Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

1Y0-440 Architecting a Citrix Networking Solution Questions and Answers

Questions 4

Scenario: A Citrix Architect needs to design a new Citrix ADC Gateway deployment to provide secure RDP access to backend Windows machines.

Click the Exhibit button to view additional requirements collected by the architect during the design discussions.

To meet the customer requirements, the architect should deploy the RDP proxy through _______, using a _________ solution. (Choose the correct option to complete the sentence.)

Options:

A.

ICAProxy, stateless gateway

B.

CVPN; single gateway

C.

CVPN; stateless gateway

D.

ICAProxy; single gateway

Buy Now
Questions 5

Scenario: A Citrix Architect needs to design a hybrid Citrix Virtual App and Citrix Virtual Desktop environment which will include Citrix Cloud as well as resource locations in an on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

  • Active Citrix Virtual App and Citrix Virtual Desktops Service subscription
  • No existing NetScaler deployment
  • Global Server Load Balancing is used to direct connection requests to Location B, if the StoreFront server in Location B fails, connections should be directed to Location A.

Click the Exhibit button to view the conceptual environment architecture.

The architect should use _____ in Location A, and should use ________ in Location B. (Choose the correct option to complete the sentence.)

Options:

A.

Citrix ADC (BYO); Citrix gateway appliance

B.

Citrix ADC (BYO); No Citrix products

C.

Citrix ADC (BYO); Citrix ADC (BYO)

D.

Citrix Gateway appliance; Citrix Gateway appliance

E.

Citrix Gateway appliance; Citrix ADC (BYO)

Buy Now
Questions 6

Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.

They captured the following requirements during the design discussion held for a Citrix ADC design project:

  • All three (3) Workspacelab sites (DC NDR and DR) will have similar Citrix ADC configurations and design
  • Both external and internal Citrix ADC MPX appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Passive mode
  • GSLB should resolve both A and AAA DNS queries.
  • In the GSLB deployment the NDR site will act as backup for the DC site, whereas the DR site will act as backup for the NDR site
  • When the external Citrix ADC replies to DNS traffic coming in through Cisco Firepower IPS the replies should be sent back through the same path
  • On the internal Citrix ADC. both front-end VIP and back-end SNIP will be part of the same subnet
  • USIP is configured on the DMZ Citrix ADC appliances
  • The external Citrix ADC will act as default gateway for back-end servers.
  • All three (3) sites (DC, NDR, and DR) will have two (2) links to the Internet from different service providers configured in Active/Standby mode

Which design decision must the architect make to meet the design requirements above?

Options:

A.

Mac Based Routing must be configured on the External Citrix ADC

B.

Interface 0/1 must be used for DNS traffic

C.

The SNIP of the external Citrix ADC must be configured as default gateway on the back-end servers

D.

ADNS service must be used with IPv6 address

E.

The SNIP of the internal Citrix ADC must be configured as the default gateway on the back-end servers.

Buy Now
Questions 7

Which three tasks can a Citrix Architect select and schedule using the Citrix ADC maintenance tasks? (Choose three.)

Options:

A.

Convert Citrix Web App Firewall Policy Instances.

B.

Upgrade Citrix ADC CPX Instances

C.

Upgrade Citrix ADC Instances.

D.

Convert a high availability pair of Instances to Cluster.

E.

Convert cluster instances to a high availability pair.

F.

Configure a high availability pair of Citrix ADC Instances.

Buy Now
Questions 8

Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion. They have captured the following requirements for NetScaler design project:

  • The authentication must be deployed for the users from the workspacelab.com and vendorlab.com domains.
  • The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP.
  • The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS.
  • The vendorlab users should be authenticated using Active Directory Federation Service.
  • The user credentials must NOT be shared between workspacelab and vendorlab.
  • Single Sign-on must be performed between StoreFront and NetScaler Gateway.
  • A domain drop down list must be provided if the used connects to the NetScaler gateway virtual server externally.

Which method must the architect utilize for user management between the two domains?

Options:

A.

Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain.

B.

Create a global catalog containing the objects of Vendorlab and Workspacelab domains.

C.

Create shadow accounts for the Vendorlab domain in the Workspacelab domain.

D.

Create a two-way trust between the Vendorlab and Workspacelab domains.

Buy Now
Questions 9

Which four settings can a Citrix Architect use to create a configuration job using Citrix Application Delivery Management? (Choose four.)

Options:

A.

Action

B.

File

C.

Configuration Template

D.

StyleBooks

E.

Event Manager

F.

Instance

G.

Record and Play

Buy Now
Questions 10

Scenario: A Citrix Architect needs to design a new multi-datacenter Citrix ADC deployment. The customer wants Citrix ADC to provide access to various backend resources by using Global Server Load Balancing (GSLB) in an Active-Active deployment. Click the Exhibit button to view additional requirements identified by the architect.

Which GSLB algorithm or method should the architect use for the deployment based on the stated requirements?

Options:

A.

Dynamic round trip time (RTT)

B.

Least response time

C.

Least packets

D.

Source IP hash

E.

Static proximity

F.

Least connections

Buy Now
Questions 11

Which request can a Citrix Architect utilize to create a NITRO API command to add a NetScaler appliance with NSIP address 10.102.29.60 to the cluster?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 12

Scenario: A junior Citrix Architect would like to use nFactor to perform authentication based on the domain. The junior architect has reached out to a supervisor for assistance and has been provided with the following step-by-step configuration guide:

  • Create Authentication policy for LDAP. RADIUS.
  • Create logon schema for Domain drop down. LDAP. LDAP+RADIUS, and noschema.
  • Create Authentication policy label for OnlyLDAR LDAP+RADIUS, and RADIUS.
  • Bind DOMAIN drop down as default logon schema policy
  • Create Authentication profile to bind the AAA virtual server.
  • Bind Authentication profile to Traffic management virtual server or Citrix Gateway virtual server.

What must the junior architect bind In order for the authentication to work correctly?

Options:

A.

The authentication policy label to Citrix ADC AAA virtual server

B.

The authentication policy label to the Citrix Gateway virtual server

C.

The logon schema to the AAA virtual server

D.

The logon schema to the Citrix ADC AAA virtual server

E.

The authentication policy label to the Traffic management virtual server

Buy Now
Questions 13

Scenario: A Citrix Architect needs to design a hybrid XenApp and XenApp and XenDesktop environment which will include Citrix Cloud as well as resource locations in on-premises datacenter and Microsoft Azure.

Organizational details and requirements are as follows:

  • Active XenApp and XenDesktop Service subscription
  • No existing Citrix deployment
  • About 3,000 remote users are expected to regularly access the environment
  • Multi-factor authentication should be used for all external connections
  • Solution must provide load balancing for backend application servers
  • Load-balancing services must be in Location B

Click the Exhibit button to view the conceptual environment architecture.

The architect should use ________ in Location A, and should use _________ in Location B. (Choose the correct option to complete the sentence.)

Options:

A.

Citrix Gateway as a Service, no Citrix products

B.

No Citrix products, Citrix ADC (BYO)

C.

Citrix Gateway as a Service, Citrix ADC (BYO)

D.

No Citrix products, Citrix ICA Proxy (cloud-licensed)

E.

Citrix Gateway as a Service, Citrix ICA Proxy (cloud-licensed)

F.

No Citrix products; Citrix Gateway appliance

Buy Now
Questions 14

Which StyleBook group should a Citrix Architect use to deploy the configuration for Microsoft SharePoint servers on Citrix ADC Management and Analytics (Citrix Application Delivery Management)?

Options:

A.

Default

B.

Public

C.

Private

D.

Custom

Buy Now
Questions 15

Scenario: A Citrix Architect needs to deploy a load balancing for an application server on the NetScaler. The authentication must be performed on the NetScaler. After the authentication, the Single Sign-on with the application servers must be performed using Kerberos impersonation.

Which three authentication methods can the Architect utilize to gather the credentials from the user in this scenario? (Choose three.)

Options:

A.

SAML

B.

OTP

C.

TACACS

D.

WEBAUTH

E.

LDAP

Buy Now
Questions 16

Scenario: A Citrix Architect has configured two MPX devices in high availability mode with version 12.0.53.13 nc. After a discussion with the security team, the architect enabled the Application Firewall feature for additional protection.

