March Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Citrix 1Y0-440 Architecting a Citrix Networking Solution Exam Practice Test

Demo: 45 questions
Total 152 questions

Architecting a Citrix Networking Solution Questions and Answers

Question 1

Which session parameter does the default authorization setting control when authentication, authorization, and auditing profiles are configured?

Options:

A.

Determines the default logging level

B.

Determines whether the NetScaler appliance will allow or deny access to content for which there is no specific authorization policy

C.

Determines the default period after which the user is automatically disconnected and must authenticate again to access the intranet

D.

Determines whether the NetScaler appliance will log users onto all web applications automatically after they authenticate or will pass users to the web application logon page to authenticate for each application.

E.

Controls are amount of time the users can be idle before they are automatically disconnected.

Question 2

Which two methods can a Citrix Architect use to create a Heat Orchestration template? (Choose two)

Options:

A.

Direct Input

B.

Configuration jobs

C.

Citrix Web App Firewall Policies

D.

File

E.

Gateway Policies

Question 3

Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production NetScaler appliances that do NOT align with the designed security requirements.

Click the Exhibit button to view the configured command policies for the production NetScaler deployment.

To align the command policy configuration with the security requirements of the organization, the _______ for ______should change. (Choose the correct option to complete the sentence.)

Options:

A.

command spec; item 3

B.

priority; Item 5

C.

action; Item 1

D.

priority; Item 2

E.

action; Item 4

F.

command spec; Item 6

Question 4

Scenario: A Citrix Architect needs to design a new NetScaler Gateway deployment to provide secure RDP access to backend Windows machines.

Click the Exhibit button to view additional requirements collected by the architect during the design discussions.

To meet the customer requirements, the architect should deploy the RDP proxy through ______ using a________ solution. (Choose the correct option to complete the sentence.)

Options:

A.

CVPN: single gateway

B.

CVPN, stateless gateway

C.

ICAProxy: single gateway

D.

ICAProxy; stateless gateway

Question 5

Which three tasks can a Citrix Architect select and schedule using the Citrix ADC maintenance tasks? (Choose three.)

Options:

A.

Convert Citrix Web App Firewall Policy Instances.

B.

Upgrade Citrix ADC CPX Instances

C.

Upgrade Citrix ADC Instances.

D.

Convert a high availability pair of Instances to Cluster.

E.

Convert cluster instances to a high availability pair.

F.

Configure a high availability pair of Citrix ADC Instances.

Question 6

A Citrix Architect needs to make sure that maximum concurrent AAA user sessions are limited to 4000 as a security restriction.

Which authentication setting can the architect utilize to view the current configuration?

Options:

A.

Global Session Settings

B.

AAA Parameters

C.

Active User Session

D.

AAA Virtual Server

Question 7

Which four settings can a Citrix Architect use to create a configuration job using Citrix Application Delivery Management? (Choose four.)

Options:

A.

Action

B.

File

C.

Configuration Template

D.

StyleBooks

E.

Event Manager

F.

Instance

G.

Record and Play

Question 8

Which session parameter does the default authorization setting control when authentication, authorization, and auditing profiles are configured?

Options:

A.

Determines the default logging level

B.

Determines whether the Citrix ADC appliance will allow or deny access to content for which there is no specific authorization policy

C.

Determines the default period after which the user is automatically disconnected and must authenticate again to access the intranet

D.

Determines whether the Citrix ADC appliance will log users onto all web applications automatically after they authenticate or will pass users to the web application logon page to authenticate for each application.

E.

Controls are amount of time the users can be idle before they are automatically disconnected.

F.

Determines whether the Citrix ADC appliance will use primary or the secondary authentication for SSO

Question 9

Which two options should a Citrix Architect evaluate during a capabilities assessment? (Choose two.)

Options:

A.

Users and applications

B.

Disaster recovery requirements

C.

Network infrastructure

D.

Conformance to the ISO model

Question 10

Scenario: A Citrix Architect needs to assess an existing Citrix ADC configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production Citrix ADC appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production Citrix ADC deployment.

To align the command policy configuration with the security requirements of the organization, the__________for________________should change. (Choose the correct option to complete the sentence.)

