Which XenMobile deployment option would pose the greatest security risk?
A Citrix Engineer is testing enrollment and notices that while Mobile Device Management (MDM) enrollment succeeds, Mobile Application Management (MAM) enrollment fails.
A possible cause of this issue is that ports __________ from the __________ are NOT open. (Choose the correct set of options to complete the sentence.)
Which two components are required in order for a Citrix Engineer to use the MDX Toolkit to wrap Android applications for production use? (Choose two.)
A Citrix Engineer needs to design a multi-node, scalable XenMobile solution.
Which database type should the engineer choose to meet the needs of this deployment?
A Citrix Engineer must delegate enrollment invitation management to Level 1 administrators.
What should the engineer do to accomplish this objective?
How could a Citrix Engineer ensure that user devices reflect a change to the Worx PIN security policy?
What should a Citrix Engineer do to remove and prevent subsequent access to an unwrapped application that is already installed by a group of users on their iOS devices?
What are two situations in which XenMobile notification templates are used? (Choose two.)
A Citrix Engineer downloaded the incorrect version of Worx Home on an Android device and is attempting to uninstall Worx Home, but attempts to uninstall have NOT been successful.
What should the engineer do to successfully uninstall Worx Home?
Scenario: A Citrix Engineer created an automated action to notify users when the Pandora application is installed on their mobile devices. For testing purposes, the engineer installed the application on a mobile device but noticed that a notification was NOT received.
Which two XenMobile Server settings should the engineer check to resolve this issue? (Choose two.)
Which task should a Citrix Engineer perform before installing the StorageZone Controller?
A Citrix Engineer is currently in the process of a first-time installation of a XenMobile Server using the command-line interface.
Which two settings are required when configuring the remote database using SQL authentication? (Choose two.)
Which two statements are true when the database becomes unavailable in a XenMobile deployment? (Choose two.)
Scenario: A Citrix Engineer needs to provide access from WorxWeb to internal corporate HTTP websites through an internal proxy server. The engineer has configured Single Sign-On to web applications on the NetScaler.
What are two ways that the engineer could ensure that users are able to access the websites without being prompted to authenticate more than once? (Choose two.)
Which three permissions may a Citrix Engineer control with a Role-based Access Control (RBAC) policy? (Choose three.)
Scenario: Microsoft CA certificate-based authentication is the sole authentication method being used for Mobile Application Management (MAM). A certificate administrator revokes a user's client certificate. After doing so, the user can still access applications in the Worx Store.
What could a Citrix Engineer do to make sure that the user will no longer be able to access the Worx Store when their certificate is revoked?
Scenario: A Citrix Engineer is getting ready to deploy a XenMobile pilot environment to several users in the Sales department. The engineer assigned to the project has provided some users with logon instructions and a URL for the NetScaler Gateway. The engineer has configured LDAP for SSO with SAMAccountName. Several users are reporting that they are unable to log on.
Which file could the engineer check on the NetScaler to help troubleshoot the issue?