Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by IP address, ensure full control over which GPOs are applied?
A. It provides central management and control.
B. It ensures that only policies with the correct filter in Active Directory are applied.
C. It ensures that only settings located in the root OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by end user and Delivery Group, ensure full control over which GPOs are applied?
A. It provides central management and control.
B. It ensures that only policies with the correct filter in Active Directory are applied.
C. It ensures that only settings located in the root OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
What are two potential risks in the existing environment that the architect must address in the proposed virtual solution? (Choose two.)
A. Local profiles are used and administrators manually delete them when necessary.
B. Installation of PositivelyPeople is performed manually based on a thoroughly documented process.
C. No logon scripts are enabled for users because the company abandoned logon scripts last year in favor of GPOs.
D. Users log on to the company environment based on Active Directory credentials, but the PositivelyFinance application requires secondary credentials.
Scenario:
A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.
How should the architect configure the callback URL with a high availability pair of NetScalers located in all three regional datacenters?
A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
C. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
D. Configure the callback URL to point to the external beacon address.
Users must be able to connect remotely from their own mobile devices.
What should the architect consider to increase the security of the current authentication solution?
A. Adding a second authentication factor
B. Placing domain controllers in the DMZ for remote users
C. Shortening the Active Directory password expiration period
D. Populating the RDS user profile path in the Active Directory user accounts
How should the architect configure high availability (HA) on a XenServer host to support an iSCSI SAN?
A. Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.
B. Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network
C. and enable Asymmetric Logical Unit Assignment (ALUA).
D. Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.
E. Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.
Why would the architect choose active-passive bonding when configuring network interfaces for storage networks?
A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.
B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.
D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.
Scenario:
Each XenServer host has four 10GB network cards - two bonded for storage and management separated by separate VLAN, and the two bonded for guest VM networks. The CIO would like to see network traffic distributed across all links to maximize their utilization. Switches to which the Hypervisors will connect to support 802.3ad.
How should the architect configure the guest VM network?
A. Using active-active bonding
B. Using active-passive bonding
C. Using XenSever MPIO redundancy
D. Using LACP bonding
Why is configuring regional shared storage locations on a CIFS server using XenServer with HA enabled the best design choice for vDisk storage?
A. It is the least expensive solution.
B. It is a highly scalable and resilient solution.
C. It creates the least amount of administrative overhead.
D. It reduces the system footprint.
Why is deploying two NetScaler appliances in each regional datacenter, with one in the internal network for load balancing and the other in the DMZ for Gateway traffic, the best design solution?
A. It provides intrasite redundancy in case of appliance failures.
B. It provides redundancy in case of site failures, while optimizing external WAN traffic.
C. It protects against WAN failures and connects end users to their home datacenter.
D. It allows for the expected expansion of remote access usage and provides functionality for future needs.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Citrix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Y0-401 exam preparations and Citrix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.