Scenario: A Citrix Engineer is notified that improper requests are reacting the web application. While investigating, the engineer notices that the Citrix Web App Firewall policy has zero hits. What are two possible causes for this within the Citrix Web App Firewall policy? (Choose two.)
A. The expression is incorrect.
B. It has been assigned an Advanced HTML profile.
C. It is NOT bound to the virtual server.
D. It has been assigned the built-in APPFW_RESET profile.
Which Front End Optimization technique can a Citrix Engineer enable on the Citrix ADC to remove all excess whitespace from a file?
A. Shrink to Attributes
C. Lazy Load
What can a Citrix Engineer implement to protect against the accidental disclosure of personally identifiable information (PII)?
A. Form Field Consistency
B. HTML Cross-Site Scripting
C. Safe Object
D. Cookie Consistency.
Which Citrix Application Delivery Management (ADM) Analytics page allows a Citrix Engineer to monitor the metrics of the optimization techniques and congestion control strategies used in Citrix ADC appliances?
A. Gateway Insight
B. TCP Insight
C. HDX Insight
D. Web Insight.
Scenario: A Citrix Engineer is asked to help improve the performance of a web application. After capturing and analyzing a typical session, the engineer notices a large number of user requests for the stock price of the company. Which action can the engineer take to improve web application performance for the stock quote?
A. Enable the Combine CSS optimization.
B. Create a static content group.
C. Create a dynamic content group.
A Citrix Engineer needs to create a configuration job to clone a configuration from an existing Citrix ADC to a new Citrix ADC. Which configuration source can the engineer use to accomplish this?
A. Master Configuration
B. Inbuilt Template
D. Configuration Template.
What is required for connecting a data center to the Citrix Application Delivery Management (ADM) Service?
B. Configuration Job
Scenario: A Citrix Engineer wants to configure the Citrix ADC for OAuth authentication. The engineer uploads the required certificates, configure the actions, and creates all the necessary policies. After binding the authentication policy to the application, the engineer is unable to authenticate. What is the most likely cause of this failure?
A. The log files are full.
B. The Redirect URL is incorrect.
C. The certificates have expired.
D. The policy bindings were assigned incorrect priorities.
Scenario: A Citrix Engineer implements Application-level Quality of Experience (AppQoE) to protect a web application. The engineer configures the AppQoE action to deliver a custom response from a backup server once the maximum number of concurrent connection is reached. To achieve this, the engineer should set the Acton Type to ________ and specify the ________. (Choose the correct option to complete the sentence.)
A. NS; Alternate Content Server Name
B. ACS; Custom File
C. ACS; Alternate Content Server Name
D. NS; Custom File
A Citrix Engineer needs to set up access to an internal application for external partners. Which two entities must the engineer configure on the Citrix ADC to support this? (Choose two.)
A. SAML Policy
B. SAML IdP Profile
C. SAML IdP Policy
D. SAML Action.
Scenario: A Citrix Engineer configures Citrix Web App Firewall to protect an application. Upon reviewing the log files, the engineer notices a pattern of forceful browsing toward the configuration page for the application. To protect against this, the engineer enforces Start URL and enables Enforce URL Closure. What is the effect of enforcing Start URL and enabling Enforce URL Closure on the application?
A. Access to the path /config.aspx is unblocked when a user clicks a referring link elsewhere on the website.
B. Non-administrative users are blocked from the path /config.aspx. Administrative users are permitted to the path /config.aspx.
C. External users are blocked from the path /config.aspx. Internal users are permitted to the path /config.aspx.
D. Access to the path /config.aspx is blocked.
A review of purchases made at an online retailer shows that several orders were processed for items at an unpublished price. Which protection can a Citrix Engineer implement to prevent a site visitor from modifying the unit price of a product on the shopping cart page?
A. Cross-Site Request Forgeries (CSRF)
B. Form Field Consistency
C. HTML Cross-Site Scripting (XSS)
D. HTML SQL Injection
Which Front End Optimization technique causes the Citrix ADC to resize images before sending them to the client?
B. Shrink to Attributes
A Citrix Engineer reviews the App Dashboard and notices that three of the monitored applications have an App Score of less than 50. The engineer can interpret the App Score as a metric of application ___________. (Choose the correct option to complete the sentence.)
A. security, with a lower score indicating better security
B. performance and availability, with a higher score indicating better health
C. performance and availability, with a lower score indicating better health
D. security, with a higher score indicating better security
Scenario: A Citrix Engineer has configured Integrated Caching to improve application performance. Within hours, the Citrix ADC appliance has run out of memory. Which Content Group setting can the engineer configure to show the caching process until a need is demonstrated?
A. Maximum memory usage limit
B. Quick Abort Size
C. Do not cache – if hits are less than
D. Do not cache – if size exceeds