3 Months Free Update
3 Months Free Update
3 Months Free Update
Which step can a Citrix Administrator take in order to use the default compression policies?
Scenario: A Citrix Administrator needs to deploy 300 virtual Windows 10 desktops in an environment. The deployment should have a low impact on the existing network infrastructure. The environment also requires user-installed applications and persistency.
Which Citrix technology can the administrator use to provision the desktops?
Scenario: A Citrix Administrator created an SSL virtual server using only the following commands:
The SSL virtual server is currently in a DOWN state.
What could be the reason the SSL virtual server is in a down state?
Which account is used by FlexCast Management Architecture (FMA) services to access the Citrix Virtual Apps and Desktops SQL databases?
Which mode on the Citrix ADC can a Citrix Administrator utilize to avoid asymmetrical packet flows and multiple route/ARP lookups?
Scenario: A Citrix Administrator is configuring the Citrix Workspace app to allow users to access their applications and desktops. Management requires that users can log on to the environment from any device without having to remember the server address.
What should the administrator do to meet these requirements?
Scenario: While using Citrix Studio to create a new Delivery Group, a Citrix Administrator does NOT see any machine catalogs listed, but does see an error message. The administrator successfully verified the presence of machine catalogs in the Machine Catalogs node of Citrix Studio.
Which issue can cause this to happen?
A Citrix Administrator receives complaints from some users that authentication for the Citrix Gateway site fails.
Which tool can the administrator use to find data regarding time of failure and a list of users facing this issue?
What are three valid ways to configure Virtual Delivery Agent (VDA) registration? (Choose three.)
Scenario: A Citrix Administrator needs to migrate a Citrix Provisioning environment into Citrix Cloud. Management prefers that new virtual machines are created instead of using the existing Device Collection.
Which step does the administrator need to complete in order to migrate the Citrix Provisioning environment to Citrix Cloud?
What happens to the differencing disk of a Random/Non-Persistent desktop machine following a restart in a Citrix Virtual Apps and Desktops Site running on Citrix Hypervisor?
Which three policy settings can a Citrix Administrator configure to improve HDX session performance for high-latency, low bandwidth user connections? (Choose three.)
A Citrix Administrator has configured the Citrix ADC as a DNS Proxy Server. The administrator executed the following commands on the Citrix ADC using command-line interface:
What will be the effect of executing the above commands?
Scenario: A Citrix Administrator maintains a Citrix Virtual Apps and Desktops Site with local storage that contains several logical disk space locations. The administrator would like to reduce the total number of writes on the storage.
What can the administrator implement with minimal administrative effort to address these needs?
A Citrix Administrator needs to confirm that all the client certificates presented to the authentication vServer are valid until year 2020.
Which expression can the administrator use to meet this requirement?
Scenario: A Citrix Administrator is performing a disaster recovery test and decided to fail over the Citrix ADC high availability (HA) pair appliances. The administrator noticed that the failover is NOT working as expected in item text, and the Secondary Citrix ADC is NOT taking over as Primary. The administrator suspects that networking issues may be causing the failure.
What could be the cause of this issue with the Citrix ADCs?
Which component can optionally be hosted in Citrix Cloud or in a customer-controlled resource location, when using the Citrix Virtual Apps and Desktops service?
Scenario: A Citrix Administrator has configured an Authentication, Authorization, and Auditing (AAA) action policy to allow users access through the Citrix ADC. The Administrator bound the policy to a specific vServer.
Which policy expression will allow all users access through the vServer?
A Citrix Administrator has executed the commands in the screenshot on the Citrix ADC using the command-line interface.
Click on the ‘Exhibit’ button to view the screenshot of the command-line interface.
Which two replacements will be the outcome of executing these commands? (Choose two.)
Scenario: A Citrix Administrator is working on a published application. The network is connected for 100 seconds but is interrupted and applications become unusable. The session then automatically resumes, and the administrator is able to continue working on the application at the same progress point as before the interruption.
Which policy is enabled in this scenario?
Scenario: A Citrix Administrator has made changes to the Citrix ADC, deleting parts of the configuration, and then saved the new configurations. The changes caused an outage which needs to be resolved as quickly as possible. There is no Citrix ADC backup.
What does the administrator need to do to recover the configuration quickly?
Scenario: A Citrix ADC appliance is having intermittent issues. A Citrix Administrator is unable to identify the root cause and fix them. The administrator opened a Support ticket and the Engineer assigned to the case requested all the logs and configuration information from the Citrix ADC.
Which technical support tool can the administrator use to gather all the information on the Citrix ADC to send to the Support Engineer?
When creating a new Delegated Administrator with a custom scope, a Citrix Administrator notices that the Full Administrator role is NOT available.
The administrator is experiencing this behavior because the custom scope _______________. (Choose the correct option to complete the sentence.)
Scenario: A Citrix ADC receives packets that are destined for a MAC address owned by the Citrix ADC. The destination IP address of the packets does NOT belong to the Citrix ADC. Layer 3 Mode is enabled by default on the Citrix ADC.