In the initial deployment phase, the following security features were enabled:

  • IP address reputation
  • HTML SQL injection check
  • Start URL
  • HTML Cross-site scripting
  • Form-field consistency
  • After deployment in pre-production, the team identifies the following additional security features and changes as further requirements:
  • Application Firewall should retain the response of form field in its memory. When a client submits the form in the request, Application Firewall should check for inconsistencies in the request before sending it to the web server.
  • All the requests dropped by Application Firewall should get a pre-configured HTML error page with appropriate information.
  • The Application Firewall profile should be able to handle the data from the RSS feed and an ATOM-based site. Click the Exhibit button to view an excerpt of the existing configuration.

What should the architect do to meet these requirements?

Options:

A.

Configure a new profile with web 2.0 and use the previously used Application Firewall security checks.

B.

Configure a new HTML profile and use previously used Application Firewall security checks.

C.

Configure a new profile with XML and use previously used Application Firewall security checks.

D.

Modify an existing HTML profile and disable 'Drop invalid security check'

Buy Now
Questions 17

Which two methods can a Citrix Architect use to create a Heat Orchestration template? (Choose two)

Options:

A.

Direct Input

B.

Configuration jobs

C.

Citrix Web App Firewall Policies

D.

File

E.

Gateway Policies

Buy Now
Questions 18

Scenario: A Citrix Architect has set up NetScaler MPX devices in high availability mode with version 12.0. 53.13 nc. These are placed behind a Cisco ASA 5505 Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.

The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer’s security team:

The NetScaler device:

  • Should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The NetScaler device should be able to stop the HTTP, TCP, and DNS based requests.
  • Needs to protect backend servers from overloading.
  • Needs to queue all the incoming requests on the virtual server level instead of the service level.
  • Should provide access to resources on the basis of priority.
  • Should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and phishing proxies.
  • Should provide flexibility to enforce the desired level of security check inspections for the requests originating from a specific geolocation database.
  • Should block the traffic based on a pre-determined header length, URL length, and cookie length. The device should ensure that characters such as a single straight quote (*); backslash(\), and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.

Which two security features should the architect configure to meet these requirements? (Choose two.)

Options:

A.

Pattern sets

B.

Rate limiting

C.

HTTP DDOS

D.

Data sets

E.

APPQOE

Buy Now
Questions 19

Scenario: A Citrix Architect has sent the following request to the NetScaler:

Which response would indicate the successful execution of the NITRO command?

Options:

A.

302

B.

201

C.

202

D.

200

Buy Now
Questions 20

Which two settings must a Citrix Architect enable to deploy a shared VLAN on Citrix ADC VPX instance on an ESX platform? (Choose two.)

Options:

A.

VLAN tagging on the VLAN

B.

Port based VLAN tagging must be enabled

C.

Promiscuous mode for shared VLANs

D.

VLAN sharing on the VLAN

Buy Now
Questions 21

Which three parameters must a Citrix Architect designate when creating a new session policy? (Choose three.)

Options:

A.

Single Sign-on Domain

B.

Request Profile

C.

Name

D.

Enable Persistent Cookie

E.

Expression

Buy Now
Questions 22

Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a Citrix ADC design project. They captured the following requirements from this design discussion:

  • All three (3) Workspacelab sites (DC, NOR, and DR) will have similar Citrix ADC configurations and design.
  • The external Citrix ADC MPX1 appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Active mode.
  • ADNS service should be configured on the Citrix ADC to make it authoritative for domain nsg.workspacelab.com • In GSLB deployment, the DNS resolution should be performed to connect the user to the site with least network latency.
  • On the internal Citrix ADC, load balancing for StoreFront services, Citrix XML services, and Citrix Director services must be configured.
  • On the external Citrix ADC, the Gateway virtual server must be configured in ICA proxy mode.

Click the Exhibit button to view the logical representation of the network.

On which firewall should the architect configure the access policy to permit the MEP communication between the sites?

Options:

A.

CISCO IPS 1 and Checkpoint FW1

B.

CISCO IPS and CISCO IPS1

C.

CISCO IPS and Checkpoint FW1

D.

Checkpoint FW1 and DMZ ASA Firewall

Buy Now
Questions 23

Which three methods can a Citrix Architect use to assess the capabilities of a network infrastructure? (Choose three.)

Options:

A.

