Scenario: A Citrix Administrator has configured an Authentication, Authorization, and Auditing (AAA) action policy to allow users access through the NetScaler. The administrator bound the policy to a specific virtual server. Which policy expression will allow all users access through the virtual server?
Scenario: A Citrix Administrator has configured the following Access Control List (ACL) to block traffic from the IP address 10.102.29.5. add simpleacl rule1 DENY srcIP 10.102.29.5 A week later, the administrator found that the ACL is no longer present on the NetScaler. What could be the reason for this?
A. The administrator did NOT run the apply ACL command.
B. The NetScaler has been restarted without saving the configurations.
C. The Simple ACLs remain active for only 600 seconds.
D. The Simple ACLs remain active for only 60 seconds.
Scenario: External users are currently experiencing delays while accessing XenApp and XenDesktop through the NetScaler. A Citrix Administrator needs to monitor the ICA connections to gather the performance information from the NetScaler Management and Analytics System (MAS). Which two tools can the administrator use to gather information about WAN Latency, DC Latency and Host Delay? (Choose two.)
A. HDX Insight
B. Gateway Insight
C. Web Insight
D. TCP Insight
Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)
A. Configure the HA status of the Primary Node as STAYPRIMARY.
B. HA Monitoring should be disabled on all the unused interfaces.
C. Both the devices should have different SNIP addresses.
D. The nsroot password should be the same on both nodes.
E. The Independent Network Configuration (INC) mode should be enabled.
Which VLAN(S) will be bound to an interface, if VLAN 20 is bound to the interface as tagged in an environment where NetScaler is configured with the default settings?
A. VLAN 20 untagged only
B. VLAN 1 tagged, VLAN 20 tagged
C. VLAN 1 untagged, VLAN 20 tagged
D. VLAN 20 tagged only
POLICY 1: add rewrite action ACT_1 corrupt_http_header Accept-Encoding add rewrite policy POL_1 HTTP.REQ.IS_VALID ACT_1 POLICY 2: add rewrite action ACT_2 insert_http_header Accept-Encoding “\”identity\”” add rewrite policy POL_2 “HTTP.REQ.IS_VALID” ACT_2 How can a Citrix Administrator bind the rewrite policies to the LB vserver lb_vsrv such that POL_2 is evaluated after POL_1 is evaluated successfully?
A. bind lb vserver lb_vsrv –policyName POL_1 –priority 110 –gotoPriorityExpression NEXT –type REQUEST bind lb vserver lb_vsrv –policyName POL_2 –priority 100 –gotoPriorityExpression END –type REQUEST
B. bind lb vserver lb_vsrv –policyName POL_1 –priority 90 –type REQUEST bind lb vserver lb_vsrv –policyName POL_2 –priority 100 –type REQUEST
C. bind lb vserver lb_vsrv –policyName POL_1 –priority 90 –gotoPriorityExpression NEXT –type REQUEST bind lb vserver lb_vsrv –policyName POL_2 –priority 100 –gotoPriorityExpression END –type REQUEST
D. bind lb vserver lb_vsrv –policyName POL_1 –priority 90 –gotoPriorityExpression END –type REQUEST
A Citrix Administrator needs to configure the Lights Out Management (LOM) port. Which statement is applicable to LOM?
A. LOM is accessed using Command-Line Interface (CLI).
B. LOM IP address should be in the same subnet as NSIP.
C. LOM firmware is included in the NetScaler upgrade package.
D. LOM port can be used to remotely monitor and manage the appliance.
A user needs to resolve the domain training.citrix.com, and the information is NOT available in resolver cache and Local Domain Name Server (DNS). Where will the request be forwarded next?
A. Root server
B. Authoritative Name server
C. Top-level Domain server
D. Second-level Domain server
Scenario: A Citrix Administrator is running applications on thousands of load-balanced backend servers in a large infrastructure. It is difficult to track and troubleshoot problems due to the large volume of traffic received. Which feature of NetScaler Management and Analytics System (NetScaler MAS) can the administrator configure to monitor and troubleshoot in detail for an environment of this size?
A. AppFlow Analytics
B. Advanced Analytics with Telemetry Node installed
C. Application Performance Analytics
D. Application Security Analytics
After being audited, a Citrix Administrator was notified that additional enhancements should be made of the virtual servers. Which two options can the administrator take to make the additional enhancements? (Choose two.)
A. Enable RC4 cipher suite
B. Create SHA1 key
C. Enable TLSv1.2
D. Disable SSLv3
Which two configurations can a Citrix Administrator use to block all the post requests that are larger than 10,000 bytes in order to protect the environment against HashDoS attacks? (Choose two.)
A. add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) && http.REQ.CONTENT_LENGTH.GT(10000)” add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP bind responder global pol_resp_hashdos_prevention 70 END type REQ_OVERRIDE
B. add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) && http.REQ.CONTENT_LENGTH.GT(10000)” add rewrite policy drop_rewrite expr_hashdos_prevention DROP bind rewrite global drop_rewrite 100 END type REQ_OVERRIDE
C. add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) || http.REQ.CONTENT_LENGTH.GT(10000)” add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP bind responder global pol_resp_hashdos_prevention 70 END type REQ_OVERRIDE
D. add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) || http.REQ.CONTENT_LENGTH.GT(10000)” add rewrite policy drop_rewrite expr_hashdos_prevention DROP
Scenario: A Citrix Administrator manages an environment that has multiple websites running through a NetScaler MPX 5550. The NetScaler meets the needs of the environment throughout the year, except in December, when the capacity doubles. The administrator needs to handle this increased web traffic with a temporary, cost-effective solution. Which action should the administrator recommend in order to handle the increased web traffic?
A. Purchase a license to upgrade the MPX 5550 to a MPX 5650.
B. Purchase a BurstPack License.
C. Purchase Universal License.
D. Purchase NetScaler Gateway Platform License.
Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL virtual servers?
A. SSL Policy
B. SSL Profile
C. SSL Bridge
D. SSL Offload
What is a recommended practice for managing a NetScaler high availability (HA) pair to ensure that management changes are always made on the Primary NetScaler?
A. Connect to both NetScalers to see which one is the Primary.
B. Enable Management Access to a SNIP.
C. Enable Management Access on the Cluster IP (CLIP) address.
D. Connect to the shared HA NSIP.
Scenario: A Citrix Administrator is configuring SNMP management on the NetScaler to receive alerts when something fails. The administrator was confident that the Manager, Alarms and SNMP Traps were configured correctly. The following week, there was a NetScaler-related outage and the administrator did NOT get any alerts. What could be the reason for the SNMP alert failure?
A. The Community Name was NOT configured on the NetScaler SNMP Trap Destination settings.
B. The NetScaler only has Standard licensing.
C. The NetScaler is configured for SNMP version 1.
D. The NetScaler Application Firewall is blocking the alerts from going out.