Which two steps could a Citrix Engineer take to tag both corporate-owned and employee-owned devices? (Choose two.)
What should a Citrix Engineer do to remove and prevent subsequent access to an unwrapped application that is already installed by a group of users on their iOS devices?
Scenario: A Citrix Engineer has already backed up the XenMobile configuration database. The following is a list, in no particular order, of some of the remaining steps that the engineer must complete to apply a patch to a multi-node, clustered XenMobile Server deployment:
1. Shut down the updated node.
2. Repeat the above steps for each node in the cluster until all nodes have been upgraded.
3. Fail over to secondary node.
4. Update the running node and confirm that the service is running.
5. Start the next node in the cluster.
6. Shut down all but one node.
7. Verify that all nodes are running in the cluster.
8. Update all nodes at the same time.
9. Restore the XenMobile configuration database.
Which six steps must the engineer take, and in which order do they need to be completed, to apply a patch to a multi-node, clustered XenMobile Server deployment?
Scenario: A Citrix Engineer is getting ready to deploy a XenMobile pilot environment to several users in the Sales department. The engineer assigned to the project has provided some users with logon instructions and a URL for the NetScaler Gateway. The engineer has configured LDAP for SSO with SAMAccountName. Several users are reporting that they are unable to log on.
Which file could the engineer check on the NetScaler to help troubleshoot the issue?
A Citrix Engineer, in the process of configuring XenMobile, launches the XenMobile Console for the first time and is presented with the wizard to continue the configuration.
Which two options could the engineer configure at this stage of the installation? (Choose two.)