Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two features can a Citrix Administrator use to allow secure external access to a sensitive company web server that is load-balanced by the Citrix ADC? (Choose two.)

A.

Authentication, authorization, and auditing (AAA)

B.

Citrix Web App Firewall

C.

ICA proxy

D.

AppFlow

E.

Integrated caching

SAML is an authentication protocol based on _____________.

A.

LDAP

B.

XML

C.

HTML

D.

YAML

Scenario: A Citrix Administrator configured the policies below:

POLICY 1:

add rewrite action ACT_1 corrupt_http_header Accept-Encoding

add rewrite policy POL_1 HTTP.REQ.IS_VALID ACT_1

POLICY 2:

add rewrite action ACT_2 insert_http_header Accept-Encoding “\”identity\””

add rewrite policy POL_2 “HTTP.REQ.IS_VALID” ACT_2

Which set of commands can the administrator use to bind the rewrite policies to the LB vserver lb_vsrv so that

POL_2 is evaluated after POL_1 is evaluated successfully?

A.

bind lb vserver lb_vsrv -policyName POL_1 -priority 110 -gotoPriorityExpression NEXT -type REQUEST

bind lb vserver lb_vsrv -policyName POL_2 -priority 100 -gotoPriorityExpression END -type REQUEST

B.

bind lb vserver lb_vsrv -policyName POL_1 -priority 90 -type REQUEST

bind lb vserver lb_vsrv -policyName POL_2 -priority 100 -type REQUEST

C.

bind lb vserver lb_vsrv -policyName POL_1 -priority 90 -gotoPriorityExpression END -type REQUEST

bind lb vserver lb_vsrv -policyName POL_2 -priority 80 -gotoPriorityExpression NEXT -type REQUEST

D.

bind lb vserver lb_vsrv -policyName POL_1 -priority 90 -gotoPriorityExpression NEXT -type REQUEST

bind lb vserver lb_vsrv -policyName POL_2 -priority 100 -gotoPriorityExpression END -type REQUEST

In a single-hop deployment, a Citrix Administrator needs to use a client’s IP address as the source IP address for Citrix ADC-to-server connections.

Which Citrix ADC mode can the administrator use to meet this requirement?

A.

USIP

B.

USNIP

C.

Layer 2

D.

Layer 3

After being audited, a Citrix Administrator learns that additional security enhancements should be made to one

of the virtual servers.

Which two actions can the administrator perform to accomplish this? (Choose two.)

A.

Enable the TLSv1.2.

B.

Enable the RC4 cipher suite.

C.

Create a SHA1 key.

D.

Disable the SSLv3.

Scenario: A Junior Citrix Administrator needs to create a content switching virtual server on a Citrix ADC high availability (HA) pair. The NSIP addresses are 192 168.20.10 and 192.168.20.11. The junior administrator connects to NSIP address 192.168.20.10 and saves the changes.

The following day, a Senior Citrix Administrator tests the new content switching virtual server, but it is NOT working. The senior administrator connects to the HA pair and discovers that everything the junior administrator configured is NOT visible.

Why has the Citrix ADC lost the newly added configurations?

A.

The junior administrator made the changes and did NOT force a failover to save the configurations.

B.

The junior administrator connected to the NSIP of the secondary Citrix ADC in the HA pair.

C.

The Citrix ADC appliances have different firmware versions.

D.

Both Citrix ADCs in the HA pair restarted overnight.

Scenario: A Citrix Administrator suspects an attack on a load-balancing virtual server (IP address

192.168.100.25). The administrator needs to restrict access to this virtual server for 10 minutes.

Which access control list (ACL) will accomplish this?

A.

add ns acl rule1 DENY -destIP 192.168.100.25 -TTL 600000

B.

add simpleacl rule1 DENY -srcIP 192.168.100.25 -TTL 600000

C.

add ns acl rule1 DENY -destIP 192.168.100.25 -TTL 600

D.

add simpleacl rule1 DENY -srcIP 192.168.100.25 -TTL 600

Scenario: A Citrix Administrator would like to grant access to a Junior Citrix Administrator on the Citrix ADC.

The administrator would like to grant full access to everything except:

Shell

User configuration

Partition configuration

Which preexisting command policy would meet the needs of this scenario?

A.

Network

B.

Operator

C.

Sysadmin

D.

Superuser

What are three possible policy results in a default (advanced) policy configuration? (Choose three.)

A.

True

B.

False

C.

Undefined

D.

Bridge

E.

Drop

What is one reason a Citrix Administrator should configure the AlwaysON VPN feature?

A.

An employee needs to have client choices after logging on outside the enterprise network.

B.

Management wants to regulate the network access provided to its users when they are connected to a VPN tunnel.

C.

Management wants web traffic to go out locally instead of across the VPN.

D.

An employee starts the laptop outside the enterprise network and needs assistance to establish VPN connectivity.