ExamGecko
Home Home / Citrix / 1Y0-440

Citrix 1Y0-440 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions







Scenario: A Citrix Architect has implemented two high availability pairs of MPX 5500 and MPX 11500 devices respectively with 12.0.53.13 nc version. The Citrix ADC devices are set up to handle Citrix Gateway. Load Balancing. Application Firewall, and Content Switching. The Workspacelab infrastructure is set up to be monitored with Citrix Application Delivery Management version 12.0.53.13 nc by the Workspacelab administrators. The Workspacelab team wants to implement one more pair(s) of Citrix ADC MPX 7500 devices with version 12.0.53.13 nc. The Citrix consulting team has assigned the task to implement these Citrix ADC devices in the infrastructure and set them up to be monitored and managed by Citrix ADC Management and Analytics {Citrix Application Delivery Management). The following are the requirements that were discussed during the project initiation call: Citrix Application Delivery Management should be configured to get the infrastructure information under sections such as HDX Insight, WEB Insight, and Security Insight. Configuration on the new MPX devices should be identical to that of MPX 11500 devices. Configuration changes after the deployment and initial setup should be optimized using Citrix Application Delivery Management. Citrix Application Delivery Management should be utilized to configure templates that can be utilized by the Workspacelab team in future deployments. As per the requirement from the Workspacelab team, Citrix Application Delivery Management should store the audited data for only 15 days. However, the architect is NOT able to view any Information under Analytics. What should the architect do to fix this issue?




Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production NetScaler appliances that do NOT align with the designed security requirements.

Click the Exhibit button to view the configured command policies for the production NetScaler deployment.

To align the command policy configuration with the security requirements of the organization, the _______ for ______should change. (Choose the correct option to complete the sentence.)

A.
command spec; item 3
A.
command spec; item 3
Answers
B.
priority; Item 5
B.
priority; Item 5
Answers
C.
action; Item 1
C.
action; Item 1
Answers
D.
priority; Item 2
D.
priority; Item 2
Answers
E.
action; Item 4
E.
action; Item 4
Answers
F.
command spec; Item 6
F.
command spec; Item 6
Answers
Suggested answer: D

A Citrix Architect needs to define the architect and operational processes required to implement and maintain the production environment.

In which phase of the Citrix Methodology will the architect define this?

A.
Define
A.
Define
Answers
B.
Deploy
B.
Deploy
Answers
C.
Assess
C.
Assess
Answers
D.
Review
D.
Review
Answers
E.
Manage
E.
Manage
Answers
F.
Design
F.
Design
Answers
Suggested answer: F

Scenario: A Citrix Architect needs to configure a full VPN session profile to meet the following requirements:

Users should be able to send the traffic only for the allowed networks through the VPN tunnel.

Only the DNS requests ending with the configured DNS suffix workspacelab.com must be sent to NetScaler Gateway.

If the DNS query does NOT contain a domain name, then DNS requests must be sent to NetScaler gateway.

Which settings will meet these requirements?

A.
Split Tunnel to OFF, Split DNS Both
A.
Split Tunnel to OFF, Split DNS Both
Answers
B.
Split Tunnel to ON, Split DNS Local
B.
Split Tunnel to ON, Split DNS Local
Answers
C.
Split Tunnel to OFF, Split DNS Remote
C.
Split Tunnel to OFF, Split DNS Remote
Answers
D.
Split Tunnel to ON, Split DNS Remote
D.
Split Tunnel to ON, Split DNS Remote
Answers
Suggested answer: D

Explanation:

https://support.citrix.com/article/CTX207149

Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose two.)

A.
The service does NOT receive traffic for three successive increment intervals.
A.
The service does NOT receive traffic for three successive increment intervals.
Answers
B.
The server request rate parameters are set above 25 requests per second.
B.
The server request rate parameters are set above 25 requests per second.
Answers
C.
The actual request rate is slower than the new service request rate.
C.
The actual request rate is slower than the new service request rate.
Answers
D.
The percentage of traffic that the new service must receive is greater or equal to 50.
D.
The percentage of traffic that the new service must receive is greater or equal to 50.
Answers
E.
The request rate has been incremented 100 times.
E.
The request rate has been incremented 100 times.
Answers
Suggested answer: A, C

Scenario: A Citrix Architect has set up NetScaler MPX devices in high availability mode with version 12.0.53.13 nc. These are placed behind a Cisco ASA 5505 Firewall. The Cisco ASA Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.

The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer's security team:

The NetScaler MPX device:

should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The NetScaler device should be able to stop the HTTP, TCP, and DNS based requests.

needs to protect backend servers from overloading.

needs to queue all the incoming requests on the virtual server level instead of the service level.

should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and phishing proxies.

should provide flexibility to enforce the decided level of security check inspections for the requests originating from a specific geolocation database.

should block the traffic based on a pre-determined header length, URL length, and cookie length. The device should ensure that characters such as a single straight quote (''); backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.

Which security feature should the architect configure to meet these requirements?

A.
Global Server Load balancing with Dynamic RTT
A.
Global Server Load balancing with Dynamic RTT
Answers
B.
Global Server Load Balancing with DNS views
B.
Global Server Load Balancing with DNS views
Answers
C.
Geolocation-based blocking using Application Firewall
C.
Geolocation-based blocking using Application Firewall
Answers
D.
geolocation-based blocking using Responder policies
D.
geolocation-based blocking using Responder policies
Answers
E.
Global Server Load Balancing with Mac Based Forwarding
E.
Global Server Load Balancing with Mac Based Forwarding
Answers
Suggested answer: C

Scenario: A Citrix Architect has deployed an authentication setup with a ShareFile load-balancing virtual server. The NetScaler is configured as the Service Provider and Portalguard server is utilized as the SAML Identity Provider. While performing the functional testing, the architect finds that after the users enter their credentials on the logon page provided by Portalguard, they get redirected back to the Netscaler Gateway page at uri /cgi/samlauth/ and receive the following error.

The events in the /var/log/ns.log at the time of this issue are as follows:

What should the architect change in the SAML action to resolve this issue?

A.
Signature Algorithm to SHA 256
A.
Signature Algorithm to SHA 256
Answers
B.
The Digest Method to SHA 256
B.
The Digest Method to SHA 256
Answers
C.
The Digest Method to SHA 1
C.
The Digest Method to SHA 1
Answers
D.
Signature Algorithm to SHA 1
D.
Signature Algorithm to SHA 1
Answers
Suggested answer: C

Scenario: A Citrix Architect has deployed Authentication for the SharePoint server through NetScaler. In order to ensure that users are able to edit or upload documents, the architect has configured persistent cookies on the NetScaler profile.

Which action should the architect take to ensure that cookies are shared between the browser and non-browser applications?

A.
The time zone should be the same on the NetScaler, client, and SharePoint server.
A.
The time zone should be the same on the NetScaler, client, and SharePoint server.
Answers
B.
The SharePoint load-balancing VIP FQDN and the AAA VIP FQDN should be in the trusted site of the client browser.
B.
The SharePoint load-balancing VIP FQDN and the AAA VIP FQDN should be in the trusted site of the client browser.
Answers
C.
The Secure flag must be enabled on the cookie.
C.
The Secure flag must be enabled on the cookie.
Answers
D.
The cookie type should be HttpOnly.
D.
The cookie type should be HttpOnly.
Answers
Suggested answer: B

Scenario: A Citrix Architect needs to assess an existing NetScaler gateway deployment. During the assessment, the architect collects key requirements for different user groups, as well as the current session profile settings that are applied to those users.

Click the Exhibit button to view the information collected by the architect.

Which configuration should the architect make to meet these requirements?

A.
Change the Clientless Access settings in an existing session profile.
A.
Change the Clientless Access settings in an existing session profile.
Answers
B.
Change the remote Access settings in StoreFront.
B.
Change the remote Access settings in StoreFront.
Answers
C.
Change ICA proxy settings in an existing session profile.
C.
Change ICA proxy settings in an existing session profile.
Answers
D.
Change the policy expression in an existing session policy.
D.
Change the policy expression in an existing session policy.
Answers
E.
Create a new session profile and policy.
E.
Create a new session profile and policy.
Answers
Suggested answer: A

Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that certain user groups were receiving access to an internal web server with an authorization configuration that does NOT align with the designed security requirements.

Click the Exhibit button view the configured authorization settings for the web server.

Which item should the architect change or remove to align the authorization configuration with the security requirements of the organization?

A.
Item 1
A.
Item 1
Answers
B.
Item 3
B.
Item 3
Answers
C.
Item 4
C.
Item 4
Answers
D.
Item 5
D.
Item 5
Answers
E.
Item 2
E.
Item 2
Answers
Suggested answer: D

For which three reasons should a Citrix Architect perform a capabilities assessment when designing and deploying a new NetScaler in an existing environment? (Choose three.)

A.
Understand the skill set of the company.
A.
Understand the skill set of the company.
Answers
B.
Assess and identify potential risks for the design and build phase.
B.
Assess and identify potential risks for the design and build phase.
Answers
C.
Establish and prioritize the key drivers behind a project.
C.
Establish and prioritize the key drivers behind a project.
Answers
D.
Determine operating systems and application usage.
D.
Determine operating systems and application usage.
Answers
E.
Identify other planned projects and initiatives that must be integrated with the design and build phase.
E.
Identify other planned projects and initiatives that must be integrated with the design and build phase.
Answers
Suggested answer: A, B, E
Total 152 questions
Go to page: of 16