A Citrix Engineer has correctly installed and configured the NetScaler Web Logging (NSWL) client but has noticed that logs are NOT being updated.
What could be causing this issue?
A. The TCP port 3011 is NOT open between the NSWL client and NetScaler.
B. The NSWL client executable is NOT running on the client.
C. The NSWL buffer is full on the NetScaler.
D. An NSIP is missing in the log.conf file
Scenario: A Citrix Engineer uses one StyleBook on a NetScaler Management and Analytics System (NMAS) to create multiple load-balanced virtual server configurations for NetScaler instances. The configuration is saved in a config pack.
In which two locations is the StyleBook config pack saved? (Choose two.)
A. NetScaler Instance
B. NetScaler SDX
C. Syslog Server
D. Local network
E. NMAS
A Citrix Engineer has determined that users are able to access random URLs on a web site through bookmarks and by manually typing in the URLs to skip the pages required to reach that part of the website.
Which two checks can the engineer enable to prevent this attack? (Choose two.)
A. Form Field Consistency
B. Deny URL
C. Start URL
D. Buffer overflow
E. HTML Cross-site scripting
A Citrix Engineer needs to configure the authentication feature on NetScaler Management and Analytics System (NMAS) to enable local authentication to take over if the external authentication fails.
What can the engineer configure to meet this requirement?
A. Select LOCAL as the Server Type when configuring authentication.
B. Select EXTERNAL as the Server Type when configuring authentication.
C. Enable the fallback local authentication option.
D. Configure Cascade authentication with External as primary and LOCAL as secondary.
Scenario: A Citrix Engineer has configured LDAP group extraction on the NetScaler Management and Analytics System (NMAS) for the administration. The engineer observes that extraction is NOT working for one of the five configured groups.
What could be the cause of the issue?
A. The admin bind user has read-only permissions on the LDAP server.
B. The NMAS group does NOT match the one on the external LDAP servers.
C. The LDAP bind DN is incorrectly configured in the LDAP profile.
D. The user group extraction is NOT supported with plaintext LDAP.
A Citrix Engineer needs to migrate the NetScaler Insight Center virtual appliance to NetScaler Management and Analytics System (NMAS).
Which two actions should be met before migrating the NetScaler Insight Center virtual appliance to NMAS? (Choose two.)
A. Install NetScaler Insight Center 11.1 Build 47.14 or later.
B. Install NetScaler MAS License on the NMAS.
C. Download the NetScaler MAS build to the /var/mps/mps_images.
D. Remove the NetScaler instances added to the Insight Center.
E. Migrate the NMAS virtual machine to XenServer.
Scenario: A Citrix Engineer has enabled learning on Application Firewall for all the Security checks on a basic profile that is configured in a production environment. However, after a few hours, the Application Firewall has stopped learning new data.
What is causing the issue?
A. The learning database is limited to 20 MB in size and needs a reset.
B. Application Firewall learning can only be enabled for an advanced profile.
C. Application Firewall learning should only be enabled on Start URL.
D. All the Security checks CANNOT be enabled simultaneously.
Which setting should be enabled to convert the content-length form submission requests to chunked requests, when HTML SQL Injection protection is enabled?
A. Optimize Partial Requests
B. Streaming
C. Enable form tagging
D. Percentage Recursive Decoding
A Citrix Engineer needs to implement Application Firewall to prevent the following tampering and
vulnerabilities:
-If web server does NOT send a field to the user, the check should NOT allow the user to add that field and
return data in the field.
-If a field is a read-only or hidden field, the check verifies that data has NOT changed.
-If a field is a list box or radio button field, the check verifies that data in the response corresponds to one
of the values in that field.
Which security check can the engineer enable to meet this requirement?
A. Field Formats
B. Form Field Consistency
C. HTML Cross-Site Scripting
D. CSRF Form Tagging
Scenario: A hacker accessed the HTML code from a product page and manipulated the HTML code as
shown:
Original Value:
Manipulated Value:
Which security check can the engineer configure to counter the manipulation?
A. Content-type
B. Field Formats
C. Form Field consistency
D. HTML Cross-Site Scripting
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Citrix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Y0-340 exam preparations and Citrix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.