Options:

A.

command spec; Item 6

B.

priority; Item 5

C.

command spec; Item 3

D.

action; Item 4

E.

priority; Item 2

F.

action; Item 1

Question 11

Which format must a Citrix Architect utilize while importing the StyleBook in Citrix Application Delivery Management to compose the content of a StyleBook in the YAML editor?

Options:

A.

Raw

B.

NITRO APl

C.

Bundle

D.

HTML

E.

File

F.

SGML

Question 12

Which three session settings are valid once a Citrix Architect has configured session settings to customize user sessions? (Choose three.)

Options:

A.

Single Sign-on Domain

B.

Credential Index

C.

KCD Profile

D.

Default Authentication Group

E.

Single Sign-on to Web Applications

F.

Session Idle Time

Question 13

Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.

They captured the following requirements during the design discussion held for a Citrix ADC design project:

  • All three (3) Workspacelab sites (DC, NDR, and DR) will have similar NetScaler configurations and design.
  • Both external and internal NetScaler MPX appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Passive mode.
  • GSLB should resolve both A and AAA DNS queries.
  • In the GSLB deployment, the NDR site will act as backup for the DC site, whereas the DR site will act as backup for the NDR site.
  • When the external NetScaler replies to DNS traffic coming in through Cisco Firepower IPS, the replies should be sent back through the same path.
  • On the internal NetScaler, both the front-end VIP and backend SNIP will be part of the same subnet.
  • The external NetScaler will act as default gateway for the backend servers.
  • All three (3) sites, DC, NDR, and DR, will have two (2) links to the Internet from different service providers configured in Active/Standby mode.

Which design decision must the architect make the design requirements above?

Options:

A.

MAC-based Forwarding must be enabled on the External NetScaler Pair.

B.

NSIP of the External NetScaler must be configured as the default gateway on the backend servers.

C.

The Internal NetScaler must be deployed in Transparent mode.

D.

The ADNS service must be configured with an IPv6 address.

Question 14

Which two parameters must a Citrix Architect specify in the configuration job to replicate a specific configuration snippet from one Crtnx ADC instance to multiple instances? (Choose two.)

Options:

A.

Running Configuration

B.

Target Instance

C.

Saved Configuration

D.

Source Instance

E.

Configuration Source

Question 15

Scenario: A Citrix Architect has configured a load balancing virtual server for RADIUS authentication. The architect observes that, when the radius authentication action has the virtual server IP address, the authentication falls. However, when any of the individual server IP addresses are used, the authentication works fine.

How should the architect troubleshoot this issue?

Options:

A.

Change the Logon name attribute in Radius Action

B.

Ensure that TCP port 1821 is open from NSIP to backend Radius servers

C.

Verify the shared secret on Citrix ADC

D.

Change the Radius client from NSIP to SNIP on the Radius server

Question 16

Scenario: A Citrix Architect needs to design a hybrid Citrix Virtual App and Citrix Virtual Desktop environment which will include as well as resource locations in an on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

  • Active Citrix Virtual App and Citrix Virtual Desktop Service subscription
  • No existing Citrix deployment
  • Minimization of additional costs
  • All users should correct directly to the resource locations containing the servers which will host HDX sessions

Click the Exhibit button to view the conceptual environment architecture.

The architect should use___________ in Location A, and should use _______________ in Location B. (Choose the correct option to complete the sentence.)

Options:

A.

No Citrix products; Citrix ICA Proxy (cloud-licensed)

B.

Citrix Gateway as a Service; Citrix ICA Proxy (cloud-licensed)

C.

Citrix Gateway as a Service; no Citrix ADC products

D.

No Citrix products; Citrix Gateway appliance

E.

Citrix gateway as a Service; Citrix ADC (BYO)

Question 17

Which response is returned by the Citrix ADC, if a negative response is present in the local cache?

Options:

A.

NXDOMAIN

B.

NXDATA

C.

NODOMAIN

D.

NO DATA

Question 18

A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a NetScaler_________deployed_________. (Choose the correct option to complete sentence.)

Options:

A.

CPX; as part of a high availability pair

B.

CPX; as a stand alone device

C.

SDX; with less than 6 partitions and dedicated management interface

D.

MPX; as part of the cluster but Cluster IP is NOT configured

E.

SDX; with no partitions as a stand alone device

Question 19

Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a Citrix ADC design project. They captured the following requirements from this design discussion:

  • All three (3) Workspacelab sites (DC, NOR, and DR) will have similar Citrix ADC configurations and design.
  • The external Citrix ADC MPX1 appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Active mode.
  • ADNS service should be configured on the Citrix ADC to make it authoritative for domain nsg.workspacelab.com • In GSLB deployment, the DNS resolution should be performed to connect the user to the site with least network latency.
  • On the internal Citrix ADC, load balancing for StoreFront services, Citrix XML services, and Citrix Director services must be configured.
  • On the external Citrix ADC, the Gateway virtual server must be configured in ICA proxy mode.

Click the Exhibit button to view the logical representation of the network.

On which firewall should the architect configure the access policy to permit the MEP communication between the sites?

Options:

A.

CISCO IPS 1 and Checkpoint FW1

B.

CISCO IPS and CISCO IPS1

C.

CISCO IPS and Checkpoint FW1

D.

Checkpoint FW1 and DMZ ASA Firewall

Question 20

Scenario: A Citrix Architect and a team of Workspacelab members have met for a design discussion about the NetScaler Design Project. They captured the following requirements:

  • Two pairs of NetScaler MPX appliances will be deployed in the DMZ network and the internal network.
  • High availability will be accessible between the pair of NetScaler MPX appliances in the DMZ network.
  • Multi-factor authentication must be configured for the NetScaler Gateway virtual server.
  • The NetScaler Gateway virtual server is integrated with XenApp/XenDesktop environment.
  • Load balancing must be deployed for the users from the workspacelab.com and vendorlab.com domains.
  • The logon page must show the workspacelab logo.
  • Certificate verification must be performed to identify and extract the username.
  • The client certificate must have UserPrincipalName as a subject.
  • All the managed workstations for the workspace users must have a client identifications certificate installed on it.
  • The workspacelab users connecting from a managed workstation with a client certificate on it should be authenticated using LDAP.
  • The workspacelab users connecting from a workstation without a client certificate should be authenticated using LDAP and RADIUS.
  • The vendorlab users should be authenticated using Active Directory Federation Service.
  • The user credentials must NOT be shared between workspacelab and vendorlab.
  • Single Sign-on must be performed between StoreFront and NetScaler Gateway.
  • A domain drop down list must be provided if the user connects to the NetScaler Gateway virtual server externally.
  • The domain of the user connecting externally must be identified using the domain selected from the domain drop down list.

On performing the deployment, the architect observes that users are always prompted with two-factor authentication when trying to assess externally from an unmanaged workstation.

Click the exhibit button to view the configuration.

What should the architect do to correct this configuration?

Options:

A.

Update the binding LoginSchema Policy LDAP_RADIUS from the virtual server and set it as priority 1

B.

Bind the Portal theme as Domaindropdown.

C.

Bind the LoginSchema Policy Domaindropdown to priority 90.

D.

Bind the Default LoginSchema Policy as Domaindropdown.

Question 21

Scenario: A Citrix Architect needs to design a new Citrix ADC Gateway deployment to provide secure RDP access to backend Windows machines.

Click the Exhibit button to view additional requirements collected by the architect during the design discussions.

To meet the customer requirements, the architect should deploy the RDP proxy through _______, using a _________ solution. (Choose the correct option to complete the sentence.)

Options:

A.

ICAProxy, stateless gateway

B.

CVPN; single gateway

C.

CVPN; stateless gateway

D.

ICAProxy; single gateway

Question 22

For which two reasons should a Citrix Architect perform a capabilities assessment when designing and deploying a new Citrix ADC in an existing environment? (Choose two.)

Options:

A.

Determine operating system and application usage.

B.

Identify other planned projects and initiatives that must be integrated with the design and build phase.

C.

Determine the new environment networking requirements.

D.

Establish and prioritize the key drivers behind a project.

E.

Assess and identify potential risks for the design and build phase.

Question 23

Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.

The issue was isolated to several endpoint analysis (EPA) scan settings.

Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.

Which setting is preventing the security requirements of the organization from being met?

Options:

A.

Item 6

B.

Item 7

C.

Item 1

D.

Item 3

E.

Item 5

F.

Item 2

G.

Item 4

Question 24

Which parameter must a Citrix Architect configure to ensure that HDX Proxy Connection terminates upon AAA Session TimeOut?

Options:

A.

ICA session timeout in VPN parameters

B.

