Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
Why does using SecureICA meet CGE's compliance requirements?
A. It encrypts internal ICA traffic.
B. It encrypts ICA traffic from remote end users.
C. It enables the SSL Relay service.
D. It complies with industry-standard SSL encryption requirements.
Scenario:
A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.
Which configuration should the architect recommend for the new external access architecture?
A. One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device.
B. A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.
C. A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site.
D. One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs.
Which component should a Citrix Architect recommend to centrally audit any failed logon attempts to NetScaler Gateway? A Citrix Architect is asked to design a new external access architecture for CGE.
A. Citrix Studio
B. Citrix Director
C. Citrix Command Center
D. Citrix NetScaler AppFlow
Which endpoint devices must be replaced to support the Streamed VHD method of desktop delivery?
A. Windows 7
B. Windows XP
C. Linux thin clients
D. PCs running Internet Explorer 7
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that SecureICA be implemented?
A. By using NetScaler
B. By implementing secure Delivery Groups
C. By implementing an Active Directory Group Policy to configure SecureICA
D. By installing an SSL certificate in the master image
Why does using a shared VLAN with a Provisioning Services server in both the primary and secondary datacenters help segment streaming traffic?
A. It separates disk and end-user data traffic.
B. It enables disk data traffic to be encrypted with IPsec.
C. It allows the necessary TCP offload settings to be configured on the streaming NIC.
D. It provides multiple IP addresses that can be dedicated to streaming traffic.
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE
needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied?
A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.
B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.
C. It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.
D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
Why does using L2TP meet CGE's compliance requirements?
A. It encrypts internal ICA traffic.
B. It encrypts ICA traffic from remote end users.
C. It enables the SSL Relay service.
D. It complies with industry-standard SSL encryption requirements.
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing with replace at the root level ensure full control over which Group Policies are applied?
A. It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.
B. It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.
C. It ensures that only Citrix policies are applied below the root level when end users log on.
D. It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies.
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers,
StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that SSL be implemented?
A. By installing certificates on Citrix infrastructure components
B. By configuring an Active Directory Group Policy to distribute SSL certificates
C. By installing a certificate authority server in the DMZ
D. By installing an SSL certificate in the master image
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Citrix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Y0-401 exam preparations and Citrix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.