Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 1Y0-401 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

1Y0-401 Exam Dumps - Designing Citrix XenDesktop 7.6 Solutions

Question # 4

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Profile streaming' when configuring group profiles benefit CGE's Sales end-user group?

A.

It allows faster logons.

B.

It simplifies home drive cleanup.

C.

It minimizes the required storage needed for folder redirection.

D.

It improves application performance.

Full Access
Question # 5

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Why does using Provisioning Services and leveraging snapshots help manage the image versioning process?

A.

It enables rollbacks.

B.

It manages version control.

C.

It leverages storage array features to offload host processing.

D.

It automatically deploys the latest drivers and patches.

Full Access
Question # 6

Scenario: StoreFront is installed on dedicated servers. A Citrix Architect needs to supply CGE’s corporate IT team with the critical Citrix services to be monitored.

Which two Citrix services on the StoreFront servers should the architect recommend be monitored? (Choose two.)

A.

Monitor Service

B.

StoreFront Service

C.

Peer Resolution Service

D.

Credential Wallet Service

Full Access
Question # 7

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Which tool should a Citrix Architect recommend for those groups?

A.

Provisioning Services

B.

Hypervisor templates and snapshots

C.

Windows Deployment Services

D.

Machine Creation Services

Full Access
Question # 8

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

How should the architect deploy MGMT as an On-Demand App?

A.

As a VM hosted app on Windows 7 x86 deployed with Machine Creation Services

B.

As a VM hosted app on Windows 7 x86 deployed with Provisioning Services

C.

As a published application on Windows Server 2008 R2 deployed with Machine Creation Services

D.

As a published application on Windows Server 2012 R2 deployed with Provisioning Services

Full Access
Question # 9

Scenario: The Engineers end-user group requires access to an application that automatically updates itself daily from an Internet source. The application is NOT multi-user aware.

Which FlexCast model would be most suitable for these end users?

A.

Local VM

B.

Remote PC Access

C.

Hosted Shared Desktop - Non-Persistent

D.

Hosted VDI - Static/Non-Persistent with Personal vDisk

Full Access
Question # 10

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Full Access
Question # 11

What are the benefits of using IPsec to meet the company’s compliance requirements?

A.

It encrypts internal network traffic

B.

It encrypts ICA traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It complies with industry-standard IPsec encryption requirements

Full Access
Question # 12

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Why do using Hypervisor templates and WAIK help manage the image versioning process?

A.

It reduces image deployment time.

B.

It reduces the storage requirement for images.

C.

It allows for testing updates prior to updating the production machine catalog.

D.

It allows for testing updates prior to updating the production Delivery Group.

Full Access
Question # 13

Which two risks exist in the access layer of the CGE environment? (Choose two.)

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Full Access
Question # 14

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Full Access
Question # 15

Which two issues should a Citrix Architect address for end users? (Choose two.)

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Full Access
Question # 16

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT as a published application on Windows Server 2012 R2 with Provisioning Services the best solution?

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Full Access
Question # 17

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Offline profile support' benefit CGE's Sales end-user group?

A.

It allows faster logons and logoffs.

B.

It minimizes the required storage needed for folder redirection.

C.

It simplifies home drive cleanup.

D.

It improves data accuracy in volatile environments.

Full Access
Question # 18

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents ensure full control over which Group Policies are applied?

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on.

B.

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on.

C.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

D.

It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

Full Access
Question # 19

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect implement GPOs to ensure full control over which Citrix policies are applied?

A.

Create one GPO for each region.

B.

Create Citrix policies within a GPO and filter the policies based on end users and Delivery Groups.

C.

Create Citrix policies within a GPO and filter the policies based on Client Name.

D.

Create Citrix policies within a GPO and filter the Citrix policies based on IP address.

Full Access
Question # 20

Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.

What should an architect recommend to optimize printer bandwidth?

A.

Optimize WAN traffic through CloudBridge.

B.

Increase the WAN bandwidth through a WAN link upgrade.

C.

Restrict overall session bandwidth through a HDX bandwidth policy.

D.

Restrict printer redirection bandwidth through a HDX bandwidth policy.

Full Access
Question # 21

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

How should the architect configure the callback URL with a high availability pair of NetScalers located in all three regional datacenters?

A.

Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

B.

Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

C.

Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

D.

Configure the callback URL to point to the external beacon address.

Full Access
Question # 22

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace at the root level ensure full control over which Group Policies are applied?

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.

B.

It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.

C.

It ensures that only Citrix policies are applied below the root level when end users log on.

D.

It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies.

Full Access
Question # 23

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network.

How should the architect implement a highly available Provisioning Services server on dedicated physical switches?

A.

By installing multiple NICs in one Provisioning Services server in each datacenter

B.

By deploying one Provisioning Services server on a dedicated switch in the primary and secondary datacenters

C.

By deploying two Provisioning Services servers on dedicated switches in each datacenter

D.

By using NetScaler with GSLB to load balance the Provisioning Services servers on dedicated switches in each datacenter

Full Access
Question # 24

Which tool should a Citrix Architect use to document CGE's existing printer models?

A.

Print Migrator

B.

Stress Printer

C.

Print Detective

D.

Print Management

Full Access
Question # 25

A Citrix Architect plans to update the virtual environment in CGE's Jurong datacenter.

Which constraint should the architect address to satisfy CGE's stated business needs?

A.

Lack of shared storage

B.

1 Gb network infrastructure

C.

Datacenter power and cooling

D.

Mixed-server hardware landscape

Full Access
Question # 26

After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.

What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)

A.

It allows the end users to install custom software.

B.

It gives the end users full rights over the system drive.

C.

It requires less storage space than dedicated desktops.

D.

It allows for high availability in a disaster recovery scenario.

Full Access
Question # 27

What should a Citrix Architect do to simplify printer driver management for CGE's Back Office end-user group?

A.

Use the Citrix Universal Print Server.

B.

Enforce the use of the Citrix Universal Printer Driver.

C.

Manually install printer drivers on the XenApp servers.

D.

Modify the printer driver format of the Citrix Universal Printer Driver.

Full Access
Question # 28

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

A.

Two StoreFront servers in a single StoreFront server group.

B.

Two NetScalers in a high availability pair, with load balancing pointing to a single StoreFront server.

C.

Three NetScalers in a cluster, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

D.

Two NetScalers in a high availability pair, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Full Access
Question # 29

Which reason explains why a Citrix Architect would identify the SQL environment as a cause of potential issues in CGE's current deployment?

A.

Use of SQL authentication

B.

Lack of backup and restoration procedures

C.

Lack of identical servers in different datacenters

D.

Network bandwidth between congested datacenters

Full Access
Question # 30

Scenario:

CGE wants to use NetScaler Insight to capture network metrics for connections to the Citrix environment. Specifically, CGE wants to capture internal and external end users connecting to XenDesktop.

Where in the design should a Citrix Architect place NetScalers to capture the required metrics for internal end users without using ICA Proxy?

A.

In front of the StoreFront server group

B.

In-line between the clients and the Delivery Controllers

C.

In the network DMZ for NetScaler Gateway connections

D.

In-line between the clients and the XenDesktop virtual desktops

Full Access
Question # 31

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

How should the architect configure the callback URL with a high availability pair of NetScalers located in all three regional datacenters?

A.

Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

B.

Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

C.

Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

D.

Configure the callback URL to point to the external beacon address.

Full Access
Question # 32

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Which type of encryption should a Citrix Architect recommend?

A.

SecureICA

B.

IPsec

C.

SSL

D.

L2TP

Full Access
Question # 33

A Citrix Architect reviewed CGE's antivirus policy and found that it does NOT comply with the posted Citrix antivirus recommendations.

What should the architect recommend be added to CGE's antivirus policy?

A.

Enable scanning of network drives.

B.

Disable real-time scanning on Citrix XenApp servers.

C.

Scan all excluded files during the scheduled periodic scan.

D.

Exclude the user profile storage location from antivirus scanning.

Full Access
Question # 34

Which consideration is unnecessary for the PositivelyPeople application in the new environment?

A.

File security

B.

Secure remote access

C.

Access to legacy mainframe

D.

Support for secured print jobs

Full Access
Question # 35

Why is configuring regional shared storage locations on a CIFS server using DNS Round Robin the best design choice for vDisk storage?

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Full Access
Question # 36

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with a Gateway vServer the best design solution?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 37

Why is a design with 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 38

How should the architect configure high availability (HA) on a Windows File Server so that Provisioning Services always has access to the Provisioning Services images?

A.

By using Distributed File Services

B.

By using Clustered File Services

C.

By using DNS Round Robin

D.

By using XenServer with HA enabled

Full Access
Question # 39

Scenario:

Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure XenServer?

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Full Access
Question # 40

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server for each appliance binded to a session policy, the best remote access design for the environment?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 41

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with two NetScaler virtual servers for each appliance, each binded to a redirection policy, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 42

Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 43

Why is creating six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies, the best design solution?