Connection timeout(mins) in Citrix ADC gateway Session Profile.

C.

Connection timeout(mins) in VPN Parameters

D.

ICA session timeout in Citrix ADC Gateway Session Profile.

Question 25

Which two types of database deployments are supported in Citrix Application Delivery Management? (Choose two.)

Options:

A.

High Availability

B.

Multiple Server

C.

Single Server

D.

Cluster instance

E.

Cloud Services

Question 26

Scenario: A Citrix Architect needs to assess a NetScaler Gateway deployment that was recently completed by a customer and is currently in pre-production testing. The NetScaler Gateway needs to use ICA proxy to provide access to a XenApp and XenDesktop environment. During the assessment, the customer informs the architect that users are NOT able to launch published resources using the Gateway virtual server.

Click the Exhibit button to view the troubleshooting details collected by the customer.

What is the cause of this issue?

Options:

A.

The required ports have NOT been opened on the firewall between the NetScaler gateway and the Virtual Delivery Agent (VDA) machines.

B.

The StoreFront URL configured in the NetScaler gateway session profile is incorrect.

C.

The Citrix License Server is NOT reachable.

D.

The Secure Ticket Authority (STA) servers are load balanced on the NetScaler.

Question 27

Scenario: A Citrix Architect is asked by management at the Workslab organization to review their existing configuration and make the necessary upgrades. The architect recommends small changes to the pre-existing NetScaler configuration. Currently, the NetScaler MPX devices are configured in a high availability pair, and the outbound traffic is load-balanced between two Internet service providers 9ISPs). However, the failover is NOT happening correctly.

The following requirements were discussed during the design requirements phase:

  • The return traffic for a specific flow should be routed through the same path while using Link Load Balancing.
  • The link should fail over if the ISP router is up and intermediary devices to an ISP router are down.
  • Traffic going through one ISP router should fail over to the secondary ISP, and the traffic should NOT flow through both routers simultaneously.

What should the architect configure with Link Load balancing (LLB) to meet this requirement?

Options:

A.

Net Profile

B.

Mac-based forwarding option enabled.

C.

Resilient deployment mode

D.

Backup route

Question 28

Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.

The issue was isolated to several endpoint analysis (EPA) scan settings.

Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.

Which setting is preventing the security requirements of the organization from being met?

Options:

A.

Item 6

B.

Item 7

C.

Item 1

D.

Item 3

E.

Item 5

F.

Item 2

G.

Item 4

Question 29

Which three parameters must a Citrix Architect designate when creating a new session policy? (Choose three.)

Options:

A.

Single Sign-on Domain

B.

Request Profile

C.

Name

D.

Enable Persistent Cookie

E.

Expression

Question 30

Scenario: A Citrix Architect needs to design a new multi-datacenter Citrix ADC deployment. The customer wants Citrix ADC to provide access to various backend resources by using Global Server Load Balancing (GSLB) in an Active-Active deployment. Click the Exhibit button to view additional requirements identified by the architect.

Which GSLB algorithm or method should the architect use for the deployment based on the stated requirements?

Options:

A.

Dynamic round trip time (RTT)

B.

Least response time

C.

Least packets

D.

Source IP hash

E.

Static proximity

F.

Least connections

Question 31

Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose two.)

Options:

A.

The service does NOT receive traffic for three successive increment intervals.

B.

The server request rate parameters are set above 25 requests per second.

C.

The actual request rate is slower than the new service request rate.

D.

The percentage of traffic that the new service must receive is greater or equal to 50.

E.

The request rate has been incremented 100 times.

Question 32

Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose Two)

Options:

A.

The Service is receiving more than 480 requests per second

B.

The new service request rate is slower than the actual request rate

C.

The Service does not receive traffic for four successive increment intervals

D.

The request rate has been incremented 200 times

E.

The percentage of traffic that the new service must receive is greater than or equal to 100.

Question 33

Scenario: More than 10,000 users will access a customer’s environment. The current networking infrastructure is capable of supporting the entire workforce of users. However, the number of support staff is limited, and management needs to ensure that they are capable of supporting the full user base.

Which business driver is prioritized, based on the customer’s requirements?

Options:

A.

Simplify Management

B.

Increase Scalability

C.

Increase Flexibility

D.

Reduce Costs

E.

