Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a Citrix ADC design project. They captured the following requirements from this design discussion:
* All three (3) Workspacelab sites (DC, NDR, and DR) will have similar Citrix ADC configurations and design.
* The external Citrix ADC MPX appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Active mode.
* ADNS service should be configured on the Citrix ADC to make it authoritative for domain nsg.workspaceIab.com.
* In GSLB deployment, the DNS resolution should be performed to connect the user to the site with least network latency.
* On the internal Citrix ADC, load balancing for StoreFront services, Citrix XML services, and Citrix Director services must be configured.
* On the external Citrix ADC, the Gateway virtual server must be configured in ICA proxy mode.
Which GSLB method should the architect utilize to meet the design requirements?
A. Static Proximity
B. Least Packets
C. Least Bandwidth
D. Dynamic RTT
正解:B
質問 2:
Which three methods can a Citrix Architect use to assess the capabilities of a network infrastructure? (Choose three.)
A. Map the location of the users against the existing network topology.
B. Review existing monitoring solutions for periods of latency, lost packets, and insufficient bandwidth.
C. Examine the topology for single points of failure and potential bottlenecks.
D. Alter firewall rules of existing network to fit into the new NetScaler Deployment.
E. Ensure that users and computers are in the correct organizational units (OUs).
正解:A,B,C
質問 3:
Scenario: A Citrix Architect has set up Citrix ADC MPX devices in high availability mode with version 12.0.53.13 nc. These are placed behind a Cisco ASA 5505 firewall. The Cisco ASA firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.
The following requirements were captured by the architect during the discussion held as part of the Citrix ADC security implementation project with the customers security team:
The Citrix ADC MPX device:
should monitor the rate of traffic either on a specific virtual entity or on the device It should be able to mitigate the attacks from a hostile client sending a flood of requests. The Citrix ADC device should be able to stop the HTTP TCP. and DNS based requests needs to protect backend servers from overloading needs to queue all the incoming requests on the virtual server level instead of the service level should provide access to resources on the basis of priority should provide protection against well-known Windows exploits virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and phishing proxies should provide flexibility to enforce the desired level of security check inspections for the requests originating from a specific geolocation database.
should block the traffic based on a pre-determined header length. URL length and cookie length. The device should ensure that characters such as a single straight quote ('): backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.
Which security feature should the architect configure to meet these requirements?
A. Configure Signatures manually and apply them to the Application Firewall profile
B. Configure Application Firewall with HTML cross-site scripting to block unwanted traffic
C. Configure IP address reputation and use IPREP and webroot to block the traffic
D. Configure pattern sets using regular expressions to block attacks
E. Configure signatures to auto-update and apply them to the Application Firewall profile
正解:B
質問 4:
A Citrix Architect needs to configure advanced features of NetScaler by using StyleBooks as a resource in the Heat service.
What is the correct sequence of tasks to be completed for configuring NetScaler using the Heat stack?
A. 1. Install NetScaler Bundle for OpenStack2. Prepare the HOT by using the NetScaler heat resources and NetScaler Network Resource3. Register OpenStack with NMAS4. Deploy the Heat stack5. Add NetScaler instances (Optional)6. Create service packages (Add OpenStack tenants)
B. 1. Install NetScaler Bundle for OpenStack2. Add NetScaler instances (Optional)3. Create service packages (Add OpenStack tenants)4. Prepare the HOT by using the NetScaler heat resources and NetScaler Network Resource5. Register OpenStack with NMAS6. Deploy the Heat stack
C. 1. Install NetScaler Bundle for OpenStack2. Deploy the Heat stack3. Register OpenStack with NMAS4. Add NetScaler instances (Optional)5. Prepare the HOT by using the NetScaler heat resources and NetScaler Network Resource6. Create service packages (Add OpenStack tenants)
D. 1. Install NetScaler Bundle for OpenStack2. Register OpenStack with NMAS3. Add NetScaler instances (Optional)4. Create service packages (Add OpenStack tenants)5. Prepare the HOT by using the NetScaler heat resources and NetScaler Network Resource6. Deploy the Heat stack
正解:A
質問 5:
Scenario: A Citrix Architect needs to design a new Citrix Gateway deployment for a customer. During the design discussions, the architect documents the key requirements for the Citrix Gateway.

Click the Exhibit button to view the key requirements.
The architect should configure Citrix Gateway for __________________in order to meet the stated requirements. (Choose the correct option to complete the sentence.)
A. Client access
B. ICA proxy
C. ROP proxy
D. VPN access
正解:B
質問 6:
Scenario: A Citrix Architect needs to assess an existing Citrix ADC configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production Citrix ADC appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production Citrix ADC deployment.

To align the command policy configuration with the security requirements of the organization, the__________for________________should change. (Choose the correct option to complete the sentence.)
A. command spec; Item 3
B. command spec; Item 6
C. action; Item 4
D. priority; Item 5
E. priority; Item 2
F. action; Item 1
正解:B
吉野** -
説明が非常に分かりやすくPass4Testの問題集は、短時間内に受験したい人におすすめだな。すべての問題を暗記して言ったら絶対合格すると思うよ。だって試験問題のほとんどがこの問題集に収めたんだもん。