ExamGecko
Home Home / Citrix / 1Y0-440
Ask QuestionAsk Question

Citrix 1Y0-440 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions

Scenario: A Citrix Architect has deployed two MPX devices, 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm. and the devices are installed behind a CISCO ASA 5585 firewall. The architect enables the following features on the Citrix ADC devices: Content Switching. SSL Offloading, Load Balancing, Citrix Gateway, Application Firewall in hybrid security, and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server. The following requirements were discussed during the implementation: All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration. All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS. Single Sign-on should be created for Microsoft Outlook web access (OWA). Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC, when users hit the Logoff button in Microsoft Outlook web access. Users should be able to authenticate using user principal name (UPN). The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers, and the monitor probes must be sent on SSL. <a target='_blank' href=' http://mail.citrix.com/'>Which Responder policy can be utilized to redirect the users from http://mail.citrix.com to https://mail.citrix.com/owa?</a>










Question 21

Report
Export
Collapse

Which encoding type can a Citrix Architect use to encode the StyleBook content, when importing the StyleBook configuration under source attribute?

A.
Hex
A.
Hex
Answers
B.
base64
B.
base64
Answers
C.
URL
C.
URL
Answers
D.
Unicode
D.
Unicode
Answers
Suggested answer: B
asked 16/09/2024
Rodolfo Ponce
38 questions

Question 22

Report
Export
Collapse

Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.

The issue was isolated to several endpoint analysis (EPA) scan settings.

Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.

Which setting is preventing the security requirements of the organization from being met?

A.
Item 6
A.
Item 6
Answers
B.
Item 7
B.
Item 7
Answers
C.
Item 1
C.
Item 1
Answers
D.
Item 3
D.
Item 3
Answers
E.
Item 5
E.
Item 5
Answers
F.
Item 2
F.
Item 2
Answers
G.
Item 4
G.
Item 4
Answers
Suggested answer: A
asked 16/09/2024
Padraig Walsh
34 questions

Question 23

Report
Export
Collapse

Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.

The issue was isolated to several endpoint analysis (EPA) scan settings.

Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.

Which setting is preventing the security requirements of the organization from being met?

A.
Item 1
A.
Item 1
Answers
B.
Item 4
B.
Item 4
Answers
C.
Item 2
C.
Item 2
Answers
D.
Item 3
D.
Item 3
Answers
Suggested answer: D
asked 16/09/2024
Ryan Lee
27 questions

Question 24

Report
Export
Collapse

_________ content type supports sending NITRO commands to NetScaler. (Choose the correct option to complete sentence.)

A.
Application/sgml
A.
Application/sgml
Answers
B.
Text/html
B.
Text/html
Answers
C.
Application/json
C.
Application/json
Answers
D.
Text/enriched
D.
Text/enriched
Answers
Suggested answer: C
asked 16/09/2024
Tolga Kesici
48 questions

Question 25

Report
Export
Collapse

Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion. They have captured the following requirements for NetScaler design project:

The authentication must be deployed for the users from the workspacelab.com and vendorlab.com domains.

The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP.

The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS.

The vendorlab users should be authenticated using Active Directory Federation Service.

The user credentials must NOT be shared between workspacelab and vendorlab.

Single Sign-on must be performed between StoreFront and NetScaler Gateway.

A domain drop down list must be provided if the used connects to the NetScaler gateway virtual server externally.

Which method must the architect utilize for user management between the two domains?

A.
Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain.
A.
Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain.
Answers
B.
Create a global catalog containing the objects of Vendorlab and Workspacelab domains.
B.
Create a global catalog containing the objects of Vendorlab and Workspacelab domains.
Answers
C.
Create shadow accounts for the Vendorlab domain in the Workspacelab domain.
C.
Create shadow accounts for the Vendorlab domain in the Workspacelab domain.
Answers
D.
Create a two-way trust between the Vendorlab and Workspacelab domains.
D.
Create a two-way trust between the Vendorlab and Workspacelab domains.
Answers
Suggested answer: B
asked 16/09/2024
Andrea Ciovati
41 questions

Question 26

Report
Export
Collapse

Which parameter must a Citrix Architect configure to ensure that HDX Proxy Connection terminates upon AAA Session TimeOut?

A.
ICA session timeout in VPN parameters
A.
ICA session timeout in VPN parameters
Answers
B.
Connection timeout(mins) in Citrix ADC gateway Session Profile.
B.
Connection timeout(mins) in Citrix ADC gateway Session Profile.
Answers
C.
Connection timeout(mins) in VPN Parameters
C.
Connection timeout(mins) in VPN Parameters
Answers
D.
ICA session timeout in Citrix ADC Gateway Session Profile.
D.
ICA session timeout in Citrix ADC Gateway Session Profile.
Answers
Suggested answer: D
asked 16/09/2024
Kaan K
37 questions

Question 27

Report
Export
Collapse

Scenario: A Citrix Architect needs to design a new multi-datacenter NetScaler deployment. The customer wants NetScaler to provide access to various backend resources by using Global Server Load Balancing (GSLB) in an Active-Active deployment.

Click the Exhibit button to view additional requirements identified by the architect.

Which GSLB algorithm or method should the architect use for the deployment, based on the stated requirements?

A.
Dynamic round trip time (RTT)
A.
Dynamic round trip time (RTT)
Answers
B.
Least response time
B.
Least response time
Answers
C.
Static proximity
C.
Static proximity
Answers
D.
least connection
D.
least connection
Answers
E.
Least packets
E.
Least packets
Answers
F.
Source IP hash
F.
Source IP hash
Answers
Suggested answer: B
asked 16/09/2024
rafael Flores
52 questions

Question 28

Report
Export
Collapse

Scenario: A Citrix Architect needs to assess an existing NetScaler gateway deployment. During the assessment, the architect collected key requirements for VPN users, as well as the current session profile settings that are applied to those users.

Click the Exhibit button to view the information collected by the architect.

Which configuration should the architect change to meet all the stated requirements?

A.
Item 5
A.
Item 5
Answers
B.
Item 1
B.
Item 1
Answers
C.
Item 2
C.
Item 2
Answers
D.
Item 3
D.
Item 3
Answers
E.
Item 4
E.
Item 4
Answers
Suggested answer: A
asked 16/09/2024
Martijn Bot
35 questions

Question 29

Report
Export
Collapse

Scenario: A Citrix Architect needs to deploy a load balancing for an application server on the NetScaler. The authentication must be performed on the NetScaler. After the authentication, the Single Sign-on with the application servers must be performed using Kerberos impersonation.

Which three authentication methods can the Architect utilize to gather the credentials from the user in this scenario? (Choose three.)

A.
SAML
A.
SAML
Answers
B.
OTP
B.
OTP
Answers
C.
TACACS
C.
TACACS
Answers
D.
WEBAUTH
D.
WEBAUTH
Answers
E.
LDAP
E.
LDAP
Answers
Suggested answer: A, D, E
asked 16/09/2024
Said Bouzardaoui
38 questions

Question 30

Report
Export
Collapse

Which request can a Citrix Architect utilize to create a NITRO API command to add a NetScaler appliance with NSIP address 10.102.29.60 to the cluster?

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: A
asked 16/09/2024
Ihab ALkasrawi
34 questions
Total 152 questions
Go to page: of 16