Enable Mobile Work Styles

F.

Increase Security

Question 34

Which two NetScaler cookies indicate the validity of the Authentication, Authorization and Accounting (AAA) session for users? (Choose two.)

Options:

A.

NSC_WT

B.

NSC_TMAS

C.

NSC_AAAC

D.

NSC_TMAA

Question 35

A Citrix Architect needs to evaluate and define the architecture and operational processes required to implement and maintain the production environment. In which two phases of the Citrix Methodology will the architect define this? (Choose two.)

Options:

A.

Design

B.

Define

C.

Manage

D.

Deploy

E.

Assess

Question 36

Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion They have captured the following requirements for the Citrix ADC design project:

The authentication must be deployed for the users from the workspacelab com and vendorlab com domains.

  • The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP
  • The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS.
  • The vendorlab users should be authenticated using Active Directory Federation Service
  • The user credentials must NOT be shared between workspacelab and vendorlab
  • Single Sign-on must be performed between StoreFront and Citrix Gateway
  • A domain drop down list must be provided if the user connects to the Citrix Gateway virtual server externally

Which method must the architect utilize for user management between the two domains?

Options:

A.

Create a global catalog containing the objects of Vendorlab and Workspacelab domains.

B.

Create shadow accounts for the users of the Vendorlab domain in the Workspacelab domain C. Create a two-way trust between the Vendorlab and Workspacelab domains

C.

Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain

Question 37

Scenario: A Citrix Architect needs to deploy a load balancing for an application server on the NetScaler. The authentication must be performed on the NetScaler. After the authentication, the Single Sign-on with the application servers must be performed using Kerberos impersonation.

Which three authentication methods can the Architect utilize to gather the credentials from the user in this scenario? (Choose three.)

Options:

A.

SAML

B.

OTP

C.

TACACS

D.

WEBAUTH

E.

LDAP

Question 38

Scenario: A Citrix Architect has deployed two MPX devices. 12.0.53.13 nc and MPX 11500 models, in a high availability (HA) pair for the Workspace labs team. The deployment method is two-arm and the devices are installed behind a CISCO ASA 5585 Firewall. The architect enabled the following features on the Citrix ADC devices. Content Switching. SSL Offloading, Load Balancing, Citrix Gateway. Application Firewall in hybrid security and Appflow. All are enabled to send monitoring information to Citrix Application Delivery Management 12.0.53.13 nc build. The architect is preparing to configure load balancing for Microsoft Exchange 2016 server.

The following requirements were discussed during the implementation:

  • All traffic needs to be segregated based on applications, and the fewest number of IP addresses should be utilized during the configuration.
  • All traffic should be secured and any traffic coming Into FITTP should be redirected to HTTPS.
  • Single Sign-on should be created for Microsoft Outlook web access (OWA).
  • Citrix ADC should recognize Uniform Resource Identifier (URI) and close the session to Citrix ADC when users hit the Logoff button In Microsoft Outlook web access.
  • Users should be able to authenticate using either user principal name (UPN) or sAMAccountName.
  • The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers and the monitor probes must be sent on SSL.

Which monitor will meet these requirements?

Options:

A.

add lb monitor mon.rpc HTTP-ECV -send "GET /rpc/healthcheck.htm" recv 200 -LRTM DISABLED -secure YES

B.

add lb monitor mon.rpc HTTP -send "GET /rpc/healthcheck.htm" recv 200 -LRTM DISABLED -secure YES

C.

add lb monitor mon.rpc HTTP-ECV -send "GET /owa/healthcheck.htm" recv 200 -LRTM DISABLED

D.

add lb monitor mon.rpc HTTP-ECV -send "GET /owa/healthcheck.htm" recv 200 -LRTM ENABLED

E.

add lb monitor mon.rpc HTTP-ECV -send "GET /rpc/healthcheck.htm" recv 200 -LRTM ENABLED

Question 39

Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion. They have captured the following requirements for NetScaler design project:

  • The authentication must be deployed for the users from the workspacelab.com and vendorlab.com domains.
  • The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP.
  • The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS.
  • The vendorlab users should be authenticated using Active Directory Federation Service.
  • The user credentials must NOT be shared between workspacelab and vendorlab.
  • Single Sign-on must be performed between StoreFront and NetScaler Gateway.
  • A domain drop down list must be provided if the used connects to the NetScaler gateway virtual server externally.

