A Citrix Administrator has deployed a new NetScaler MPX appliance in the demilitarized (DMZ) with one interface in the DMZ and the other on the internal network.
In which mode should the administrator deploy the NetScaler?
Which three Unified Gateway elements can be configured by the Unified Gateway Wizard? (Choose three.)
Scenario: A Citrix Administrator manages an environment that has an externally accessible website. The administrator would like to provide end-to-end encryption and use features such as caching and compression on the NetScaler.
Which setting in SSL offload should the administrator configure to meet this requirement?
A Citrix Administrator receives user complaints about latency while accessing an application that is being load-balanced on the NetScaler.
Which tool can the administrator use to gather information regarding Response time, Client latency and Server-side processing time?
Scenario: Client connects to certain virtual servers are abnormally high. A Citrix Administrator needs to be alerted whatever the connections pass a certain threshold.
How can the administrator use NetScaler Management and Analytics System (MAS) to accomplish this requirement?
Scenario: Users belong to three Authentication, Authorization and Auditing (AAA) groups: Corporate, Finance and Software.
Show aaa groups:
>show aaa group
1) GroupName: Corporate
2) GroupName: Finance
3) GroupName: Software
>show aaa group Corporate
Authorization Policy: pol_1, Type: Classic, Priority: 0
> add authorization policy pol_1 ns_true ALLOW
> bind aaa group Corporate –policy pol_1
The user is being denied resources while aaad.debug shows:
Group ‘corporate’ being extracted for user User1
Why is the user being denied access?
Scenario: A Citrix Administrator manages an environment that has multiple websites running through a NetScaler MPX 5550. The NetScaler meets the needs of the environment throughout the year, except in December, when the capacity doubles. The administrator needs to handle this increased web traffic with a temporary, cost-effective solution.
Which action should the administrator recommend in order to handle the increased web traffic?
Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)
Scenario: A Citrix Administrator was notified that all contractor user IDs will start with the prefix “con.” Currently SmartControl is used to restrict access to peripherals.
Which expression can the administrator use to accomplish this requirement?
Scenario: A NetScaler Appliance is having intermittent issues. A Citrix Administrator is unable to identify the root cause and fix them. The administrator opened a Support ticket and the engineer assigned to the case requested all the logs and configuration information from the NetScaler.
Which technical support tool can the administrator use to gather all the information on the NetScaler to send to the Support Engineer?
A Citrix Administrator is configuring a NetScaler high availability (HA) pair and needs to ensure that one NetScaler is UP and primary at all times to ensure the business websites are always available.
What does the administrator need to do ensure that the NetScalers still handle web traffic in the event that both nodes become unavailable or fail a health check?
A Citrix Administrator needs to configure a NetScaler high availability (HA) pair with both NetScalers in different subnets.
What does the administrator need to do for the HA pair to work in different subnets?
Scenario: A Citrix Administrator configured SNMP to send traps to an external SNMP system. When reviewing the messages, the administrator noticed several entity UP and entity DOWN messages.
To what are these messages related?
Scenario: A Citrix Administrator is running applications on thousands of load-balanced back-end servers in a large infrastructure. It is difficult to track and troubleshoot problems due to the large volume of traffic received.
Which feature of NetScaler Management and Analytics System (MAS) can the administrator configure to monitor and troubleshoot in detail for an environment of this size?
Which type of policy should a Citrix Administrator configure to ensure that only users who have data antivirus protection can connect to the environment?
Which two deployment methods does remote desktop protocol (RDP) proxy support? (Choose two.)