Review existing monitoring solutions for periods of latency, lost packets, and insufficient bandwidth.

B.

Map the location of the users against the existing network topology.

C.

Alter firewall rules of existing network to fit into the new NetScaler Deployment.

D.

Examine the topology for single points of failure and potential bottlenecks.

E.

Ensure that users and computers are in the correct organizational units (OUs).

Buy Now
Questions 24

Scenario: A Citrix Architect needs to design a NetScaler deployment in Microsoft Azure. An Active-Passive NetScaler VPX pair will provide load balancing for three distinct web applications. The architect has identified the following requirements:

  • Minimize deployment costs where possible.
  • Provide dedicated bandwidth for each web application.
  • Provide a different public IP address for each web application.

For this deployment, the architect should configure each NetScaler VPX machine to have ______ network interface(s) and configure IP address by using ________. (Choose the correct option to complete the sentence).

Options:

A.

4; Port Address Translation

B.

1; Network Address Translation

C.

1; Port Address Translation

D.

2; Network Address Translation

E.

4; Network Address Translation

F.

2; Port Address Translation

Buy Now
Questions 25

Which two options should a Citrix Architect evaluate during a capabilities assessment? (Choose two.)

Options:

A.

Users and applications

B.

Disaster recovery requirements

C.

Network infrastructure

D.

Conformance to the ISO model

Buy Now
Questions 26

Scenario: A Citrix Architect needs to design a new NetScaler Gateway deployment to provide secure RDP access to backend Windows machines.

Click the Exhibit button to view additional requirements collected by the architect during the design discussions.

To meet the customer requirements, the architect should deploy the RDP proxy through ______ using a________ solution. (Choose the correct option to complete the sentence.)

Options:

A.

CVPN: single gateway

B.

CVPN, stateless gateway

C.

ICAProxy: single gateway

D.

ICAProxy; stateless gateway

Buy Now
Questions 27

What are three potential risks when examining the disaster recovery plan and implementation for a company? (Choose three)

Options:

A.

Supporting infrastructure for proposed environment is NOT included in disaster recovery implementation

B.

A disaster recovery plan exists but has never been tested

C.

A disaster recovery location does NOT exist.

D.

Users require mobile devices with continuous access

E.

Optimal Gateway Routing decisions are NOT understood

Buy Now
Questions 28

Which two parameters are required to ensure that after authentication, the cookies can be transferred from browser to non-browser applications? (Choose two.)

Options:

A.

Cookie should be Persistent cookie

B.

Cookie type should be HttpOnly

C.

Cookie type should NOT be HttpOnly

D.

Cookie type should have Secure Flag enabled

Buy Now
Questions 29

Which three steps should a Citrix Architect complete to configure session settings for different user accounts or groups? (Choose three.)

Options:

A.

Bind a profile to the authentication virtual server that handles the traffic to which the architect wants to apply the policy.

B.

Create policies to select the connections to which to apply particular profiles and bind the policies to users or groups.

C.

Create a profile for each user account or group for which the architect wants to configure custom session settings.

D.

Customize the default settings for sessions with the global session settings.

E.

Bind a policy to the authentication virtual server that handles the traffic to which the architect wants to apply the profile.

Buy Now
Questions 30

Which session parameter does the default authorization setting control when authentication, authorization, and auditing profiles are configured?

Options:

A.

Determines the default logging level

B.

Determines whether the Citrix ADC appliance will allow or deny access to content for which there is no specific authorization policy

C.

Determines the default period after which the user is automatically disconnected and must authenticate again to access the intranet

D.

Determines whether the Citrix ADC appliance will log users onto all web applications automatically after they authenticate or will pass users to the web application logon page to authenticate for each application.

E.

Controls are amount of time the users can be idle before they are automatically disconnected.

F.

Determines whether the Citrix ADC appliance will use primary or the secondary authentication for SSO

Buy Now
Questions 31

Scenario: A Citrix Architect needs to assess an existing NetScaler Gateway deployment. During the assessment, the architect collected key requirements for VPN users, as well as the current session profile settings that are applied to those users.

Click the Exhibit button to view the information collected by the architect.

Which configurations should the architect change to meet all the stated requirements?

Options:

A.

Item 4

B.

Item 3

C.

