Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1Y0-341 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1Y0-341 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Citrix ADC Advanced Topics - Security. Management and Optimization (CCP-N)
  • Last Update: May 29, 2024
  • Questions and Answers: 107
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1Y0-341 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1Y0-341 Practice Exam Questions with Answers Citrix ADC Advanced Topics - Security. Management and Optimization (CCP-N) Certification

Question # 6

A Citrix Engineer observes that the servers hosting a critical application are crashing on a regular basis. Which protection could the engineer implement on a Citrix Web App Firewall in front of the application?

A.

Buffer Overflow Check

B.

HTML Cross-Site Scripting (XSS)

C.

Start URL

D.

HTML SQL Injection

Full Access
Question # 7

Scenario: A Citrix Engineer is notified that improper requests are reacting the web application. While investigating, the engineer notices that the Citrix Web App Firewall policy has zero hits.

What are two possible causes for this within the Citrix Web App Firewall policy? (Choose two.)

A.

The expression is incorrect.

B.

It has been assigned an Advanced HTML profile.

C.

It is NOT bound to the virtual server.

D.

It has been assigned the built-in APPFW_RESET profile.

Full Access
Question # 8

What should a Citrix Engineer do when using the Learn feature for Start URL relaxation?

A.

Ensure that only valid or correct traffic is directed to the protected web application while in Learn mode.

B.

Invite at least 10 test users to collect sufficient data for the Learn feature.

C.

Create a Web App Firewall policy that blocks unwanted traffic.

D.

Ensure that the /var file system has at least 10 MB free.

Full Access
Question # 9

Which data populates the Events Dashboard?

A.

Syslog messages

B.

SNMP trap messages

C.

API calls

D.

AppFlow IPFIX records

Full Access
Question # 10

Scenario: During application troubleshooting, a Citrix Engineer notices that response traffic received from a protected web application is NOT matching what the web server is sending out. The engineer is concerned that someone is trying to disrupt caching behavior.

Which action is the Citrix Web App Firewall performing that would trigger this false positive?

A.

Removing the Last-Modified header

B.

Inserting a hidden form field

C.

Removing the Accept-Encoding header

D.

Modifying and adding cookies in the response

Full Access
Question # 11

A Citrix Engineer wants to create a configuration job template to add a DNS nameserver to each Citrix ADC instance. What is a valid variable name for the DNS nameserver?

A.

%dns_nameserver%

B.

%dns_nameserver

C.

$dns_nameserver$

D.

$dns nameserver

Full Access
Question # 12

Scenario: A Citrix Engineer is reviewing the Citrix Web App Firewall log files using the GUI. Upon further analysis, the engineer notices that legitimate application traffic is being blocked.

What can the engineer do to allow the traffic to pass through while maintaining security?

A.

Note the protection blocking the traffic in the log entry. Edit the profile and deselect the Block action for the protection.

B.

Select the check box in the log entry. Choose Dismiss to allow the traffic to pass through from the Action menu.

C.

Note the protection blocking the traffic in the log entry. Create a new profile and policy and bind it with a larger priority number.

D.

Select the check box in the log entry. Choose Edit & Deploy to create a relaxation rule from the Action menu.

Full Access
Question # 13

Which build-in TCP profile can a Citrix Engineer assign to a virtual server to improve performance for users who access an application from a remote office over an ATM connection?

A.

nstcp_default_tcp_lfp

B.

nstcp_default_tcp_lan

C.

nstcp_default_tcp_interactive_stream

D.

nstcp_default_tcp_lnp

Full Access
Question # 14

Which feature of Learning should a Citrix Engineer configure to direct Citrix Web App Firewall to learn from specific sessions?

A.

Advanced policy expression filter

B.

Default policy expression filter

C.

Trusted Learning Clients list

D.

Manage Content Types for Safe Commerce

Full Access
Question # 15

Scenario: A Citrix Engineer notices that a web page takes a long time to display. Upon further investigation,

the engineer determines that the requested page consists of a table of high-resolution pictures which are being displayed in table cells measuring 320 by 180 pixels.

Which Front End Optimization technique can the engineer enable on the Citrix ADC to improve time-to-display?

A.

Shrink to Attributes

B.

Make Inline

C.

Extend Page Cache

D.

Minify

Full Access
Question # 16

A Citrix Engineer reviews the App Dashboard and notices that three of the monitored applications have an App Score of less than 50.

The engineer can interpret the App Score as a metric of application. (Choose the correct option to complete the sentence.)

A.

security, with a lower score indicating better security

B.

performance and availability, with a higher score indicating better health

C.

performance and availability, with a lower score indicating better health

D.

security, with a higher score indicating better security

Full Access
Question # 17

Which font end Optimization technique overcomes the parallel download limitation of web browsers?

A.

Domain Sharing

B.

Minify

C.

Extend Page Cache

D.

Lazy Load

Full Access
Question # 18

Which protection can a Citrix Engineer implement to prevent a hacker from extracting a customer list from the company website?

A.

Cross-Site Request Forgeries (CSRF)

B.

Form Field Consistency

C.

HTML Cross-Site Scripting (XSS)

D.

HTML SQL Injection

Full Access
Question # 19

A Citrix Engineer for an online retailer wants to ensure that customer address information is NOT stolen. Which protection can the engineer implement to prevent this?

A.

Cross-Site Request Forgeries (CSFR)

B.

HTML SQL Injection

C.

For Field Consistency

D.

Credit Card Check

Full Access
Question # 20

Which build-in TCP profile can a Citrix Engineer assign to a virtual server to improve performance for users who access an application from a secondary campus building over a fiber optic connection?

A.

nstcp_default_tcp_lfp

B.

nstcp_default_tcp_lan

C.

nstcp_default_tcp_interactive_stream

D.

nstcp_default_tcp_lnp

Full Access
Question # 21

A Citrix Engineer needs to set up access to an internal application for external partners.

Which two entities must the engineer configure on the Citrix ADC to support this? (Choose two.)

A.

SAML Policy

B.

SAML ldP Profile

C.

SAML ldP Policy

D.

SAML Action

Full Access
Question # 22

Scenario: A Citrix Engineer needs to ensure that the flow of traffic to a web application does NOT overwhelm the server. After thorough testing, the engineer determines that the application can handle a maximum of 3,000 requests per minute. The engineer builds a limit identifier, rl_maxrequests, to enforce this limitation.

Which advanced expression can the engineer write in the Responder policy to invoke rate limiting?

A.

SYS.CHECK_LIMIT(“rl_maxrequests”)

B.

SYS.CHECK_LIMIT(“rl_maxrequests”).CONTAINS(“Busy”)

C.

SYS.CHECK_LIMIT(“rl_maxrequests”).IS_VALID

D.

SYS.CHECK_LIMIT(“rl_maxrequests”).GE(3000)

Full Access
Question # 23

Scenario: A Citrix Engineer reviews the log files for a business-critical web application. The engineer notices a series of attempts to directly access a file, /etc/passwd.

Which feature can the engineer implement to protect the application against this attack?

A.

Buffer Overflow

B.

Start URL

C.

Content Type

D.

Form Field Consistency

Full Access
Question # 24

Scenario: A Citrix Engineer wants to use Citrix Application Delivery Management (ADM) to monitor a single Citrix ADC VPX with eight web applications and one Citrix Gateway. It is important that the collected data be protected.

Which deployment will satisfy the requirements?

A.

A single Citrix ADM with database replication to a secondary storage repository.

B.

A pair of Citrix ADM virtual appliances configured for High Availability.

C.

A single Citrix ADM imported onto the same hypervisor as the Citrix ADC VPX.

D.

A pair of Citrix ADM virtual appliances, each working independently.

Full Access
Question # 25

A Citrix Engineer enabled Cookie Consistency protection on a web application and wants to verify that it is working.

Which cookie name can the engineer look for in the HTTP headers sent from the client to verify the protection?

A.

Citrix_ns_id

B.

Citrix_waf_id

C.

Citrix_adc_id

D.

Citrix_sc_id

Full Access
Question # 26

Scenario: A Citrix Engineer has configured Integrated Caching to improve application performance. Within hours, the Citrix ADC appliance has run out of memory.

Which Content Group setting can the engineer configure to show the caching process until a need is demonstrated?

A.

Maximum memory usage limit

B.

Quick Abort Size

C.

Do not cache – if hits are less than

D.

Do not cache – if size exceeds

Full Access
Question # 27

Scenario: A Citrix Engineer manages Citrix Application Delivery Management (ADM) for a large holding company. Each division maintains its own ADC appliances. The engineer wants to make Citrix ADM features and benefits available to each group independently.

What can the engineer create for each division to achieve this?

A.

A site

B.

A role

C.

A tenant

D.

A dashboard

E.

A group

Full Access
Question # 28

Scenario: A Citrix Engineer created the policies in the attached exhibit.

1Y0-341 question answer

Click the Exhibit button to view the list of policies.

HTTP Request:

GET /resetpassword.htm HTTP/1.1

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0 Host: www.citrix.com

Accept-Language: en-us Accept-Encoding: gzip, deflate Connection: Keep-Alive

Which profile will be applied to the above HTTP request?

A.

Profile_C

B.

Profile_D

C.

Profile_A

D.

Profile_B

Full Access
Question # 29

Which Front End Optimization technique reduces the number of files to be requested for download?

A.

Minify

B.

Shrink to Attributes

C.

Inlining

D.

Domain Sharding

Full Access
Question # 30

Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. After the Web App Firewall policy is bound to the virtual server, the engineer notices that Citrix Web App Firewall is NOT blocking bad requests from clients. Which tool can help the engineer view the traffic that is passing to and from the client?

A.

nstrace

B.

nsconmsg

C.

syslog

D.

aaad.debug

Full Access
Question # 31

Scenario: A Citrix Engineer used Learning to establish the HTML SQL Injection relaxations for a critical web application. The engineer now wishes to begin working on the protections for a different web application. The

name of the Web App Profile is appfw_prof_customercare.

Which CLI command can the engineer use to empty the Learn database?

A.

set appfw learningsettings appfw_prof_customercare -SQLInjectionMinThreshold 0

B.

set appfw learningsettings appfw_prof_customercare -startURLMinThreshold 0

C.

reset appfw learningdata

D.

export appfw learningdata appfw_prof_customercare

Full Access
Question # 32

Scenario: A Web Application Developer asked a Citrix Engineer to implement Citrix Web App Firewall protections. To provide consistency in branding, the developer asked that the web server provide a custom message when a violation occurs. Which profile setting does the engineer need to configure to provide the custom message?

A.

Redirect URL

B.

HTML Error Object

C.

RFC Profile

D.

Content Type Default Response

Full Access