Category Archives: Citrix Exam

2014 Latest Citrix 1Y0-A28 Exam Demo Free Download!

QUESTION 1
Which type of authentication server could an engineer configure in order to provide the use of RSA token authentication as a permitted authentication method to access a AAA Virtual Server?

A.    LDAP
B.    SAML
C.    RADIUS
D.    Negotiate

Answer: C

QUESTION 2
A company wants to implement a policy where all passwords should be encrypted while transiting the network. Where in the GUI would the network engineer prevent access to unsecured management protocols?

A.    Network -> IPs
B.    System -> Auditing
C.    AppExpert -> Pattern Sets
D.    Protection Features -> Filter

Answer: A

QUESTION 3
Scenario: The NetScaler is configured with a NSIP of 10.20.30.40. Management access is NOT enabled on any other IP address. Which command should an engineer execute to prevent access to the NetScaler using HTTP and only allow HTTPS access?

A.    set ns ip 10.20.30.40 -gui disabled -telnet disabled
B.    set ip 10.20.30.40 -gui secureonly -mgmtaccess enabled
C.    set ip 10.20.30.40 -mgmtaccess disabled -gui secureonly
D.    set ns ip 10.20.30.40 -gui enabled -restrictAccess enabled

Answer: B

QUESTION 4
Company policy states that all passwords should travel the network in encrypted packets except SNMP. Which command should the network engineer execute to comply with this policy?

A.    set ns ip 10.20.30.40 -ssh disabled -telnet disabled -gui enabled
B.    set ns ip 10.20.30.40 -telnet disabled -gui secureonly -ftp disabled
C.    set ns ip 10.20.30.40 -mgmtaccess disabled -restrictaccess enabled
D.    set ns ip 10.20.30.40 -gui secureonly -ssh enabled -restrictaccess enabled

Answer: B

QUESTION 5
Scenario: The IT department in an organization manages servers and network devices from an internal management subnet. A Netscaler device has recently been installed into the DMZ network. The intranet firewall allows TCP 443 from the management subnet to the Netscaler device. How could the engineer ensure that only workstations in the management network are permitted to manage the Netscaler?

A.    Create an Extended ACL based on the source IP address.
B.    Create a restricted route from the internal network to the DMZ.
C.    Enable the management access control option on the NSIP address.
D.    Enable the management access control on the internal SNIP address.

Answer: A

QUESTION 6
Scenario: An engineer has three subnets configured on a NetScaler appliance. The engineer must only allow a certain group of users to access a virtual server on the appliance. The IT Manager requires that all rules are flexible and can be easily modified for ease of administration. How could the engineer allow certain groups to access the virtual server while still being able to modify the setting in the future?

A.    Add a Simple ACL.
B.    Disable USNIP Mode.
C.    Create an Extended ACL.
D.    Add a Host Route to the virtual server.

Answer: C

QUESTION 7
A network engineer needs to configure load balancing for an FTP site. Which type of session persistence method can the engineer select for this scenario?

A.    Rule
B.    Source IP
C.    Cookie Insert
D.    Custom Server ID

Answer: B

QUESTION 8
Scenario: Example.com runs a dating service site that provides a service with videos of candidates. They want to use RTSP load balancing to stream the videos more effectively. Which load balancing method should the engineer select?

A.    Least packet
B.    Round Robin
C.    Least bandwidth
D.    Least connection

Answer: C

QUESTION 9
A network engineer wants to configure a NetScaler for load balancing Voice over IP traffic (VoIP).
Which hash method is the best fit for VoIP traffic?

A.    Call ID
B.    Source IP
C.    Destination IP
D.    Domain name

Answer: A

QUESTION 10
Scenario: A company has three HTTP servers that are load balanced using NetScaler. When users connect to the HTTP application they often receive inconsistent data or are advised that they need to log on again. Which step should the engineer take to correct this?

A.    Remove Down State Flush.
B.    Change the idle timeout value for the service.
C.    Configure persistence with appropriate timeouts.
D.    Change the global TCP Client Idle Time-Out value.

Answer: C

QUESTION 11
Scenario: A network engineer has configured a load balancing virtual server for an HTTP application. Due to the application architecture, it is imperative that a user’s session remains on a single server during the session. The session has an idle timeout of 60 minutes. Some devices are getting inconsistent application access while most are working fine. The problematic devices all have tighter security controls in place. Which step should the engineer take to resolve this issue?

A.    Set the cookie timeout to 60 minutes.
B.    Configure a backup persistence of SourceIP.
C.    Change the HTTP parameters to Cookie Version 1.
D.    Utilize SSL offload to enable the application to use SSL.

Answer: B

QUESTION 12
Scenario: An application that uses HTTP for connections and other protocols for different types of content has been deployed. Load balancing virtual servers have been created for each protocol and the engineer now needs to ensure that once a load balancing decision has occurred, further requests for different content are served from the same server. How could the engineer achieve this?

