لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which type of entity can a Citrix Administrator configure to support the use of an SSL policy?
A. Global server load-balancing virtual server
B. SSL_Bridge load-balancing virtual server
C. Authentication, authorization, and auditing (AAA) group or user
D. SSL load-balancing virtual server
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Scenario: A Citrix Administrator has configured an HTTP load-balancing virtual server with least response time as the load-balancing algorithm.The administrator notices that requests to the virtual server appear to be using the round robin load-balancing algorithm.What could be causing the virtual server to use the round robin load-balancing algorithm?
A. The virtual server is in startup round robin mode
B. Least response time CANNOT be used as a load-balancing algorithm on an HTTP virtual server
C. The services that are bound to the HTTP virtual server are using the PING monitor
D. The Citrix ADC configuration has NOT been saved yet
عرض الإجابة
اجابة صحيحة: A
السؤال #3
The StoreFront service is using SSL and is showing as DOWN.What could be causing this issue?
A. The reverse option is NOT enabled
B. A wildcard certificate is in use
C. A certificate is NOT bound to the monitor
D. The secure checkbox is NOT checked in the StoreFront monitor
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A Citrix Administrator needs to investigate why Citrix ADC messages are NOT being recorded on an external server.What should the administrator check to resolve this issue?
A. Location of nslog file
B. Content inspection
C. Authentication, authorization, and auditing (AAA) policy
D. Syslog server entry
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Scenario: A Citrix Administrator needs to create local, limited-privilege user accounts for other administrators. The other administrators will require only:The ability to enable and disable services and serversRead-only access -Which built-in command policy permission level can the administrator use?
A. ead-only
B. perator
C. ysadmin
D. etwork
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Where do the monitor probes originate by default, after creating and correctly configuring a custom user monitor?
A. IP
B. NIP
C. IP
D. SIP
عرض الإجابة
اجابة صحيحة: D
السؤال #7
What is one reason a Citrix Administrator should configure the AlwaysON VPN feature?
A. n employee needs to have client choices after logging on outside the enterprise network
B. anagement wants to regulate the network access provided to its users when they are connected to a VPN tunnel
C. anagement wants web traffic to go out locally instead of across the VPN
D. n employee starts the laptop outside the enterprise network and needs assistance to establish VPN connectivity
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Scenario: A Citrix Administrator needs to configure an authentication workflow on Citrix ADC with the below requirements.All internal users must use their corporate credentials to authenticate.Users from partner organizations must be authenticated using their own directory services without replication or a synchronization process.How can the administrator meet the above requirements while authenticating the users?
A. eploy SAML on Citrix ADC in the service provider (SP) role for users from partner organizations
B. reate two LDAP and two SAML authentication policies on the authentication, authorization, and auditing (AAA) virtual server
C. onfigure nFactor authentication with two LDAP advanced policies and one SAML advanced policy
D. onfigure two dedicated AAA virtual servers for internal and partner users
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL virtual servers?
A. SSL bridge
B. SSL multiplexing
C. SSL policy
D. SSL profile
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Scenario: A Citrix Administrator is configuring a new authentication, authorization, and auditing (AAA) virtual server, and the status is DOWN. The administrator makes the below configurations: add lb vserver lb_vsrv_www HTTP 10.107.149.229 80 -persistenceType NONE -cltTimeout 180 -authn401 ON -authnVsName SAML_SP bind lb vserver lb_vsrv_www_ssl Red_srv bind lb vserver Ib_vsrv_www_ssl Blue_srv add authentication vserver SAML_SP SSL 10.107.149.230 443 -AuthenticationDomain citrix.labWhat should the administr
A. An SSL certificate
B. A service
C. An AAA policy
D. An LDAP policy
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A Citrix Administrator wants to customize the look of the landing page presented to users during the authentication process on Citrix ADC.Which nFactor component should the administrator modify in this scenario?
A. Logon Schema
B. Pass-through factor
C. Next factor
D. NoAuth Policy
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A Citrix Administrator needs to block all local printer access from users in the Marketing department who are connecting remotely, but who should still have access when connecting inside the corporate network using the same Citrix Gateway.What can the administrator configure to accomplish this?
A. SmartControl
B. Extended access control list (ACL)
C. Simple access control list (ACL)
D. AppFlow
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A Citrix Administrator configured a Citrix Gateway virtual server for authentication, but there is no authentication policy bound to the virtual server.Which authentication binding point will the Citrix ADC evaluate next?
A. Override global
B. Group
C. Default global
D. User
عرض الإجابة
اجابة صحيحة: D
السؤال #14
A Citrix Administrator needs to integrate an existing certification-based authentication policy into an existing Citrix Gateway virtual server.Which three steps can the administrator take to accomplish this? (Choose three.)
A. Bind the existing CERT authentication policy to the Citrix Gateway virtual server
B. Enable the two-factor option on the existing CERT authentication profile
C. Enable client authentication on the SSL parameters of the virtual server
D. Change the client certificate to mandatory on the SSL parameters of the virtual server
E. Create a CERT authentication policy and bind it to the Citrix Gateway virtual server
عرض الإجابة
اجابة صحيحة: CDE
السؤال #15
Scenario: A Citrix Administrator suspects an attack on a load-balancing virtual server (IP address 192.168.100.25). The administrator needs to restrict access to this virtual server for 10 minutes.Which access control list (ACL) will accomplish this?
A. add ns acl rule1 DENY -destIP 192
B. add simpleacl rule1 DENY -srcIP 192
C. add ns acl rule1 DENY -destIP 192
D. add simpleacl rule1 DENY -srcIP 192
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Scenario: A Citrix Administrator would like to grant access to a Junior Citrix Administrator on the Citrix ADC. The administrator would like to grant full access to everything except:Shell -User configuration -Partition configuration -Which preexisting command policy would meet the needs of this scenario?
A. Network
B. Operator
C. Sysadmin
D. Superuser
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A Citrix Administrator needs to configure a Citrix Gateway virtual server to meet an organization’s security requirements.Which two types of devices can the administrator control with Endpoint Analysis (EPA) scans? (Choose two.)
A. iOS
B. Mac
C. Microsoft Windows
D. Chromebook
E. Android
عرض الإجابة
اجابة صحيحة: BC
السؤال #18
After being audited, a Citrix Administrator learns that additional security enhancements should be made to one of the virtual servers.Which two actions can the administrator perform to accomplish this? (Choose two.)
A. Enable the TLSv1
B. Enable the RC4 cipher suite
C. Create a SHA1 key
D. Disable the SSLv3
عرض الإجابة
اجابة صحيحة: AC
السؤال #19
Scenario: A Citrix ADC appliance is having intermittent issues, and a Citrix Administrator is unable to identify the root cause. The administrator opens a support ticket, and the Citrix Support Engineer assigned to the case requests all logs and configuration information from the Citrix ADC.Which technical support tool can the administrator use to gather all requested information?
A. Batch Configuration
B. Start New Trace
C. Get Back Trace
D. Generate Support File
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: