What is a possible cause of this issue?
Scenario: A network engineer adds a secondary node for high availability (HA) purposes. To confirm the
implementation is working, the engineer initiates a fail over; however when this is complete, some virtual
servers are un-reachable.
What is a possible cause of this issue?
What are two valid ways of checking that a back-end web server is reachable from the NetScaler SNIP address us
What are two valid ways of checking that a back-end web server is reachable from the NetScaler SNIP address
using port 80? (Choose two.)
Which feature should the administrator use?
A network engineer wants to hide the IP address of the outgoing packets by changing it to the IP of the VIP.
Which feature should the administrator use?
Which two methods could the network engineer use to restrict these services?
During a recent security penetration test, several ports on the management address were identified as
providing unsecured services.
Which two methods could the network engineer use to restrict these services? (Choose two.)
(Choose the two correct options to complete the sentence.)
An engineer should use the filter (content filtering) feature to prevent __________ and __________. (Choose
the two correct options to complete the sentence.)
Which two tasks could the engineer do before the creation of the HA pair to ensure that the exiting unit stays
Scenario: A network engineer needs to implement high availability (HA) for a pair of NetScaler appliances. The
existing appliance was recently restarted and the new appliance has been rack mounted and turned on for
several weeks waiting to be configured. The engineer needs to create an HA pair, but is concerned that his
original appliance will get erased when the HA pair is created.
Which two tasks could the engineer do before the creation of the HA pair to ensure that the exiting unit stays
the main appliance? (Choose two.)
Which two actions should the engineer take to configure this authentication requirement on the NetScaler syste
Scenario: A network engineer plans to configure an Active Directory Server as the default authentication for a
NetScaler deployment and provide users with the option to change their password if it is expired.
Which two actions should the engineer take to configure this authentication requirement on the NetScaler
system? (Choose two.)
Which two parameters in the TCP buffering settings can be controlled by a network engineer?
Which two parameters in the TCP buffering settings can be controlled by a network engineer? (Choose two.)
Which two steps should the administrator take to fix the virtual server?
Scenario: A NetScaler engineer has received an SSL certificate and bound it to the vServer. However, users are
unable to browse to the website using HTTPS. When the NetScaler engineer browses to the site using HTTPS,
the engineer notices that the certificate chain is incomplete.
Which two steps should the administrator take to fix the virtual server? (Choose two.)
Which command could the engineer run to check the logs that will contain such details?
The network engineer is investigating issues and suspects that one of the administrators recently changed the
NetScaler configuration.
Which command could the engineer run to check the logs that will contain such details?