ExamGecko
Home / Citrix / 1Y0-440 / List of questions
Ask Question

Citrix 1Y0-440 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production NetScaler appliances that do NOT align with the designed security requirements.

Click the Exhibit button to view the configured command policies for the production NetScaler deployment.

Citrix 1Y0-440 image Question 51 21643 09162024192802000000

To align the command policy configuration with the security requirements of the organization, the _______ for ______should change. (Choose the correct option to complete the sentence.)

Become a Premium Member for full access
  Unlock Premium Member

Question 52

Report Export Collapse

A Citrix Architect needs to define the architect and operational processes required to implement and maintain the production environment.

In which phase of the Citrix Methodology will the architect define this?

Become a Premium Member for full access
  Unlock Premium Member

Question 53

Report Export Collapse

Scenario: A Citrix Architect needs to configure a full VPN session profile to meet the following requirements:

Users should be able to send the traffic only for the allowed networks through the VPN tunnel.

Only the DNS requests ending with the configured DNS suffix workspacelab.com must be sent to NetScaler Gateway.

If the DNS query does NOT contain a domain name, then DNS requests must be sent to NetScaler gateway.

Which settings will meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 54

Report Export Collapse

Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 55

Report Export Collapse

Scenario: A Citrix Architect has set up NetScaler MPX devices in high availability mode with version 12.0.53.13 nc. These are placed behind a Cisco ASA 5505 Firewall. The Cisco ASA Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.

The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer's security team:

The NetScaler MPX device:

should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The NetScaler device should be able to stop the HTTP, TCP, and DNS based requests.

needs to protect backend servers from overloading.

needs to queue all the incoming requests on the virtual server level instead of the service level.

should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and phishing proxies.

should provide flexibility to enforce the decided level of security check inspections for the requests originating from a specific geolocation database.

should block the traffic based on a pre-determined header length, URL length, and cookie length. The device should ensure that characters such as a single straight quote (''); backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.

Which security feature should the architect configure to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 56

Report Export Collapse

Scenario: A Citrix Architect has deployed an authentication setup with a ShareFile load-balancing virtual server. The NetScaler is configured as the Service Provider and Portalguard server is utilized as the SAML Identity Provider. While performing the functional testing, the architect finds that after the users enter their credentials on the logon page provided by Portalguard, they get redirected back to the Netscaler Gateway page at uri /cgi/samlauth/ and receive the following error.

Citrix 1Y0-440 image Question 56 21648 09162024192802000000

The events in the /var/log/ns.log at the time of this issue are as follows:

Citrix 1Y0-440 image Question 56 21648 09162024192802000000

What should the architect change in the SAML action to resolve this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 57

Report Export Collapse

Scenario: A Citrix Architect has deployed Authentication for the SharePoint server through NetScaler. In order to ensure that users are able to edit or upload documents, the architect has configured persistent cookies on the NetScaler profile.

Which action should the architect take to ensure that cookies are shared between the browser and non-browser applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

Scenario: A Citrix Architect needs to assess an existing NetScaler gateway deployment. During the assessment, the architect collects key requirements for different user groups, as well as the current session profile settings that are applied to those users.

Click the Exhibit button to view the information collected by the architect.

Citrix 1Y0-440 image Question 58 21650 09162024192802000000

Which configuration should the architect make to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that certain user groups were receiving access to an internal web server with an authorization configuration that does NOT align with the designed security requirements.

Click the Exhibit button view the configured authorization settings for the web server.

Citrix 1Y0-440 image Question 59 21651 09162024192802000000

Which item should the architect change or remove to align the authorization configuration with the security requirements of the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

For which three reasons should a Citrix Architect perform a capabilities assessment when designing and deploying a new NetScaler in an existing environment? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member
Total 152 questions
Go to page: of 16
Search

Related questions

Scenario: A Citrix Architect has deployed two MPX devices, 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm. and the devices are installed behind a CISCO ASA 5585 firewall. The architect enables the following features on the Citrix ADC devices: Content Switching. SSL Offloading, Load Balancing, Citrix Gateway, Application Firewall in hybrid security, and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server. The following requirements were discussed during the implementation: All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration. All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS. Single Sign-on should be created for Microsoft Outlook web access (OWA). Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC, when users hit the Logoff button in Microsoft Outlook web access. Users should be able to authenticate using user principal name (UPN). The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers, and the monitor probes must be sent on SSL. <a target='_blank' href=' http://mail.citrix.com/'>Which Responder policy can be utilized to redirect the users from http://mail.citrix.com to https://mail.citrix.com/owa?</a>