A.    Create a persistency group.
B.    Set the Spillover method to DYNAMICCONNECTION.
C.    Add a new virtual server for each protocol that is not directly addressable.
D.    Set each virtual server to use Source IP Hash as the load balancing method.

Answer: A

Passing your Citrix 1Y0-A28 Exam by using the latest 1Y0-A28 Exam Demo Full Version: http://www.braindump2go.com/1y0-a28.html

2014 Latest Citrix 1Y0-A25 Exam Demo Free Download!

QUESTION 1
Scenario: Nether Tech’s corporate policy requires that passwords are NOT requested for XenApp passthrough connections, except for those that pertain to members of the Nursing Users group. Nurses connect to XenApp servers hosting applications in the Nurses Worker Group. Click the Exhibit button to view a list of the policies configured in the environment.
 clip_image001
An engineer needs to prioritize the three policies so that only members of the Nurses group are prompted for passwords when they connect to their XenApp resources. What is the correct order of prioritization for the policies from lowest to highest?

A.    Unfiltered, Nurses, Corporate Users
B.    Corporate Users, Nurses, Unfiltered
C.    Unfiltered, Corporate Users, Nurses
D.    Nurses, Unfiltered, Corporate Users

Answer: D

QUESTION 2
Scenario: As part of the designs for the XenDesktop site and XenApp farm at Nether Tech, a Citrix Engineer is instructed to ensure that all auto-created printers use the Citrix Universal Printer Driver. As the deployment phase begins, a home user is experiencing issues printing to a locally attached printer. When print jobs are sent to the printer, the pages print, but only with strange characters on them. To resolve the user’s printing issue, the engineer should create a Citrix User policy and __________. (Choose the correct phrase to complete the sentence.)

A.    set a session printer to the user’s default printer
B.    set the client printer names to legacy printer names
C.    set the client printer names to standard printer names
D.    set PCL5c driver at the top of the Universal driver preference list

Answer: D

QUESTION 3
Scenario: Nether Tech’s head office, which has over 400 employees, is located in the city center of Amsterdam, where the majority of the employees rely on public transport to travel to and from the office. During the winter, a significant amount of disruption is caused when staff cannot get into the office. Nether Tech wants to ensure that staff can connect to their corporate desktops from their home computers or corporate issued laptops during times of disruption. Nether Tech has a XenApp farm already. This farm can be accessed externally and all staff members have access. Nether Tech can only spare two virtual servers to facilitate a solution that will allow employees to access their own corporate physical desktops. Any solution must allow employees to work directly with their own corporate physical desktops. Which solution will best suit Nether Tech’s needs?

A.    Deploy two XenApp servers to the existing farm and publish the RDP client.
B.    Deploy two XenApp servers to the existing farm and publish a hosted desktop for all users.
C.    Deploy two desktop controllers to the existing farm and use XenDesktop to publish each user’s desktop.
D.    Deploy two desktop controllers servers to the existing farm and use XenApp to publish each user’s desktop.

Answer: C

QUESTION 4
Scenario: An engineer has been instructed to implement a new XenApp farm. The IT Manager at Nether Tech wants idle sessions for server hosted applications to be disconnected after two hours and idle sessions for XenApp server hosted desktops to be disconnected after eight hours. There is a separate domain group policy which disconnects idle sessions after four hours. The XenApp servers hosting the server hosted desktops are in a worker group named Apps. The XenApp servers hosting the server hosted desktop are in a worker group named Desktops. Several Computer policies are configured in the environment. Click the Exhibit button to view the list of configured Computer policies.
 clip_image001[4]
Users are complaining that their idle sessions are disconnected after four hours. What must the engineer do to meet the requirements stated in the environment?

A.    Remove the Domain Group Policy.
B.    Disable Domain Group Policy Inheritance.
C.    Change the Domain Group Policy to 8 hours.
D.    Change the Domain Group Policy to 2 hours.

Answer: B

QUESTION 5
Scenario: In order to complete the rollout of a new XenApp farm, a Citrix Engineer is required to set a policy to allow all client printers to auto-create for the domain group called Accounting Users. Their current unfiltered Citrix policy is configured to only auto-create the client’s default printer. The engineer must also ensure that any changes made will NOT affect other users in the farm. All the XenApp servers are in a single worker group. Which three actions must the engineer take to allow the Accounting Users group to receive all of their printers? (Choose three.)

A.    Increase the policy priority.
B.    Decrease the policy priority.
C.    Assign the policy to the Accounting User group.
D.    Assign the policy to the existing XenApp Worker group.
E.    Create a User policy and set the policy to allow the autocreation of all client printers.
F.    Create a Computer policy and set the policy to allow the autocreation of all client printers.

