How could this result be achieved?
A network engineer needs to configure Citrix NetScaler to provide Access Gateway services to VLAN 2 using
interface 1/1 only, while also using interface 1/2 to provide load balancing services to VLAN 3.
How could this result be achieved?
What should a network engineer do to prevent unauthorized users from using the root user account?
What should a network engineer do to prevent unauthorized users from using the root user account?
How should the network engineer accomplish this?
The network engineer would like all HTTP and HTTPS requests that travel through the NetScaler to have an
HTTP header added with the source IP address for logging on the web servers.
How should the network engineer accomplish this?
How could the engineer configure the NetScaler so that it can communicate with both networks?
Scenario: A network engineer needs to re-configure the NetScaler to utilize two new VLANs – VLAN2 and
VLAN3. VLAN2 is an untagged VLAN and VLAN3 will require a .1q compliant tag. Interface 1/1 is the only
interface that will be used on the NetScaler.
How could the engineer configure the NetScaler so that it can communicate with both networks?
How could the engineer configure access to meet the needs of this scenario?
Scenario: A call center has deployed Access Gateway Enterprise to provide its employees with access to work
resources from home. Due to the number of available licenses, only selected employees should access the
environment remotely based on their user account information.
How could the engineer configure access to meet the needs of this scenario?
Which command should the network engineer execute to comply with this policy?
Company policy states that all passwords should travel the network in encrypted packets except SNMP.
Which command should the network engineer execute to comply with this policy?
Which type of authentication server could an engineer configure in order to provide the use of RSA token authe
Which type of authentication server could an engineer configure in order to provide the use of RSA token
authentication as a permitted authentication method to access a AAA Virtual Server?
Which hash method is the best fit for VoIP traffic?
A network engineer wants to configure a NetScaler for load balancing Voice over IP traffic (VoIP).
Which hash method is the best fit for VoIP traffic?
Which step should the engineer take to correct this?
Scenario: A company has three HTTP servers that are load balanced using NetScaler. When users connect to
the HTTP application they often receive inconsistent data or are advised that they need to log on again. Which
step should the engineer take to correct this?
How could the engineer achieve this?
Scenario: An application that uses HTTP for connections and other protocols for different types of content has
been deployed. Load balancing virtual servers have been created for each protocol and the engineer now
needs to ensure that once a load balancing decision has occurred, further requests for different content are
served from the same server.
How could the engineer achieve this?