Download Citrix XenApp and XenDesktop 7-15 Assessment, Design, and Advanced Configurations.Test-king.1Y0-402.2018-09-08.1e.39q.vcex

Download Exam

File Info

Exam Citrix XenApp and XenDesktop 7.15 Assessment, Design, and Advanced Configurations
Number 1Y0-402
File Name Citrix XenApp and XenDesktop 7-15 Assessment, Design, and Advanced Configurations.Test-king.1Y0-402.2018-09-08.1e.39q.vcex
Size 4.98 Mb
Posted September 08, 2018
Downloads 29
Download Citrix XenApp and XenDesktop 7-15 Assessment, Design, and Advanced Configurations.Test-king.1Y0-402.2018-09-08.1e.39q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

A Citrix Architect needs to conduct a capabilities assessment for an organization that wants to design and build a new XenApp and XenDesktop environment. 
Which four capabilities will directly influence whether the existing Citrix administrative team will have the capacity to support the new environment? (Choose four.) 

  • A: Network architecture
  • B: Current backup solutions
  • C: Users and applications
  • D: Existing XenApp and XenDesktop environments
  • E: Training and certifications of support staff and users
  • F: Current storage solutions
  • G: Image management processes

Correct Answer: ACDF




Question 2

Scenario: A Citrix Architect must complete a XenApp and XenDesktop security assessment. After examining the network topology for the hypervisor hosts supporting the Virtual Delivery Agent (VDA) machines, the architect finds that some of the network connections are NOT following leading security practices. 
Click the Exhibit button to view a high-level diagram which shows the connectivity between various components. 

  

Which three of the labeled areas of the diagram represent connections which are NOT following Citrix leading security practices? (Choose three.)

  • A: G
  • B: B
  • C: A
  • D: E
  • E: F
  • F: D
  • G: C

Correct Answer: DEF




Question 3

Scenario: A Citrix Architect needs to redesign an existing XenApp and XenDesktop environment to use Machine Creation Services (MCS). During the design discussions, the locations for the MCS-provisioned thin clone machine disks are proposed as shown in the Exhibit. 

  

Which two potential drawbacks should the architect address with the customer before proceeding with this configuration? (Choose two.)

  • A: It is limited to NFS shared storage.
  • B: It will require substantial read IOPS from the shared storage location during machine creation and updates.
  • C: It will require substantial write IOPS to the shared storage location as temporary data is written.
  • D: It will require more storage to be allocated on the VM hosts compared with other options.
  • E: It is limited to certain hypervisors.

Correct Answer: CE




Question 4

Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment.
The architect has identified the User Layer requirements, as shown in the Exhibit. 
Click the Exhibit button to view the requirements. 

  

Additionally, management at the organization has identified the following general Access Layer requirements:
A multi-factor authentication method is required for any connections to the XenApp and XenDesktop environment originating from outside the corporate network. 
External connections must be authenticated by a NetScaler Gateway virtual server located in a DMZ network. 
Internal connection traffic should NOT leave the internal corporate network. 
Which two authentication methods should the architect use for the Contractors group? (Choose two.)

  • A: RADIUS authentication
  • B: Smart Cards
  • C: SAML authentication
  • D: Domain pass-through
  • E: Federated Authentication Service
  • F: Username and password 

Correct Answer: CE




Question 5

Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment.
The architect has identified the Resource Layer requirements shown in the Exhibit. 

  

Additionally, management at the organization has identified the following general Resource Layer requirements:
The profile solution should be centrally managed. 
The profile solution should minimize logon and logoff times as much as possible. 
User groups do NOT need to use the same profile type. 
Citrix Director should be used for monitoring profiles. 
Which profile type should the architect use for the Executives group?

  • A: Local
  • B: Microsoft roaming
  • C: Citrix Profile Management
  • D: Mandatory

Correct Answer: B




Question 6

Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment.
The architect has identified the Resource Layer requirements shown in the Exhibit. 

  

Which feature of Citrix Profile Management could help the architect address the Graphic Designers group requirements?

  • A: Profile caching
  • B: Profile streaming
  • C: File exclusions
  • D: Active Write Back

Correct Answer: B




Question 7

Scenario: While assessing the User Layer, a Citrix Architect finds that most of the internal users connect using corporate-owned laptops, desktop devices, and thin clients. Many of these laptops and desktop devices are running Windows 10, while the remainder of the machines are running Windows 7 and are in the process of being migrated to Windows 10. Some users also connect using personal devices which have Receiver Desktop Lock installed. 
Currently, Citrix Receiver is manually installed on any endpoint device added to the company. All these devices use Citrix Receiver version 4.8 and above. The IT team is planning to automate a process to update all the devices with the latest version of Citrix Receiver and to automate another process for automatic installation of Citrix Receiver without incurring extra costs and maintenance. 
During the initial testing of the Citrix Receiver Auto-Update feature, the architect observed that the Citrix Receiver Auto-Update feature does NOT work on some of the machines. 
Which two reasons could be causing this issue? (Choose two.) 

  • A: Citrix Receiver was locally installed with administrator-level privileges.
  • B: The Group Policy Object for Receiver Auto-Update feature is incorrectly configured in Active Directory.
  • C: Citrix Receiver Auto-Update is disabled on machines where Receiver Desktop Lock is installed.
  • D: The Citrix Receiver Auto-Update feature needs to be configured before Receiver Desktop Lock is configured.

Correct Answer: BC




Question 8

Scenario: A Citrix Architect needs to design a multi-datacenter XenApp and XenDesktop environment that will use Provisioning Services (PVS) to manage Virtual Delivery Agent (VDA) machine images. Each datacenter will have a separate Provisioning Services farm. During the design discussions, the architect creates a diagram to depict the way vDisk files will be replicated between PVS farms, based on the available storage for the vDisk Stores. 
Click the Exhibit button to view the diagram. 

  

Overall, the customer has identified the following objectives for the image replication process:
Minimize the administrative time required to replicate images between farms 
Must be usable by storage administrators without PVS farm administrative permissions 
Utilize pre-existing infrastructure and processes where possible 
Which method should the architect use to replicate the vDisk files between datacenters?

  • A: Scheduled robocopy commands
  • B: vDisk Replicator Tool
  • C: Microsoft DFS-R
  • D: Manual copy
  • E: SAN replication

Correct Answer: B




Question 9

Scenario: A Citrix Architect is designing a XenApp and XenDesktop environment and needs to design machine catalogs and Delivery Groups. Users should only be able to access their assigned resources. 
Click on the Exhibit button to view the design requirements. 

  

What is the appropriate design using the minimum number of machine catalogs and Delivery Groups, based on the requirements in the Exhibit?

  • A: 1 machine catalog, 2 Delivery Groups, and no tagging
  • B: 2 machine catalogs, 3 Delivery Groups, and tagging for the machine hosting the Engineering application - QA version
  • C: 3 machine catalogs, 4 Delivery Groups, and no tagging
  • D: 1 machine catalog, 1 Delivery Group, and tagging for the machine hosting the Engineering application - QA version

Correct Answer: A




Question 10

Scenario: After a recent security assessment, a Citrix Architect recommends blocking unnecessary peripheral types by disabling the associated HDX channels.
Currently, the environment is intended to support the peripheral types listed in the Exhibit. 
Click the Exhibit button to view the supported peripheral types. 

  

Which four HDX virtual channels should the architect disable, based on the peripherals required in the environment? (Choose four.)

  • A: SmartCard
  • B: TWI
  • C: Print
  • D: ClientAudio
  • E: GenericUSB
  • F: TwainRdr
  • G: Multimedia

Correct Answer: ACDE










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files