Scenario: Dual-source authentication is configured on the Access Gateway 9.0, Enterprise Edition appliance. The appropriate group extraction configuration is configured on both the primary and secondary authentication servers, and a user named "User1" exists on both authentication servers. How will groups be extracted for "User1"?
A. Only the groups in the secondary authentication server will be extracted and matched to the group names configured on the primary authentication server.
B. Only the groups from the primary authentication server will be extracted and matched to the group names configured on the secondary authentication server.
C. The groups from the primary authentication server will be extracted and matched to the group names configured on the secondary authentication server by the administrator.
D. The applicable groups from both the primary and secondary authentication servers will be extracted and matched to the group names configured on the appliance.
正解:D
質問 2:
The Policy Precedence Model for Access Gateway 9.0, Enterprise Edition is the priority level in which multiple ________________ are prioritized, evaluated and enforced. (Choose the correct phrase to complete the sentence.)
A. Profiles of the same type
B. Profiles of different types
C. Policies of the same type
D. Policies of different types
正解:C
質問 3:
Scenario: An Access Gateway virtual server is configured with the following three global settings:
Client Security is set to "CLIENT.APP.AV == SYMANTEC EXISTS"
Client Choices is set to ON
Clientless Access is set to ON
Which client choice(s) will be available to a user logging in from a device running a Windows
operating system but which is NOT running the Symantec Antivirus?
A. Citrix Access Gateway Plugin for Java and Clientless Access
B. Citrix Access Gateway Plugin for Windows only
C. Clientless Access only
D. Web Interface, Clientless Access and Citrix Access Gateway Plugin for Windows
正解:C
質問 4:
Scenario: CompanyA has two Access Gateway virtual servers to provide employees and partners with remote access to internal resources using LDAP authentication. The security team at CompanyA has mandated that every employee connecting to the corporate network must pass a pre-authentication check that identifies his or her client device as a corporate device. The scans will include Symantec Antivirus version 10 and some registry checks.The administrator in this environment should bind the pre-authentication policy at the __________. (Choose the correct phrase to complete the sentence.)
A. Global level
B. User level
C. Employee corporate access virtual server level
D. Partner access virtual server level
正解:C
質問 5:
Scenario: A company has the following auditing requirements:
A - All the audit messages generated with severity CRITICAL and EMERGENCY should be
logged on the server with IP address 192.54.1.1.
B - All the HTTP resources accessed by user1 should be logged on the server with IP address
192.54.1.3. C - All the other log messages need to be logged to an auditlog server with IP address 192.54.1.2. There are 5 auditlog policies with the following settings: auditlogpol1 : ServerIP : 192.54.1.1 LogLevel : CRITICAL EMERGENCY auditlogpol2 : ServerIP : 192.54.1.2 LogLevel : DEBUG CRITICAL ERROR INFORMATIONAL EMERGENCY ALERT NOTICE WARNING auditlogpol3 : serverIP : 192.54.1.3 LogLevel : INFORMATIONAL auditlogpol4 : serverIP : 192.54.1.1 LogLevel : DEBUG ERROR ALERT INFORMATIONAL NOTICE WARNING auditlogpol5 : ServerIP : 192.54.1.2 LogLevel : DEBUG ERROR ALERT NOTICE WARNING Which bindings will meet the requirements of this environment?
A. Bind auditlogpol1 and auditlogpol5 at the global level and bind auditlogpol3 to user1
B. Bind auditlogpol5 at the global level and bind auditlogpol1 to user1
C. Bind auditlogpol1 and auditlogpol4 at the global level and bind auditlogpol3 to user1
D. Bind auditlogpol1 to user1 and bind auditlogpol2 to user1
正解:A
質問 6:
The Citrix Access Gateway Plugin for Windows needs administrative privileges _______ and ________ on a Windows XP device. (Choose the two correct phrases to complete the sentence.)
A. For installation
B. For upgrading or downgrading of the system
C. For those rare situations where it will be used as an antivirus application
D. For Endpoint Analysis checks that require administrative privileges
正解:A,D
質問 7:
An administrator for Access Gateway 9.0, Enterprise Edition suspects that some users in the environment are misusing the remote access granted to them by accessing and downloading some restricted intranet web resources.What should the administrator check first on the Access Gateway appliance in order to investigate these users' remote access behavior?
A. Statistic counters
B. Network traces
C. Client side debug trace files
D. Audit logs
正解:D
杉浦** -
1Y0-A13試験用のテキストです。1Y0-A13問題中心にすすめるの