Answer: ACE

QUESTION 6
Scenario: Nether Tech is delivering Windows 7 virtual desktops to 1000 employees using XenDesktop in a XenServer hosting infrastructure that consists of 16 XenServer hosts. Provisioning Services is used to provide standard OS image streaming to the virtual desktops in standard image mode. The Citrix Engineer in the environment has observed a decrease in overall performance. Which two actions should the engineer take to increase performance? (Choose two.)

A.    Delete snapshots from the XenServer storage repository.
B.    Configure the vDisk write cache mode on the target device.
C.    Configure the vDisk write cache mode on the Provisioning Services server.
D.    Create a hard drive on the XenServer storage repository for each virtual machine.

Answer: BD

QUESTION 7
Scenario: Nether Tech has rolled out Windows Server 2008 XenApp published desktop to 1000 employees as their primary workspace since 2008. Recently the Citrix team has been receiving an increasing number of tickets on slow logons and logoffs and slow XenApp server performance. After further investigation, the Citrix team discovered low available disk space on the system drive of the XenApp servers. The majority of the disk space has been occupied by thousands of temporary Internet files and cookies on the local profile cache as well as in the roaming profile storage. The CIO of Nether Tech made a decision to discard the temporary Internet files and cookies but to keep the rest of the user profile information and reclaim local disk space. To accomplish this goal, the Citrix Engineer is looking to use Citrix Profile Management to replace Windows roaming profile. Which two group policy options in the Citrix profile management administrative template should the Citrix Engineer configure to accomplish this goal? (Choose two.)

A.    In profile handling, enable “Delete locally cached profiles on logoff”.
B.    In file system, configure exclusion list: local settings\temporary internet files.
C.    In Streamed user profiles, configure logon without the download temporary Internet files folder.
D.    In Advanced Settings, configure folder redirection: c:\users\%username%\local settings\temporary internet files.
E.    In file system, configure exclusion list: C:\Documents and Settings\%username%\microsoft\internet explorer\temporary internet files.

Answer: AB

QUESTION 8
Scenario: A Citrix Engineer plans to set up a regularly scheduled backup and archive implementation for five critical Windows 2008 Server R2 virtual machines. Each virtual machine must be backed up on a different day at the same time of day and archived to a safe place for extra security. Which two actions must the engineer take to configure the scheduled backup and archive implementation for these five virtual machines? (Choose two.)

A.    Automatically archive to a remote NFS share.
B.    Automatically archive to a remote EXT3 share.
C.    Automatically archive to a local XenServer share.
D.    Create one protection and recovery policy for all five virtual machines.
E.    Create five protection and recovery policies; one for each virtual machine.

Answer: AE

Passing your Citrix 1Y0-A25 Exam by using the latest 1Y0-A25 Exam Demo Full Version: http://www.braindump2go.com/1y0-a25.html

2014 Latest Citrix 1Y0-A16 Exam Demo Free Download!

QUESTION 1
Why is this the best design for the desktops for these user groups?

A.    This design provides the most security by limiting access to the sensitive applications from the virtual desktop only and keeping confidential user data private on each vDisk.
B.    This design is essential to meet the strict security requirements for data and printing while keeping administrative maintenance to a minimum since the user groups are relatively small in number.
C.    This design maintains the security requirements and provides the best user experience by allowing users to write to their own vDisk.
D.    This is the best design for users based in a corporate office where security is a big concern because, when using XenApp, data could be intercepted while traversing the network and print jobs could be misdirected to the wrong printer.

Answer: A

QUESTION 2
Scenario: Users in various corporate and regional offices need access to common office productivity applications and email, in addition to their own job-specific applications. Although WAN congestion is NOT a critical issue at the moment, Healthy Helping Hands’ IT staff would like to keep to a minimum the impact of farm communication to the network. Healthy Helping Hands requires that, whenever possible, users access XenApp servers in the same datacenter where their resources and data are located.
What should the architect do to meet the needs of Healthy Helping Hands while ensuring that network traffic is kept to a minimum?

A.    Create two farms with one zone each.
B.    Create one farm with four zones.
C.    Create four farms with one zone each.
D.    Create one farm with three zones.

Answer: B

QUESTION 3
How should the architect achieve failover between farms?

A.    Create two Web Interface sites in each farm with unique URLs and manually update DNS records to redirect users to another Web Interface in the same farm in case of a failure.
B.    Create a custom ICA file for each farm, distribute these files to all users and allow users to manually select the farm they wish to connect to in case of a failure.
C.    Create a central Web Interface site, add both farms to the WebInterface site and allow users to manually select the application to connect to in case of a failure.
D.    Create a zone preference and failover policy that specifies a primary and secondary farm for each user group.

Answer: D

QUESTION 4
How should the architect configure zone preference and failover for the XenApp farm?

A.    Create eight policies in the following priority order:
1. New York primary, SF secondary applied to Eastern America sites’ subnets;
2. SF primary, NY secondary applied to Western America sites’ subnets;
3. London primary, NY secondary applied to Europe sites’ subnets;
4. Hong Kong primary, SF secondary applied to Asia/Pacific sites’ subnets;
5. NY primary, SF secondary applied to Eastern America user group;
6. SF primary, NY secondary applied to Western America user group;
7. London primary, NY secondary applied to Europe user group;
8. Hong Kong primary, SF secondary applied to Asia/Pacific user group
B.     Create eight policies in the following priority order:
1. NY primary, SF secondary applied to Eastern America user group;
2. New York primary, SF secondary applied to Eastern America sites’ subnets;
3. SF primary, NY secondary applied to Western America user group;
4. SF primary, NY secondary applied to Western America sites’ subnets;
5. London primary, NY secondary applied to Europe user group;
6. London primary, NY secondary applied to Europe sites’ subnets;
7. Hong Kong primary, SF secondary applied to Asia/Pacific user group;
8. Hong Kong primary, SF secondary applied to Asia/Pacific sites’ subnets.
C.     Create four policies in the following priority order:
1. NY primary, SF secondary applied to Eastern America user group;
2. SF primary, NY secondary applied to Western America user group;
3. London primary, NY secondary applied to Europe user group;
4. Hong Kong primary, SF secondary applied to Asia/Pacific user group.
D.     Create four policies in the following priority order:
1. New York primary, SF secondary applied to Eastern America sites’ subnets;
2. SF primary, NY secondary applied to Western America sites’ subnets;
3. London primary, NY secondary applied to Europe sites’ subnets;
4. Hong Kong primary, SF secondary applied to Asia/Pacific sites’ subnets.

Answer: C

QUESTION 5
Why is creating two farms the best solution for this environment?

A.    This solution reduces LAN traffic within sites by ensuring that users access a XenApp server closest to their resources.
B.    This solution ensures that network administrators can customize farm settings for each datacenter.
C.    This solution enhances security by creating separate access control boundaries.
D.    This solution enhances efficient use of network bandwidth by reducing zone data collector communication.

Answer: D

QUESTION 6
Why should the architect apply the subnet policies with a higher priority than the user group policies?

A.    This solution ensures that users will be directed to a XenApp server in the same datacenter as their resources regardless of connection location.
B.    This solution ensures that the users will be directed to the XenApp server with the lightest load regardless of connection location.
C.    This solution ensures that users connecting from the Internet will be directed to the XenApp server closest to their physical location although they may be connecting from unknown subnets.
D.    This solution ensures that the Sales users will be directed to the closest XenApp server to their physical location although they may be connecting fromdifferent regional offices.

Answer: A

QUESTION 7
Based on the assessment document, which two actions must the architect take regarding Citrix
licensing in order to properly assess the environment?

A.    Restart the IIS Service.
B.    Restart the Citrix Licensing Service.
C.    Add the REPORTLOG keyword to the options file.
D.    Create a file called REPORT.LOG in C:\Program Files\Citrix\MyFiles.
E.    Select a network share to which the local system account has write access.

Answer: BC

QUESTION 8
Scenario: Healthy Helping Hands has created a new pilot XenApp 5 Platinum Edition farm with
applications delivered to 25 pilot users. The pilot farm includes all the applications that were previously published to the HR users and some additional applications to support Manufacturing.
During the pilot week of September 14th, the users of the PositivelyPeople application reporting that the application was responding slowly.
 clip_image002
Fortunately, EdgeSight had been installed and configured in the pilot farm and was recording data during the pilot. Attached in the exhibit is the information gathered from the Transaction Network Delay report from EdgeSight. Which theory effectively explains the data that is presented in the report?

A.    The XenApp server is waiting on another host to respond, most likely the server hosting the
PositivelyPeople database.
B.    The XenApp server is waiting on the network packet queue to clear as evidenced by the 9ms
network latency being reported.
C.    The XenApp server is reaching maximum capacity, and the lack of physical resources on the
XenApp server is causing the response delay.
D.    The Network Delay on 9/19/2009 is probably the source of complaints from the HR Users. An
average network latency of almost 9ms is unacceptable.
Description: C:\Documents and Settings\Administrator\Desktop\untitled.JPG

Answer: A

QUESTION 9
Scenario: The IT managers at Healthy Helping Hands are updating their environment.
Recertify the HR users have been experiencing intermittent outages in remote access to their application.
Which solution should be included in the project to address this problem?

A.    Issue company laptops to HR users
B.    Replace the existing Secure Gateway server.
C.    Add a second Secure Gateway server to the environment.
D.    Request that HR users upgrade their Internet connections

Answer: B

QUESTION 10
Scenario: Several users in the HR user group will be traveling to trade conferences this year to meet industry training requirements and stay current on developing trends in the field While working remotely, these users will need to upload presentations and training material distributed during the conferences onto sponsored USB keys.
Based on the analysis document, how can an architect ensure that the current environment allows the HR user group to meet this need?