What will the Citrix ADC do with the packets in this scenario?
Scenario: A Citrix Administrator needs to add 10 new web servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.
To ensure that only the 10 new servers are receiving twice the connections of the old servers without changing the load balancing to the rest of the environment, the administrator needs to add a weight of _____________ to the services attached to the _________ servers. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Administrator needs to configure StoreFront to allow external users access to internal resources. The external users will authenticate on StoreFront.
Which StoreFront authentication method can the administrator configure?
What is the minimum permission a Citrix Administrator can grant to an IT manager to access Citrix Studio?
Scenario: A Citrix Administrator has enabled an HDX Session printers policy within a Citrix Virtual Apps and Desktops Site. The administrator added a printer to a print server and assigned the printer to all users through a session printer policy. In addition, several local client printers are auto-created within HDX sessions. No other printing policies are configured.
How will print jobs be routed when users send print jobs to a printer managed by the print server?
Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL virtual servers?
A Citrix Administrator has deployed a non-domain-joined StoreFront server.
Which two options should the administrator be aware of with this deployment? (Choose two.)
Which two options should a Citrix Administrator configure to stop the First-Time wizard from automatically popping up? (Choose two.)
Scenario: A Citrix Administrator is configuring the Workspace Experience to provide users with access to their applications and desktops. The administrator deployed Microsoft Azure Active Directory (AD) already and wants to leverage it to support user access to the Workspace Experience.
Which two steps does the administrator need to take to enable users to authenticate using Azure AD to the Workspace Experience? (Choose two.)
Scenario: A Citrix Administrator is in the process of migrating a Citrix Virtual Apps and Desktops on-premises deployment to Citrix Cloud with an on-premises resource location. StoreFront and Citrix ADC machines are located on premises. The administrator notices that application enumeration is NOT occurring for resources managed by the Citrix Cloud Site.
What does the administrator need to change in order to get application enumeration working?
Scenario: A Citrix Administrator would like to better monitor traffic within the Citrix Gateway and Citrix Virtual Apps and Desktops Site. The administrator decides to implement the Citrix Application Delivery Management appliance for use with Citrix Director.
Which three additional pieces of infrastructure information can the administrator now review within Citrix Director? (Choose three.)
Scenario: A Citrix Administrator manages a Citrix Gateway with a Standard Platform License, with remote employees in the environment. The administrator wants to increase employee access by 300 users through the Citrix Gateway, using VPN access.
Which license should the administrator recommend purchasing for this environment?
Which two resource locations are supported for machines running the Virtual Delivery Agent (VDA) when using the Citrix Virtual Apps and Desktops service? (Choose two.)
Scenario: The Director of network security in a financial organization wants to protect the enterprise network from any external malware threats. To do this, the director needs to gain visibility into otherwise-bypassed traffic and control access to malicious web sites. The director is required to do the following:
Intercept and examine all the traffic, including SSL/TLS (encrypted traffic), coming in, and going out of the enterprise network.
Block access to URLs identified as serving harmful or insecure content.
Identify users (employees) in the enterprise who are accessing malicious websites.
Which Citrix ADC deployment mode should a Citrix Administrator use to achieve this requirement?
Which port does a Citrix Administrator need to open for Cloud Connector to communicate with the internet?
Click the ‘Exhibit’ button to view the screenshot.
How will the HTTP request http://xenapp.training.lab/url1” be redirected based on the screenshot?
When hosting Citrix Virtual Apps and Desktops on the Citrix Cloud platform, the ___________ Layer is always managed by Citrix. (Choose the correct option to complete the sentence.)
Which PowerShell command can be used to display all the Citrix services installed on the Delivery Controller?
A Citrix Administrator is configuring a Citrix Virtual Desktops Site for use with a mirrored SQL Server database.
Which collation sequence should the administrator use when creating an empty database on the principal SQL Server?
Which disk type will always be created for each virtual machine, when creating new virtual machines using Machine Creation Services (MCS)?
What is the effect of the “set cs vserver vserver-CS-1 –redirectURL http://www.newdomain.com/mysite/” command?
Which set of resources can a Citrix Administrator contain within a resource location in a Citrix Virtual Apps and Desktops service deployment?
When deploying an on-premises resource location for a Citrix Cloud-managed Site, a Citrix Administrator should configure the Virtual Delivery Agent (VDA) machines to communicate with a ___________ that is located in the ___________ location in order to become registered with the Site. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Administrator has a configured a Citrix policy using Citrix Studio. However, when the administrator restarted a Virtual Delivery Agent (VDA) machine and launched an HDX session hosted on that machine, the policy settings were NOT being applied.
Which three statements are possible reasons for this behavior? (Choose three.)
The “Limit Visibility” option should be configured when a Citrix Administrator wants to ____________. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Administrator configured the rewrite policies below:
In which order will the policies be evaluated?