New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 1Y0-401 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

1Y0-401 Exam Dumps - Designing Citrix XenDesktop 7.6 Solutions

Go to page:
Question # 41

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with two NetScaler virtual servers for each appliance, each binded to a redirection policy, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 42

Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 43

Why is creating six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies, the best design solution?

A.

It provides intrasite redundancy in case of appliance failures, while enhancing performance through an active/active configuration.

B.

It provides redundancy in case of site failures, while optimizing external WAN traffic.

C.

It protects against WAN failures and connects end users to their home datacenter.

D.

It allows for the expected expansion of remote access usage and provides functionality for future needs.

Full Access
Question # 44

Why would the architect choose LACP bonding when configuring network interfaces for storage networks?

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Full Access
Question # 45

Why does Provisioning Services with private image mode enable users in the Radiology group to maintain the changes to their desktops?

A.

Because it enables use of cache on server persistence

B.

Because it retains user changes in a dedicated vDisk image

C.

Because it stores user changes separate from the base image

D.

Because it provides efficient centralization of dedicated user images

Full Access
Question # 46

Why does using SysLog help the company comply with its security policy?

A.

Because it is a centralized, industry-standard log that is easily queried

B.

Because it password-protects the audit logs for added security

C.

Because it uses a standard TCP port

D.

Because it collects logs from multiple devices

Full Access
Question # 47

Why should the network utilization rising above 50% be used to identify bottlenecks?

A.

This indicates insufficient bandwidth for virtual machines delivered by Provisioning Services

B.

This indicates a saturated network segment

C.

This indicates a failed network switch

D.

This indicates an incorrectly configured router

Full Access
Question # 48

Why should disk queue length above zero be used to identify bottlenecks?

A.

This indicates excessive I/O and a disk bottleneck

B.

This indicates excessive swap file utilization

C.

This indicates insufficient RAM

D.

This indicates a failed disk

Full Access
Go to page: