 -submrtMethod POST
A.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa' -userField username -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIE(V,cadata\M).VALUE(\Mcadata\').LENGTH.GT(70)M -responsesize 15000000 -submrtMethod POST
Answers
B.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/auth.owa' -userField user -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIEC'cadataV) VALUE(\'cadata\').LENGTH.GT(70)' -responsesize 15000000 -submrtMethod GET
B.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/auth.owa' -userField user -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIEC'cadataV) VALUE(\'cadata\').LENGTH.GT(70)' -responsesize 15000000 -submrtMethod GET
Answers
C.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/owa.aspx' -userField usemame -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIE(\'cadata\') VALUE(\ncadata\') LENGTH.GT(70)' -responsesize 150 -submrtMethod POST
C.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/owa.aspx' -userField usemame -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIE(\'cadata\') VALUE(\ncadata\') LENGTH.GT(70)' -responsesize 150 -submrtMethod POST
Answers
D.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/auth owa' -userField usemame -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIE(V'cadataV,)VALUE(V,cadata\') LENGTH GT(70)M -responsesize 15000000 -submrtMethod POST
D.
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/auth owa' -userField usemame -passwdField password -ssoSuccessRule 'http RES SET_COOKIE COOKIE(V'cadataV,)VALUE(V,cadata\') LENGTH GT(70)M -responsesize 15000000 -submrtMethod POST
Answers
Suggested answer: D

Explanation:

add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/auth.owa' -userField username -passwdField password -ssoSuccessRule 'http.RES.SET_COOKIE.COOKIE(\'cadata\').VALUE(\'cadata\').LENGTH.GT(70' -responsesize 15000 -submitMethod POST

Scenario: A Citrix Architect captured the following requirements during a design discussion held for a Citrix ADC design project.

There will be a pair of Citrix ADC MPX appliances deployed in the DMZ and another pair deployed in the internal network

High availability will be accessible for each Citrix ADC MPX appliance in both the DMZ (external) and LAN (internal) networks

DMZ Citrix ADC MPX appliances will have GSLB configured and deployed in Active/Passive mode

Load balancing for the internal Microsoft Exchange servers will be configured on the internal Citrix ADC appliances

Load balancing for SAP application servers in the DMZ will be configured on the DMZ Citrix ADC appliances

For the DMZ Citrix ADC MPX pair, the data and management traffic will be sent over the same interface.

The DMZ Citrix ADC MPX pair will have three interfaces available.

The users from the DMZ should NOT have access to servers in the internal zone

Which deployment mode should the architect use to deploy the Citrix ADC pair in the DMZ?

A.
One-Arm Mode
A.
One-Arm Mode
Answers
B.
Two-Arm Mode
B.
Two-Arm Mode
Answers
C.
Hybrid Mode
C.
Hybrid Mode
Answers
D.
Transparent Mode
D.
Transparent Mode
Answers
Suggested answer: A

Scenario: A Citrix Architect has executed the following commands on the Citrix ADC:

In which scenario will the timeout work as configured?

A.
If a session is non-idle, then the client browser will send an HTTP Response in which the URL will contain UA!=
A.
If a session is non-idle, then the client browser will send an HTTP Response in which the URL will contain UA!=
Answers
B.
If a session is non-idle, then the client browser will send an HTTP Request in which the URL will contain UA=0'
B.
If a session is non-idle, then the client browser will send an HTTP Request in which the URL will contain UA=0'
Answers
C.
If a session is idle, then the client browser will keep on sending HTTP Requests in which URL will contain UA=0
C.
If a session is idle, then the client browser will keep on sending HTTP Requests in which URL will contain UA=0
Answers
D.
If a session is idle, then the client browser will keep on sending HTTP Responses in which URL will contain UA!=
D.
If a session is idle, then the client browser will keep on sending HTTP Responses in which URL will contain UA!=
Answers
Suggested answer: B

What are three potential risks when examining the disaster recovery plan and implementation for a company? (Choose three)

A.
Supporting infrastructure for proposed environment is NOT included in disaster recovery implementation
A.
Supporting infrastructure for proposed environment is NOT included in disaster recovery implementation
Answers
B.
A disaster recovery plan exists but has never been tested
B.
A disaster recovery plan exists but has never been tested
Answers
C.
A disaster recovery location does NOT exist.
C.
A disaster recovery location does NOT exist.
Answers
D.
Users require mobile devices with continuous access
D.
Users require mobile devices with continuous access
Answers
E.
Optimal Gateway Routing decisions are NOT understood
E.
Optimal Gateway Routing decisions are NOT understood
Answers
Suggested answer: A, B, C

Scenario: A Citrix Architect has set up Citrix ADC MPX devices in high availability mode with version 12.0.53.13 nc. These are placed behind a Cisco ASA 5505 firewall. The Cisco ASA firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.