A.    Edit the HR Users policy to allow client mappings.
B.    Provide a secure FTP site for presentation and training material uploads.
C.    Maintain the current environment since it currently allows users to map their drives.
D.    Move the Secure Gateway/Web Interface server to the DMZ in the environment to allow for
remote connections.

Answer: A

QUESTION 11
Scenario: In order to plan for the possibility of a pandemic flu, the HR department for Healthy
Helping Hands has asked an architect to test whether the infrastructure could accommodate 300 key or ‘at risk” workers working from home over a two week period. Based on the information in the assessment document, can the existing infrastructure support such a situation?

A.    No, there are insufficient licenses available to support this requirement.
B.    Yes, sufficient capacity exists to support this temporary requirement; no action is required.
C.    No. two additional servers are required to support the remote workers during this two week
period.
D.    No. the Secure Gatew3y/Web Interface server has insufficient capacity to support this
requirement.

Answer: A

QUESTION 12
In the future upgrade environment, Healthy Helping Hands wants to provide the IT department with the ability to interact with user session for training and troubleshooting without compromising
security demands. How can an architect meet the needs of the Healthy Helping Hands IT
department?

A.    Enable shadowing in the current environment.
B.    Use Group Policy to enable Microsoft Remote Support.
C.    Purchase license for a third party remote viewing software.
D.    Enable shadowing once the environment is migrated to XenApp 5.

Answer: D

QUESTION 13
Scenario: The Healthy Helping Hands infrastructure assessment identified that the Manufacturing
team has access to locked-down terminals in order to complete their work. However, frequent
breakdowns due to unauthorized software installations have caused productivity problems for the
Manufacturing staff. How can an architect reduce the breakdowns as the applications are moved to a virtual environment?

A.    Upgrade the workstations to new computers.
B.    Lock the workstations using local group policies.
C.    Upgrade the workstations to diskless computers.
D.    Deploy the Desktop Appliance Lock on all workstations.

Answer: D

QUESTION 14
Based on the CIO’s WAN traffic requirement, users at which two locations would have a single point of failure when attempting to access applications? (Choose two)

A.    Hong Kong Site
B.    Berlin Regional Office
C.    Rome Sates Branch Office
D.    New York Main Data Center

Answer: BC

QUESTION 15
Healthy Helping Hands is going to use Provisioning Services for the virtual desktop.
How should the architect design the Provisioning Services component of the environment?

A.    Six Provisioning Services server, two in San Francisco, two in New York, one in London and one in Hong Kong should be used.
B.    Two Provisioning Services servers, one in San Francisco and one in New York, should be used.
C.    Four Provisioning Services server, two in San Francisco and two in Now York, should be used.
D.    Eight Provisioning Services servers, two each in San Francisco, New York, London and Hong Kong should be used.

Answer: D

Passing your Citrix 1Y0-A16 Exam by using the latest 1Y0-A16 Exam Demo Full Version: http://www.braindump2go.com/1y0-a16.html

2014 Latest Citrix 1Y0-400 Exam Demo Free Download!

QUESTION 1
Users must be able to connect remotely from their own mobile devices.
What should the architect consider to increase the security of the current authentication solution?

A.    Adding a second authentication factor
B.    Placing domain controllers in the DMZ for remote users
C.    Shortening the Active Directory password expiration period
D.    Populating the RDS user profile path in the Active Directory user accounts

Answer: D

QUESTION 2
Which aspect of the new storage system’s performance requirements is critical to the success of the project and should be determined before any purchase takes place?

A.    Whether it supports automatic tiering
B.    The number of SSD drives it will hold
C.    Whether 8Gb/s Fibre Channel or 10Gb/s Ethernet technology provides more storage bandwidth
D.    The number of IOPS it must support to host the required amount of pooled and dedicated virtual desktops

Answer: A

QUESTION 3
The architect needs to evaluate the options for replicating user profiles across all sites.
Which two pieces of information should the architect collect to analyze the options? (Choose two.)

A.    WAN traffic
B.    License requirements
C.    Storage infrastructure
D.    Database configuration

Answer: BD

QUESTION 4
What are two potential risks in the existing environment that the architect must address in the proposed virtual solution? (Choose two.)

A.    Local profiles are used and administrators manually delete them when necessary.
B.    Installation of PositivelyPeople is performed manually based on a thoroughly documented process.
C.    No logon scripts are enabled for users because the company abandoned logon scripts last year in favor
of GPOs.
D.    Users log on to the company environment based on Active Directory credentials, but the PositivelyFinance
application requires secondary credentials.

Answer: AB

QUESTION 5
Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications?

