Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 1Y0-240 has been withdrawn.

1Y0-240 Practice Exam Questions with Answers Citrix NetScaler 12 Essentials and Traffic Management Certification

Question # 6

What is the effect of the set cmp parameter –cmpBypassPct 70 command if compression is enabled on the NetScaler?

A.

Compression will be bypassed if the NetScaler bandwidth consumption is more than 70%.

B.

Compression will be bypassed if the NetScaler CPU load is 70%.

C.

Compression will be bypassed if the NetScaler bandwidth consumption is less than 70%.

D.

Compression will be bypassed if the NetScaler Memory utilization is 70%.

Full Access
Question # 7

Scenario: A Citrix Administrator has a NetScaler SDX with four VPX instances configured. The SDX has a 10GB bandwidth license that has been configured with dedicated bandwidth of 2GB for each instance. However, the administrator found that three instances do NOT ever reach the bandwidth limit, while one instance reaches the limit and needs 1 GB more bandwidth to accommodate increased traffic requests.

What can the administrator change on the instance that requires more bandwidth, to meet traffic requirements?

A.

Purchase an SDX license to increase the bandwidth on the instances.

B.

Configure burst capacity on the instance adding 1 GB of bandwidth with burst priority 0.

C.

Configure LA channel to increase the bandwidth.

D.

Configure burst capacity of 1 GB with priority 10.

Full Access
Question # 8

View the Exhibit.

1Y0-240 question answer

A Citrix Administrator has implemented the HTTP Callout.

Click on the ‘Exhibit’ button to view the screenshot of the command-line interface.

Which part of the configuration is responsible for triggering the call to HTTP Callout server?

A.

–parameters cip(CLIENT.IP.SRC)

B.

sys.http_callout(myCallout1)

C.

–urlStemExpr “\”/cgi-bin/check_clnt_from_database.pl\”

D.

–headers Request(“Callout Request”)

Full Access
Question # 9

Scenario: A Citrix Administrator has made changes to the NetScaler, deleting parts of the configuration, and then saved the new configurations. The changes caused an outage which needs to be resolved as quickly as possible. There is no NetScaler backup.

What does the administrator need to do to recover the configuration quickly?

A.

Restore form revision history.

B.

Run HA file synchronization.

C.

Run Save v/s Running configuration.

D.

Restart the NetScaler

Full Access
Question # 10

Scenario: A Citrix Administrator has a NetScaler SDX appliance with several instances configured. The administrator needs one instance with two interfaces connected to forward packets that are NOT destined for its MAC address. Hence, the administrator has enabled Layer 2 mode. After enabling Layer 2 mode, the administrator found the interface status going up and down.

What can the administrator perform to resolve this issue?

A.

Disable Layer 2 mode on a NetScaler instance.

B.

Enable tagging on all interfaces.

C.

Enable Layer 3 mode along with Layer 2 mode.

D.

Enable MAC-based forwarding mode.

Full Access
Question # 11

A Citrix Administrator notices that the NetScaler is sending the IP addresses of all the active services in the DNS response.

The administrator can use the set gslb vserver ________________ parameter to avoid this behavior. (Choose the correct option to complete the sentence.)

A.

EDR DISABLED

B.

EDR ENABLED

C.

MIR ENABLED

D.

MIR DISABLED

Full Access
Question # 12

Scenario: A Citrix Administrator has executed the following command:

set csv server Vserver-CS-1 –caseSensitive ON

add cs action CS_Act_1 –targetLBVserver MYVPN_http

add cs policy CS_Pol_1 –rule “http.REQ.HOSTNAME.CONTAINS (\ “server.citrix.lab\”)” –action CS_Act_1

bind csv server CS-vserver1 –policyName CS_Pol_1 –priority 100

What will be the outcome of this configuration?

A.

The users trying to access HTTP://SEVER.CITRIX.LAB will be connected to CS Vserver Vserver-CS-1.

B.

The users trying to access HHTP://SERVER.CITRIX.LAB will be connected to the Vserver MYVPN_http.

C.

The users trying to access HTTP://SERVER.CITRIX.LAB will NOT be connected to the Vserver MYVPN_http.

D.

The users trying to access http://server.citrix.lab will be connected to CS Vserver Vserver-CS-1.

Full Access
Question # 13

Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL virtual servers?

A.

SSL Policy

B.

SSL Profile

C.

SSL Bridge

D.

SSL Offload

Full Access
Question # 14

Scenario: A Citrix Administrator needs to implement a Content Filter policy to ensure the following conditions are met:

  • The user with source IP 10.100.32.211 should NOT be allowed to access the vserver 10.10.10.1.
  • All other users from subnet 10.100.32.0/24 should have access to the vserver 10.10.10.1.
  • Access to the vserver should be blocked for all the other users.

Which policy expression will meet this requirement if the policy action is RESET and the policy is bound to the server (VIP:10.10.10.1)?

A.

REQ.IP.SOURCEIP != 10.100.32.211 || REQ.IP.SOURCEIP != 10.100.32.211 –netmask 255.255.255.0

B.

REQ.IP.SOURCEIP = = 10.100.32.211 || REQ.IP.SOURCEIP != 10.100.32.0 –netmask 255.255.255.0

C.

REQ.IP.SOURCEIP != 10.100.32.211 && REQ.IP.SOURCEIP = = 10.100.32.0–netmask 255.255.255.0

D.

REQ.IP.SOURCEIP = = 10.100.32.211 && REQ.IP.SOURCEIP != 10.100.32.0 –netmask 255.255.255.0

Full Access
Question # 15

Which two options would provide an end-to-end encryption of data, while allowing the NetScaler to optimize the responses? (Choose two.)

A.

SSL Bridge protocol for the services

B.

HTTP protocol for the virtual server

C.

HTTP protocol for the services

D.

SSL protocol for the services

E.

SSL Bridge protocol for the virtual server

F.

SSL protocol for the virtual server

Full Access
Question # 16

Scenario: A Citrix Administrator would like to grant access to a Junior Administrator on the NetScaler. The administrator would like to grant full access to everything except the following:

  • Shell Access
  • User Configuration access
  • Partition Configuration access

Which pre-existing command policy would meet the needs of the scenario?

A.

Superuser

B.

Network

C.

Operator

D.

Sysadmin

Full Access
Question # 17

Scenario: A Citrix Administrator is troubleshooting a NetScaler issue. The administrator goes to the command line and from the Shell, tails the ns.log to view the log in real time to find the issue. After a few minutes, the administrator noticed that the logs stopped scrolling and the issue was missed.

How can troubleshooting continue using the ns.log?

A.

The ns.log needs to be downloaded to the client machine for full viewing.

B.

The ns.log service has stopped and needs to be restarted.

C.

The ns.log is still running. Press ‘Enter’ and the ns.log will resume.

D.

The ns.log has reached its 100 KB limit. Press ‘CTRL+C’ to stop it from running and issue the command “tail-f ns.log” to resume.

Full Access
Question # 18

Scenario: A Citrix Administrator has configured a NetScaler active-passive high availability (HA) pair. When the HA pair fails over, customers are unable to access the hosted websites. After some troubleshooting, the administrator found that the upstream router was NOT updating its ARP table.

What can the administrator configure to resolve this issue?

A.

Virtual MAC

B.

Route Monitor

C.

Independent Network Configuration (INC) mode

D.

HA monitor

Full Access