Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Scenario: A Citrix Architect needs to assess an existing NetScaler multi-site deployment. The deployment is using Global Server Load Balancing (GSLB) configured in a parent-child configuration.

Click the Exhibit button to view the diagram of the current GSLB configuration and parent-child relationships, as well as the status of the sites and the connectivity between them.

Based on the displayed configuration and status, Child_site1_______ a connection from _______. (Choose the correct option to complete the sentence.)

A.

rejects; SiteP2 and SiteP3; remains a child site of SiteP1

B.

rejects; SiteP3; remains a child site of SiteP1

C.

accepts; SiteP3; becomes its child site

D.

accepts; SiteP2; becomes its child site

E.

does NOT receive; SiteP2 and SiteP3; remains a child site of SiteP1

F.

rejects; SiteP2; remains a child site of SiteP1

Scenario: A Citrix Architect needs to deploy a load balancing for an application server on the NetScaler. The authentication must be performed on the NetScaler. After the authentication, the Single Sign-on with the application servers must be performed using Kerberos impersonation.

Which three authentication methods can the Architect utilize to gather the credentials from the user in this scenario? (Choose three.)

A.

SAML

B.

OTP

C.

TACACS

D.

WEBAUTH

E.

LDAP

Which two methods can a Citrix Architect use to create a Heat Orchestration template? (Choose two)

A.

Direct Input

B.

Configuration jobs

C.

Citrix Web App Firewall Policies

D.

File

E.

Gateway Policies

Scenario: A Citrix Architect has configured two MPX devices in high availability mode with version 12.0.53.13 nc. After a discussion with the security team, the architect enabled the Application Firewall feature for additional protection.

In the initial deployment phase, the following security features were enabled:

    IP address reputation

    HTML SQL injection check

    Start URL

    HTML Cross-site scripting

    Form-field consistency

After deployment in pre-production, the team identifies the following additional security features and changes as further requirements:

    Application Firewall should retain the response of form field in its memory When a client submits the form in the next request. Application Firewall should check for inconsistency in the request before sending it to the web server

    All the requests dropped by Application Firewall should receive a pre-configured HTML error page with appropriate information.

    The Application Firewall profile should be able to handle the data from the RSS feed and an ATOM-based site.

Click the Exhibit button to view an excerpt of the existing configuration.

What should the architect do to meet these requirements?

A.

Delete the existing profile and create a new profile of type: XML Application (SOAP)

B.

Modify the existing profile to include sessionization

C.

Create a new basic profile and use pre-existing HTML settings.

D.

Modify existing profile settings, change HTML settings, and ensure to exclude uploaded files from security checks.

Scenario: A Citrix Architect needs to configure a Content Switching virtual server to provide access to www.workspacelab.com . However, the architect observes that whenever the user tries to access www.worksapcelab.com/CITRIX/WEB , the user receives a "503 - Service Unavailable" response. The configuration snippet is as follows:

What should the architect modify to resolve this issue?

A.

add cs policy Pol3 -rule "http.REQ.URL.containsC'WEB")" -action Act3

B.

add cs policy Pol3 -rule "http.REQ.URLcontainsf'citrix")" -action Act3

C.

set cs vserver Vserver -caseSensitive ON

D.

add cs policy Pol3 -rule "http.REQ.URLPATH_AND_QUERY.con

Which request can a Citrix Architect utilize to create a NITRO API command to add a NetScaler appliance with NSIP address 10.102.29.60 to the cluster?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Scenario: A Citrix Architect is asked by management at the Workspacelab organization to review their existing configuration and make the necessary upgrades. The architect recommends small changes to the pre-existing Citrix ADC configuration. Currently, the Citrix ADC MPX devices are configured in a high availability pair, and the outbound traffic is load balanced between two Internet service providers (ISPs). However, the failover is NOT happening correctly. The following requirements were discussed during the design requirement phase:

• The return traffic for a specific flow should be routed through the same path while using Link Load Balancing.

• The link should fail over even if the ISP router is up and intermediary devices to an ISP router are down.

• Traffic going through one ISP router should fail over to the secondary ISP, and the traffic should NOT flow through both routers simultaneously. What should the architect configure to meet this requirement?

A.

Transparent monitor

B.

Ping Monitor

C.

HTTP-ECV monitor wit" secure option enabled

D.

HTTP-ECV monitor without secure option enabled

Scenario: A Citrix Architect has deployed two MPX devices. 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm and the devices are installed behind a CISCO ASA 5585 Firewall. The architect enabled the following features on the Citrix ADC devices. Content Switching. SSL Offloading, Load Balancing, Citrix Gateway. Application Firewall in hybrid security and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server.

The following requirements were discussed during the implementation:

    All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration.

    All traffic should be secured and any traffic coming Into FITTP should be redirected to HTTPS.

    Single Sign-on should be created for Microsoft Outlook web access (OWA).

    Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC when users hit the Logoff button In Microsoft Outlook web access.

    Users should be able to authenticate using either user principal name (UPN) or sAMAccountName.

    The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers and the monitor probes must be sent on SSL.

Which monitor will meet these requirements?

A.

add lb monitor mon.rpc HTTP-ECV -send "GET /rpc/healthcheck.htm" recv 200 -LRTM DISABLED -secure YES

B.

add lb monitor mon.rpc HTTP -send "GET /rpc/healthcheck.htm" recv 200 -LRTM DISABLED -secure YES

C.

add lb monitor mon.rpc HTTP-ECV -send "GET /owa/healthcheck.htm" recv 200 -LRTM DISABLED

D.

add lb monitor mon.rpc HTTP-ECV -send "GET /owa/healthcheck.htm" recv 200 -LRTM ENABLED

E.

add lb monitor mon.rpc HTTP-ECV -send "GET /rpc/healthcheck.htm" recv 200 -LRTM ENABLED

Scenario: A Citrix Architect needs to design a hybrid Citrix Virtual App and Citrix Virtual Desktop environment which will include as well as resource locations in an on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

    Active Citrix Virtual App and Citrix Virtual Desktop Service subscription

    No existing Citrix deployment

    Minimization of additional costs

    All users should correct directly to the resource locations containing the servers which will host HDX sessions

Click the Exhibit button to view the conceptual environment architecture.

The architect should use___________ in Location A, and should use _______________ in Location B. (Choose the correct option to complete the sentence.)

A.

No Citrix products; Citrix ICA Proxy (cloud-licensed)

B.

Citrix Gateway as a Service; Citrix ICA Proxy (cloud-licensed)

C.

Citrix Gateway as a Service; no Citrix ADC products

D.

No Citrix products; Citrix Gateway appliance

E.

Citrix gateway as a Service; Citrix ADC (BYO)

Scenario: A Citrix Architect needs to design a new Citrix Gateway deployment for a customer. During the design discussions, the architect documents the key

requirements for the Citrix Gateway.

Click the Exhibit button to view the key requirements.

The architect should configure Citrix Gateway for __________________in order to meet the stated requirements. (Choose the correct option to complete the

sentence.)

A.

ICA proxy

B.

Client access

C.

VPN access

D.

ROP proxy