Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 1Y0-401 has been withdrawn.

1Y0-401 Practice Exam Questions with Answers Designing Citrix XenDesktop 7.6 Solutions Certification

Question # 6

Scenario:

CGE's CIO asks a Citrix Architect to design a new Provisioning Services environment. Management asks about best practices for storing master images to ensure scalability, performance, and high availability.

Which solution should the architect recommend?

A.

Configure a shared storage location (CIFS) on a Windows File Server for each regional datacenter.

B.

Configure an iSCSI LUN on a Storage Area Network (SAN) for each Provisioning Services server.

C.

Configure an iSCSI LUN on a Network Attached Storage (NAS) device for each Provisioning Services server.

D.

Configure a shared storage location (CIFS) on a Network Attached Storage (NAS) device.

Full Access
Question # 7

Why would the architect choose active-passive bonding when configuring bonded network interfaces for guest VM networks?

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Full Access
Question # 8

Why should two of each component be located at the London datacenter?

A.

Because it allows for Inter and Intra site high availability

B.

Because it increases security for remote access

C.

Because two components at each datacenter allow for increased user performance

D.

Because user experience will NOT be affected in the event of a site outage

Full Access
Question # 9

How can the architect identify if the server OS machines are the source of a bottleneck?

A.

Identify excessive CPU and memory consumption

B.

Identify excessive memory and network utilization

C.

Identify excessive disk and network I/O

D.

Identify excessive disk I/O and page file utilization

Full Access
Question # 10

What are the benefits of using a Hosted VDI environment with Citrix Profile Management?

A.

It retains the single image management function while allowing users to install applications

B.

It provides a high level of security while allowing user customization

C.

It has a low storage performance requirement and high user density

D.

It delivers low-cost and high application compatibility

Full Access
Question # 11

Why should two of each component be located at the London datacenter?

A.

Because it allows New York and Hong Kong to fail over to the London datacenter

B.

Because it provides secure remote access

C.

Because it allows for increased user performance

D.

Because it allows for centralized management

Full Access
Question # 12

Why does using SmartAuditor help the company comply with its security policy?

A.

Because it records ICA sessions

B.

Because it uses proprietary codec

C.

Because it enables sessions to be searched

D.

Because it provides configuration changes for an audit trail

Full Access
Question # 13

The company’s security compliance policy requires that remote access is logged for auditing purposes.

Which data sources should be captured?

A.

NetScaler logs, StoreFront logs, and Citrix Director database

B.

Configuration Logging database, NetScaler logs, and Citrix Director database

C.

StoreFront logs, System Event logs, and firewall logs

D.

Configuration Logging database, firewall logs, and Application Event log

Full Access
Question # 14

Why does Provisioning Services with cache on server help the Radiology group maintain changes in their desktops?

A.

Because it is stored centrally

B.

Because it reduces XenServer shared storage consumption

C.

Because Profile Manager provides a consistent user experience

D.

Because it reduces storage IO on the XenServer local storage

Full Access
Question # 15

Which risk could lead to a lengthy farm outage in the event of a corrupt SQL data store?

A.

SQL server backups are encrypted

B.

An untested SQL backup and restoration process

C.

SQL servers that are NOT running on the same service packs

D.

The use of SQL Mirroring instead of SQL AlwaysOn Availability Groups

Full Access
Question # 16

Which two factors should a Citrix Architect consider with regard to CGE’s Back Office end-user group? (Choose two.)

A.

Their need for a special application set

B.

Their need to access additional printers

C.

Their need to install their own applications

D.

Their need to use non-corporate-owned devices

Full Access
Question # 17

What should a Citrix Architect do to simplify printer driver management for CGE's Back Office end-user group?

A.

Use the Citrix Universal Print Server.

B.

Enforce the use of the Citrix Universal Printer Driver.

C.

Manually install printer drivers on the XenApp servers.

D.

Modify the printer driver format of the Citrix Universal Printer Driver.

Full Access
Question # 18

Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter?

A.

Server infrastructure

B.

Network connectivity

C.

Storage infrastructure

D.

Power and cooling infrastructure

Full Access
Question # 19

Which tool should a Citrix Architect use to document CGE's existing printer models?

A.

Print Migrator

B.

Stress Printer

C.

Print Detective

D.

Print Management

Full Access
Question # 20

Which two issues could CGE's current home directory storage strategy cause? (Choose two.)

A.

Slow logons

B.

Unverified data backups

C.

High IOPS on the storage appliance

D.

High CPU usage on the XenApp servers

Full Access
Question # 21

A Citrix Architect plans to update the virtual environment in CGE's Jurong datacenter.

Which constraint should the architect address to satisfy CGE's stated business needs?

A.

Lack of shared storage

B.

1 Gb network infrastructure

C.

Datacenter power and cooling

D.

Mixed-server hardware landscape

Full Access
Question # 22

A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image.