A.    VM Hosted applications
B.    Streamed server OS machines
C.    Dedicated desktop OS machines
D.    Pooled desktop OS machine with Personal vDisk

Answer: B

QUESTION 6
Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.
What should an architect recommend to optimize printer bandwidth?

A.    Optimize WAN traffic through CloudBridge.
B.    Increase the WAN bandwidth through a WAN link upgrade.
C.    Restrict overall session bandwidth through a HDX bandwidth policy.
D.    Restrict printer redirection bandwidth through a HDX bandwidth policy.

Answer: A

QUESTION 7
The architect recommended pooled desktop OS machines with Personal vDisks for the Nurses, Imaging, and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines?

A.    Install the antivirus software into the base image.
B.    Deploy the antivirus package as an App-V application.
C.    Deploy the antivirus software through a Group Policy startup script.
D.    Install the antivirus software in the master Personal vDisk as a user-installed application.

Answer: A

QUESTION 8
Which endpoint devices must be replaced to support the Streamed VHD method of desktop delivery?

A.    Windows 7
B.    Windows XP
C.    Linux thin clients
D.    PCs running Internet Explorer 7

Answer: C

QUESTION 9
The company plans to reduce their storage requirement by using thin provisioning with XenServer hosts. Which storage option should the architect verify for capability in the current environment?

A.    NFS
B.    CIFS
C.    iSCSI
D.    Fibre Channel

Answer: A

QUESTION 10
Which consideration is unnecessary for the PositivelyPeople application in the new environment?

A.    File security
B.    Secure remote access
C.    Access to legacy mainframe
D.    Support for secured print jobs

Answer: C
Passing your Citrix 1Y0-400 Exam by using the latest Citrix 1Y0-400 Exam Demo Full Version: http://www.braindump2go.com/1y0-400.html

2014 Latest Citrix 1Y0-300 Exam Demo Free Download!

QUESTION 1
A Citrix Engineer needs to enable high availability on the XenServer host.
What are two requirements for the environment? (Choose two.)

A.    Workload Balancing has to be disabled.
B.    A static IP address must be set on the management interface.
C.    XenServer hosts need to be part of a XenServer resource pool.
D.    A dedicated management interface for high availability must be created.
E.    A shared storage repository needs to be available for heartbeat and metadata.

Answer: CE

QUESTION 2
When using diskless VM with Provisioning Services, which two steps does a Citrix Engineer need to perform for Active Directory Domain Management? (Choose two.)

A.    Enable Target Device Management.
B.    Enable Automatic Device Management.
C.    Enable Automatic Password Management.
D.    Enable Machine Account Password Management.

Answer: CD

QUESTION 3
Scenario: Specialists at CCH are reporting that X-ray images are NOT displaying as expected from a quality standpoint. HDX policies are configured with default values.
What should a Citrix Engineer do to make sure X-ray images are displayed with the best possible quality?

A.    Set the lossy compression level to None.
B.    Set the Flash latency threshold to 50 ms.
C.    Set the progressive display level to High.
D.    Set the extra color compression threshold to 1024 Kbps.

Answer: A

QUESTION 4
CCH requires that every Change at Site configuration is documented for auditing and needs to prevent undocumented changes to the Site configuration.
Which two actions should a Citrix Engineer perform to meet these requirements? (Choose two.)

A.    Ensure that Configuration logging is enabled.
B.    Configure logging for the Site database on the SQL Server.
C.    Enable Windows Security Settings – Audit Policy using Group Policy.
D.    Disable the ‘Allow changes when the database is disconnected’ option on the Configuration database.

Answer: AD

QUESTION 5
A Citrix Engineer creates a new Delivery Controller and needs to join it to an existing Site to increase Site redundancy. Which database user role permissions does the engineer need?

A.    db_owner and db_datawriter permissions
B.    db_accessadmin and dbcreator permissions
C.    db_accessadmin and db_ddladmin permissions
D.    db_securityadmin and dbm_monitor permissions

Answer: A

QUESTION 6
Scenario: A Citrix Engineer must use Provisioning Services to provision 50 desktop OS machines. The engineer has installed and configured two Provisioning Services servers to guarantee high availability and now needs to configure the write cache location of the virtual desktops so that failover is possible in case one of the Provisioning Services servers fails.
Which three write cache locations could the engineer choose? (Choose three.)

A.    In the RAM of the virtual desktop
B.    On a Citrix ShareFile storage zone
C.    On a persistent disk attached to the virtual desktop
D.    On the local disk of both Provisioning Services servers
E.    On a fileshare connected to both Provisioning Services servers

Answer: ACE

QUESTION 7
A Citrix Engineer needs to install a new Delivery Controller with database mirroring.
Which two editions of SQL Server support database mirroring? (Choose two.)

