Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Citrix 1Y0-440 - Architecting a Citrix Networking Solution

Page: 2 / 5
Total 152 questions

Scenario: A Citrix Architect has configured a load balancing virtual server for RADIUS authentication. The architect observes that, when the radius authentication action has the virtual server IP address, the authentication falls. However, when any of the individual server IP addresses are used, the authentication works fine.

How should the architect troubleshoot this issue?

A.

Change the Logon name attribute in Radius Action

B.

Ensure that TCP port 1821 is open from NSIP to backend Radius servers

C.

Verify the shared secret on Citrix ADC

D.

Change the Radius client from NSIP to SNIP on the Radius server

Which four settings can a Citrix Architect use to create a configuration job using Citrix Application Delivery Management? (Choose four.)

A.

Action

B.

File

C.

Configuration Template

D.

StyleBooks

E.

Event Manager

F.

Instance

G.

Record and Play

Scenario: The Workspacelab team has implemented Citrix ADC high availability pair and Citrix ADC Management and Analytics System (Citrix Application Delivery Management). The Citrix Application Delivery Management was configured by a Citrix Architect to monitor and manage these devices. The Workspacelab team wants to load balance their Microsoft SharePoint servers on the Citrix ADC and needs the process to be streamlined and administered using Citrix Application Delivery Management.

The following requirements were discussed during the meeting:

    The Microsoft SharePoint server should be optimized, load balanced, and secured in the network and should be deployed using Citrix Application Delivery Management.

    All the configurations should be yenned before getting pushed to the Citrix Application Delivery Management.

Which feature should the architect use to configure the Microsoft SharePoint server using Citrix Application Delivery Management?

A.

StyleBooks

B.

Orchestration

C.

Configuration

D.

Jobs Analytics

Scenario: A Citrix Engineer is asked by management at the workspacelab organization to review their existing Citrix ADC Configurations and make the necessary upgrades. The architect recommends small changes to the pre-existing Citrix ADC configuration. Currently, the Citrix ADC MPX devices are configured in high-availability pair, and the outbound traffic is load balanced between two internet service providers (ISPs), however, the failover is NOT happening correctly. The following requirements were discussed during the design requirement phase:

    The return traffic for a specific flow should be routed through the same path while using Link Load Balancing.

    The link should fail over even if the ISP router is up and intermediary devices to an ISP router are down.

    Traffic going through one ISP router should fail over to the secondary ISP, and the traffic should not flow through both routers simultaneously.

What should the architect configure with Link Load Balancing LLB) to meet the requirement?

A.

Inverse NAT

B.

Least packets load balancing method

C.

Destination IP hash load balancing method

D.

Reverse NAT.

Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that certain user groups were receiving access to an internal web server with an authorization configuration that does NOT align with the designed security requirements.

Click the Exhibit button view the configured authorization settings for the web server.

Which item should the architect change or remove to align the authorization configuration with the security requirements of the organization?

A.

Item 1

B.

Item 3

C.

Item 4

D.

Item 5

E.

Item 2

Scenario: A Citrix Architect needs to design a hybrid XenApp and XenApp and XenDesktop environment which will include Citrix Cloud as well as resource locations in on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

    Active XenApp and XenDesktop Service subscription

    No existing Citrix deployment

    About 3,000 remote users are expected to regularly access the environment

    Multi-factor authentication should be used for all external connections

    Solution must provide load balancing for backend application servers

    Load-balancing services must be in Location B

Click the Exhibit button to view the conceptual environment architecture.

The architect should use ________ in Location A, and should use _________ in Location B. (Choose the correct option to complete the sentence.)

A.

Citrix Gateway as a Service, no Citrix products

B.

No Citrix products, Citrix ADC (BYO)

C.

Citrix Gateway as a Service, Citrix ADC (BYO)

D.

No Citrix products, Citrix ICA Proxy (cloud-licensed)

E.

Citrix Gateway as a Service, Citrix ICA Proxy (cloud-licensed)

F.

No Citrix products; Citrix Gateway appliance

Scenario: A Citrix Architect has deployed load balancing for SharePoint 2010 on a Citrix ADC instance. While editing the document, the architect observed the error displayed below:

Sorry, we couldn't open 'https://sharepointcs.emea.in/Shared Documents/Citrix Enhancement Request Form.doc'

After troubleshooting, the architect discovers the issue. When a user opens a document, it opens in the browser, but while editing the document, thd session is transferred from the browser to the Word application During this time, the cookies should be transferred from the browser to the Word application.

Which two configurations should the architect modify to ensure that the cookies are shared between the browser and non-browser applications? (Choose two.)

A.

Enable Persistent Cookie

B.

Disable Persistent Cookie

C.

Set HTTPOnly Cookie to NO

D.

Set the NSC_AAAC cookie with HTTPOnly Flag

E.

Set lb vserver -persistenceType COOKIEINSERT

F.

Set HTTPOnly Cookie to Yes

Scenario: A Citrix Architect needs to deploy a load balancing for an application server on the NetScaler. The authentication must be performed on the NetScaler. After the authentication, the Single Sign-on with the application servers must be performed using Kerberos impersonation.

Which three authentication methods can the Architect utilize to gather the credentials from the user in this scenario? (Choose three.)

A.

SAML

B.

OTP

C.

TACACS

D.

WEBAUTH

E.

LDAP

Scenario: A Citrix Architect has configured two MPX devices in high availability mode with version 12.0.53.13 nc. After a discussion with the security team, the architect enabled the Application Firewall feature for additional protection.

In the initial deployment phase, the following security features were enabled:

    IP address reputation

    HTML SQL injection check

    Start URL

    HTML Cross-site scripting

    Form-field consistency

    After deployment in pre-production, the team identifies the following additional security features and changes as further requirements:

    Application Firewall should retain the response of form field in its memory. When a client submits the form in the request, Application Firewall should check for inconsistencies in the request before sending it to the web server.

    All the requests dropped by Application Firewall should get a pre-configured HTML error page with appropriate information.

    The Application Firewall profile should be able to handle the data from the RSS feed and an ATOM-based site. Click the Exhibit button to view an excerpt of the existing configuration.

What should the architect do to meet these requirements?

A.

Configure a new profile with web 2.0 and use the previously used Application Firewall security checks.

B.

Configure a new HTML profile and use previously used Application Firewall security checks.

C.

Configure a new profile with XML and use previously used Application Firewall security checks.

D.

Modify an existing HTML profile and disable 'Drop invalid security check'

For which three reasons should a Citrix Architect perform a capabilities assessment when designing and deploying a new NetScaler in an existing environment? (Choose three.)

A.

Understand the skill set of the company.

B.

Assess and identify potential risks for the design and build phase.

C.

Establish and prioritize the key drivers behind a project.

D.

Determine operating systems and application usage.

E.

Identify other planned projects and initiatives that must be integrated with the design and build phase.