Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Citrix 1Y0-241 - Deploy and Manage Citrix ADC with Traffic Management

Page: 1 / 4
Total 111 questions

Where do the monitor probes originate by default, after creating and correctly configuring a custom user monitor?

A.

MIP

B.

VIP

C.

SNIP

D.

NSIP

A Citrix Network Engineer informs a Citrix Administrator that a data interface used by Citrix ADC SDX is being saturated.

Which action could the administrator take to address this bandwidth concern?

A.

Add a second interface to each Citrix ADC VPX instance.

B.

Configure a failover interface set on each Citrix ADC VPX instance.

C.

Configure LACP on the SDX for the data interface.

D.

Configure LACP on the SDX for management interface.

Scenario: A company has three departments with proprietary applications that need to be load balanced on a Citrix ADC. The three department managers would like to use the same IP address to access their individual applications. This would mean configuring three load-balanced vServers, all using the same IP address.

What can the Citrix Administrator configure for this scenario?

A.

Three SNIPs with the same IP address on a Citrix ADC

B.

Three different Citrix ADCs that use the same IP address

C.

Three different admin partitions that allow use of the same IP address for each load-balanced vServer on a Citrix ADC

D.

Three different load-balanced vServers with three different IP addresses on a Citrix ADC

Scenario: For security reasons, a Citrix Administrator needs to block access to multiple URLs.

The administrator executes the below commands:

> add policy patset BAD_URL

> bind policy patset BAD_URL badurl1.mylab.lab -index 11 -charset ASCII

> bind policy patset BAD_URL badurl2.mylab.lab -index 10 -charset ASCII

Which final two commands should the administrator execute to accomplish this?

A.

> add responder policy BAD_URL_DNS "DNS.REQ.QUESTION.DOMAIN.CONTAINS(\"BAD_URL\")" DROP

> bind responder global BAD_URL_DNS 100 END -type DNS_REQ_OVERRIDE

B.

> add responder policy BAD_URL_DNS "DNS.REQ.QUESTION.DOMAIN.CONTAINS_ANY(\"BAD_URL\")" RESET

> bind responder global BAD_URL_DNS 100 END -type DNS_REQ_OVERRIDE

C.

> add responder policy BAD_URL_DNS "DNS.REQ.QUESTION.DOMAIN.CONTAINS(\"BAD_URL\" RESET

> bind responder global BAD_URL_DNS 100 END -type DNS_REQ

D.

> add responder policy BAD_URL_DNS "DNS.REQ.QUESTION.DOMAIN.CONTAINS(\"BAD_URL\" RESET

> bind responder global BAD_URL_DNS 100 END -type DNS_REQ_OVERRIDE

Scenario: A Citrix Administrator observes that when the client gets redirected to www.citrix.com/owa/search?q=username, an HTTP 503 response is received from the content switching vServer.

The relevant configuration is as follows:

> add cs action CS_Act_1 -targetLBVserver SERVER_1

> add cs action CS_Act_2 -targetLBVserver SERVER_2

> add cs action CS_Act_3 -targetLBVserver SERVER_3

> add cs action CS_Act_4 -targetLBVserver SERVER_4

> add cs policy CS_Pol_1 -rule "http.REQ.URL path_and_queryCONTAINS(\"connect\")" -action CS_Act_1

> add cs policy CS_Pol_2 -rule "http.REQ.URL path_and_query EQ(\"owa\")" -action CS_Act_2

> add cs policy CS_Pol_3 -rule "http REQ.URL path_and_query CONTAINS(\"owa\")" -action CS_Act_3

> add cs policy CS_Pol_4 -rule "http.REQ.IS_VALID" -action CS_Act_4

> bind cs vServer CS_vserver1 -policyName CS_Pol_1 -priority 110

> bind cs vServer CS_vserver1 -policyName CS_Pol_4 -priority 120

How can the administrator correct the issue?

A.

Unbind CS_Pol_1.

B.

Bind Policy CS_Pol_3 with priority 100.

C.

Bind Policy CS_Pol_2 with priority 100.

D.

Unbind CS Pol 4.

Scenario: A Citrix Administrator manages a Citrix SDX appliance with several instances configured. The administrator needs to enable Layer 2 mode on two instances.

When using a shared network interface, what must the administrator do to ensure that traffic flows correctly?

A.

Ensure Layer 3 and Layer 2 modes are enabled.

B.

Enable tagging on all interfaces.

C.

Enable MAC-based forwarding (MBF) mode.

D.

Disable Layer 2 mode on a Citrix ADC instance.

Scenario: A Citrix Administrator configured Citrix ADC load balancing to send requests to one of three identical backend servers. Each server handles multiple protocols, and load balancing is set up in round-robin mode.

The current load-balancing setup on the Citrix ADC is:

    One load-balancing vServer with one externally accessible VIP

    One service created for each protocol type

    One server entity for each backend resource

During business hours, the administrator wants to make changes to one backend server without affecting the other servers.

What is the most efficient way for the administrator to ensure that all traffic is routed away from the server without impeding responses from other resources?

A.

Disable the backend service entity targeted for change.

B.

Disable the backend server entity targeted for change.

C.

Disable the load-balancing vServer.

D.

Unbind the correct server entity from the load-balancing vServer.

Users are experiencing resets from the intranet server website, which is load balanced through the Citrix ADC.

Which Citrix ADC tool can a Citrix Administrator use to troubleshoot the reset issue?

A.

View the newnslog from the command line interface (CLI) to look for packet resets from the Citrix ADC.

B.

Use the nslog to look for packet resets on the Citrix ADC.

C.

Take a packet trace with nstrace and analyze with Wireshark.

D.

Look in the event viewer for packet resets from the Citrix ADC

Scenario: A Citrix Administrator configured a rewrite action as follows:

> add rewrite action sync_date replace http.res.date.sys.time

What is the correct way to interpret this rewrite action?

A.

It replaces the date header in the HTTP response with the Citrix ADC system time in a conventional date format.

B.

It replaces the date header in the HTTP response with the Greenwich Mean Time (GMT) time stamp.

C.

It replaces the Citrix ADC system time with the date header in a conventional date format.

D.

It is invalid, as system time CANNOT be referenced in the system policy.

Which two statements are true regarding a typical global server load balancing (GSLB) setup? (Choose two.)

A.

Restrict the selection of a GSLB service from a subset of GSLB services bound to a GSLB vServer for the given domain.

B.

An administrator CANNOT define a backup for a backup vServer in an active standby GSLB setup for a given GSLB domain.

C.

Apply spillover policies on a subset of GSLB services, and ensure that the user CANNOT have a backup for a subset of GSLB services.

D.

Any given GSLB vServer can load balance only one fully qualified domain name (FQDN).