3 Months Free Update
3 Months Free Update
3 Months Free Update
How can a Citrix Engineer monitor the Citrix ADC appliances to check that all SSL certificates have a key strength of at least 2048 bits from the SSL Dashboard Settings?
Which Citrix Application Delivery Management (ADM) feature can a Citrix Engineer use to narrow a list of Citrix ADC devices based on pre-defined criteria?
Which font end Optimization technique overcomes the parallel download limitation of web browsers?
Which report can a Citrix Engineer review to ensure that the Citrix ADC meets all PCI-DSS requirements.
Which Front End Optimization technique can a Citrix Engineer enable on the Citrix ADC to remove all excess whitespace from a file?
Which variable will display the client’s source IP address when added to an HTML Error Object page?
Scenaho: A Citrix Engineer needs to block requests from a list of IP addresses in a database maintained by the Security team. The Security team has built a web application that will send a response of either "Blocked" or "Allowed," based on whether the given IP address is on the list. Which expression should the engineer use to extract the status for policy processing?
Scenario: A Citrix Engineer has configured Citrix Application Delivery Management (ADM) to monitor applications presented by Citrix ADC appliances. When reviewing the App Security Dashboard, the engineer finds no data.
What must the engineer do to ensure data is being collected from the applications?
What should a Citrix Engineer do when using the Learn feature for Start URL relaxation?
Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. After the Web App Firewall policy is bound to the virtual server, the engineer notices that Citrix Web App Firewall is NOT blocking bad requests from clients. Which tool can help the engineer view the traffic that is passing to and from the client?
Scenario: A Citrix Engineer is asked to implement multi-factor authentication for Citrix Gateway. The engineer creates the authentication policies and binds the policies to the appropriate bind points. The engineer creates a custom form using Notepad++ to format the page which will capture the user’s credentials.
What is the first step the engineer must perform to assign this form to the authentication process?