Which two factors helped guide the architect's recommendation? (Choose two.)

A.

A reduction in Hotfix testing time

B.

CGE's planned upgrade to Microsoft Office 2013

C.

The use of both applications by all CGE end users

D.

End-user complaints about slow application launch times

Full Access
Question # 23

Which two current licensing issues should a Citrix Architect resolve in CGE's new virtualization design? (Choose two.)

A.

There are more RDS CALs than Citrix licenses.

B.

The Citrix and RDS licenses share the same server.

C.

There are many different license servers in the environment.

D.

There is a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.

Full Access
Question # 24

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

A.

Two StoreFront servers in a single StoreFront server group.

B.

Two NetScalers in a high availability pair, with load balancing pointing to a single StoreFront server.

C.

Three NetScalers in a cluster, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

D.

Two NetScalers in a high availability pair, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Full Access
Question # 25

Scenario:

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

Individuals in the Research end-user group need to be able to remotely access a centrally stored database.

Which FlexCast model should the Citrix architect recommend for this group?

A.

Hosted Shared

B.

Hosted VDI

C.

Streamed VHD

D.

Local VM

Full Access
Question # 26

Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.

What should an architect recommend to optimize printer bandwidth?

A.

Optimize WAN traffic through CloudBridge.

B.

Increase the WAN bandwidth through a WAN link upgrade.

C.

Restrict overall session bandwidth through a HDX bandwidth policy.

D.

Restrict printer redirection bandwidth through a HDX bandwidth policy.

Full Access
Question # 27

What should a Citrix Architect recommend to ensure that streaming traffic is segmented and highly available?

A.

Provisioning Services servers on a shared VLAN.

B.

Provisioning Services servers using NetScaler.

C.

Provisioning Services servers on dedicated physical switches.

D.

Provisioning Services servers on dedicated VLANs.

Full Access
Question # 28

The architect recommended pooled desktop OS machines with Personal vDisks for the Nurses, Imaging, and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines?

A.

Install the antivirus software into the base image.

B.

Deploy the antivirus package as an App-V application.

C.

Deploy the antivirus software through a Group Policy startup script.

D.

Install the antivirus software in the master Personal vDisk as a user-installed application.

Full Access
Question # 29

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

Which configuration should the architect recommend for the new external access architecture?

A.

One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device.

B.

A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.

C.

A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site.

D.

One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs.

Full Access
Question # 30

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

How should a Hosted VDI FlexCast model be implemented to allow end-user-installed applications?

A.

By using Citrix Profile management

B.

By using Personal vDisks

C.

By using statically assigned virtual desktops

D.

By using a network share that contains the App-V packages

Full Access
Question # 31

Scenario:

CGE has a new XenApp image for hosting office applications and will use Provisioning Services to deploy the servers hosting these applications. However, CGE is concerned that their current strategy for deploying antivirus definition updates will reduce the performance of the provisioned servers.

Additionally, the Security team is concerned about the frequency of the antivirus definition updates and would like to have as many updates as possible without reducing performance of the provisioned disk.

Which change should a Citrix Architect recommend to CGE's current strategy for deploying antivirus definitions?

A.

Configure the antivirus client to store definition updates on a CIFS share.

B.

Restart the servers each day to clear the Provisioning Services write cache.

C.

Configure the antivirus client to store definition updates on a locally, non-provisioned disk.

D.

Disable automatic antivirus definition updates and update the definitions manually during each Provisioning Services image update.

Full Access
Question # 32

The architect needs to evaluate the options for replicating user profiles across all sites.

Which two pieces of information should the architect collect to analyze the options? (Choose two.)

A.

WAN traffic

B.

License requirements

C.

Storage infrastructure

D.

Database configuration

Full Access
Question # 33

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Why does using SSL meet CGE's compliance requirements?

A.

It eliminates the need to distribute an internal root certificate.

B.

It encrypts end-to-end traffic from remote end users.

C.

It enables the SSL Relay service.

D.

It encrypts network traffic between XenDesktop, StoreFront, and NetScaler.

Full Access
Question # 34

Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications?

A.

VM Hosted applications

B.

Streamed server OS machines

C.

Dedicated desktop OS machines

D.

Pooled desktop OS machine with Personal vDisk

Full Access
Question # 35

Which two issues should a Citrix Architect address for end users? (Choose two.)

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Full Access
Question # 36

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Full Access
Question # 37

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Full Access
Question # 38

Which two risks exist in the access layer of the CGE environment? (Choose two.)

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Full Access
Question # 39

Which profile type would NOT be suitable for the Back Office end-user group?

A.

Local

B.

Roaming

C.

Mandatory

D.

Citrix Profile management

Full Access
Question # 40

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

A.

CDFControl utility

B.

Citrix EdgeSight console

C.

Citrix AppCenter console

D.

Group Policy Management console

Full Access
Question # 41

CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session.

Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

A.

Research

B.

Engineers

C.

Back Office

D.

Executives/Management

Full Access
Question # 42

What should a Citrix Architect identify as a potential security risk that should be resolved in the next design, based on the current provision for external access?

A.

Web Interface is used

B.

Online Plug-in 12.1 is used

C.

NetScaler Gateway is used to load balance StoreFront

D.

Single-factor authentication is used for external access

Full Access
Question # 43

Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?

A.

A Smart Card reader is installed to allow the end user to log on with an X509 certificate issued by the Active Directory Certificate Authority.

B.

The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO).

C.

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

D.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Full Access
Question # 44

CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment.

Which two sites will be able to support this requirement for Citrix Receiver for iOS and Android? (Choose two.)

A.

Tulsa

B.

Jurong

C.

London

D.

Odessa

E.

Houston

F.

Aberdeen

G.

Makassar

Full Access
Question # 45

How should the architect configure high availability (HA) on a XenServer VM to support an iSCSI NAS?

A.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.

B.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

C.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.

D.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.

Full Access
Question # 46

Scenario:

Each XenServer hypervisor host is configured with four 10GB NICS - two dedicated for storage and two bonded for guest VM networks and management separated by VLAN. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure the guest VM network?

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Full Access
Question # 47

Why would the architect choose XenServer MPIO when configuring network interfaces for storage networks?

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Full Access
Question # 48

Why would the architect choose LACP bonding when configuring network interfaces for storage networks?

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Full Access
Question # 49

Scenario:

CGE's CIO asks a Citrix Architect to design its Hypervisor networking solution. The storage team informs the architect that they have purchased a new 10GB iSCSI SAN array that the XenServer hosts will use for SAN storage. They would like the solution to meet all outlined requirements.

What should the architect recommend?

A.

Each XenServer host should be configured with six 10GB network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic.

B.

Each XenServer host should be configured with four 10GB network cards - two bonded for storage and management separated by separate VLAN, and two bonded for guest VM networks.

C.

Each XenServer host should be configured with two bonded 10GB NICs for storage, management, and guest VM networking.

D.

Each XenServer host should be configured with four 10GB NICS - two dedicated for storage, and two bonded for guest VM networks and management separated by VLAN.

Full Access
Question # 50

Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 51

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with failover sites within the NetScaler Gateway the best design solution?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 52

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT as a VM hosted app on Windows 7 x86 with Machine Creation Services the best solution?

A.

It supports 16-bit applications.

B.

It meets the high-performance application demands of the Executives/Management end-user group.

C.

It allows the installation of custom applications.

D.

It offers faster change and rollback procedures.

Full Access
Question # 53

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT as Hosted VDI Static the best solution?

A.

It allows the installation of custom applications.

B.

It is easy to manage.

C.

It meets the high-performance application demands of the Executives/Management end-user group.

D.

It allows the Executives/Management end-user group to share desktops.

Full Access
Question # 54

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT as a published application on Windows Server 2008 R2 with Machine Creation Services the best solution?

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Full Access
Question # 55

How many Provisioning Services servers should the architect install in each of the three farms?

A.

B.

One server in each farm

C.

Two servers in each farm

D.

Two servers in the primary farm, two servers in the secondary farm, and one server in the remaining farm

Full Access
Question # 56

Scenario:

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

Which high availability solution should a Citrix Architect recommend?

A.

Fast Recovery

B.

Database Mirroring

C.

Database Snapshots

D.

AlwaysOn Failover Cluster Instances

Full Access
Question # 57

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Active write back' when configuring group profiles benefit CGE's Sales end-user group?

A.

It improves application performance.

B.

It simplifies home drive cleanup.

C.

It minimizes the required storage needed for folder redirection.

D.

It improves data accuracy in volatile environments.

Full Access
Question # 58

How should the components be set up for this environment?

A.

Configure a NetScaler cluster. Place the StoreFront servers and Delivery Controllers in the internal network.

B.

Configure NetScaler high availability. Place the StoreFront servers and Delivery Controllers in the internal network.

C.

Configure a back-up vServer. Place the StoreFront servers and Delivery Controllers in the internal network.

D.

Configure GSLB for the StoreFront servers and Delivery Controllers and place them in the internal network.

Full Access
Question # 59

Which three user groups require remote access? (Choose three.)

A.

IT

B.

Call center

C.

Human Resources

D.

Emergency Response Team

E.

Nurses, Imaging, and Radiology

Full Access
Question # 60

Scenario: Some contractors require access to various corporate applications. They must also be able to install their own application within the environment for testing purposes.

Which two delivery methods fulfill these requirements? (Choose two.)

A.

Hosted server OS with Profile Management enabled

B.

Pooled hosted desktop OS with Personal vDisk enabled

C.

Hosted server OS with persistent server operating system

D.

Assigned hosted desktop OS with persistent desktop operating system

Full Access