Which two actions should the engineer take to configure…
Scenario: A network engineer plans to configure an Active Directory Server as the default
authentication for a NetScaler deployment and provide users with the option to change their
password if it is expired. Which two actions should the engineer take to configure this authentication
requirement on the NetScaler system? (Choose two.)
Which two tasks could the engineer do before the creati…
Scenario: A network engineer needs to implement high availability (HA) for a pair of NetScaler
appliances. The existing appliance was recently restarted and the new appliance has been rack
mounted and turned on for several weeks waiting to be configured. The engineer needs to create
an HA pair, but is concerned that his original appliance will get erased when the HA pair is created.
Which two tasks could the engineer do before the creation of the HA pair to ensure that the exiting
unit stays the main appliance? (Choose two.)
(Choose the two correct options to complete the sentence.)
An engineer should use the filter (content filtering) feature to prevent ____ and ____. (Choose the
two correct options to complete the sentence.)
Which two methods could the network engineer use to res…
During a recent security penetration test, several ports on the management address were identified
as providing unsecured services. Which two methods could the network engineer use to restrict
these services? (Choose two.)
Which feature should the administrator use?
A network engineer wants to hide the IP address of the outgoing packets by changing it to the IP
of the VIP. Which feature should the administrator use?
What are two valid ways of checking that a back-end web…
What are two valid ways of checking that a back-end web server is reachable from the NetScaler
SNIP address using port 80? (Choose two.)
What is a possible cause of this issue?
Scenario: A network engineer adds a secondary node for high availability (HA) purposes. To
confirm the implementation is working, the engineer initiates a fail over; however when this is
complete, some virtual servers are un-reachable. What is a possible cause of this issue?
Which two actions can the engineer take to meet the nee…
Scenario: Company Inc. wants to modify the HTTP Server header so that unauthorized users and
malicious code CANNOT use the header to identify the software that the HTTP server uses. Which
two actions can the engineer take to meet the needs of the scenario? (Choose two.)
Which two scenarios could cause the virtual server show…
Scenario: A network engineer has created an SSL offload virtual server. The virtual server shows
as a DOWN state. Which two scenarios could cause the virtual server showing as DOWN? (Choose
two.)
Which two actions could the engineer perform on the Net…
Scenario: A network engineer deployed a new NetScaler MPX appliance on the network and all
interfaces are connected to the core switch. The network engineer notices the CPU utilization has
become very high on the switch since the NetScaler deployment. Which two actions could the
engineer perform on the NetScaler to resolve this issue? (Choose two.)