Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that IPsec be implemented?
A. By using NetScaler
B. By implementing secure Delivery Groups
C. By implementing an Active Directory Group Policy
D. By configuring a local IPsec policy in the master image
Scenario:
A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.
How should the architect configure the callback URL with a high availability pair of NetScalers located in all three regional datacenters?
A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the
C. Secure Ticket Authority (STA) to point to the local Delivery Controllers.
D. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
E. Configure the callback URL to point to the external beacon address.
A Citrix Architect reviewed CGE's antivirus policy and found that it does NOT comply with the posted Citrix antivirus recommendations.
What should the architect recommend be added to CGE's antivirus policy?
A. Enable scanning of network drives.
B. Disable real-time scanning on Citrix XenApp servers.
C. Scan all excluded files during the scheduled periodic scan.
D. Exclude the user profile storage location from antivirus scanning.
The architect recommended pooled desktop OS machines with Personal vDisks for the Nurses, Imaging, and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines?
A. Install the antivirus software into the base image.
B. Deploy the antivirus package as an App-V application.
C. Deploy the antivirus software through a Group Policy startup script.
D. Install the antivirus software in the master Personal vDisk as a user-installed application.
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that L2TP be implemented?
A. By using NetScaler
B. By implementing secure Delivery Groups
C. By configuring an Active Directory Group Policy to configure L2TP
D. By installing a Windows Server OS with Routing and Remote Access Service
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.
How should a Hosted VDI FlexCast model be implemented to allow end-user-installed applications?
A. By using Citrix Profile management
B. By using Personal vDisks
C. By using statically assigned virtual desktops
D. By using a network share that contains the App-V packages
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
Which type of encryption should a Citrix Architect recommend?
A. SecureICA
B. IPsec
C. SSL
D. L2TP
Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications?
A. VM Hosted applications
B. Streamed server OS machines
C. Dedicated desktop OS machines
D. Pooled desktop OS machine with Personal vDisk
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
Why does using IPsec meet CGE's compliance requirements?
A. It encrypts internal network traffic.
B. It encrypts ICA traffic from remote end users.
C. It enables the SSL Relay service.
D. It complies with industry-standard SSL encryption requirements.
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would implementing one GPO in each region ensure full control over which GPOs are applied?
A. It provides central management and control.
B. It ensures that only policies with the correct filter in Active Directory are applied
C. It ensures that only settings located in the root OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Citrix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Y0-401 exam preparations and Citrix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.