Item 5

D.

Item 2

E.

Item 1

Buy Now
Questions 32

Scenario: A Citrix Architect has deployed Authentication for the SharePoint server through NetScaler. In order to ensure that users are able to edit or upload documents, the architect has configured persistent cookies on the NetScaler profile.

Which action should the architect take to ensure that cookies are shared between the browser and non-browser applications?

Options:

A.

The time zone should be the same on the NetScaler, client, and SharePoint server.

B.

The SharePoint load-balancing VIP FQDN and the AAA VIP FQDN should be in the trusted site of the client browser.

C.

The Secure flag must be enabled on the cookie.

D.

The cookie type should be HttpOnly.

Buy Now
Questions 33

A Citrix Architect has deployed Citrix Application Delivery Management to monitor a high availability pair of Citrix ADC VPX devices.

The architect needs to deploy automated configuration backup to meet the following requirements:

  • The configuration backup file must be protected using a password.
  • The configuration backup must be performed each day at 8:00 AM GMT.
  • The configuration backup must also be performed if any changes are made in the ns.conf file.
  • Once the transfer is successful, auto-delete the configuration file from the NMAS.

Which SNMP trap will trigger the configuration file backup?

Options:

A.

netScalerConfigSave

B.

sysTotSaveConfigs

C.

netScalerConfigChange

D.

sysconfigSave

Buy Now
Questions 34

Which two features are supported on LbaaSV1? (Choose two.)

Options:

A.

Cookie Insertion

B.

Layer 7 Load Balancing

C.

Certificate Bundle

D.

Layer 4 Load balancing

E.

Server name Indicator

Buy Now
Questions 35

Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose Two)

Options:

A.

The Service is receiving more than 480 requests per second

B.

The new service request rate is slower than the actual request rate

C.

The Service does not receive traffic for four successive increment intervals

D.

The request rate has been incremented 200 times

E.

The percentage of traffic that the new service must receive is greater than or equal to 100.

Buy Now
Questions 36

Which step does a Citrix Architect need to ensure during the Define phase when following the Citrix Methodology?

Options:

A.

Testing steps were integrated.

B.

The project manager agrees with road map timelines.

C.

A phased roll out was completed.

D.

Existing networking infrastructure is ready.

E.

The redundancy deployment decision was made.

Buy Now
Questions 37

Which session parameter does the default authorization setting control when authentication, authorization, and auditing profiles are configured?

Options:

A.

Determines the default logging level

B.

Determines whether the NetScaler appliance will allow or deny access to content for which there is no specific authorization policy

C.

Determines the default period after which the user is automatically disconnected and must authenticate again to access the intranet

D.

Determines whether the NetScaler appliance will log users onto all web applications automatically after they authenticate or will pass users to the web application logon page to authenticate for each application.

E.

Controls are amount of time the users can be idle before they are automatically disconnected.

Buy Now
Questions 38

A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a NetScaler_________deployed_________. (Choose the correct option to complete sentence.)

Options:

A.

CPX; as part of a high availability pair

B.

CPX; as a stand alone device

C.

SDX; with less than 6 partitions and dedicated management interface

D.

MPX; as part of the cluster but Cluster IP is NOT configured

E.

SDX; with no partitions as a stand alone device

Buy Now
Questions 39

Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion They have captured the following requirements for the Citrix ADC design project:

The authentication must be deployed for the users from the workspacelab com and vendorlab com domains.

  • The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP
  • The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS.
  • The vendorlab users should be authenticated using Active Directory Federation Service
  • The user credentials must NOT be shared between workspacelab and vendorlab
  • Single Sign-on must be performed between StoreFront and Citrix Gateway
  • A domain drop down list must be provided if the user connects to the Citrix Gateway virtual server externally

Which method must the architect utilize for user management between the two domains?

Options:

A.

Create a global catalog containing the objects of Vendorlab and Workspacelab domains.

B.

Create shadow accounts for the users of the Vendorlab domain in the Workspacelab domain C. Create a two-way trust between the Vendorlab and Workspacelab domains

C.

Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain

Buy Now
Questions 40

Scenario: A Citrix Architect needs to design a new Citrix Gateway deployment for a customer. During the design discussions, the architect documents the key

requirements for the Citrix Gateway.

