Which action could an administrator take to configure auditing of logon events for all the employees who conne
Which action could an administrator take to configure auditing of logon events for all the employees
who connected through the NetScaler Gateway for the current day?
Which command could the engineer run to see this information?
A network engineer must determine which SSL protocols are enabled on a virtual server
named SSL01. Which command could the engineer run to see this information?
How much traffic is being passed through the public IP address based on the output displayed above?
An administrator is reviewing the following output:
VIP(141.128.58.149:80:UP:WEIGHTEDRR): Hits(38200495, 18/sec) Mbps(1.02) Pers(OFF) Err(0)
Pkt(186/sec, 610 bytes) actSvc(4) DefPol(NONE) override(0)
Conn: Clt(253, 1/sec, OE[252\]) Svr(3)
S(141.128.49.40:80:UP) Hits(9443063, 4/sec, P[2602342, 0/sec\]) ATr(5) Mbps(0.23)BWlmt(100
kbits) RspTime(112.58 ms)
Other: Pkt(36/sec, 712 bytes) Wt(10000) RHits(31555)
Conn: CSvr(42, 0/sec) MCSvr(20) OE(16) RP(11) SQ(0)
How much traffic is being passed through the public IP address based on the output displayed
above?
Which feature on the NetScaler should an engineer enable to provide faster application performance and also pr
A company has two sites that host six cache web servers that are used to promote sales information.
Which feature on the NetScaler should an engineer enable to provide faster application performance and also
provide additional capacity if the demand increases for one site?
Which action could the administrator take to troubleshoot this issue?
Scenario: An administrator has configured LDAPS authentication, but users are unable to log on to
the NetScaler Gateway virtual server. The same users are able to log on to other systems.
Which action could the administrator take to troubleshoot this issue?
(Choose the correct option to complete the sentence.)
The security department just conducted a penetration test on the published virtual servers
and all of the SSL virtual servers returned the result “Allowed changing to weak certificate
standard” in the report. The reason for this result could be that the network engineer who
configured the virtual servers forgot to __________. (Choose the correct option to complete
the sentence.)
Which two certificates could the administrator use to meet this requirement?
Scenario: An administrator needs to deliver production applications to users. Encryption must be
maintained between the users’ managed devices.
Which two certificates could the administrator use to meet this requirement? (Choose two.)
Which policy expression must an engineer use to enable compression for javascript files?
Which policy expression must an engineer use to enable compression for javascript files?
(Choose the correct set of options to complete the sentence.)
Scenario: An administrator plans to publish 2010 Outlook Web Access through Citrix NetScaler AAA
and allow users to authenticate using domain credentials and their RSA tokens. Users must also have
the ability to change the password when it has expired.
The administrator should configure ________ for user authentication and ________ for RSA token
authentication. (Choose the correct set of options to complete the sentence.)
Which step should the engineer take to resolve this issue?
Scenario: A network engineer has configured a load balancing virtual server for an HTTP application. Due to the
application architecture, it is imperative that a user’s session remains on a single server during the session. The
session has an idle timeout of 60 minutes. Some devices are getting inconsistent application access while most
are working fine. The problematic devices all have tighter security controls in place.
Which step should the engineer take to resolve this issue?