Pass Citrix 1Y0-306 Exam

Size: px
Start display at page:

Download "Pass Citrix 1Y0-306 Exam"

Transcription

1 Pass Citrix 1Y0-306 Exam Number: 1Y0-306 Passing Score: 800 Time Limit: 120 min File Version: Pass Citrix 1Y0-306 Exam Exam Name: Citrix Access Gateway 4.2 with Advanced Access Control:Admin

2 Passguide QUESTION 1 Scenario: Ken configured an Exchange Server and Outlook clients for synchronization. Client devices are using Microsoft Outlook 2000 and running on Windows XP operating systems. The Secure Access Client is installed on all client devices. What are two requirements to perform the configurations required for this scenario? (Choose two.) A. The administrator must create and configure a policy. B. The administrator grants the Download Attachment privilege for all users. C. The administrator verifies that the client devices have Internet Explorer 5 or 6 with all critical updates installed. D. The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens. Correct Answer: AD /Reference: QUESTION 2 Scenario: An administrator wants to provide access to Certkiller.com intranet site from the access server farm. The home page for the intranet site includes several links to external web pages. The administrator wants to ensure that all links can be accessed through this resource. How can this be configured? A. Create a filter that allows access to all the websites lnked from the home page. B. Enable URL rewriting to provide users access to the pages linked on the website. C. Include all the web pages linked from the home page using a URL that contains a wildcard. D. Within the New Web Resource Wizard add URLs for the home page and each page linked from the home page. /Reference: QUESTION 3 Whenever a RADIUS or LDAP profile is associated with a logon point, the administrator must. (Fill in the blank with a listed option.) A. use a Sample Logon Point B. deploy the Secure Access Client on every client device C. provide a decentralized database to store users' profiles D. provide the associated credential during the deployment of the logon point /Reference:

3 QUESTION 4 Scenario: An administrator is required to configure the setting that determines whether users can reconnect to both active and disconnected sessions or only to disconnected sessions while creating a logon point. Which option should the administrator enable? A. Window B. Session Time-out C. Domain Prompting D. Workspace Control /Reference: QUESTION 5 Along with Active Directory, which other two authentications could be implemented in order to provide Advanced Authentication? (Choose two.) A. Smart Cards B. LDAP authentication C. RSA Security SecurID D. Secure Computing SafeWord PremierAccess Correct Answer: CD /Reference: QUESTION 6 A client device is scanned but the user receives a message that he is denied access to the network. Which two actions can help the administrator determine which endpoint analysis scans failed? (Choose two.) A. Examine the "Endpoint Analysis Scan Results" snap-in B. Modify the Disallowed.ascx page to show the scan results C. View the event log on the Advanced Access Control server D. Export the results to a comma-separated list using an endpoint analysis command-line tool Correct Answer: BC /Reference:

4 QUESTION 7 In an environment that restricts client device access to resources based upon the presence of a specific version of an antivirus software, which step must be completed for a continuous process scan? A. Clear the MD5 field. B. Browse to the client version of the antivirus executable. C. Provide the registry path and values for the antivirus software. D. Type the earliest date stamp that is acceptable for the process. Correct Answer: B /Reference: QUESTION 8 After providing the configuration database server and the access server farm name, which additional step must an administrator perform to change the farm membership of server? A. Run discovery in the Access Suite Console B. Restart the server for which the farm membership was changed C. Provide the credentials used to access the configuration database server D. Restart the license server for the access server farm where the server was added Correct Answer: C /Reference: QUESTION 9 Which statement regarding the rules for configuring a connection policy is true? A. Multiple connection policies can be used for a single session. B. Multiple connection policies cannot be used for a single logon point. C. IP address pools can be defined in the connection policy for dynamic IP addressing. D. Names can be duplicated among several connection policies as long as the farm name is included. Correct Answer: C /Reference: QUESTION 10 Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.) A. The Access Suite Console must be closed. B. The administrator must use the Server Configuration Tool.

5 C. All the services must be manually stopped and then restarted again. D. The administrator must use the Access Gateway Administration Tool. Correct Answer: AB /Reference: QUESTION 11 Which policy setting is the only permission that can be set for network resources? A. Upload B. Access C. VPN Tunnel D. File Type Association Correct Answer: B /Reference: QUESTION 12 In an environment where client devices must pass two file scans before being permitted access to the network, which logical expression should be used to create a continuous scan? A. NOT Y, where Y represents a failed scan B. X OR Y, where X and Y represents the file scans C. X AND Y, where X and Y represents the file scans D. (X AND Y) OR Y, where X and Y represents the file scans Correct Answer: C /Reference: QUESTION 13 An administrator is instructed to configure advanced authentication using RADIUS profile and must define RADIUS authentication. Which node in the console tree should the administrator select to define RADIUS authentication? (Click on the exhibit button to display the screen shot.) Exhibit:

6 A. Servers node B. Resources node C. Configuration Tools node D. Access Server Farm node /Reference: QUESTION 14 When a logon point is renamed just after it is deployed,. (Fill in the blank with a listed option.) A. it can no longer be used B. it must be redeployed using the update function in the Access Suite Console C. the Advanced Access Control setup CD must be used to redeploy the updated logon D. it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources /Reference:

7 QUESTION 15 From which node in the Access Suite Console can an administrator configure event logging? A. Servers node B. Resource node C. Endpoint Analysis node D. Access Server Farm node /Reference: QUESTION 16 Scenario: To ensure that a service pack level scan is run whenever Windows XP or 98 operating system is encountered, which configuration is required? A. Configure two rules for the scan with client device locale conditions and the remote language selected. B. Configure two rules for the scan with logon point conditions and the remote logon point added to the property value for the scan. C. Configure two rules for the scan with the logon point and operating system conditions and SP1 as the property values for the scan. D. Configure two rules for the scan with operating system conditions and the respective service pack as the property values for the scan. /Reference: QUESTION 17 If migrating from a MetaFrame Secure Access Manager 2.X implementation to Advanced Access Control, which file must be specified during the initial configuration of the access server farm? A. NFE.XML B. XPS.CAB C. NFUSE.CONF D. MSAM2.X CAB /Reference: QUESTION 18 What does a port of zero (0) mean when defining a network resource? A. All ports B. No ports

8 C. TCP Port 0 D. Variable port depending on the resource table Correct Answer: A /Reference: QUESTION 19 Which server role must be selected for Advanced Access Control servers that will process CDAs? A. Web server B. State server C. Agent server D. HTML Preview server Correct Answer: C /Reference: QUESTION 20 In the Access Suite Console, which steps must an administrator take to create an access policy that controls access to all visible servers and services in the network? A. Select "Network Resources" and choose "Entire Network." B. Select the farm node and disable network policy enforcement. C. Select the Access Policies node in the console tree and add all visible servers and services to the access policy. D. Select the appropriate domain from the domain list and choose to make the access policy the default authentication for that domain. Correct Answer: A /Reference: QUESTION 21 Which utility can an administrator use to audit a logged event for a specific server? A. Access Suite Console B. Windows Event Viewer C. Server Configuration Tools D. Presentation Server Management Console Correct Answer: B

9 /Reference: QUESTION 22 Which three URL addresses are valid when creating a web resource? (Choose three.) A. B. C. file://server1/pilotresource/index.html D. E. #<username> Correct Answer: BDE /Reference: QUESTION 23 An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished? A. Create a new scan package when updated signatures are released. B. Create a scan rule which has a parameter that specifies the maximum age of the signatures. C. Configure the Anti-Virus package to automatically download the latest pattern file periodically. D. Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters. /Reference: QUESTION 24 What are two required steps for creating a typical filter that would require users to logon using a specific URL and their client devices to be running a specific anti-virus software? (Choose two.) A. Choose to filter based on logon points B. Run the Create Filter Wizard from the logon point C. Choose to filter based on endpoint analysis scan results D. Combine logon points and endpoint analysis results with the OR logical operator Correct Answer: AC /Reference: QUESTION 25 Which type of filter should an administrator create, if a filter that specifies a particular NOT logic condition must exist in order for access to be granted?

10 A. Typical Filter B. Custom Filter C. Negative Filter D. Exclusion Filter Correct Answer: B /Reference: QUESTION 26 Which policy setting should be enabled if an administrator wants users to be able to open documents with a published application? A. Download B. HTML Preview C. as Attachment D. File Type Association /Reference: QUESTION 27 What is required to administer an access server farm using the Access Suite Console? A. An account which is in the Administrators role for the SQL server database. B. An account which is in the Guest role of the Access Gateway Server COM+ application. C. An account which is in the Systems role of the Access Gateway Server COM+ application. D. An account which is in the Administrators role of the Access Gateway Server COM+ application. /Reference: QUESTION 28 Scenario: An administrator gives a user the URL to access a logon page. "Accounting1.net" is the FQDN of the Advanced Access Control server hosting the logon point and "AccountAccess" is the name of the logon point. From the URL given to the user, which access method will be used to obtain resources from the access server farm? A. Default logon point B. Secure Web Client C. Browser-only access D. Secure Access Client Correct Answer: C

11 /Reference: QUESTION 29 Scenario: An administrator wants to make documents from a defined file share open from a Citrix Presentation Server session. Which policy setting should be enabled for this purpose? A. Live Edit B. Download C. HTML Preview D. File type association /Reference: QUESTION 30 Which two conditions must be included in the first rule for a scan to ensure that the same conditions are available for additional subsequent rules for the scan? (Choose two.) A. Logon point B. Operating system C. Authentication strength D. Client device regional locale Correct Answer: AD /Reference: QUESTION 31 Scenario: An administrator is implementing Access Gateway with Advanced Access Control for use in his environment. The implementation will be used primarily for mobile workers who may access resources from diverse client devices, which may be locked down and may not allow files such as client software to be downloaded. For this environment, which type of access should be given to the clients? A. Direct access B. VPN Client access C. Kiosk Mode access D. Browser-only access /Reference:

12 QUESTION 32 Which type of IP addressing is needed to enable internal and external connection to the Access Gateway appliance? A. Static IP addressing B. Default IP addressing C. Dynamic IP addressing D. Alternate IP addressing Correct Answer: A /Reference: QUESTION 33 Scenario: Certkiller.com's Contractors Acitve Directory group is allowed to launch Outlook and SAP only when using a corporate-supplied laptop. The same users are allowed to view Office and Adobe Reader applications regardless of the accessing device. Which type of scan can the administrator perform to ensure that the requirements for this scenario are met? A. Citrix scans for hardware types B. Citrix scans for MAC addresses C. Citrix scans for antivirus software D. Citrix scans for operating systems Correct Answer: B /Reference: QUESTION 34 Which connection setting should be configured in a connection policy if a connection will be made using the Secure Access Client? A. Launch Secure Access Client if access is allowed B. Launch and execute Secure Access Client logon scripts C. Launch Secure Access Client in the default connection D. Launch the Secure Access Client and enable scripting on the client device Correct Answer: A /Reference: QUESTION 35 Scenario: You just added a new server to the access server farm however it is not displaying in the Access Suite Console. Which two steps can you take to display this server in the Access Suite Console? (Choose two.) A. Stop and restart the agent server. B. Close and reopen the Access Suite Console.

13 C. Enter the name of the new server into the Access Suite Console. D. Run discovery from the Servers node in the Access Suite Console. Correct Answer: BD /Reference: QUESTION 36 In which two ways can an accessible network be specified for an Access Gateway appliance? (Choose two.) A. Using the access server farm name B. Using Classless Inter Domain Routing (CIDR) C. Using the IP address and subnet mask of the network D. Using the FQDN of the primary server in the access server farm Correct Answer: BC /Reference: QUESTION 37 Scenario: An IT environment has Access Gateway with Advanced Access Control implemented as a VPN solution to provide external users access to internal network resources. The implementation design requires that external users obtain access to these resources through the appliance and that users' permissions to internal resources be defined. The design also requires that client devices be able to access local networks while logged on. Which two tasks must an administrator perform to ensure that the requirements included in the scenario are met? (Choose two.) A. Grant all users permissions to the internal network. B. Ensure that split tunneling is enabled for the appliance. C. Create a network resource which includes the IP address of the LAN. D. Deploy the Secure Access Client to all users in the environment before they log on. Correct Answer: BC /Reference: QUESTION 38 Why would an administrator need to setup a network resource? A. To share files on the local network B. To share a network drive with users C. To allow users to access a file share on the company's intranet D. To allow users direct access to a subnet on the company's intranet

14 /Reference: QUESTION 39 Which two tools are used to configure RADIUS authorization for an Advanced Access Control implementation in a Windows domain? (Choose two.) A. The Access Suite Console B. The Server Configuration Wizard C. The Access Gateway Administrator's Tool D. The remote access policy in Microsoft Internet Authentication Service Correct Answer: AD /Reference: QUESTION 40 Which three can directly reference scan outputs? (Choose three.) A. Filters B. Policies C. Other scans D. Logon points E. Web resources Correct Answer: ACD /Reference: QUESTION 41 When establishing events to be logged in the Windows Event Viewer, which step should be taken in Advanced Access Control? A. Configure a logging filter B. Configure the types of events to be logged C. Configure a network resource to log events D. Configure an event to be logged from the Server Configuration Correct Answer: B

15 /Reference: QUESTION 42 Which rule must be followed when attempting to change the service account for an access server farm in which the credentials have been compromised? A. An administrator must use the Access Suite Console to change the service account on all servers. B. A user account in the same domain as the service account must be used to change the credentials. C. The new account must be granted System Administrator privileges by the administrator during the change. D. The administrator must use the Server Configuration Tool to change the service account on each server in the farm. /Reference: QUESTION 43 Which setting must be configured in a policy to secure the privilege of logging onto an access server farm? A. Access Action Control B. Allow Logon Resource C. Permit Access Control D. Show Logon Resource Correct Answer: B /Reference: QUESTION 44 When enabled which three policy settings allow users to access attachments? (Choose three.) A. Upload B. Live Edit C. Download D. HTML Preview E. as Attachment Correct Answer: BCD /Reference: QUESTION 45 From which node in the Access Suite Console can an administrator configure event logging?

16 A. Servers node B. Resource node C. Endpoint Analysis node D. Access Server Farm node /Reference: QUESTION 46 An administrator wants to grant internal users access to resources in an access server farm. Which two things should be provided to the users to ensure that they have access to published resources? (Choose two.) A. The name of the logon point B. The FQDN of the Presentation Server C. The FQDN of an Access Gateway appliance in a network D. The FQDN of the Advanced Access Control server hosting the logon point Correct Answer: AD /Reference: QUESTION 47 Which two statements are true of adding an Access Gateway appliance to an Advanced Access Control deployment? (Choose two.) A. The Access Gateway appliance must be assigned at least one IP address. B. After configuring the Access Gateway appliance, at least one Advanced Access Control server in the farm must be rebooted. C. The Access Gateway appliance must be configured to point to the FQDN/IP address of one or more Advanced Access Control servers in the farm. D. The administrator must execute the Add Gateway Appliance task from the Gateway Appliance node in order for the new Access Gateway appliance to appear in the Access Suite Console. Correct Answer: AC /Reference: QUESTION 48 An administrator is creating logon points and needs to configure the session settings. What is true about the configuration of session settings for logon points? A. Session time-out is set by default to 30 minutes. B. Domain prompting is used to determine whether the domain is available for access. C. Secure Access Client (VPN) time-out should always be longer than session time-out.

17 D. Published application usage through the web browser may require an increase in VPN client time-out. Correct Answer: C /Reference: QUESTION 49 Where does an administrator configure the conditions that users must meet to be able to see the logon page? A. In a filter B. In a policy C. In logon point properties D. In the properties of an endpoint analysis scan Correct Answer: C /Reference: QUESTION 50 Which data included in each event included in the event log consolidator correlates with the error message that an end-user reports? A. Start time B. Resource C. Reference ID D. Resource group Correct Answer: C /Reference: QUESTION 51 What are two requirements for enabling access to file share resources from the default navigation page (Access Navigator)? (Choose two.) A. The file share must contain at least one file. B. Permission to the share must be granted in an access policy. C. The share must exist in the location specified when created as a resource. D. The file server hosting the file share must be accessible to the Advanced Access Control servers on the network. Correct Answer: BD /Reference:

18 QUESTION 52 Which procedure should an administrator implement when a RADIUS or LDAP profile is associated with a logon point during the deployment of the logon point? A. Refresh the logon page information. B. Provide a decentralized database to store user profiles. C. Deploy the Secure Access Client on every client device. D. Type the global or server-specific password into the appropriate field. /Reference: QUESTION 53 In order to import a scan package into a different scan group than that which it was originally a part of, an administrator must. (Complete the sentence with an option from the list.) A. edit the.cab file B. delete all rules and filters that refer to the scan package C. reinstall the Endpoint Analysis Client on all client devices D. uninstall any files in the original group that are already saved in the desired destination Correct Answer: B /Reference: QUESTION 54 Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.) A. Web Client B. Client for Java C. Live Edit Client D. Secure Access Client E. Endpoint Analysis Client Correct Answer: AB /Reference: QUESTION 55 Scenario: Tim, a member of the Sales and Marketing groups, calls the Help Desk to report difficulties accessing when connecting to the corporate Advanced Access Control access server farm. Using the Policy Overview Tool you notice that the web-based resource belongs to multiple policies which have different access rights to the resource. The environment has these policy configurations: In Policy A, web-based is set to "Not Configured" for all authenticated users. In Policy B, web-based

19 is set to "Allow" for the Marketing Group and the Sales Group. In Policy C, web-based is set to "Deny" for the Marketing Group. Based on the listed policy configurations, which statement accurately describes the outcome of the policies? A. The "Deny" setting in Policy C takes precedence over Policy A and B. Tim will be denied access to webbased . B. The "Allow" setting in Policy B takes precedence over Policy A and C. Tim will be granted access to webbased . C. The "Not Configured" setting on Policy A takes precedence over Policy B and C. No users will be granted access to web-based . D. The "Deny" setting in Policy C is overridden by the "Not Configured" and "Allow" settings in Policy A and C respectively. Tim will be granted access to web-based . Correct Answer: A /Reference: QUESTION 56 An administrator needs to make a change to the default logon point settings for an Advanced Access Control implementation. Where can the administrator locate the default logon point? A. In the IIS Manager Console B. In the Access Suite Console C. In the Access Gateway Administration Tool D. In the Access Gateway Administration Portal Correct Answer: B /Reference: QUESTION 57 Which two syntaxes can be used when entering the administrator's credentials into the "Administrator Bind DN" field to configure LDAP authentication against Active Directory? (Choose two.) A. username/domain B. user@domain.com C. ou=administrator,dc=citrix,dc=com D. cn=administrator,cn=users,dc=citrix,dc=com Correct Answer: BD /Reference: QUESTION 58 While configuring a web resource, what must an administrator do to ensure that users can attachments from the web resource?

20 A. Configure synchronization B. Enable the "Access" policy setting C. Configure an HTML Preview server D. Create a policy granting users the appropriate permissions /Reference: QUESTION 59 Which three options are available to deploy the Endpoint Analysis Client? (Choose three.) A. Active X /Plug-in B. Access Client Packager C. Endpoint Analysis Client MSI D. Citrix Instant Client Download E. Secure Access Client Download Correct Answer: ABC /Reference: QUESTION 60 Scenario: An administrator is configuring web to use Outlook Web Access (OWA) as the front end for the Microsoft Exchange 5.5 Server for those users who require access to web from their hand-held devices. Which two configurations are required for this environment to ensure that users' inboxes display correctly? (Choose two.) A. Configure to display as HTML. B. Update the %systemroot%\\system32\\mapisvc.inf file. C. Ensure the WebDAV Web services extension is set to "Prohibit." D. Create a network resource that includes the Exchange server's FQDN. Correct Answer: BC /Reference: QUESTION 61 Which type of IP addressing is needed to enable internal and external connection to the Access Gateway appliance? A. Static IP addressing B. Default IP addressing C. Dynamic IP addressing D. Alternate IP addressing

21 Correct Answer: A /Reference: QUESTION 62 What is required to administer an access server farm using the Access Suite Console? A. An account which is in the Administrators role for the SQL server database. B. An account which is in the Guest role of the Access Gateway Server COM+ application. C. An account which is in the Systems role of the Access Gateway Server COM+ application. D. An account which is in the Administrators role of the Access Gateway Server COM+ application. /Reference: QUESTION 63 When is the "Authentication Credentials" option used in the deployment of a logon point? A. When RSA SecurID will be used along with the logon point B. When the logon point is used to connect devices that are not secure C. When a RADIUS or LDAP profile will be used along with the logon point D. When the logon point is used by devices to access resources from a secure network over a connection that is not secure Correct Answer: C /Reference: QUESTION 64 Which connection setting should be enabled during a connection policy configuration to ensure automatic drive mapping on client devices using a Windows logon script? A. Select file shares B. Execute logon scripts C. Execute automatic drive mapping D. Enable pass-through authentication Correct Answer: B /Reference: QUESTION 65 Which type of filter can be applied to a connection policy?

22 A. A group policy filter B. A continuous scan filter C. An filter from Microsoft Outlook D. A policy filter created on Citrix Presentation Server Correct Answer: B /Reference: QUESTION 66 Which two options are available for configuring licensing from the Server Configuration Wizard? (Choose two.) A. Import licenses from the Access Gateway appliance. B. Install a license onto the Access Gateway appliance. C. Use a licensing server that exists on another server. D. Install Citrix License server on the Advanced Access Control server during configuration. Correct Answer: CD /Reference: QUESTION 67 Which two Internet Explorer security settings should be enabled on the client device to allow users to log on to the access server farm? (Choose two.) A. File download B. Active scripting C. Per-session cookies D. Do not save encrypted pages to disk Correct Answer: BC /Reference: QUESTION 68 Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.) A. Web Client B. Client for Java C. Live Edit Client D. Secure Access Client E. Endpoint Analysis Client Correct Answer: AB

23 /Reference: QUESTION 69 Scenario: You just added a new server to the access server farm however it is not displaying in the Access Suite Console. Which two steps can you take to display this server in the Access Suite Console? (Choose two.) A. Stop and restart the agent server. B. Close and reopen the Access Suite Console. C. Enter the name of the new server into the Access Suite Console. D. Run discovery from the Servers node in the Access Suite Console. Correct Answer: BD /Reference: QUESTION 70 Scenario: An administrator wants to perform additional analysis in the Event Log Consolidator on aggregated data collected from multiple Advanced Access Control servers in the farm. In which three ways can this be done? (Choose three.) A. By using the Domain B. By using the logon point C. By using the User Name D. By using the Reference ID E. By using the service account Correct Answer: BCD /Reference: QUESTION 71 Scenario: An administrator needs to provide users access to unique file shares named for users through the access server farm. The shares named for the users are in a folder called "users" located on the server named "corporatehq1srv" and are linked directly to the user's profile as set up in Active Directory. In this environment, what is the UNC path that the administrator should specify when defining a web file resource that will grant each user access to their directory? A. \\corporatehq1srv\users\#<username> B. \\corporatehq1srv\users\%username% C. \\corporatehq1srv\users\%displayname% D. \\corporatehq1srv\users\#<homedirectory> Correct Answer: A /Reference:

24 QUESTION 72 Scenario: An administrator would like to provide access to a Web Interface 4.2 site through Advanced Access Control. He would like the site to appear as the home page. What are the two required configurations for this scenario? (Choose two.) A. Configure the site as the application with the highest priority. B. Configure a logon point to display the navigation page as the home page. C. Configure the web resource for Citrix Web Interface 4.2 to bypass web proxy URL rewriting. D. Create a published web resource with Citrix Web Interface 4.2 selected as the application type. Correct Answer: AD /Reference: QUESTION 73 In an environment that restricts access to resources to client devices running a specific version of Internet Explorer, which step must be completed to create a continuous registry scan? A. Clear the MD5 field. B. Browse to the software executable on the server. C. Provide the registry path, type and key values for the browser. D. Type the earliest date stamp that is acceptable for the browser. Correct Answer: C /Reference: QUESTION 74 An administrator configuring advanced authentication decides to use an index database with Global Catalog in order to improve the speed of LDAP queries. The administrator is instructed to use Microsoft port number What should the administrator do in the "LDAP Profile Configuration" to implement this configuration? (Click on the exhibit button to display the screen shot.) Exhibit:

25 A. Type "3268" in the "Port" field and deselect "Use SSL". B. Type "3268" in the "Port" field and leave "Use SSL" selected. C. Type "3268" in the "Port" field and in the name field for the "Administrator Bind DN" and the "Base Bind DN". D. Type "3268" in the "Port" field and type ":3268" after the IP address in the "LDAP Server Name or IP Address" field. Correct Answer: A /Reference: QUESTION 75 Which Radius configuration would result in the first request going to the first Radius server, the second request going to the second server, and so on? A. Failover B. Redundancy C. Fault Tolerance D. Load Balancing

26 /Reference: QUESTION 76 Scenario: An environment requires that client devices accessing resources through the Access Gateway have a specific antivirus software installed. In addition, all client devices must have a valid SSL certificate installed. Which detail must be included when configuring a filter to meet the SSL certificate requirement? A. The location of the the SSL client certificate B. The common name included on the SSL client certificate C. The name of the organization on the SSL client certificate D. The presence of an SSL client certificate must be specified /Reference: QUESTION 77 Where does an administrator configure the Allow Logon setting for users? A. In a filter B. In a policy C. In the logon point properties D. In the properties of an endpoint analysis scan Correct Answer: B /Reference: QUESTION 78 Which data included in each event included in the event log consolidator correlates with the error message that an end-user reports? A. Start time B. Resource C. Reference ID D. Resource group Correct Answer: C /Reference: QUESTION 79 Scenario: An administrator wants to aggregate the Advanced Access Control events from six different servers and poll the activity on these servers every 50 seconds. What can be used to configure the poll interval?

27 A. CitrixAGE Audit B. Edit farm properties C. Event Log Consolidator D. Server Configuration tool Correct Answer: C /Reference: QUESTION 80 To use tokens while defining a file share for an access server farm. (Choose the option which best completes the sentence.) A. the file share must not be published B. you must have LDAP implemented in the environment C. you must have Active Directory implemented in the environment D. the service account in Server Configuration must be a local machine account Correct Answer: C /Reference: QUESTION 81 A network has multiple Presentation Server farms identified in the logon point. How can an administrator determine which server farm will be used for file type association? A. Prioritize the server farms. B. Prioritize the published applications. C. Choose the default Presentation Server. D. Prioritize the Access Gateway appliance that connects to a specific server farm. Correct Answer: A /Reference: QUESTION 82 Which two steps must an administrator take to remove an Access Gateway appliance server from an Advanced Access Control deployment? (Choose two.)

28 A. The administrator must execute the Remove Access Gateway task from the Gateway Appliances node in the Access Suite Console. B. After configuring the Access Gateway appliance to be removed, at least one Advanced Access Control server in the farm must be rebooted. C. The administrator must configure the Access Gateway appliance server so that it no longer points itself to an Advanced Access Control server in the deployment. D. The administrator must uncheck the Access Gateway role checkbox for the Access Gateway appliance to be removed in the Manage Server Roles dialog of the Access Suite Console. Correct Answer: AC /Reference: QUESTION 83 Which two resources require the Secure Access Client? (Choose two.) A. Network resources B. synchronization resources accessed using Outlook C. File share resources accessed using the default navigation page (Access Navigator) D. Web resources accessed using the default navigation page (Access Navigator) Correct Answer: AB /Reference: QUESTION 84 Scenario: The administrator at Certkiller.com wants a scan to run only for users who obtain access to the access server farm through an external entry point and do not have a mandated corporate security software on their client device. Which two conditions need to be taken into consideration when creating rules for this scan? (Choose two.) A. Logon point conditions B. Operating system conditions C. Antivirus properties conditions D. Client device regional locale conditions Correct Answer: AC /Reference: QUESTION 85 When changing the service account information for an access server farm, which statement is true? A. The service account must be a domain administrator. B. New service accounts will automatically be added to the Local Administrators group. C. Once changed, the original service account is automatically removed from the local security policy.

