Citrix 1Y0-312 - Citrix Virtual Apps and Desktops 7 Advanced Administration
Scenario: A Citrix Engineer needs to use Citrix App Layering to create layered images for use with a Citrix Virtual Apps and Desktops environment.
The environment requires the following (MCS) Machine Creation Services-provisioned images:
Windows 10 Virtual Delivery Agent (VDA) machines with App A, App B, and App C installed
Windows Server 2016 VDA machines with App A, App B, and App C installed
The environment is in the middle of long-term hypervisor migration and uses both Citrix Hypervisor and Microsoft Hyper-V to host VDA machines. The images must be available on both hypervisor types.
The engineer has determined that Elastic and User Layers will NOT be used in this environment.
In this scenario the engineer will needlayered image(s) andOS Layer
(s) to meet the image requirements while minimizing administrative effort.
Which two actions should a Citrix Engineer take when upgrading a Workspace Environment Management (WEM) environment? (Choose two.)
Scenario: A large company recently acquired a smaller company. A Citrix Engineer needs to add more resources in the environment, so that all users can access the published resources.
The engineer has planned to add six more StoreFront servers to the existing StoreFront server group with four StoreFront servers.
The engineer found that the scalability declined after reaching the seventh StoreFront.
What should the engineer increase in the StoreFront server group to prevent issues in the scalability?
Which tool should a Citrix Engineer use to change the priority of an application layer to meet business requirements?
Scenario: A user from the 'test.com' domain is browsing a StoreFront server from the 'corp.com' domain with URL: https://sf.corp.com. The user notices that the browser redirects to a server with URL: https:// apps.test.com and again back to https://sf.corp.com. The user logged into the StoreFront store without getting any authentication prompt.
is the Identity provider andis the authentication method used in this scenario.
Which three considerations are accurate regarding the Enterprise Layer Manager (ELM) server? (Choose three.)
Which statement is true regarding Citrix Workspace Environment Management (WEM) Agent?
What are two valid Redundancy options for the Citrix License Server? (Choose two.)
How can a Citrix Engineer restrict end user access to an ICA file?
Which PowerShell cmdlet is used to check the connection string, which connects the Citrix Delivery Controller to communicate to the site database?