A.

It provides intrasite redundancy in case of appliance failures, while enhancing performance through an active/active configuration.

B.

It provides redundancy in case of site failures, while optimizing external WAN traffic.

C.

It protects against WAN failures and connects end users to their home datacenter.

D.

It allows for the expected expansion of remote access usage and provides functionality for future needs.

Full Access
Question # 44

Why would the architect choose LACP bonding when configuring network interfaces for storage networks?

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Full Access
Question # 45

Why does Provisioning Services with private image mode enable users in the Radiology group to maintain the changes to their desktops?

A.

Because it enables use of cache on server persistence

B.

Because it retains user changes in a dedicated vDisk image

C.

Because it stores user changes separate from the base image

D.

Because it provides efficient centralization of dedicated user images

Full Access
Question # 46

Why does using SysLog help the company comply with its security policy?

A.

Because it is a centralized, industry-standard log that is easily queried

B.

Because it password-protects the audit logs for added security

C.

Because it uses a standard TCP port

D.

Because it collects logs from multiple devices

Full Access
Question # 47

Why should the network utilization rising above 50% be used to identify bottlenecks?

A.

This indicates insufficient bandwidth for virtual machines delivered by Provisioning Services

B.

This indicates a saturated network segment

C.

This indicates a failed network switch

D.

This indicates an incorrectly configured router

Full Access
Question # 48

Why should disk queue length above zero be used to identify bottlenecks?

A.

This indicates excessive I/O and a disk bottleneck

B.

This indicates excessive swap file utilization

C.

This indicates insufficient RAM

D.

This indicates a failed disk

Full Access
Question # 49

Why is configuring GSLB the best remote access design for the environment?

A.

This design provides redundancy in case of site failures and connects users to their backup datacenter in case of primary site failure.

B.

This design provides redundancy in case of appliance failures and connects users to their home datacenter using external WAN traffic.

C.

This design provides redundancy in case of appliance failures and connects users to their home datacenter using external WAN traffic.

D.

This design will allow for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 50

What should CGE do to all corporate-owned and non-corporate-owned Windows client devices to ensure an optimal end-user experience?

A.

Upgrade all clients to Receiver 4.2.

B.

Install native printer drivers on all clients.

C.

Install the CloudBridge Plug-in on all clients.

D.

Install Citrix Profile management on all clients.

Full Access
Question # 51

Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?

A.

HDX Monitor

B.

Citrix Director

C.

Citrix EdgeSight

D.

Citrix AppCenter Console

Full Access
Question # 52

Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?

A.

A Smart Card reader is installed to allow the end user to log on with an X509 certificate issued by the Active Directory Certificate Authority.

B.

The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO).

C.

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

D.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Full Access
Question # 53

Which two CGE end-user groups do NOT currently have their profile settings retained between sessions? (Choose two.)

A.

Sales

B.

Engineers

C.

Technicians

D.

Executives/Management

Full Access
Question # 54

Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.)

A.

Single-factor authentication is used for external access.

B.

There are single Secure Gateway servers in some locations.

C.

NetScaler Gateway is being used to load balance StoreFront.

D.

There is no automatic failover between regions for end users.

Full Access
Question # 55

CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment.

Which two sites will be able to support this requirement for Citrix Receiver for iOS and Android? (Choose two.)

A.

Tulsa

B.

Jurong

C.

London

D.

Odessa

E.

Houston

F.

Aberdeen

G.

Makassar

Full Access
Question # 56

Scenario:

CGE decided to disable USB device redirection by default for all end users in the new environment using Citrix policies. The only exception is if there is a clear requirement for end users to have this functionality.

For which two end-user groups should a Citrix Architect configure an exception policy to enable USB device redirection? (Choose two.)

A.

Research

B.

Engineers

C.

Back Office

D.

Technicians

Full Access
Question # 57

Scenario:

The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.

Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?

A.

Use client printing and the Universal Printer Driver.

B.

Use network printers connected with Citrix Policies.

C.

Use the Universal Print Server and Universal Printer Driver.

D.

Use network printers connected with Group Policy Preferences.

Full Access
Question # 58

CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session.

Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

A.

Research

B.

Engineers

C.

Back Office

D.

Executives/Management

Full Access
Question # 59

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

A.

CDFControl utility

B.

Citrix EdgeSight console

C.

Citrix AppCenter console

D.

Group Policy Management console

Full Access