Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Citrix 1Y0-401 Designing Citrix XenDesktop 7.6 Solutions Exam Practice Test

Demo: 59 questions
Total 449 questions

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Question 1

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would creating Citrix policies within a GPO, filtered by Client Name, ensure full control over which GPOs are applied?

Options:

A.

It provides central management and control.

B.

It ensures that only policies with the correct filter in Active Directory are applied.

C.

It ensures that only settings located in the root OU are applied.

D.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

Question 2

Which two operational risks exist in CGE’s current environment? (Choose two.)

Options:

A.

Only one farm is running multiple zones.

B.

A test environment is NOT in place.

C.

Web Interface id NOT highly available in all regions.

D.

The London datacenter uses SAN storage.

Question 3

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

How should the architect configure the callback URL with a high availability pair of NetScalers located in all three regional datacenters?

Options:

A.

Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

B.

Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

C.

Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

D.

Configure the callback URL to point to the external beacon address.

Question 4

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with merge at the regional level ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on.

B.

It ensures that only Group Policies located in the regional Citrix OU are applied at the regional level when end users log on.

C.

It ensures that only Citrix policies are applied at the regional level when end users log on.

D.

It ensures that Group Policies located in the regional OU are merged with Citrix policies.

Question 5

Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.

What should an architect recommend to optimize printer bandwidth?

Options:

A.

Optimize WAN traffic through CloudBridge.

B.

Increase the WAN bandwidth through a WAN link upgrade.

C.

Restrict overall session bandwidth through a HDX bandwidth policy.

D.

Restrict printer redirection bandwidth through a HDX bandwidth policy.

Question 6

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace at the root level ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.

B.

It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.

C.

It ensures that only Citrix policies are applied below the root level when end users log on.

D.

It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies.

Question 7

The company plans to reduce their storage requirement by using thin provisioning with XenServer hosts. Which storage option should the architect verify for capability in the current environment?

Options:

A.

NFS

B.

CIFS

C.

iSCSI

D.

Fibre Channel

Question 8

How should the architect segment streaming traffic using Provisioning Services servers on a shared VLAN?

Options:

A.

By installing multiple NICs on each datacenter’s Provisioning Services server.

B.

By deploying one Provisioning Services server in the primary datacenter and one in the secondary datacenter.

C.

By deploying two Provisioning Services servers in the same datacenter.

D.

By using NetScaler with Global Server Load Balancing (GSLB) to load balance the Provisioning Services servers in each datacenter.

Question 9

Scenario:

CGE wants to use NetScaler Insight to capture network metrics for connections to the Citrix environment. Specifically, CGE wants to capture internal and external end users connecting to XenDesktop.

Where in the design should a Citrix Architect place NetScalers to capture the required metrics for internal end users without using ICA Proxy?

Options:

A.

In front of the StoreFront server group

B.

In-line between the clients and the Delivery Controllers

C.

In the network DMZ for NetScaler Gateway connections

D.

In-line between the clients and the XenDesktop virtual desktops

Question 10

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect implement loopback processing to ensure full control over the Group Policies that are applied?

Options:

A.

Configure loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents.

B.

Configure loopback processing with merge on a GPO linked to all OUs containing Virtual Desktop Agents.

C.

Configure loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers.

D.

Configure loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers.

Question 11

Which profile type would NOT be suitable for the Back Office end-user group?

Options:

A.

Local

B.

Roaming

C.

Mandatory

D.

Citrix Profile management

Question 12

Scenario:

The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.

Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?

Options:

A.

Use client printing and the Universal Printer Driver.

B.

Use network printers connected with Citrix Policies.

C.

Use the Universal Print Server and Universal Printer Driver.

D.

Use network printers connected with Group Policy Preferences.

Question 13

CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session.

Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

Options:

A.

Research

B.

Engineers

C.

Back Office

D.

Executives/Management

Question 14

Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?

Options:

A.

A Smart Card reader is installed to allow the end user to log on with an X509 certificate issued by the Active Directory Certificate Authority.

B.

The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO).

C.

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

D.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Question 15

What should a Citrix Architect identify as a potential security risk that should be resolved in the next design, based on the current provision for external access?

Options:

A.

Web Interface is used

B.

Online Plug-in 12.1 is used

C.

NetScaler Gateway is used to load balance StoreFront

D.

Single-factor authentication is used for external access

Question 16

Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?

Options:

A.

HDX Monitor

B.

Citrix Director

C.

Citrix EdgeSight

D.

Citrix AppCenter Console

Question 17

Which two CGE end-user groups do NOT currently have their profile settings retained between sessions? (Choose two.)

Options:

A.

Sales

B.

Engineers

C.

Technicians

D.

Executives/Management

Question 18

What should CGE do to all corporate-owned and non-corporate-owned Windows client devices to ensure an optimal end-user experience?

Options:

A.

Upgrade all clients to Receiver 4.2.

B.

Install native printer drivers on all clients.

C.

Install the CloudBridge Plug-in on all clients.

D.

Install Citrix Profile management on all clients.

Question 19

Which action would improve the end-user experience for Technicians and Engineers?

Options:

A.

Apply a Citrix policy to enable lossless graphics

B.

Apply a Citrix policy to disable Queuing and Tossing

C.

Apply a Citrix policy to enable Desktop Composition Redirection

D.

Apply a Citrix policy to limit graphics quality based on available bandwidth

Question 20

Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.)

Options:

A.

Single-factor authentication is used for external access.

B.

There are single Secure Gateway servers in some locations.

C.

NetScaler Gateway is being used to load balance StoreFront.

D.

There is no automatic failover between regions for end users.

Question 21

Which two risks exist in the access layer of the CGE environment? (Choose two.)

Options:

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Question 22

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

Options:

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Question 23

Which two issues should a Citrix Architect address for end users? (Choose two.)

Options:

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Question 24

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

Options:

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Question 25

A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image.

Which two factors helped guide the architect's recommendation? (Choose two.)

Options:

A.

A reduction in Hotfix testing time

B.

CGE's planned upgrade to Microsoft Office 2013

C.

The use of both applications by all CGE end users

D.

End-user complaints about slow application launch times

Question 26

Which reason explains why a Citrix Architect would identify the SQL environment as a cause of potential issues in CGE's current deployment?

Options:

A.

Use of SQL authentication

B.

Lack of backup and restoration procedures

C.

Lack of identical servers in different datacenters

D.

Network bandwidth between congested datacenters

Question 27

What should a Citrix Architect do to simplify printer driver management for CGE's Back Office end-user group?

Options:

A.

Use the Citrix Universal Print Server.

B.

Enforce the use of the Citrix Universal Printer Driver.

C.

Manually install printer drivers on the XenApp servers.

D.

Modify the printer driver format of the Citrix Universal Printer Driver.

Question 28

After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.

What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)

Options:

A.

It allows the end users to install custom software.

B.

It gives the end users full rights over the system drive.

C.

It requires less storage space than dedicated desktops.

D.

It allows for high availability in a disaster recovery scenario.

Question 29

Which two factors should a Citrix Architect consider with regard to CGE’s Back Office end-user group? (Choose two.)

Options:

A.

Their need for a special application set

B.

Their need to access additional printers

C.

Their need to install their own applications

D.

Their need to use non-corporate-owned devices

Question 30

A Citrix Architect decides that pooled desktops is the appropriate delivery model for CGE’s Engineers end-user group.

Which two reasons explain the architect’s delivery model decision? (Choose two.)

Options:

A.

The CAD application is updated frequently.

B.

It allows engineers to install their own applications.

C.

It isolates CPU and memory resources to single instances.

D.

The instability of the CAD application impacts several end users.

Question 31

Why should disk and network I/O be used to identify bottlenecks?

Options:

A.

Excessive disk and network I/O will slow the creation of new sessions.

B.

Excessive disk and network I/O on the data collector will slow down Web Interface authentication.

C.

Excessive disk and network I/O on the data collector will slow down application enumeration.

D.

Excessive disk and network I/O on the XenApp server will affect the local host cache.

Question 32

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

What are the benefits of using Hosted VDI and manually installing the operating system?

Options:

A.

Highest user density and lowest cost

B.

Highest level of user personalization

C.

Lowest storage performance requirement and highest user density

D.

