What could the administrator specify to meet the needs of this scenario?
Scenario: Multiple virtual servers are configured in a NetScaler Gateway implementation. Corporate
policy requires that an administrator restrict the number of users who can log on through each
virtual server.
What could the administrator specify to meet the needs of this scenario?
(Choose the correct option to complete the sentence.)
Scenario: Two NetScaler Gateway virtual servers are configured on a NetScaler appliance. Each
NetScaler Gateway virtual server is used to enable secure remote access to dedicated XenDesktop
sites for separate divisions:
Division A:
NetScaler Gateway: NG-A
XenDesktop Controller: DDC-A
Division B:
NetScaler Gateway: NG-B
XenDesktop Controller: DDC-B
Each XenDesktop site is placed in its own Active Directory. Firewalls prevent any communication
between the divisions.
An administrator should configure the Secure Ticket Authority on the NetScaler for Division B,
without causing any configuration issues for NG-A, by binding __________. (Choose the correct
option to complete the sentence.)
Which two tasks should the administrator complete to pass the client IP address to all the load balancing virt
Scenario: An administrator has configured several load balancing virtual servers on a NetScaler to
accelerate the Web content. After an update on the Web content platform, all the servers need the
client IP address to perform tracking operations.
Which two tasks should the administrator complete to pass the client IP address to all the load
balancing virtual servers? (Choose two.)
Which two actions must an administrator perform to ensure that users are informed of the browser requirements?
Scenario: A virtual server has been configured in the Content Switching node to provide multiple
Web services using the full website path location. This website contains details that can only be
displayed using a specific Web browser such as Internet Explorer.
Which two actions must an administrator perform to ensure that users are informed of the browser
requirements? (Choose two.)
Which action could an administrator take to configure auditing of logon events for all the employees who conne
Which action could an administrator take to configure auditing of logon events for all the employees
who connected through the NetScaler Gateway for the current day?
How much traffic is being passed through the public IP address based on the output displayed above?
An administrator is reviewing the following output:
VIP(141.128.58.149:80:UP:WEIGHTEDRR): Hits(38200495, 18/sec) Mbps(1.02) Pers(OFF) Err(0)
Pkt(186/sec, 610 bytes) actSvc(4) DefPol(NONE) override(0)
Conn: Clt(253, 1/sec, OE[252\]) Svr(3)
S(141.128.49.40:80:UP) Hits(9443063, 4/sec, P[2602342, 0/sec\]) ATr(5) Mbps(0.23)BWlmt(100
kbits) RspTime(112.58 ms)
Other: Pkt(36/sec, 712 bytes) Wt(10000) RHits(31555)
Conn: CSvr(42, 0/sec) MCSvr(20) OE(16) RP(11) SQ(0)
How much traffic is being passed through the public IP address based on the output displayed
above?
Which action could the administrator take to troubleshoot this issue?
Scenario: An administrator has configured LDAPS authentication, but users are unable to log on to
the NetScaler Gateway virtual server. The same users are able to log on to other systems.
Which action could the administrator take to troubleshoot this issue?
Which two certificates could the administrator use to meet this requirement?
Scenario: An administrator needs to deliver production applications to users. Encryption must be
maintained between the users’ managed devices.
Which two certificates could the administrator use to meet this requirement? (Choose two.)
(Choose the correct set of options to complete the sentence.)
Scenario: An administrator plans to publish 2010 Outlook Web Access through Citrix NetScaler AAA
and allow users to authenticate using domain credentials and their RSA tokens. Users must also have
the ability to change the password when it has expired.
The administrator should configure ________ for user authentication and ________ for RSA token
authentication. (Choose the correct set of options to complete the sentence.)
Which actions could the administrator take to protect the environment from a brute force attack?
An administrator is setting up two-factor authentication, using Active Directory and RSA SecurID.
Which actions could the administrator take to protect the environment from a brute force attack?