Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

How to Easily Pass the Citrix 1Y0-440 Exam: Expert Advice

Questions 11

Scenario: A Citrix Architect has configured a load balancing virtual server for RADIUS authentication. The architect observes that, when the radius authentication action has the virtual server IP address, the authentication falls. However, when any of the individual server IP addresses are used, the authentication works fine.

How should the architect troubleshoot this issue?

Options:

A.

Change the Logon name attribute in Radius Action

B.

Ensure that TCP port 1821 is open from NSIP to backend Radius servers

C.

Verify the shared secret on Citrix ADC

D.

Change the Radius client from NSIP to SNIP on the Radius server

Buy Now
Questions 12

Scenario: A Citrix Architect has deployed two MPX devices, 12.0.53.13 nc and MPX 11500 models, in high availability (HA) pair for the Workspace labs team. The deployment method is two-arm and the devices are installed behind a CISCO ASA 5585 Firewall. The architect enabled the following features on the NetScaler devices. Content Switching, SSL Offloading, Load Balancing, NetScaler Gateway, Application Firewall in hybrid security and Appflow. All are enabled to send monitoring information to NMAS 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server.

The following requirements were discussed during the implementation:

  • All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration
  • All traffic should be secured and any traffic coming into HTTP should be redirected to HTTPS.
  • Single Sign-on should be created for Microsoft Outlook web access (OWA).
  • NetScaler should recognize Uniform Resource Identifier (URl) and close the session to NetScaler when users hit the Logoff button in Microsoft Outlook web access.
  • Users should be able to authenticate using either user principal name (UPN) or sAMAccountName.
  • The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers and the monitor probes must be sent on SSL

Which monitor will meet these requirements?

Options:

A.

add lb monitor mon_rpc HTTP-ECV –send “GET /rpc/healthcheck.htm” recv 200 -LRTM DISABLED

B.

add lb monitor mon_rpc HTTP-ECV –send “GET /rpc/healthcheck.htm” recv 200 -LRTM ENABLED

C.

add lb monitor mon_rpc HTTP –send “GET /rpc/healthcheck.htm” recv 200 -LRTM DISABLED –secure YES

D.

add lb monitor mon_rpc HTTP-ECV –send “GET/rpc/healthcheck.htm” recv 200 -LRTM DISABLED –secure YES

Buy Now
Questions 13

What are three potential risks when examining the disaster recovery plan and implementation for a company? (Choose three)

Options:

A.

Supporting infrastructure for proposed environment is NOT included in disaster recovery implementation

B.

A disaster recovery plan exists but has never been tested

C.

A disaster recovery location does NOT exist.

D.

Users require mobile devices with continuous access

E.

Optimal Gateway Routing decisions are NOT understood

Buy Now
Questions 14

Scenario: A Citrix Architect needs to design a hybrid XenApp and XenApp and XenDesktop environment which will include Citrix Cloud as well as resource locations in on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

  • Active XenApp and XenDesktop Service subscription
  • No existing NetScaler deployment
  • About 3,000 remote users are expected to regularly access the environment
  • Multi-factor authentication should be used for all external connections
  • Solution must provide load balancing for backend application servers
  • Load-balancing services must be in Location B

Click the Exhibit button to view the conceptual environment architecture.

1Y0-440 Question 14

The architect should use ________ in Location A, and should use _________ in Location B. (Choose the correct option to complete the sentence.)

Options:

A.

Citrix Gateway as a Service, no NetScaler products

B.

No Citrix products, Citrix ADC (BYO)

C.

Citrix Gateway as a Service, Citrix ADC (BYO)

D.

No Citrix products, Citrix ICA Proxy (cloud-licensed)

E.

Citrix Gateway as a Service, Citrix ICA Proxy (cloud-licensed)

F.

No Citrix products; Citrix Gateway appliance

Buy Now
Questions 15

Scenario: A Citrix Architect has setup Citrix ADC MPX devices in high availability mode with version 12.0.53.13 nc. These are placed behind a Cisco ASA 5505 firewall. The Cisco ASA firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall. The following requirements were captured by the architect during the discussion held as part of the Citrix ADC security implementation project with the customer's security team: The Citrix ADC MPX device:

  • should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The Citrix ADC device should be able to stop the HTTP. TOP, and DNS based requests.
  • needs to protect backend servers from overloading.
  • needs to queue all the incoming requests on the virtual server level instead of the service level.
  • should provide access to resources on the basis of priority.
  • should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets. compromised webservers, known spammersThackers. and phishing proxies.
  • should provide flexibility to enforce the desired level of security check inspections for the requests originating from a specific geolocation database.
  • should block the traffic based on a predetermined header length, URL length, and cookie length.The device should ensure that characters such as a single straight quote (') backslash (); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.

Which security feature should the architect implement to meet these requirements?