The following requirements were captured by the architect during the discussion held as part of the Citrix ADC security implementation project with the customers security team:

The Citrix ADC MPX device:

should monitor the rate of traffic either on a specific virtual entity or on the device It should be able to mitigate the attacks from a hostile client sending a flood of requests. The Citrix ADC device should be able to stop the HTTP TCP. and DNS based requests

needs to protect backend servers from overloading

needs to queue all the incoming requests on the virtual server level instead of the service level

should provide access to resources on the basis of priority

should provide protection against well-known Windows exploits virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and phishing proxies

should provide flexibility to enforce the desired level of security check inspections for the requests originating from a specific geolocation database.

should block the traffic based on a pre-determined header length. URL length and cookie length. The device should ensure that characters such as a single straight quote ('): backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.

Which security feature should the architect configure to meet these requirements?

A.
Configure Application Firewall with HTML cross-site scripting to block unwanted traffic
A.
Configure Application Firewall with HTML cross-site scripting to block unwanted traffic
Answers
B.
Configure pattern sets using regular expressions to block attacks
B.
Configure pattern sets using regular expressions to block attacks
Answers
C.
Configure Signatures manually and apply them to the Application Firewall profile
C.
Configure Signatures manually and apply them to the Application Firewall profile
Answers
D.
Configure signatures to auto-update and apply them to the Application Firewall profile
D.
Configure signatures to auto-update and apply them to the Application Firewall profile
Answers
E.
Configure IP address reputation and use IPREP and webroot to block the traffic
E.
Configure IP address reputation and use IPREP and webroot to block the traffic
Answers
Suggested answer: A

Scenario: A Citrix Architect needs to assess a Citrix Gateway deployment that was recently completed by a customer and is currently in pre-production testing The Citrix Gateway needs to use ICA proxy to provide access to a Citrix Virtual Apps and Citrix Virtual Desktops environment. During the assessment, the customer informs the architect that users are NOT able to launch published resources using the Gateway virtual server.

Click the Exhibit button to view the troubleshooting details collected by the customer.

Which two reasons could cause this issue? (Choose two)

A.
The StoreFront URL configured in the Citrix Gateway session profile is NOT correct.
A.
The StoreFront URL configured in the Citrix Gateway session profile is NOT correct.
Answers
B.
The required ports have NOT been opened on the firewall between the Citrix Gateway and the Virtual Delivery Agent machines
B.
The required ports have NOT been opened on the firewall between the Citrix Gateway and the Virtual Delivery Agent machines
Answers
C.
There are no backend Virtual Delivery Agent (VDA) machines available to host the selected published resource
C.
There are no backend Virtual Delivery Agent (VDA) machines available to host the selected published resource
Answers
D.
The Secure Ticket Authority (STA) servers have NOT been configured in the Citrix Gateway settings
D.
The Secure Ticket Authority (STA) servers have NOT been configured in the Citrix Gateway settings
Answers
E.
The two-factor authentication is NOT configured on the Citrix Gateway
E.
The two-factor authentication is NOT configured on the Citrix Gateway
Answers
Suggested answer: B, D

Scenario: A Citrix Architect needs to design a new solution within Amazon Web Services (AWS) The architect would like to create a high availability Citrix ADC VPX pair to provide load balancing for applications hosted in the AWS deployment within a single availability zone which will receive traffic arriving from the Internet.

Which configuration should the architect choose to accomplish this?

A.
Two standalone Citrix ADC instances in the AWS marketplace, then deploy them as a cluster in the AWS management console
A.
Two standalone Citrix ADC instances in the AWS marketplace, then deploy them as a cluster in the AWS management console
Answers
B.
A Citrix ADC AWS-VPX Cluster using a Citrix CloudFormation template in the AWS marketplace, then deploy it to create an Active-Passive high availability pair
B.
A Citrix ADC AWS-VPX Cluster using a Citrix CloudFormation template in the AWS marketplace, then deploy it to create an Active-Passive high availability pair
Answers
C.
Two standalone Citrix ADC instances in the AWS marketplace, then deploy them as an Active-Passive high availability pair in the AWS management console
C.
Two standalone Citrix ADC instances in the AWS marketplace, then deploy them as an Active-Passive high availability pair in the AWS management console
Answers
D.
Two standalone Citrix ADC instances in the AWS marketplace, deploy them in the AWS management console, then use an AWS Elastic Load Balancing load balancer to distribute client traffic across both instances
D.
Two standalone Citrix ADC instances in the AWS marketplace, deploy them in the AWS management console, then use an AWS Elastic Load Balancing load balancer to distribute client traffic across both instances
Answers
E.
Two Single AMI Citrix CloudFormation templates in the AWS marketplace then configure a high availability pair
E.
Two Single AMI Citrix CloudFormation templates in the AWS marketplace then configure a high availability pair
Answers
Suggested answer: C
Total 152 questions
Go to page: of 16