Which step should the network engineer take to prevent forwarding packets?
Scenario: A security test has shown that the NetScaler is forwarding IP packets. Company
standard operating procedure is that the routers should be the only devices forwarding
packets. Which step should the network engineer take to prevent forwarding packets?
What should a Citrix Administrator configure to optimize an internal NetScaler Gateway virtual server when mor
What should a Citrix Administrator configure to optimize an internal NetScaler Gateway virtual
server when more bandwidth is available for use and other websites are NOT affected?
What should the administrator configure to achieve this goal?
Scenario: A Citrix Administrator has configured two virtual servers (VServer1 and VServer2). The
administrator would like to set up the virtual servers so that only when VServer1 is offline, VServer2
will become active.
What should the administrator configure to achieve this goal?
How could the engineer verify that the policy is being applied?
An engineer has bound a policy to a test virtual server. How could the engineer verify that
the policy is being applied?
Which command, when run from a shell, will allow real time reading of the logs for this specific purpose?
A Citrix Administrator needs to validate the session policies that are put in place to differentiate
mobile devices from PCs.
Which command, when run from a shell, will allow real time reading of the logs for this specific
purpose?
(Choose the correct set of options to complete the sentence.)
Scenario: Company Inc. wants to tag incoming requests with a header that indicates which browser is being
used on the connection. This helps the server keep track of the browsers after the NetScaler has delivered the
connections to the back end.
The engineer should create __________ actions to __________. (Choose the correct set of options to
complete the sentence.)
What must the administrator install as one of the steps to secure communications between the NetScaler Gateway
Scenario: A recent security audit identified that communications between the NetScaler Gateway
and the STA were NOT secure. A Citrix Administrator was asked to secure this communication.
What must the administrator install as one of the steps to secure communications between the
NetScaler Gateway and the STA?
Which commands could the engineer use to achieve this configuration in the command-line interface prior to bin
Scenario: An engineer implementing a NetScaler is tasked with creating a new VLAN,
named VLAN 2, and adding it to the current interfaces. A new IP address of 10.102.29.54
with a network mask of 255.255.255.0 must be configured for VLAN 2. Which commands
could the engineer use to achieve this configuration in the command-line interface prior to
binding VLAN 2?
Which three parameters are required to create a new cluster instance?
Which three parameters are required to create a new cluster instance? (Choose three.)
Which step could a network engineer take to prevent brute force logon attacks?
Which step could a network engineer take to prevent brute force logon attacks?