Lowest cost and highest application compatibility

Question 33

What are the benefits of using a Hosted VDI environment with statically assigned virtual desktops?

Options:

A.

It retains the single image management function while allowing users to install applications

B.

It provides a high level of security while allowing user customization

C.

It has a low storage performance requirement and high user density

D.

It allows users to install application and access desktops remotely

Question 34

What are the benefits of using SSL to meet the company’s compliance requirements?

Options:

A.

It eliminates the need to distribute an internal root certificate

B.

It encrypts end-to-end traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It provides secure internal and external network communication

Question 35

In the new environment, the PositivelyFinance application will be deployed as a server OS-hosted application. Which two policy settings should an architect recommend to prevent data leakage from the PositivelyFinance application? (Choose two.)

Options:

A.

HDX policy setting with Client drive mapping set to ‘Prohibited’

B.

HDX policy setting with Client Clipboard Redirection set too ‘Prohibited’

C.

HDX policy setting with File redirection on Client Network drives to ‘Prohibited’

D.

Active Directory group policy with the Do not allow clipboard redirection setting set to ‘Disabled’

E.

Active Directory group policy with the Prevent access to drives setting set to ‘Restrict all drives’

Question 36

What are the benefits of using SSL to meet the company’s compliance requirements?

Options:

A.

It consumes lower CPU resources than other encryption technologies

B.

It is supported on industry-standard devices

C.

It is required to enable the SSL Relay service

D.

It enables two-factor authentication

Question 37

Why does using vDisk Update Management help manage the image release process?

Options:

A.

Because it automatically upgrades virtual desktops to the latest operating system version

B.

Because it provides centralized, automated single image management

C.

Because it is compatible with the Microsoft VHD specification

D.

Because it automatically deploys the latest target device drivers

Question 38

An architect is evaluating the user profile management solution for the desktop and application virtualization solution. Which two pieces of information should the architect collect? (Choose two.)

Options:

A.

User time zone

B.

User profile size

C.

Installed language pack

D.

Client device CPU/RAM

E.

Application compatibility of profile type

Question 39

Which two design decisions should the architect recommend to improve the user experience? (Choose two.)

Options:

A.

Configure Clipboard policy

B.

Configure Drive encryption

C.

Configure Flash redirection

D.

Configure Media redirection

Question 40

Why should memory and network utilization be used to identify bottlenecks?

Options:

A.

Excessive memory and network utilization will slow the creation of new sessions.

B.

Excessive memory and network utilization on the data collector will slow down Web Interface authentication.

C.

Excessive memory and network utilization on the data collector will slow down application enumeration.

D.

Excessive memory and network utilization on the XenApp server will affect the local host cache.

Question 41

Scenario:

CGE has two StoreFront server groups. End users need to be able to roam between regions but keep their individual application subscriptions.

What should a Citrix Architect recommend to fulfill this requirement and keep management overhead to a minimum?

Options:

A.

Configure all regions to be part of the same server group.

B.

Configure a mandatory store in StoreFront to keep consistent application sets.

C.

Copy the end-user subscription database between the server groups manually.

D.

Configure scheduled subscription replication between server groups using PowerShell.

Question 42

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What is the benefit of using Streamed VHD?

Options:

A.

It leverages local client hardware.

B.

It provides the greatest level of end-user personalization.

C.

It supports a variety of hardware configurations from a single image.

D.

It allows remote access to applications.

Question 43

Scenario:

A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency.

Why does implementing RAID 0 satisfy the requirements?

Options:

A.

It provides striping.

B.

It provides the highest performance.

C.

It provides fault tolerance.

D.

It provides minimal disk usage.

Question 44

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

Why is separating the workloads by roles to reflect the OU structure of Active Directory, creating a resource pool comprising a maximum of 24 XenServer hosts, and implementing a storage repository for virtual disks, XenMotion, high availability, and disaster recovery backups the best design solution?

Options:

A.

It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.

B.

It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.

C.

It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.

D.

It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Question 45

Scenario:

To ensure the security of its new solution, CGE wants to limit end-user access to USB peripherals. Policies have been implemented to disable USB redirection for all end users. As a company policy, only the Research end-user group will be allowed to access USB peripheral devices.

What could a Citrix Architect design to meet the stated requirements?

Options:

A.

A GPO that allows USB redirection, linked to the CGE OU.

B.

A GPO that allows USB redirection, linked only to the Aberdeen and Houston OUs.

C.

A Citrix policy that allows USB redirection, with a filter on the IP range for CGE's Aberdeen and Houston subnets.

D.

A Citrix policy that allows USB redirection, with a filter on the Delivery Group for the Research end-user group desktop.

Question 46

Scenario: StoreFront is installed on dedicated servers. A Citrix Architect needs to supply CGE’s corporate IT team with the critical Citrix services to be monitored.

Which two Citrix services on the StoreFront servers should the architect recommend be monitored? (Choose two.)

Options:

A.

Monitor Service

B.

StoreFront Service

C.

Peer Resolution Service

D.

Credential Wallet Service

Question 47

Which licensing changes should a Citrix Architect recommend to enable the HDX Mobile feature in CGE's Jurong and Makassar offices?

Options:

A.

Purchase XenMobile licenses.

B.

Convert existing XenApp licenses to per device licenses.

C.

Purchase NetScaler Universal Licenses for each mobile device.

D.

Upgrade existing XenApp licenses to XenApp Enterprise licenses.

Question 48

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling file and folder exclusions when configuring group profiles benefit CGE's Sales end-user group?

Options:

A.

It minimizes the required storage needed for folder redirection.

B.

It simplifies home drive cleanup.

C.

It improves application performance.

D.

It allows faster logons and logoffs.

Question 49

Why would having one farm with three configured sites, with two Provisioning Services servers in each datacenter, meet the requirements of a regional, single-image management strategy with minimal WAN traffic across datacenters?

Options:

A.

It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region.

B.

It ensures that Provisioning Services targets will NOT load balance across regions, and reduces management overhead.

C.

It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability between regions.

D.

It ensures that Provisioning Services targets will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead.

Question 50

Why is configuring regional shared storage locations on a CIFS server using Clustered File Services the best design choice for vDisk storage?

Options:

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Question 51

Why is creating six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies, the best design solution?

Options:

A.

It provides intrasite redundancy in case of appliance failures, while enhancing performance through an active/active configuration.

B.

It provides redundancy in case of site failures, while optimizing external WAN traffic.

C.

It protects against WAN failures and connects end users to their home datacenter.

D.

It allows for the expected expansion of remote access usage and provides functionality for future needs.

Question 52

Scenario:

Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure XenServer?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Question 53

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with two NetScaler virtual servers for each appliance, each binded to a redirection policy, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 54

Why would the architect choose XenServer MPIO when configuring network interfaces for storage networks?

Options:

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Question 55

Why is configuring CIFS on a NAS the best design solution for vDisk storage?

Options:

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Question 56

Why is deploying two NetScaler appliances in each regional datacenter, with one in the internal network for load balancing and the other in the DMZ for Gateway traffic, the best design solution?

Options:

A.

It provides intrasite redundancy in case of appliance failures.

B.

It provides redundancy in case of site failures, while optimizing external WAN traffic.

C.

It protects against WAN failures and connects end users to their home datacenter.

D.

It allows for the expected expansion of remote access usage and provides functionality for future needs.

Question 57

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded to a session policy, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 58

Why is configuring regional shared storage locations on a CIFS server using Distributed File Services the best design choice for vDisk storage?

Options:

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Question 59

How should the architect configure the NetScaler virtual servers on the four appliances?

Options:

A.

Create one NetScaler virtual server for each appliance, and on each appliance bind a session policy to the NetScaler virtual server configured in ICA Proxy mode using the StoreFront server.

B.

Create one NetScaler virtual server for each appliance and on each appliance bind a redirection policy to the NetScaler virtual server configured in ICA Redirection mode using the StoreFront server.

C.

Create two NetScaler virtual servers for each appliance, and bind a redirection policy to them that is configured in ICA Redirection mode using the StoreFront server.

D.

Create four NetScaler virtual servers for each appliance, and bind a session policy to them that is configured in ICA Redirection mode using the StoreFront server.

Demo: 59 questions
Total 449 questions