Scenario: A recent security breach occurred in which a member of staff was able to copy company
confidential information onto a device which was then removed from company premises. A Citrix
Adminstrator has been instructed to disable client drive mapping when staff using corporate issued
domain-member laptops attempt to access XenApp resources.
Which section of the ICAClient.ADM template file must the administrator configure to facilitate this
request?
A.
Client Engine
B.
User Experience
C.
User Authentication
D.
Remoting Client Devices
D
0
0