Exam | Citrix NetScaler 12 Essentials and Unified Gateway |
Number | 1Y0-230 |
File Name | Citrix NetScaler 12 Essentials and Unified Gateway.testkings.1Y0-230.2018-08-23.1e.66q.vcex |
Size | 67 Kb |
Posted | August 23, 2018 |
Downloads | 76 |
Download | Citrix NetScaler 12 Essentials and Unified Gateway.testkings.1Y0-230.2018-08-23.1e.66q.vcex |
Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.
Coupon: MASTEREXAM
With discount: 20%
A Citrix Administrator would like to define granular policies to configure and enforce user environment attributes for XenApp and XenDesktop on NetScaler Gateway.
Which type of policy would enable this requirement?
Correct Answer: B
Scenario: A NetScaler Appliance is having intermittent issues. A Citrix Administrator is unable to identify the root cause and fix them. The administrator opened a Support ticket and the engineer assigned to the case requested all the logs and configuration information from the NetScaler.
Which technical support tool can the administrator use to gather all the information on the NetScaler to send to the Support Engineer?
Correct Answer: A
Scenario: A Citrix Administrator is managing a NetScaler SDX running eight NetScaler instances. The administrator first needs to upgrade the firmware on the instances. However, the administrator is concerned that it needs to be done all at once.
What upgrading flexibility does SDX provide in this scenario?
Correct Answer: A
Scenario: A Citrix Administrator has configured a NetScaler active-passive high availability (HA) pair. When the HA pair fails over, customers are unable to access the hosted websites. After some troubleshooting, the administrator found that the upstream router was NOT updating its ARP table.
What can the administrator configure to resolve this issue?
Correct Answer: B
A Citrix Administrator is configuring a NetScaler high availability (HA) pair and needs to ensure that one NetScaler is UP and primary at all times to ensure the business websites are always available.
What does the administrator need to do ensure that the NetScalers still handle web traffic in the event that both nodes become unavailable or fail a health check?
Correct Answer: D
Scenario: A Citrix Administrator suspects an attack on a load-balancing virtual server. The administrator needs to restrict access to the load-balancing virtual server (192.168.100.25) for 10 minutes.
Which Access Control List (ACL) will help to accomplish this requirement?
Correct Answer: C
Scenario: A Citrix Administrator notices user sessions are disconnecting and reconnecting more often this week than last week, signaling a problem.
The administrator troubleshoots this issue and prepares to resolve it using persistence. However, the following considerations apply in the environment:
It is a multi-proxy environment behind the NetScaler.
USIP mode is enabled and applied to the services.
The session timeout is very short.
All users connect from the same location.
The Administrator can use persistence based on the _____________setting to resolve this issue. (Choose the correct option to complete the sentence.)
Correct Answer: A
A Citrix Administrator needs to generate AppFlow data for internal ICA connections.
Which two connection methods could the administrator use to route internal ICA connections through NetScaler without modifying the existing network routing? (Choose two.)
Correct Answer: AD
Scenario: A user is attempting to access a web server, which is load-balanced by the NetScaler using HTTPS. The user received the following message:
SSL/TLS error: You have not chosen to trust “Certificate Authority” the issuer of the server’s security certificate.
What can a Citrix Administrator do to prevent users from viewing this message?
Correct Answer: A
Scenario: A NetScaler Gateway provides ICA Proxy to an internal XenDesktop site in an environment. The security team wants the Citrix Administrator to configure the NetScaler to block client drives if the client device fails a security scan.
Which NetScaler feature allows the administrator to satisfy the security team’s requirements without making changes to the XenDesktop configuration?
Correct Answer: D