Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Scenario: A Citrix Administrator configured the following policies in a Citrix Virtual Desktops Site environment, in descending priority order.

1. “Marketing Office A” has a filter on Marketing users. 'Client Network Drives' is disabled; 'Client Fixed Drives' is enabled.

2. “Marketing Office B” has a filter on Marketing users' internal IP. 'Client Network Drives' is disabled; 'Client Fixed Drives' is enabled.

3. “Accounting” has a filter on Accounting Users. 'Client Network Drives' is enabled; 'Client Fixed Drives' is NOT configured.

4. “Baseline” is configured without a filter. 'Client Network Drives' and 'Client Fixed Drives' are both disabled.

Based on these policies, what will Accounting users be able to access?

A.

Client network drives only

B.

Neither the client network drive nor the client fixed drive

C.

Client fixed drives only

D.

Client fixed and network drives

A master image that will be used to deploy machines for a Citrix Virtual Apps and Desktops environment should have the ___________ installed on it so that ___________. (Choose the correct option to complete the sentence.)

A.

Virtual Delivery Agent (VDA); users can access resources on the machines

B.

Citrix Workspace app; users can access resources on the machines

C.

Virtual Delivery Agent (VDA); machines can communicate with the Site database

D.

Citrix Workspace app; machines can communicate with the Site database

After creating a new machine catalog using the Machine Creation Services (MCS) wizard in Citrix Studio, a Citrix Administrator determines that Windows activation fails for all new machines in that catalog.

Which two conditions can cause this to happen? (Choose two.)

A.

The base image rearm count has been exceeded.

B.

The Microsoft License Server is unreachable.

C.

The version of Windows installed uses Multiple Activation Key (MAK) licensing.

D.

The version of Windows installed is Windows Server 2012 R2.

A Citrix Administrator needs to match the host name ‘www.example.com’ in all HTTP requests.

Which expression, when used, meets this requirement?

A.

HTTP.REQ.HOSTNAME.EQ(“www.example.com”)

B.

HTTP.REQ.HOSTNAME(“example.com”)

C.

HTTP.RES.HOSTNAME.CONTAINS(“www.example.com”)

D.

HTTP.RES.HOSTNAME.EQ(“www.example.com”)

By default, what is the printing behavior when no printing policy is configured?

A.

Direct connections to print servers are prohibited.

B.

All client printers are auto-created.

C.

The generic universal printer is automatically created.

D.

The Universal Print Server is enabled.

Which tool should a Citrix Administrator use when a user reports “event ID 1022: The Citrix Desktop Service Failed to register with any controller”?

A.

HDX Monitor

B.

VDA Cleanup Utility

C.

Citrix Scout

D.

Citrix Health Assistant

Scenario: A Citrix Administrator is configuring the Citrix Workspace app to allow users to access their applications and desktops. Management requires that users can log on to the environment from any device without having to remember the server address.

What should the administrator do to meet these requirements?

A.

Deploy and configure the Citrix Workspace app using scripts.

B.

Configure a DNS Service Record for the Citrix Workspace app.

C.

Allow users to download the configuration from Citrix.com.

D.

Configure the Citrix Workspace app using a Group Policy Template File.

Scenario: A Citrix Administrator is configuring the Citrix Workspace app to allow users to access their applications and desktops. Users should NOT be able to migrate their application sessions between devices throughout the work day.

The administrator needs to modify the Citrix Workspace Control settings ________ to prevent users from migrating their sessions between devices. (Choose the correct option to complete the sentence.)

A.

in the Site configuration within Citrix Studio

B.

in the StoreFront console

C.

through a Group Policy object

D.

in the Citrix Workspace app

Which type of certificate should a Citrix Administrator request so that a client endpoint can communicate with StoreFront over an encrypted connection?

A.

Server

B.

Client

C.

Intermediate

D.

Root

Creating Application Groups requires the delegated administration permission of the ___________ Administration built-in role. (Choose the correct option to complete the sentence.)

A.

Host

B.

Delivery Group

C.

machine catalog

D.

Help Desk