New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1Y0-440 Exam Dumps - Architecting a Citrix Networking Solution

Go to page:
Question # 41

Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.

They captured the following requirements during the design discussion held for a Citrix ADC design project:

  • All three (3) Workspacelab sites (DC NDR and DR) will have similar Citrix ADC configurations and design
  • Both external and internal Citrix ADC MPX appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Passive mode
  • GSLB should resolve both A and AAA DNS queries.
  • In the GSLB deployment the NDR site will act as backup for the DC site, whereas the DR site will act as backup for the NDR site
  • When the external Citrix ADC replies to DNS traffic coming in through Cisco Firepower IPS the replies should be sent back through the same path
  • On the internal Citrix ADC. both front-end VIP and back-end SNIP will be part of the same subnet
  • USIP is configured on the DMZ Citrix ADC appliances
  • The external Citrix ADC will act as default gateway for back-end servers.
  • All three (3) sites (DC, NDR, and DR) will have two (2) links to the Internet from different service providers configured in Active/Standby mode

Which design decision must the architect make to meet the design requirements above?

A.

Mac Based Routing must be configured on the External Citrix ADC

B.

Interface 0/1 must be used for DNS traffic

C.

The SNIP of the external Citrix ADC must be configured as default gateway on the back-end servers

D.

ADNS service must be used with IPv6 address

E.

The SNIP of the internal Citrix ADC must be configured as the default gateway on the back-end servers.

Full Access
Question # 42

Which markup language can a Citrix use along with NITRO API to create a StyleBook?

A.

GML

B.

XML

C.

HTML

D.

YAML

Full Access
Question # 43

Scenario: A Citrix Architect needs to design a hybrid Citrix Virtual App and Citrix Virtual Desktop environment which will include as well as resource locations in an on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

  • Active Citrix Virtual App and Citrix Virtual Desktop Service subscription
  • No existing Citrix deployment
  • Minimization of additional costs
  • All users should correct directly to the resource locations containing the servers which will host HDX sessions

Click the Exhibit button to view the conceptual environment architecture.

The architect should use___________ in Location A, and should use _______________ in Location B. (Choose the correct option to complete the sentence.)

A.

No Citrix products; Citrix ICA Proxy (cloud-licensed)

B.

Citrix Gateway as a Service; Citrix ICA Proxy (cloud-licensed)

C.

Citrix Gateway as a Service; no Citrix ADC products

D.

No Citrix products; Citrix Gateway appliance

E.

Citrix gateway as a Service; Citrix ADC (BYO)

Full Access
Question # 44

Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.

The issue was isolated to several endpoint analysis (EPA) scan settings.

Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.

Which setting is preventing the security requirements of the organization from being met?

A.

Item 3

B.

Item 4

C.

Item 2

D.

Item 6

Full Access
Question # 45

Scenario: A Citrix Architect has set up NetScaler MPX devices in high availability mode with version 12.0.53.13 nc. These are placed behind a Cisco ASA 5505 Firewall. The Cisco ASA Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.

The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer’s security team:

The NetScaler MPX device:

  • should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The NetScaler device should be able to stop the HTTP, TCP, and DNS based requests.
  • needs to protect backend servers from overloading.
  • needs to queue all the incoming requests on the virtual server level instead of the service level.
  • should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and phishing proxies.
  • should provide flexibility to enforce the decided level of security check inspections for the requests originating from a specific geolocation database.
  • should block the traffic based on a pre-determined header length, URL length, and cookie length. The device should ensure that characters such as a single straight quote (“); backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.

Which security feature should the architect configure to meet these requirements?

A.

Global Server Load balancing with Dynamic RTT

B.

Global Server Load Balancing with DNS views

C.

Geolocation-based blocking using Application Firewall

D.

geolocation-based blocking using Responder policies

E.

Global Server Load Balancing with Mac Based Forwarding

Full Access
Go to page: