Citrix 1Y0-401 Designing Citrix XenDesktop 7.6 Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/1y0-401
QUESTION: 229 existing XenApp environments. Group Policy Objects (GPOs) from OUs across the control over which GPOs apply in the new environment. How should the architect ensure full control over which Citrix policies are applied? A. Configure the Citrix policies in the GPOs. B. Create one Citrix Policy for each region. C. Create Citrix policies filtered by end users and Delivery Groups. D. Create Citrix policies and filter settings based on Client Name. Answer: A QUESTION: 230 A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ. How should the architect configure the callback URL with a high availability pair of NetScalers located in all three regional datacenters? A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. C. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. D. Configure the callback URL to point to the external beacon address. Answer: D QUESTION: 231 CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Which type of encryption should a Citrix Architect recommend?
A. SecureICA B. IPsec C. SSL D. L2TP QUESTION: 232 A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ. Which configuration should the architect recommend for the new external access architecture? A. One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device. B. A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs. C. A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site. D. One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs. QUESTION: 233 existing XenApp environments. Group Policy Objects (GPOs) from OUs across the control over which GPOs apply in the new environment. Why would configuring loopback processing with merge at the root level ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on. B. It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on. C. It ensures that only Group Policies located in the root Citrix OU are applied
below the root level when end users log on. D. It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies. Answer: D QUESTION: 234 A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ. How should the architect configure the callback URL with one NetScaler located in all three regional datacenters? A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. C. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. D. Configure the callback URL to point to the external beacon address. QUESTION: 235 A Citrix Architect reviewed CGE's antivirus policy and found that it does NOT comply with the posted Citrix antivirus recommendations. What should the architect recommend be added to CGE's antivirus policy? A. Enable scanning of network drives. B. Disable real-time scanning on Citrix XenApp servers. C. Scan all excluded files during the scheduled periodic scan. D. Exclude the user profile storage location from antivirus scanning. QUESTION: 236
existing XenApp environments. Group Policy Objects (GPOs) from OUs across the control over which GPOs apply in the new environment. Why would creating Citrix policies within a GPO, filtered by Client Name, ensure full control over which GPOs are applied? A. It provides central management and control. B. It ensures that only policies with the correct filter in Active Directory are applied. C. It ensures that only settings located in the root OU are applied. D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on. Answer: B QUESTION: 237 CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using L2TP meet CGE's compliance requirements? A. It encrypts internal ICA traffic. B. It encrypts ICA traffic from remote end users. C. It enables the SSL Relay service. D. It complies with industry-standard SSL encryption requirements. Answer: A QUESTION: 238 CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. How should the architect recommend that IPsec be implemented? A. By using NetScaler B. By implementing secure Delivery Groups C. By implementing an Active Directory Group Policy D. By configuring a local IPsec policy in the master image
QUESTION: 239 CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. How should the architect recommend that SecureICA be implemented? A. By using NetScaler B. By implementing secure Delivery Groups C. By implementing an Active Directory Group Policy to configure SecureICA D. By installing an SSL certificate in the master image Answer: B QUESTION: 240 existing XenApp environments. Group Policy Objects (GPOs) from OUs across the control over which GPOs apply in the new environment. Why would configuring loopback processing with merge at the regional level ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on. B. It ensures that only Group Policies located in the regional Citrix OU are applied at the regional level when end users log on. C. It ensures that only Citrix policies are applied at the regional level when end users log on. D. It ensures that Group Policies located in the regional OU are merged with Citrix policies. Answer: B QUESTION: 241 existing XenApp environments. Group Policy Objects (GPOs) from OUs across the control over which GPOs apply in the new environment. Why would configuring loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents ensure full control over which Group Policies are applied?
A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on. B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on. C. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on. D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies. Answer: B
For More exams visit http://killexams.com Kill your exam at First Attempt...Guaranteed!