PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 1Y0-370

Exam 1Y0-370: Designing, Deploying and Managing Citrix XenMobile Solutions

Which type of Access policy should a Citrix Engineer create to support implementation of the Automated Action?

Scenario: An Automated Action set to trigger on the event “Device noncompliance of B/W
app policy” is configured to notify the user with the following message: “This application is
not approved for your mobile device. Please remove it or access to your email will be
denied.” Which type of Access policy should a Citrix Engineer create to support
implementation of the Automated Action?

How would the engineer configure the Multi-Tenant Console so that a client only sees the accounts relevant to

Scenario: A cloud service provider hosts XenMobile solutions for multiple clients and
manages the XenMobile solutions through the Multi-Tenant Console. A Citrix Engineer

needs to configure the Multi-Tenant Console to allow some clients to report on their tenants.
How would the engineer configure the Multi-Tenant Console so that a client only sees the
accounts relevant to them?

How could the engineer set the XNC web service to securely listen on the NIC in the DMZ only?

Scenario: A Citrix Engineer installed a XenMobile Device Manager server with XenMobile
NetScaler Connector (XNC) accepting the default settings. The server has two NICs; one is
in the DMZ, dedicated to communicate with the NetScaler, and one is dedicated for internal
LAN communication. How could the engineer set the XNC web service to securely listen on
the NIC in the DMZ only?

Which three filters should the engineer configure in the XenMobile Device Manager to meet the security require

Scenario: A Citrix Engineer configured XenMobile NetScaler Connector with XenMobile
Device Manager to restrict the ability to actively sync email based on mobile device
requirements. The engineer must NOT allow devices that are outside a specific geographic
location, have the Twitter application installed or have NOT communicated with XenMobile
Device Manager in more than seven days. Which three filters should the engineer configure
in the XenMobile Device Manager to meet the security requirements? (Choose three.)

Which step could the engineer take to meet the requirements outlined in the scenario?

Scenario: A Citrix Engineer installed and configured XenMobile Mail Manager to connect to
Exchange and XenMobile Device Manager. Devices are being filtered for email access. The
engineer needs to apply existing Exchange rules to unmanaged devices for access to email.
Which step could the engineer take to meet the requirements outlined in the scenario?


Page 3 of 712345...Last »