Download NetScaler.prep4sure.1Y0-340.2019-01-23.1e.65q.vcex

Download Exam

File Info

Exam NetScaler
Number 1Y0-340
File Name NetScaler.prep4sure.1Y0-340.2019-01-23.1e.65q.vcex
Size 232 Kb
Posted January 23, 2019
Downloads 38
Download NetScaler.prep4sure.1Y0-340.2019-01-23.1e.65q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

A Citrix Engineer has deployed Front-end Optimization on NetScaler. The following are the snippets of the content before and after optimization. 
Before Optimization:

  

Which optimization technique has been applied to the content?

  • A: Convert linked JavaScript to inline JavaScript
  • B: Minify JavaScript
  • C: Move JavaScript to End of Body Tag
  • D: Inline JavaScript

Correct Answer: B

Reference: https://docs.citrix.com/en-us/netscaler/10-5/ns-optimization-wrapper-10-con/ns-feo-con.html




Question 2

Scenario: A Citrix Engineer has deployed four NetScaler MPXs with the following network configuration:
Management traffic is on VLAN 5 (NSIP). 
Application and server traffic is on VLAN 10 (SNIP). 
The engineer added the NetScaler Management and Analytics System (NMAS) interface to VLAN 10 to deploy a NMAS High Availability (HA) pair to manage and monitor the applications and virtual servers. After doing so, the engineer is NOT able to see the NetScaler or applications that need to be managed. 
How can the engineer resolve the issue?

  • A: Configure VLAN 5 as NSVLAN 5
  • B: Move the NMAS interface to VLAN 5
  • C: Configure VLAN 5 as NSSYNC VLAN
  • D: Bind SNIP to VLAN 5

Correct Answer: A




Question 3

A Citrix Engineer needs to configure NetScaler Management and Analytics System (NMAS) in their network to retain network reporting data, events, audit logs, and task logs for 20 days. 
Which settings can the engineer configure to meet the requirement?

  • A: System Prune Settings
  • B: System Backup Settings
  • C: Instance Backup Settings
  • D: Syslog Prune Settings

Correct Answer: A

Reference: https://docs.citrix.com/en-us/netscaler-mas/12/getting-started-with-mas.html




Question 4

A Citrix Engineer needs to ensure that all traffic to the virtual server is blocked if NONE of the bound Application Firewall policies are matched. 
Which setting can the engineer configure to meet this requirement?

  • A: set appfw settings –undefAction APPFW_BLOCK
  • B: set ns httpProfile nshttp_default_profile-dropInvalReqs DISABLED
  • C: set ns httpProfie nshttp_default_profile –dropInvalReqs ENABLED
  • D: set appfw settings –defaultProfile APPFW_BLOCK

Correct Answer: D




Question 5

Scenario: A Citrix Engineer needs to configure the Application Firewall to do a credit card check using the command-line interface (CLI) and configure the profile to obscure the credit card number.
Which parameter will the engineer add in the CLI to encrypt the credit card numbers in the logs?

  • A: –creditCardAction BLOCK
  • B: -creditCardMaxAllowed
  • C: –creditCardXOut ON
  • D: –doSecureCreditCardLogging ON

Correct Answer: D

Reference: https://docs.citrix.com/en-us/netscaler/11-1/application-firewall/logs.html




Question 6

Scenario: A Citrix Engineer must enable a cookie consistency security check and ensure that all the session cookies get encrypted during the transaction. The engineer needs to ensure that none of the persistent coolies are encrypted and decrypted and decrypt any encrypted cookies during the transaction.
Which cookie consistency security feature will the engineer configure in the following configuration to achieve the desired results? 
add appfw profile Test123 –startURLAction none- denyURLAction none- cookieConsistencyAction log –cookieTransforms ON –cookieEncryption ecryptSessionOnly –addCookieFlags httpOnly –crossSiteScriptingAction none- SQLInjectionAction log stats –SQLInjectionTransfrormSpecialChars ON- SQLInjectionCheckSQLWildChars ON –fieldFormatAction none –bufferOverflowAction none –responseContentType “application/octet-stream”- XMLSQLInjectionAction none –XMLXSSAction none-XMLWSIAction none- XMLValidationAction none

  • A: Configure Encrypt Server cookies to “Encrypt All”
  • B: Configure Encrypt Server cookies to “None”
  • C: Configure Encrypt Server cookies to “Encrypt Session Only”
  • D: Configure Encrypt Server cookies to “Encrypt only”

Correct Answer: B

Reference: https://docs.citrix.com/en-us/netscaler/12/application-firewall/top-level-protections/cookie-consistency-check.html




Question 7

A Citrix Engineer needs to write a regular expression to treat the URL www.citrix.com as a literal string. 
Which regular expression can the engineer use?

  • A: www$.citrix$.com
  • B: [www\]. [citrix\]. [com\]
  • C: www+.citrix+.com
  • D: www\.citrix\.com

Correct Answer: B




Question 8

What can a Citrix Engineer do to decrease browser load times by increasing the number of parallel connections to the resource?

  • A: Configure Domain Sharding.
  • B: Add more web servers.
  • C: Block JavaScript on client browsers.
  • D: Do NOT allow HTML websites.

Correct Answer: A

Reference: https://docs.citrix.com/en-us/netscaler/10-5/ns-optimization-wrapper-10-con/ns-feo-con.html




Question 9

Scenario: A Citrix Engineer observes that when going through NetScaler, user connections fail and users are unable to access Exchange server. However, users can connect directly to the Exchange server. After checking the logs, the engineer finds that the POST request is blocked through the NetScaler.
The log in/ var/log/ns.log is as follows:
Jul 20 11:00: 38 <local0.info>x.x.x. 1 07/20/2017:11:00:38 GMT ns 0-PPE-0:APPFW AF_400_RESP 29362 0: x.x.x.1 439800-PPEO- urlwdummy
https://test.abc.com/rpc/rpcproxy.dll?mail.sfmta.com:6004 Bad request headers. Content-length exceeds post body limit <blocked>
Which parameter can the engineer modify to resolve the issue while maintaining security?

  • A: Increase the Maximum Header Length under nshttp_default_profile.
  • B: Increase the POST body limit using the HTTP profile.
  • C: Add an Application Firewall policy with the expression “HTTP.REQ.METHOD.EQ(\ “POST”\)” with APPFW_BYPASS profile bound.
  • D: Increase the POST body limit under common settings in Application Firewall profile settings.

Correct Answer: D




Question 10

Which two threats can be prevented by using IP Reputation? (Choose two.)

  • A: Trojan horses
  • B: Phishing Proxies
  • C: Worm
  • D: Compromised IPv6 web-server
  • E: Compromised IPv4 web-server

Correct Answer: BE

Reference: https://docs.citrix.com/en-us/netscaler/11/security/reputation/ip-reputation.html










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files