29 D. New service accounts must be manually added to the local administrators group on the local system. Correct Answer: B /Reference: QUESTION 86 Where can an administrator configure the endpoint analysis scan for an operating system? A. In the Endpoint Analysis scan node B. From the Operating System rule node C. From the Operating System policy node D. From the Operating System scan group node /Reference: QUESTION 87 Scenario: Ken configured an Exchange Server and Outlook clients for synchronization. Client devices are using Microsoft Outlook 2000 and running on Windows XP operating systems. The Secure Access Client is installed on all client devices. What are two requirements to perform the configurations required for this scenario? (Choose two.) A. The administrator must create and configure a policy. B. The administrator grants the Download Attachment privilege for all users. C. The administrator verifies that the client devices have Internet Explorer 5 or 6 with all critical updates installed. D. The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens. Correct Answer: AD /Reference: QUESTION 88 Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.) A. The Access Suite Console must be closed. B. The administrator must use the Server Configuration Tool. C. All the services must be manually stopped and then restarted again. D. The administrator must use the Access Gateway Administration Tool. Correct Answer: AB

30 /Reference: QUESTION 89 An administrator needs to add a file share as a resource to the default navigation page. In order for users to be able to access the file share resource from the default navigation page, which three steps are required? (Choose three.) A. Publish the file share. B. Ensure that the file share exists prior to defining it for the access server farm. C. Ensure that the specified users have NTFS read permissions to the file share. D. Create a policy granting access to specified users in the Access Gateway Administration Tool. E. Create a policy granting access to the file share to specified users in the Access Suite Console. Correct Answer: ACE /Reference: QUESTION 90 How can an administrator control whether users are allowed or denied logon privileges through policies? A. Include the Allow Logon property in the access filter B. Include the Allow Logon property in the access policy C. Include the Allow Logon Resource in the access filter D. Include the Allow Logon Resource in the access policy /Reference: QUESTION 91 Scenario: UserA, an internal company user, types the following URL in a web browser to connect to the corporate site that is secured using Advanced Access Control: UserB, an external appliance user, types the following URL in a web browser to connect to the corporate site that is secured using Advanced Access Control: Which statement is true? A. Only UserA will be redirected to the corporate logon point. B. Both UserA and UserB will be redirected to the corporate logon point. C. Both users need to type the URL to the logon point or they will get a 404 page "not found" error. D. UserA will get a 404 page "not found" error and UserB will be redirected to the default logon point.

31 /Reference: QUESTION 92 In which location must the Advanced Access Control Software be installed? A. On the license server in the internal network B. On the Access Gateway appliance in the DMZ C. On the system that hosts the configuration database D. On a server which can communicate with the Access Gateway appliance /Reference: QUESTION 93 In an environment where there are multiple logon points and an endpoint analysis scan that requires a specific browser version, which logical operators should be used to so that users who access from specific logon points are also scanned to ensure that they meet the browser version requirements for the implementation? (Choose the string that matches the need for this environment.) A. (logon point A and logon point B) or endpoint analysis_1 B. (logon point A or logon point B) and endpoint analysis_1 C. (logon point A and logon point B) and endpoint analysis_1 D. (logon point A or logon point B) and not endpoint analysis_1 Correct Answer: B /Reference: QUESTION 94 When implementing Advanced Access Control in an environment in which users will access resources through a VPN tunnel created by an Access Gateway appliance, which client must be used? A. Web Client B. Secure Access Client C. Endpoint Analysis Client D. Presentation Server Client Correct Answer: B /Reference: QUESTION 95 An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished?

32 A. Create a new scan package when updated signatures are released. B. Create a scan rule which has a parameter that specifies the maximum age of the signatures. C. Configure the Anti-Virus package to automatically download the latest pattern file periodically. D. Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters. /Reference: QUESTION 96 Which connection settings should be configured if the user is required to re-authenticate after their system goes into hibernation? A. Authenticate after hibernation B. Authenticate after system failure C. Authenticate after system resume D. Authenticate after network interruption Correct Answer: C /Reference: QUESTION 97 Scenario: An administrator is required to create a scan that will scan client devices to ensure that all clients running Windows XP Professional also have service pack 1(SP1) installed and running. All users in the environment are required to have a specific version of an antivirus software running on their systems. Due to the addition of a newly acquired office, the scan requirements have to be modified. Newly acquired remote offices, which will obtain access to company resources through Access Gateway, have client devices that run on Windows 98 and are not required to submit to the same scans that are required of the other users. By configuring rules for the end point analysis scan, the administrator can ensure that only the devices in the new offices will not be required to meet the same security requirements that are required for the other corporate users. Which condition type should be added to the rules for the scan to ensure that the requirements for the scenario are met? A. Logon point B. Property value C. Operating system D. Client device regional locale Correct Answer: C /Reference: QUESTION 98 Scenario: Advanced Access Control is configured to use LDAP for primary authentication and authorization. An administrator needs to enable pass-through authentication in order for Active Directory credentials to be passed automatically to applications. What is the administrator required to do to meet the requirements of this

33 scenario? A. Ensure that the same logon account exists for LDAP and Active Directory. B. Ensure that LDAP and Active Directory use the same trusted root certificate. C. Ensure that the LDAP server is on the same network as the Active Directory server. D. Ensure that the same administrative account exists for the LDAP and Active Directory. Correct Answer: A /Reference: QUESTION 99 What happens when the Allow Logon Resources setting is NOT selected in the access policy? A. The access policy only controls the denied logon privileges. B. The access policy only controls whether users are allowed to log onto the farm. C. The access policy does not control whether users are allowed to log onto the farm. D. The access policy does not control any settings except for those that are specified in the Allow Logon setting. Correct Answer: C /Reference: QUESTION 100 Scenario: An administrator must configure a web resource to be integrated with the corporate access center. In the access server farm there are three servers in use: "access_agent"is configured as an agent server;"access_web"is configured as a web server;acess_1"is configured to server as the agent and licence server.in addition, the Exchange server is named exchange_hq. Which configuration must the administrator perform to ensure that users are provided indirect access to the web through the corporate access center? A. Configure the website viewer in the portal to point to B. Configure the website viewer in the portal to point to C. Configure the website viewer in the portal to point to D. Configure the website viewer in the portal to point to Correct Answer: B /Reference:

CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS Number: 1Y0-722 Passing Score: 700 Time Limit: 75 min File Version: 32.0 http://www.gratisexam.com/ CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS Exam Name: MetaFrame

More information

MB Exam Code: MB Exam Name: Microsoft Dynamics CRM 2016 Customer Service

MB Exam Code: MB Exam Name: Microsoft Dynamics CRM 2016 Customer Service MB2-714 Number: MB2-714 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Exam Code: MB2-714 Exam Name: Microsoft Dynamics CRM 2016 Customer Service Exam A QUESTION 1 You install Microsoft Dynamics

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

Cisco Passguide Exam Questions & Answers

Cisco Passguide Exam Questions & Answers Cisco Passguide 642-648 Exam Questions & Answers Number: 642-648 Passing Score: 800 Time Limit: 120 min File Version: 61.8 http://www.gratisexam.com/ Cisco 642-648 Exam Questions & Answers Exam Name: Deploying

More information

Receiver for BlackBerry 2.2

Receiver for BlackBerry 2.2 Receiver for BlackBerry 2.2 2015-04-19 05:21:53 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver for BlackBerry 2.2... 3 About This Release...

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

Citrix.Selftestengine.1Y0-456.v by.JUSTA.28q

Citrix.Selftestengine.1Y0-456.v by.JUSTA.28q Citrix.Selftestengine.1Y0-456.v2014-09-27.by.JUSTA.28q Number: 1Y0-456 Passing Score: 800 Time Limit: 120 min File Version: 20.5 CITRIX 1Y0-456 EXAM QUESTIONS & ANSWERS Exam Name: Citrix Access Suite 4.0:

More information

CMB-207-1I Citrix Desktop Virtualization Fast Track

CMB-207-1I Citrix Desktop Virtualization Fast Track Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-250 Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions Version: Demo QUESTION NO: 1 Citrix 1Y0-250 Exam A company uses various pre-approved user devices

More information

COURSE OUTLINE IT TRAINING

COURSE OUTLINE IT TRAINING CMB-207-1I Citrix XenApp and XenDesktop Fast Track Duration: 5 days Overview: This fast-paced course covers select content from training courses CXA-206 and CXD- 202 and provides the foundation necessary

More information

Getting Started with VMware View View 3.1

Getting Started with VMware View View 3.1 Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Exam : JN Title : Juniper Networks Certified Internet Assoc(JNCIA-SSL) Exam. Version : Demo

Exam : JN Title : Juniper Networks Certified Internet Assoc(JNCIA-SSL) Exam. Version : Demo Exam : JN0-561 Title : Juniper Networks Certified Internet Assoc(JNCIA-SSL) Exam Version : Demo 1. Which model does not support clustering? A. SA700 B. SA2000 C. SA4000 D. SA6000 Answer: A 2. What is a

More information

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Number: 1Y0-200 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Exam Name: Managing

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Aventail ST2 SSL VPN New Features Guide

Aventail ST2 SSL VPN New Features Guide Aventail ST2 SSL VPN New Features Guide Summary of New Features and Functionality for the Aventail ST2 SSL VPN Platform Upgrade Release August, 2006 2006 Aventail Corporation. All rights reserved. Aventail,

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Update 2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 452330 Revision Date 11 November 2014 Introduction WatchGuard is pleased to announce the release of

More information

Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ]

Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ] s@lm@n Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ] Question No : 1 Scenario: An administrator needs to deliver production

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Citrix 1Y Citrix Presentation Server 4.5: Administration.

Citrix 1Y Citrix Presentation Server 4.5: Administration. Citrix 1Y0-259 Citrix Presentation Server 4.5: Administration http://killexams.com/exam-detail/1y0-259 QUESTION: 118 Scenario: Behind a firewall there are five servers running Presentation Server that

More information

Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ]

Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ] s@lm@n Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ] Citrix 1Y0-301 : Practice Test Topic break down Topic No. of Questions Topic 1: Pre-installation

More information

NetScaler Gateway 10.5

NetScaler Gateway 10.5 NetScaler Gateway 10.5 Jun 26, 2014 About This Release Key Features What's New Known Issues Compatibility with Citrix Products System Requirements NetScaler Gateway Plug-in System Requirements Endpoint

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions 1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler

More information

citrix MetaFrame Password Manager2.0:Adminsitration

citrix MetaFrame Password Manager2.0:Adminsitration citrix MetaFrame Password Manager2.0:Adminsitration Number: 1Y0-972 Passing Score: 800 Time Limit: 120 min File Version: 62.24 http://www.gratisexam.com/ CITRIX 1Y0-972 EXAM QUESTIONS & ANSWERS Exam Name:

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-370 Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions Version: Demo QUESTION NO: 1 Which connection type is used when WorxWeb for ios is configured to

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Parallels Remote Application Server Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Contents 1. Introduction a. Why Should You Migrate from Citrix to Parallels RAS b. Overview

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( ) Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service on Microsoft Azure Administration Guide Modified on 03 APR 2018 VMware Horizon Cloud Service VMware Horizon Cloud Service on Microsoft Azure 1.5 You can find the most up-to-date

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee JN0-355 Q&As Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9. VMware Enterprise Systems Connector Installation and Configuration JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.3 You can find the most up-to-date technical documentation

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Merchandising Server 2.2

Merchandising Server 2.2 Merchandising Server 2.2 2014-12-07 04:31:45 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Merchandising Server 2.2... 5 About... 6 System Requirements

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1 BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About

More information

CounterACT Wireless Plugin

CounterACT Wireless Plugin CounterACT Wireless Plugin Version 1.7.0 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 5 How It Works... 6 About WLAN Controller/Lightweight Access Points...