Which method must the architect utilize for user management between the two domains?

Options:

A.

Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain.

B.

Create a global catalog containing the objects of Vendorlab and Workspacelab domains.

C.

Create shadow accounts for the Vendorlab domain in the Workspacelab domain.

D.

Create a two-way trust between the Vendorlab and Workspacelab domains.

Question 40

A Citrix Architect needs to define the architect and operational processes required to implement and maintain the production environment.

In which phase of the Citrix Methodology will the architect define this?

Options:

A.

Define

B.

Deploy

C.

Assess

D.

Review

E.

Manage

F.

Design

Question 41

Which statement is applicable to Citrix Gateway split tunneling?

Options:

A.

If you set split tunneling to reverse, the Citrix ADC Gateway plug-in sends only traffic destined for networks protected by Citrix ADC Gateway through the VPN tunnel. The Citrix ADC Gateway plug-in does NOT send network traffic destined for unprotected networks to Citrix ADC Gateway.

B.

If you set split tunneling to reverse, the intranet applications define the network traffic that Citrix ADC Gateway does NOT intercept.

C.

If you enable split tunneling, the intranet applications define the network traffic that Citrix ADC Gateway does NOT intercept.

D.

If you enable split tunneling, the Citrix ADC Gateway plug-in captures all network traffic originating from a user device and sends the traffic through the VPN tunnel to Citrix ADC Gateway.

E.

If you set split tunneling to reverse, the Citrix ADC Gateway plug-in captures all network traffic originating from a user device and sends the traffic through the VPN tunnel to Citrix ADC Gateway.

Question 42

What can help a Citrix Architect prepare to discuss time scales and resource requirements?

Options:

A.

Creating a high-level project plan.

B.

Meeting with each member of the project team to assign tasks.

C.

Designing the new environment.

D.

Setting expectations with the project’s key stakeholders.

E.

Identifying challenges associated with the project.

Question 43

Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.

The requirements captured during the design discussion held for a NetScaler design project are as follows:

  • Two (2) pairs of Citrix ADC MPX appliances deployed in the DMZ and internal network.
  • High Availability will be accessible for each Citrix ADC MPX
  • The external Citrix ADC MPX appliance will be deployed in multi-arm mode.
  • The internal Citrix ADC MPX will be deployed in single-arm mode wherein it will be connected to Cisco ACI Fabric.
  • All three (3) Workspacelab sites: Dc, NDR and DR, will have similar Citrix ADC configurations and design.

How many Citrix ADC MPX appliances should the architect deploy at each site to meet the design requirements above?

Options:

A.

2

B.

8

C.

4

D.

6

E.

10

F.

3

Question 44

Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a NetScaler design project. They captured the following requirements from this design discussion:

  • A pair of NetScaler MPX appliances will be deployed in the DMZ network.
  • High Availability will be accessible in the NetScaler MPX in the DMZ Network.
  • Load balancing should be performed for the internal network services like Microsoft Exchange Client Access Services and Microsoft App-V.
  • The load balancing should be performed for StoreFront.
  • The NetScaler Gateway virtual server will be utilizing the StoreFront load-balancing virtual server.
  • The NetScaler Gateway virtual server and StoreFront.
  • The NetScaler Gateway virtual service and StoreFront and load-balancing services are publicly accessible.
  • The traffic for internal and external services must be isolated.

Click the Exhibit button to review the logical network diagram.

Which two design decisions are incorrect based on these requirements? (Choose two.)

Options:

A.

LB StoreFront bound to traffic Domain 0

B.

Citrix Gateway VIP bound to Traffic Domain 1

C.

LB APP-V bound to Traffic Domain 1

D.

SNIP 192.168.20.2 bound to Traffic Domain 1

Question 45

Scenario: More than 10,000 users will access a customer’s environment. The current networking infrastructure is capable of supporting the entire workforce of users. However, the number of support staff is limited, and management needs to ensure that they are capable of supporting the full user base.

Which two business driver is prioritized, based on the customer’s requirements?

Options:

A.

Simplify Management

B.

Increase Scalability

C.

Increase Flexibility

D.

Reduce Costs

E.

Enable Mobile Work Styles

F.

Increase Security

Demo: 45 questions
Total 152 questions