How could the engineer customize the text of the email that users receive?
A Citrix Engineer created an Automated Action to determine when a device has been rooted
or jailbroken and needs to customize the text of the email that users receive when NOT in
compliance. How could the engineer customize the text of the email that users receive?
Which policy modes on the XenMobile NetScaler Connector would the engineer use to meet the requirements of the
Scenario: A Citrix Engineer needs to prevent restrictions from being applied to members of
the Executive Staff regardless of their enrollment status. The engineer must also ensure
that existing Device Manager rules still apply to all other users. Which policy modes on the
XenMobile NetScaler Connector would the engineer use to meet the requirements of the
scenario?
How should an architect apply the HDX policies?
The company’s HDX policies must apply to a pooled virtual desktop environment without
affecting any virtual applications.How should an architect apply the HDX policies?
Which two configuration steps must the engineer take on the NetScaler Gateway to meet the requirements of the
Scenario: A Citrix Engineer has been asked to configure the XenMobile App Controller
(ac1.domain.com) and the NetScaler Gateway to function as a Security Assertion Markup
Language (SAML) identity provider for ShareFile. In this configuration, a user logging on to
ShareFile using a Web browser or other ShareFile clients should be redirected to the
XenMobile environment for user authentication. Which two configuration steps must the
engineer take on the NetScaler Gateway to meet the requirements of the scenario?
(Choose two.)
Which action should the administrator take to ensure that the target device will acquire the boot files?
An administrator has installed Provisioning Services in a XenDesktop environment in which
DHCP and PXE run on the same server. Which action should the administrator take to
ensure that the target device will acquire the boot files?
Which action should the engineer take to ensure that the previous user’s managed applications and data a
A Citrix Engineer needs to unenroll an iOS mobile device previously assigned to a user and
then reassign it to a new user with the least amount of device downtime. Which action
should the engineer take to ensure that the previous user’s managed applications and data
are NOT accessible by the new user?
Which device security mode should the engineer set as the default security setting?
Scenario: A Citrix Engineer needs to create a ShareFile mobile application default security
policy that includes the following requirements: – PIN to access ShareFile content – Set files
to automatically be removed after 30 days – Allow external applications to open downloaded
files outside of the ShareFile application – Enable offline access to files The engineer has
NOT integrated ShareFile with the App Controller. Which device security mode should the
engineer set as the default security setting?
Which two recommended options should the architect consider for this solution?
Scenario: HR staff have a requirement to print confidential information to USB-attached
printers in their offices. Any printer model may be used for this purpose. Which two
recommended options should the architect consider for this solution? (Choose two.)
Which URL could the engineer use to verify that the service is running?
Scenario: Several users have been reporting that they have been unable to access
corporate email for several minutes. A Citrix Engineer needs to verify that the XenMobile
NetScaler Connector (XNC) service is running. XNC was set up using default values. Which
URL could the engineer use to verify that the service is running?
What could be the cause of this issue?
A Citrix Engineer has been notified that all users are unable to log on to the App Controller
to access their applications. What could be the cause of this issue?