Options:

A.

Configure HTML SQL injection check on Application Firewall and enable Transform SQL special characters.

B.

Configure signatures manually and apply them to the Application Firewall profile.

C.

Configure HTML SQL Injection check on Application Firewall and enable Block SQLSpICharANDKeyword.

D.

Configure HTML cross-Site scripting and enable Check Request headers.

Buy Now
Questions 16

Scenario: The Workspacelab team has implemented a Citrix ADC high availability pair and Citrix ADC Management and Analytics (Citrix Application Delivery Management). The Citrix Application Delivery Management was configured by a Citrix Architect to monitor and manage these devices. The Workspacelab team wants to load balance their Microsoft SharePoint servers on the Citrix ADC and needs the process to be streamlined and administered using Citrix Application Delivery Management. The following requirements were discussed during the meeting.

• The Microsoft SharePoint server should be optimized. Load balanced, and secured in the network and should be deployed using Citrix Application Delivery Management.

• All the configurations should be verified before getting pushed to the Citrix Application Delivery Management.

What is a prerequisite for installing Microsoft SharePoint using Citrix Application Delivery Management?

Options:

A.

Citrix ADC needs to have a platinum license Installed on it

B.

Citrix Application Delivery Management should have a version higher than 12.0.53.13 nc

C.

Citrix ADC MPX should be of 11500 series

D.

Microsoft SharePoint version should be 2016

Buy Now
Questions 17

Which markup language can a Citrix use along with NITRO API to create a StyleBook?

Options:

A.

GML

B.

XML

C.

HTML

D.

YAML

Buy Now
Questions 18

Which two parameters must a Citrix Architect specify in the configuration job to replicate a specific configuration snippet from one Crtnx ADC instance to multiple instances? (Choose two.)

Options:

A.

Running Configuration

B.

Target Instance

C.

Saved Configuration

D.

Source Instance

E.

Configuration Source

Buy Now
Questions 19

Scenario: A Citrix Architect captured the following requirements during a design discussion held for a Citrix ADC design project.

  • There will be a pair of Citrix ADC MPX appliances deployed in the DMZ and another pair deployed in the internal network
  • High availability will be accessible for each Citrix ADC MPX appliance in both the DMZ (external) and LAN (internal) networks
  • DMZ Citrix ADC MPX appliances will have GSLB configured and deployed in Active/Passive mode
  • Load balancing for the internal Microsoft Exchange servers will be configured on the internal Citrix ADC appliances
  • Load balancing for SAP application servers in the DMZ will be configured on the DMZ Citrix ADC appliances
  • For the DMZ Citrix ADC MPX pair, the data and management traffic will be sent over the same interface.
  • The DMZ Citrix ADC MPX pair will have three interfaces available.

The users from the DMZ should NOT have access to servers in the internal zone

Which deployment mode should the architect use to deploy the Citrix ADC pair in the DMZ?

Options:

A.

One-Arm Mode

B.

Two-Arm Mode

C.

Hybrid Mode

D.

Transparent Mode

Buy Now
Questions 20

Scenario: A Citrix Architect has deployed two MPX devices, 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm. and the devices are installed behind a CISCO ASA 5585 firewall. The architect enables the following features on the Citrix ADC devices: Content Switching. SSL Offloading, Load Balancing, Citrix Gateway, Application Firewall in hybrid security, and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server.

The following requirements were discussed during the implementation:

  • All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration.
  • All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS.
  • Single Sign-on should be created for Microsoft Outlook web access (OWA).
  • Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC, when users hit the Logoff button in Microsoft Outlook web access.
  • Users should be able to authenticate using user principal name (UPN).
  • The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers, and the monitor probes must be sent on SSL.

Which Responder policy can be utilized to redirect the users from http://mail.citrix.com to https://mail.citrix.com/owa ?

Options:

A.

add responder action Act redirect ""<a href="https://mail.citrix.com/owa/">https://mail.citrix.com/owa/</a> "" -responseStatusCode 302 add responder policy pol "http.REQ.URL.PATH_AND_QUERY.EQ("/")" Act

B.

add responder action Act redirect ""<a href="https://mail.citrix.com/owa/">https://mail.citrix.com/owa/</a> "" -responseStatusCode 307 add responder policy pol "HTTP.REQ.IS_NOTVALID Act

C.

add responder action Act redirect ""<a href="http://mail.citrix.com/owa/">http://mail.citrix.com/owa/</a> "" -responseStatusCode 302 add responder policy pol "HTTP.REQ.IS_NOTVALID Act

D.

add responder action Act redirect ""<a href="http://mail.citrix.com/owa/">http://mail.citrix.com/owa/</a> "" -responseStatusCode 302 add responder policy pol "http.REQ.URL.PATH_AND_QUERY.EQ("/")" Act

Buy Now