PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What are two ways that the engineer could ensure that u…

Scenario: A Citrix Engineer needs to provide access from WorxWeb to internal corporate HTTP websites through an internal proxy server. The engineer has
configured Single Sign-On to web applications on the NetScaler.
What are two ways that the engineer could ensure that users are able to access the websites without being prompted to authenticate more than once? (Choose
two.)

Which combination of settings should a Citrix Engineer …

Scenario: User password caching must be disabled in an environment due to an information technology security policy. The security policy also mandates the
following:
– Devices should NOT be allowed to be offline for more than 3 days.
– Devices should recognize updates to applications in under 24 hours in the event of critical security updates.
– Users should conduct application upgrades within 3 days of a device recognizing the availability of an update.
Which combination of settings should a Citrix Engineer recommend to meet the requirements of the security policy?

Which two ports should the engineer ask the Security te…

Scenario: A Citrix Engineer is deploying XenMobile for an organization. The organization will deploy iOS and Android devices, and users will be allowed to enroll
and use the solution remotely, or from an internal employee WIFI network. The NetScaler and XenMobile Server are both deployed in the Demilitarized Zone (DMZ)

with no firewall between them.
The engineer has opened the following ports:
– Internet (ANY) -> NetScaler (DMZ) (Inbound) (443)
– XenMobile Server -> Internet (TCP 2195 / 2196) (Outbound)
Which two ports should the engineer ask the Security team to open? (Choose two.)

Where should the engineer place the components listed b…

Scenario: A Citrix Engineer prepares to deploy XenMobile Server, ShareFile StorageZone Controllers, and StoreFront as part of a XenMobile implementation. The
engineer needs to ensure that the number of communication ports opened between the Demilitarized Zone (DMZ) and the internal network is kept to a minimum,
and that unauthenticated traffic is NOT allowed through to the internal network. The engineer intends to achieve these objectives by channeling all traffic into the
environment through NetScaler, which is placed in the DMZ.
Where should the engineer place the components listed below in order to meet the objectives stated in the scenario?
ShareFile StorageZone Controller
XenMobile Server
StoreFront


Page 70 of 271« First...102030...6869707172...8090100...Last »