Scenario: To meet the security requirements of the organization, a Citrix Administrator needs to configure a Citrix Gateway virtual server with time-outs for user sessions triggered by the behaviors below: Inactivity for at least 15 minutes. No keyboard or mouse activity for at least 15 minutes Which set of time-out settings can the administrator configure to meet the requirements?
A. Session time-out and client idle time-out set to 15
B. Session time-out and forced time-out set to 15
C. Client idle time-out and forced time-out set to 15
D. Client idle time-out and forced time-out set to 900
Scenario: Users are attempting to logon through Citrix Gateway. They successfully pass the Endpoint Analysis (EPA) scan, but are NOT able to see the client choices at logon. What can a Citrix Administrator disable to allow users to see the client choices at logon?
A. Quarantine groups
B. Client choices globally
C. Split tunneling
D. nFactor authentication
A Citrix Network Engineer informs a Citrix Administrator that a data interface used by Citrix ADC SDX is being saturated. Which action could the administrator take to address this bandwidth concern?
A. Add a second interface to each Citrix ADC VPX instance.
B. Configure LACP on the SDX for management interface.
C. Configure LACP on the SDX for the data interface.
D. Configure a failover interface set on each Citrix ADC VPX instance.
While applying a new Citrix ADC device, a Citrix Administrator notices an issue with the time on the appliance. Which two steps can the administrator perform to automatically adjust the time? (Choose two.)
A. Add an SNMP manager.
B. Add an SNMP trap.
C. Enable NTP synchronization.
D. Add an NTP server.
E. Configure an NTP monitor.
Scenario: A Citrix Administrator configures an access control list (ACL) to block traffic from the IP address 10.102.29.5: add simpleacl rule1 DENY -srcIP 10.102.29.5 A week later, the administrator discovers that the ACL is no longer present on the Citrix ADC. What could be the reason for this?
A. The administrator did NOT run the apply ACL command.
B. The simple ACLs remain active for only 600 seconds.
C. The simple ACLs remain active for only 60 seconds.
D. The Citrix ADC has been restarted without saving the configurations.
Which three Citrix Gateway elements can be configured by the Citrix Gateway Wizard? (Choose three.)
A. The rewrite policy for HTTP to HTTPS redirect
B. The responder policy for HTTP to HTTPS redirect
C. The Citrix Gateway primary virtual server
D. The bind SSL server certificate for the Citrix Gateway virtual server
E. The primary and optional secondary authentications
Which four steps should a Citrix Administrator take to configure SmartAccess? (Choose four.)
A. Execute “set-BrokerSite -TrustRequestsSentToTheXMLServicePort $True” on any Citrix Delivery Controller in the Site.
B. Enable Citrix Workspace control within StoreFront.
C. Ensure that the SmartAccess filter name on the Delivery Group matches the name of the Citrix Gateway virtual server.
D. Ensure that the SmartAccess filter name on the Delivery Group matches the name of the Citrix Gateway policy.
E. Ensure that ICA Only is unchecked on the Citrix Gateway virtual server.
F. Ensure that the Callback URL is defined in the Citrix Gateway configuration within Store Front.
G. Ensure that ICA Only is checked on the Citrix Gateway virtual server.
Scenario: A Citrix Administrator is managing a Citrix Gateway with a standard platform license and remote employees in the environment. The administrator wants to increase access by 3,000 users through the Citrix Gateway using VPN access. Which license should the administrator recommend purchasing?
A. Citrix Gateway Express
B. Citrix ADC Upgrade
C. Citrix Gateway Universal
D. Citrix ADC Burst Pack
A Citrix Administrator needs to configure a Citrix ADC high availability (HA) pair with each Citrix ADC in a different subnet. What does the administrator need to do for HA to work in different subnets?
A. Configure SyncVLAN
B. Turn on Independent Network Configuration (INC) mode
C. Turn on HA monitoring on all Interfaces
D. Turn on fail-safe mode
Scenario: A Citrix Administrator configured a new router that requires some incoming and outgoing traffic to take different paths through it. The administrator notices that this is failing and runs a network trace. After a short monitoring period, the administrator notices that the packets are still NOT getting to the new router from the Citrix ADC. Which mode should the administrator disable on the Citrix ADC to facilitate the successful routing of the packets?
C. MAC-based forwarding (MBF)
Scenario: A Citrix Administrator configured SNMP to send traps to an external SNMP system. When reviewing the messages, the administrator notices several entity UP and entity DOWN messages. To what are these messages related?
A. Load-balancing virtual servers
B. SSL certificate
D. High availability nodes
Scenario: A Citrix Administrator needs to test a SAML authentication deployment to be used by internal users while accessing several externally hosted applications. During testing, the administrator notices that after successfully accessing any partner application, subsequent applications seem to launch without any explicit authentication request. Which statement is true regarding the behavior described above?
A. It is expected if the Citrix ADC appliance is the common SAML identity provider (IdP) for all partners.
B. It is expected due to SAML authentication successfully logging on to all internal applications.
C. It is expected if all partner organizations use a common SAML service provider (SP).
D. It indicates the SAML authentication has failed and the next available protocol was used.
Scenario: A Citrix Administrator needs to integrate LDAP for Citrix ADC system administration using current Active Directory (AD) groups. The administrator created the group on the Citrix ADC, exactly matching the group name in LDAP. What can the administrator bind to specify the permission level and complete the LDAP configuration?
A. Users to the group on the Citrix ADC
B. A nested group to the new group
C. An authentication, authorization, and auditing (AAA) action to the group
D. A command policy to the group
Which type of policy would a Citrix Administrator use to disable USB redirection?
Scenario: A Citrix Administrator configured the policies below: POLICY 1: add rewrite action ACT_1 corrupt_http_header Accept-Encoding add rewrite policy POL_1 HTTP.REQ.IS_VALID ACT_1 POLICY 2: add rewrite action ACT_2 insert_http_header Accept-Encoding “\”identity\”” add rewrite policy POL_2 “HTTP.REQ.IS_VALID” ACT_2 Which set of commands can the administrator use to bind the rewrite policies to the LB vserver lb_vsrv so that POL_2 is evaluated after POL_1 is evaluated successfully?
A. bind lb vserver lb_vsrv -policyName POL_1 -priority 110 -gotoPriorityExpression NEXT -type REQUEST bind lb vserver lb_vsrv -policyName POL_2 -priority 100 -gotoPriorityExpression END -type REQUEST
B. bind lb vserver lb_vsrv -policyName POL_1 -priority 90 -type REQUEST bind lb vserver lb_vsrv -policyName POL_2 -priority 100 -type REQUEST
C. bind lb vserver lb_vsrv -policyName POL_1 -priority 90 -gotoPriorityExpression END -type REQUEST bind lb vserver lb_vsrv -policyName POL_2 -priority 80 -gotoPriorityExpression NEXT -type REQUEST
D. bind lb vserver lb_vsrv -policyName POL_1 -priority 90 -gotoPriorityExpression NEXT -type REQUEST bind lb vserver lb_vsrv -policyName POL_2 -priority 100 -gotoPriorityExpression END -type REQUEST