A.    SQL Server 2012 Express
B.    SQL Server 2005 SP3 Enterprise
C.    SQL Server 2012 SP1 Enterprise
D.    SQL Server 2008 R2 SP2 Standard

Answer: CD

QUESTION 8
The IT Help Desk Administrator at CCH needs to shadow a user session for application troubleshooting purposes. Which two permissions need to be set in the environment? (Choose two.)

A.    Read-Only Administrator
B.    Microsoft Group Policy settings for RDS
C.    Microsoft Group Policy settings for Remote Assistance
D.    Perform Remote Assistance on a machine role permission

Answer: CD

QUESTION 9
Scenario: A hosted application reverts to the default settings every time users log off. The application writes configuration data to C:\myapp\data\settings.ini file.
What should a Citrix Engineer create to ensure the user settings are saved?

A.    A custom Machine HDX policy
B.    A logon script renaming C:\myapp\data\
C.    A policy setting for File System Synchronization
D.    A scheduled task relocating C:\myapp\data\ directory

Answer: C

QUESTION 10
A Citrix Engineer needs to configure Citrix StoreFront load balancing on NetScaler and forward the Receiver system IP address.
What should the engineer type into the Client IP Header field on the service group Advanced tab to accomplish this task?

A.    Client-IP
B.    Source-IP
C.    User-agent
D.    X-forwarded-for

Answer: D

QUESTION 11
A Citrix Engineer at CCH needs to use Universal Print Server to simplify printer driver management in a XenDesktop environment.
Which policy should the engineer configure to implement Universal Print Server?

A.    Client printer redirection
B.    Auto-create all client printers
C.    Universal Print Server enable
D.    Use universal printing only if requested driver is unavailable

Answer: C

QUESTION 12
What must be true in order to implement offline profiles with Citrix Profile Management?

A.    Profile streaming must be disabled.
B.    The computer must be joined to a domain.
C.    Active write back must be enabled in the profile definition.
D.    Locally cached profiles must be deleted when users log off.

Answer: B

QUESTION 13
A Citrix Engineer needs to implement RADIUS as a secondary authentication method for remote access users connecting through NetScaler. Which two steps should the engineer take to ensure correct functionality? (Choose two.)

A.    Configure an Administrator Bind DN.
B.    Configure the sdconf.rec file on the NetScaler.
C.    Add a host entry on the RADIUS server for the NetScaler.
D.    Open the intranet firewall for the NSIP address to the RADIUS server.

Answer: CD

QUESTION 14
Users who are testing the hosted shared desktop at CCH report that logon time is unacceptably slow. Which three best practices should a Citrix Engineer implement to optimize the logon time for the hosted shared desktops? (Choose three.)

A.    Enable Profile Streaming.
B.    Enable Active Write Back.
C.    Store the UPM profiles on a highly available CIFS share.
D.    Replace logon scripts with GPO preferences where possible.
E.    Redirect common folders such as Documents, Music, and Pictures.

Answer: ADE

QUESTION 15
Scenario: A Citrix Engineer needs to deploy static desktops with Personal vDisk for the head office staff. The engineer implements a catalog named Windows8-PvD with Personal vDisk enabled and uses Citrix Roaming Profile Management to save user profile settings.
The engineer needs to configure Personal vDisk to NOT store user profile settings. Additionally, Personal vDisk must be configured so that 80% is allocated for applications and 20% is allocated for user profile data.
Which two steps must the engineer take to implement this solution? (Choose two.)

A.    Configure the registry key PercentOfPvDForApps on the master image with a value of 80.
B.    Configure the registry key EnableUserProfileRedirection on the master image with a value of 0.
C.    Run “Set-BrokerDesktopGroup “Windows8-PvD” -PeakBufferSizePercent 80″ on the Delivery Controller.
D.    Configure the registry key EnableDynamicResizeOfAppContainer on the master image with a value of 1.
E.    Run “Set-BrokerDesktopGroup “Windows8-PvD” -OffPeakBufferSizePercent 20″ on the Delivery Controller.

Answer: AB

Passing your Citrix 1Y0-300 Exam by using the latest Citrix 1Y0-300 Exam Demo Full Version:  http://www.braindump2go.com/1y0-300.html

2014 Latest Citrix 1Y0-200 Exam Demo Free Download!

QUESTION 1
Based on the information shown in the attached exhibit, does the XenServer host have sufficient CPU resources available?
 clip_image002[5]
Click the Exhibit button to view a screenshot of the Performance Graphs for the XenServer host.

A.    The CPU resources are sufficient, and NO upgrade is required.
B.    The CPU resources are sufficient, but some virtual machines have occasional peaks.
C.    The CPU resources are insufficient; upgrading or running fewer virtual machines is recommended.
D.    The CPU resources are sufficient for now, but running additional virtual machines is NOT recommended.