Click the Exhibit button to view the key requirements.

The architect should configure Citrix Gateway for __________________in order to meet the stated requirements. (Choose the correct option to complete the

sentence.)

Options:

A.

ICA proxy

B.

Client access

C.

VPN access

D.

ROP proxy

Buy Now
Questions 41

What can help a Citrix Architect prepare to discuss time scales and resource requirements?

Options:

A.

Creating a high-level project plan.

B.

Meeting with each member of the project team to assign tasks.

C.

Designing the new environment.

D.

Setting expectations with the project’s key stakeholders.

E.

Identifying challenges associated with the project.

Buy Now
Questions 42

Scenario: A Citrix Architect is asked by management at the Workspacelab organization to review their existing configuration and make the necessary upgrades. The architect recommends small changes to the pre-existing Citrix ADC configuration. Currently, the Citrix ADC MPX devices are configured in a high availability pair, and the outbound traffic is load balanced between two Internet service providers (ISPs). However, the failover is NOT happening correctly. The following requirements were discussed during the design requirement phase:

• The return traffic for a specific flow should be routed through the same path while using Link Load Balancing.

• The link should fail over even if the ISP router is up and intermediary devices to an ISP router are down.

• Traffic going through one ISP router should fail over to the secondary ISP, and the traffic should NOT flow through both routers simultaneously. What should the architect configure to meet this requirement?

Options:

A.

Transparent monitor

B.

Ping Monitor

C.

HTTP-ECV monitor wit" secure option enabled

D.

HTTP-ECV monitor without secure option enabled

Buy Now
Questions 43

A Citrix Architect needs to define the architect and operational processes required to implement and maintain the production environment.

In which phase of the Citrix Methodology will the architect define this?

Options:

A.

Define

B.

Deploy

C.

Assess

D.

Review

E.

Manage

F.

Design

Buy Now
Questions 44

Scenario: A Citrix Architect has configured two MPX devices in high availability mode with version 12.0.53.13 nc. After a discussion with the security team, the architect enabled the Application Firewall feature for additional protection.

In the initial deployment phase, the following security features were enabled:

  • IP address reputation
  • HTML SQL injection check
  • Start URL
  • HTML Cross-site scripting
  • Form-field consistency

After deployment in pre-production, the team identifies the following additional security features and changes as further requirements:

  • Application Firewall should retain the response of form field in its memory When a client submits the form in the next request. Application Firewall should check for inconsistency in the request before sending it to the web server
  • All the requests dropped by Application Firewall should receive a pre-configured HTML error page with appropriate information.
  • The Application Firewall profile should be able to handle the data from the RSS feed and an ATOM-based site.

Click the Exhibit button to view an excerpt of the existing configuration.

What should the architect do to meet these requirements?

Options:

A.

Delete the existing profile and create a new profile of type: XML Application (SOAP)

B.

Modify the existing profile to include sessionization

C.

Create a new basic profile and use pre-existing HTML settings.

D.

Modify existing profile settings, change HTML settings, and ensure to exclude uploaded files from security checks.

Buy Now
Questions 45

Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.

The requirements captured during the design discussion held for a NetScaler design project are as follows:

  • Two (2) pairs of Citrix ADC MPX appliances deployed in the DMZ and internal network.
  • High Availability will be accessible for each Citrix ADC MPX
  • The external Citrix ADC MPX appliance will be deployed in multi-arm mode.
  • The internal Citrix ADC MPX will be deployed in single-arm mode wherein it will be connected to Cisco ACI Fabric.
  • All three (3) Workspacelab sites: Dc, NDR and DR, will have similar Citrix ADC configurations and design.

How many Citrix ADC MPX appliances should the architect deploy at each site to meet the design requirements above?

Options:

A.

2

B.

8

C.

4

D.

6

E.

10

F.

3

Buy Now
Exam Code: 1Y0-440
Exam Name: Architecting a Citrix Networking Solution
Last Update: Nov 24, 2024
Questions: 152
1Y0-440 pdf

1Y0-440 PDF

$25.5  $84.99
1Y0-440 Engine

1Y0-440 Testing Engine

$30  $99.99
1Y0-440 PDF + Engine

1Y0-440 PDF + Testing Engine

$40.5  $134.99