QUESTION 1 If the Citrix IMA service fails to restart, how should an administrator resolve the issue? A. Open the MF20.DSN file and verify the workstation ID B. Open a command prompt and type DSMAINT CONFIG C. Open the Access Management Console and run Discovery D. Open a command prompt and type DSMAINT RECREATELHC Answer: […]
QUESTION 1 Which SNMP trap must an administrator configure to be informed when the response time for a monitor probe that had exceeded the set threshold returns to normal? A. entityup B. entitydown C. monRespTimeoutAboveThresh D. monRespTimeoutBelowThresh Answer: D
QUESTION 1 Scenario: An administrator manages a XenApp 6.5 fam with one zone. All servers in the zone have identical hardware and software. The zone is configured with a primary data collector with a preference of Most Preferred and a backup data collector with a prefenrece of Preferred. All other XenApp servers in the zone […]
QUESTION 1 All users in the Sales group must be able to save documents created on their virtual desktops to USB devices connected to their local desktops. Some users in the Sales group also belong to the Remote Users group; however, the Remote Users group must not be able to save documents to a local […]
QUESTION 1 A network administrator requested that the XenServer administrator of a resource pool separate virtual machine backup traffic from guest traffic so that virtual machine backup traffic is routed to an external backup server. Which action must the XenServer administrator take to complete this task? A. Create a VLAN for backup traffic B. Assign […]
QUESTION 1 Which of the following does a data collector not do? A. Hosts an in memory database with dynamic information about servers in the zone B. Receives incremental data updates and queries from servers within the zone C. Communicates server information to other data collectors in the farm D. Hosts applications that are deemed […]
QUESTION 1 An administrator should configure Link Aggregation on a 7000 NetScaler system when __________. (Choose the correct option to complete the sentence.) A. redundancy on a half duplex operation is required B. redundancy on an operation across multiple data rates is required C. the bandwidth requirements inbound to or outbound from the Netscaler are […]
QUESTION 1 Scenario: During the creation of a Microsoft Windows 2003 Standard Edition server virtual machine (VM), an administrator is asked to make as many processors available as possible to allow a developer to test a new multi-cpu application. What is the maximum number of VCPUs that an administrator can assign to this VM? A. […]
QUESTION 1 Scenario: Printing errors are generated randomly in a Citrix XenApp server farm. An investigation reveals that the Citrix Print Manager Service has been failing at random intervals. An administrator is asked to use the Health Monitoring and Recovery feature to check the service.What should the administrator do to monitor the service? A. Create […]
QUESTION 1 Which step must an administrator take before configuring administrative roles within a Provisioning Server environment? A. Create an administrative service account B. Create the administrative groups in Active Directory C. Grant the farm administrator db_admin rights in SQL D. Add the currently logged in user to the local administrator group Answer: B QUESTION […]
QUESTION 1 Scenario: An administrator determined that an application pilot environment should be installed. Two servers have been allocated for this purpose. How should the pilot environment be established and why? A. The servers should be placed in a distinct farm so that testing does NOT impact production. B. The servers should be placed in […]
QUESTION 1 A Citrix Engineer needs to load balance enrollment requests from Apple iOS devices. The engineer should implement an SSL Offload virtual server using __________ protocol and port __________. (Choose the correct set of options to complete the sentence.) A. SSL; 443 B. TCP; 443 C. SSL; 8443 D. TCP; 8443 Answer: C
QUESTION 1 Which two steps should an administrator take to remove an Access Gateway appliance from an Access Gateway 4.5 Advanced Edition deployment? (Choose two.) A. The administrator should execute the "Remove Access Gateway" task from the "Gateway Appliances" node in the Access Management Console. B. The administrator should restart at least one Advanced Access […]
QUESTION 1 Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID? A. LDAP password B. Firewall access rule C. Authentication policy D. RADIUS shared secret […]
QUESTION 1 Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID? A. LDAP password B. Firewall access rule C. Authentication policy D. RADIUS shared secret […]
QUESTION 1 Which type of authentication server could an engineer configure in order to provide the use of RSA token authentication as a permitted authentication method to access a AAA Virtual Server? A. LDAP B. SAML C. RADIUS D. Negotiate Answer: C QUESTION 2 A company wants to implement a policy where all passwords should […]
QUESTION 1 Scenario: Nether Tech’s corporate policy requires that passwords are NOT requested for XenApp passthrough connections, except for those that pertain to members of the Nursing Users group. Nurses connect to XenApp servers hosting applications in the Nurses Worker Group. Click the Exhibit button to view a list of the policies configured in the […]
QUESTION 1 Why is this the best design for the desktops for these user groups? A. This design provides the most security by limiting access to the sensitive applications from the virtual desktop only and keeping confidential user data private on each vDisk. B. This design is essential to meet the strict security requirements for […]
QUESTION 1 Users must be able to connect remotely from their own mobile devices. What should the architect consider to increase the security of the current authentication solution? A. Adding a second authentication factor B. Placing domain controllers in the DMZ for remote users C. Shortening the Active Directory password expiration period D. Populating the […]
QUESTION 1 A Citrix Engineer needs to enable high availability on the XenServer host. What are two requirements for the environment? (Choose two.) A. Workload Balancing has to be disabled. B. A static IP address must be set on the management interface. C. XenServer hosts need to be part of a XenServer resource pool. D. […]