PrepAway - Latest Free Exam Questions & Answers

Category: 1Y0-371

Exam 1Y0-371: Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions

Which two sets of logs could the engineer review to det…

Scenario: A Citrix Engineer is experiencing issues with client certificate authentication to their Microsoft Exchange Server after configuring their Public Key
Infrastructure (PKI) settings within the XenMobile Server. The Exchange configuration and certificate are being configured and delivered to the device within an
Exchange policy. The engineer is able to see the certificate and Exchange policy being delivered within the XenMobile Console as well as the certificate on the iOS
device.
Which two sets of logs could the engineer review to determine why authentication is failing? (Choose two.)

which order do they need to be completed, to apply a pa…

Scenario: A Citrix Engineer has already backed up the XenMobile configuration database. The following is a list, in no particular order, of some of the remaining
steps that the engineer must complete to apply a patch to a multi-node, clustered XenMobile Server deployment:
1. Shut down the updated node.
2. Repeat the above steps for each node in the cluster until all nodes have been upgraded.
3. Fail over to secondary node.
4. Update the running node and confirm that the service is running.
5. Start the next node in the cluster.
6. Shut down all but one node.
7. Verify that all nodes are running in the cluster.

8. Update all nodes at the same time.
9. Restore the XenMobile configuration database.
Which six steps must the engineer take, and in which order do they need to be completed, to apply a patch to a multi-node, clustered XenMobile Server
deployment?

Which action should the engineer take to meet the requi…

Scenario: According to corporate policy, corporate data should be removed if a device is jailbroken or rooted and the device should NOT be allowed to re-enroll. A
Citrix Engineer is asked to implement the action based on mobile device status to facilitate the company’s security compliance.
Which action should the engineer take to meet the requirements of the scenario?


Page 1 of 1012345...10...Last »