Answer: A

QUESTION 2
A Citrix Administrator turned on Provisioning Services auditing. Changes made in the __________, __________ and __________ will be recorded. (Choose the three correct locations to complete the sentence.)

A.    MCLI
B.    SOAP Server
C.    Provisioning Services Console
D.    Provisioning Services BOOTPTAB Editor
E.     Provisioning Services Boot Device Manager

Answer: ABC

QUESTION 3
Which PowerShell commandlet should a Citrix Administrator use to enable event logging for the authentication service, stores and Receiver for Web?

A.    Set-DSTraceLevel -All -TraceLevel Off
B.    Set-DSTraceLevel -All -TraceLevel Info
C.    Set-DSTraceLevel -All -TraceLevel Verbose
D.    Set-DSTraceLevel -All -TraceLevel Warning

Answer: C

QUESTION 4
A Citrix Administrator finds that Profile Management is NOT writing .INI files back to the User Profile Store. Which log entry type should the administrator enable in Profile Management logging to see which items are being written to the User Profile Store?

A.    File system actions
B.    Common information
C.    File system notifications
D.    Personalized user information

Answer: A

QUESTION 5
After configuring Active Directory authentication on a NetScaler VPX appliance, users report that they are unable to authenticate to NetScaler. Which two steps must a Citrix Administrator complete to troubleshoot this issue? (Choose two.)

A.    Validate that port 389 is open to the domain controller.
B.    Enable AAA authentication logging to monitor user authentication attempts.
C.    Run the LDAP browser from the Delivery Controller to validate LDAP connectivity.
D.    Configure a session policy on the NetScaler virtual server to use the LDAP profile.

Answer: AB

QUESTION 6
A Citrix Administrator needs to shadow a user session from Citrix Director but is unable to connect to the user’s Windows 7 virtual desktop. Which two ports may be blocked by a firewall? (Choose two.)

A.    80
B.    135
C.    443
D.    1494
E.     3389

Answer: B

QUESTION 7
A Citrix Administrator identifies that Citrix Studio CANNOT communicate with the Delivery Controller database. Which port may be blocked, preventing Citrix Studio from being able to connect to the database?

A.    443
B.    1433
C.    1494
D.    27000

Answer: B

QUESTION 8
Which three 60-minute historical trends can a Citrix Administrator view when using Citrix Director? (Choose three.)

A.    CPU usage
B.    Machine failures
C.    License checkouts
D.    Connection failures
E.     Concurrent sessions
F.     Memory consumption

Answer: BD

QUESTION 9
Scenario: A Citrix Administrator replaces the production StoreFront server with a new StoreFront server. Users access their resources from StoreFront through NetScaler. Which NetScaler policy must the administrator modify in order to allow users to continue to access resources securely from external locations?

A.    Traffic
B.    Session
C.    Authorization
D.    Authentication

Answer: B

QUESTION 10
The Sales team requests that a Citrix Administrator enhance the user experience on tablet devices. Which policy setting should the administrator enable to meet the requirements of the Sales team?

A.    Multimedia Conferencing
B.    Flash Content Redirection
C.    Windows Media Redirection
D.    Launch touch-optimized desktop

Answer: D

QUESTION 11
A Citrix Administrator needs to ensure that individual support teams are only able to control the delivery groups for their units. Which feature should the administrator configure to ensure that the appropriate teams have administrator access to the desktops for their particular unit?

A.    Scopes
B.    Exclusion filters
C.    User assignment
D.    SmartAccess settings

Answer: A

QUESTION 12
Which two actions should a Citrix Administrator take prior to deleting desktop OS machines from a machine catalog? (Choose two.)

A.    Turn off the desktop OS machines.
B.    Place the desktop OS machines in maintenance mode.
C.    Remove the desktop OS machines from the hypervisor.
D.    Delete the Active Directory account for the desktop OS machines.
E.     Enable maintenance mode on the hypervisor hosting the desktop OS machines.

Answer: AB

QUESTION 13
Which two methods could a Citrix Administrator use to ensure that users are able to launch multiple virtual desktop sessions? (Choose two.)

A.    Change the ‘Desktops per user’ setting in the delivery groups settings.
B.    Give the user multiple devices so that they can have a session open on each.
C.    Create two host connections from the Delivery Controller to different hypervisors.
D.    Create two delivery groups from the same catalog and assign the users to both delivery groups.

Answer: AD

QUESTION 14
A Citrix Administrator publishes an application but receives reports that the application is NOT visible in Receiver through StoreFront. Why is the application NOT visible to users?

A.    The application is disabled.
B.    The path to the executable is incorrect.
C.    There are some user groups NOT assigned to the application.
D.    There are NO available server OS machines in the machine catalog.

Answer: C
Passing your Citrix 1Y0-200 Exam by using the latest Citrix 1Y0-200 Exam Demo Full Version:  http://www.braindump2go.com/1y0-200.html