More information

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Pre-Installation Checklist v5.0

Pre-Installation Checklist v5.0 Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN Create and Apply Clientless SSL VPN Policies for Accessing Resources, page 1 Connection Profile Attributes for Clientless SSL VPN, page 1 Group Policy and User Attributes for Clientless SSL VPN, page 3

More information

Citrix Workspace app for ios

Citrix Workspace app for ios Citrix Product Documentation docs.citrix.com October 22, 2018 Contents What s new in Citrix Workspace app for ios 3 What s new in 1810.1....................................... 3 What s new in 1810........................................

More information

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service VMware Horizon Cloud Service on Microsoft Azure 1.4 You can find the most up-to-date technical documentation

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

ApplicationServer XG Version 11. Last updated:

ApplicationServer XG Version 11. Last updated: ApplicationServer XG Version 11 Last updated: 2013-10-09 Table of Contents Introduction to 2X ApplicationServer... 1 What is 2X ApplicationServer?... 1 How does it work?... 1 About This Document... 1 Introduction...

More information

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2 VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Exam A QUESTION 1 An XYZ Corporation systems engineer, while making a sales call on the ABC Corporation headquarters, tried to access the XYZ sales de

Exam A QUESTION 1 An XYZ Corporation systems engineer, while making a sales call on the ABC Corporation headquarters, tried to access the XYZ sales de Cisco 642-647 Deploying Cisco ASA VPN Solutions (VPN v1.0) Version: Demo https://.com Exam A QUESTION 1 An XYZ Corporation systems engineer, while making a sales call on the ABC Corporation headquarters,

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server

More information

Citrix Web Interface for Microsoft SharePoint Administrator s Guide. Citrix Access Suite 4.2

Citrix Web Interface for Microsoft SharePoint Administrator s Guide. Citrix Access Suite 4.2 Citrix Web Interface for Microsoft SharePoint Administrator s Guide Citrix Web Interface for Microsoft SharePoint Citrix Access Suite 4.2 Use of the product documented in this guide is subject to your

More information

Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment must have a Uniform Resource Locator (URL) that

Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment must have a Uniform Resource Locator (URL) that Vendor: Microsoft Exam Code: MB2-702 Exam Name: Microsoft Dynamics CRM 2013 Deployment Version: Demo Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Implementing Citrix XenApp 5.0 for Windows Server 2008

Implementing Citrix XenApp 5.0 for Windows Server 2008 Citrix 1Y0-A05 Implementing Citrix XenApp 5.0 for Windows Server 2008 Version: 5.0 Topic 1, Volume A QUESTION NO: 1 An administrator currently has Secure Gateway and web interface on the same server in

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-A04 Title : Gateway 8.1.Enterprise Edition: Administration Vendors :

More information

Streaming Profile Recipe

Streaming Profile Recipe Streaming Profile Recipe Package_Manufacturer_Version Streaming Profile Recipe for Package_Manufacturer_Version Submitted by: Date Submitted: 3/3/2011 11:25:00 AM

More information

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Citrix XenApp 6.5 Administration

Citrix XenApp 6.5 Administration Citrix XenApp 6.5 Administration CXA206; 5 Days, Instructor-led Course Description Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize

More information

IPMI Configuration Guide

IPMI Configuration Guide IPMI Configuration Guide 1. Introduction of IPMI Server Manager... 2 2. IPMI Server Manager GUI Overview... 3 1 1. Introduction of IPMI Server Manager IPMI Server Manager allows remote access of computers

More information

Course CXA-206: Citrix XenApp 6.5 Administration

Course CXA-206: Citrix XenApp 6.5 Administration Course CXA-206: Citrix XenApp 6.5 Administration Course Length: 5 days Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize

More information

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues... SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues... 5 Release Purpose SonicOS 6.1.1.5 is a general

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Quick Start Using Leostream with Citrix XenDesktop 7 and HDX Version 8.1 January 14, 2016 Contacting

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Access Gateway 9.3, Enterprise Edition

Access Gateway 9.3, Enterprise Edition Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

CXA-204-1I Basic Administration for Citrix XenApp 6

CXA-204-1I Basic Administration for Citrix XenApp 6 CXA-204-1I Basic Administration for Citrix XenApp 6 Basic Administration for Citrix XenApp 6 training course provides the foundation necessary for administrators to effectively centralize and manage applications

More information

BlackBerry UEM Configuration Guide

BlackBerry UEM Configuration Guide BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator

More information

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1 BIG-IP Access Policy Manager : Authentication and Single Sign-On Version 13.1 Table of Contents Table of Contents Authentication Concepts... 15 About AAA server support... 15 About AAA high availability

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later REVISED 1 AUGUST 2018 REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes Use

More information

BIG-IP Access Policy Manager : Portal Access. Version 13.0

BIG-IP Access Policy Manager : Portal Access. Version 13.0 BIG-IP Access Policy Manager : Portal Access Version 13.0 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...

More information

BIG-IP Access Policy Manager : Implementations. Version 12.1

BIG-IP Access Policy Manager : Implementations. Version 12.1 BIG-IP Access Policy Manager : Implementations Version 12.1 Table of Contents Table of Contents Web Access Management...11 Overview: Configuring APM for web access management...11 About ways to time out

More information

Configuration Guide. BlackBerry UEM. Version 12.9

Configuration Guide. BlackBerry UEM. Version 12.9 Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration

More information

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later REVISED 1 AUGUST 2018 QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Azure MFA Integration with NetScaler

Azure MFA Integration with NetScaler Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class

More information

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2) Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to

More information