Pass Citrix 1Y0-306 Exam

Similar documents
CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS

MB Exam Code: MB Exam Name: Microsoft Dynamics CRM 2016 Customer Service

VMware Identity Manager Administration

BIG-IP Access Policy Manager : Portal Access. Version 12.1

NetExtender for SSL-VPN

Cisco Passguide Exam Questions & Answers

Receiver for BlackBerry 2.2

Remote Support Security Provider Integration: RADIUS Server

Citrix.Selftestengine.1Y0-456.v by.JUSTA.28q

CMB-207-1I Citrix Desktop Virtualization Fast Track

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo

COURSE OUTLINE IT TRAINING

Getting Started with VMware View View 3.1

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Exam : JN Title : Juniper Networks Certified Internet Assoc(JNCIA-SSL) Exam. Version : Demo

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

vcloud Director User's Guide

Aventail ST2 SSL VPN New Features Guide

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ]

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Citrix 1Y Citrix Presentation Server 4.5: Administration.

Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ]

NetScaler Gateway 10.5

vcloud Director User's Guide

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

citrix MetaFrame Password Manager2.0:Adminsitration

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo

Security Provider Integration RADIUS Server

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server

User Identity Sources

VI. Corente Services Client

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

User Databases. ACS Internal Database CHAPTER

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

Setting Up Resources in VMware Identity Manager

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

Merchandising Server 2.2

User Guide. Version R92. English

Manage Administrators and Admin Access Policies

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1

CounterACT Wireless Plugin

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Privileged Identity App Launcher and Session Recording

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Pre-Installation Checklist v5.0

SafeConsole On-Prem Install Guide

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN

Citrix Workspace app for ios

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

KYOCERA Net Admin User Guide

Manage Administrators and Admin Access Policies

ApplicationServer XG Version 11. Last updated:

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Quest Collaboration Services 3.6. Installation Guide

DigitalPersona Pro Enterprise

Laserfiche Rio 10.3: Deployment Guide. White Paper

Exam A QUESTION 1 An XYZ Corporation systems engineer, while making a sales call on the ABC Corporation headquarters, tried to access the XYZ sales de

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Citrix Web Interface for Microsoft SharePoint Administrator s Guide. Citrix Access Suite 4.2

Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment must have a Uniform Resource Locator (URL) that

User Guide. Version R94. English

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

Implementing Citrix XenApp 5.0 for Windows Server 2008

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Streaming Profile Recipe

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Citrix XenApp 6.5 Administration

IPMI Configuration Guide

Course CXA-206: Citrix XenApp 6.5 Administration

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft

VMware Identity Manager Administration

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

Evaluation Guide Host Access Management and Security Server 12.4

Access Gateway 9.3, Enterprise Edition

FieldView. Management Suite

CXA-204-1I Basic Administration for Citrix XenApp 6

BlackBerry UEM Configuration Guide

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1

HySecure Quick Start Guide. HySecure 5.0

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later

BIG-IP Access Policy Manager : Portal Access. Version 13.0

BIG-IP Access Policy Manager : Implementations. Version 12.1

Configuration Guide. BlackBerry UEM. Version 12.9

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later

VII. Corente Services SSL Client

Azure MFA Integration with NetScaler

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Transcription:

Pass Citrix 1Y0-306 Exam Number: 1Y0-306 Passing Score: 800 Time Limit: 120 min File Version: 35.7 http://www.gratisexam.com/ Pass Citrix 1Y0-306 Exam Exam Name: Citrix Access Gateway 4.2 with Advanced Access Control:Admin

Passguide QUESTION 1 Scenario: Ken configured an Exchange Server and Outlook clients for email synchronization. Client devices are using Microsoft Outlook 2000 and running on Windows XP operating systems. The Secure Access Client is installed on all client devices. What are two requirements to perform the configurations required for this scenario? (Choose two.) A. The administrator must create and configure a policy. B. The administrator grants the Download Email Attachment privilege for all users. C. The administrator verifies that the client devices have Internet Explorer 5 or 6 with all critical updates installed. D. The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens. Correct Answer: AD /Reference: QUESTION 2 Scenario: An administrator wants to provide access to Certkiller.com intranet site from the access server farm. The home page for the intranet site includes several links to external web pages. The administrator wants to ensure that all links can be accessed through this resource. How can this be configured? A. Create a filter that allows access to all the websites lnked from the home page. B. Enable URL rewriting to provide users access to the pages linked on the website. C. Include all the web pages linked from the home page using a URL that contains a wildcard. D. Within the New Web Resource Wizard add URLs for the home page and each page linked from the home page. /Reference: QUESTION 3 Whenever a RADIUS or LDAP profile is associated with a logon point, the administrator must. (Fill in the blank with a listed option.) A. use a Sample Logon Point B. deploy the Secure Access Client on every client device C. provide a decentralized database to store users' profiles D. provide the associated credential during the deployment of the logon point /Reference:

QUESTION 4 Scenario: An administrator is required to configure the setting that determines whether users can reconnect to both active and disconnected sessions or only to disconnected sessions while creating a logon point. Which option should the administrator enable? A. Window B. Session Time-out C. Domain Prompting D. Workspace Control /Reference: QUESTION 5 Along with Active Directory, which other two authentications could be implemented in order to provide Advanced Authentication? (Choose two.) A. Smart Cards B. LDAP authentication C. RSA Security SecurID D. Secure Computing SafeWord PremierAccess Correct Answer: CD /Reference: QUESTION 6 A client device is scanned but the user receives a message that he is denied access to the network. Which two actions can help the administrator determine which endpoint analysis scans failed? (Choose two.) http://www.gratisexam.com/ A. Examine the "Endpoint Analysis Scan Results" snap-in B. Modify the Disallowed.ascx page to show the scan results C. View the event log on the Advanced Access Control server D. Export the results to a comma-separated list using an endpoint analysis command-line tool Correct Answer: BC /Reference:

QUESTION 7 In an environment that restricts client device access to resources based upon the presence of a specific version of an antivirus software, which step must be completed for a continuous process scan? A. Clear the MD5 field. B. Browse to the client version of the antivirus executable. C. Provide the registry path and values for the antivirus software. D. Type the earliest date stamp that is acceptable for the process. Correct Answer: B /Reference: QUESTION 8 After providing the configuration database server and the access server farm name, which additional step must an administrator perform to change the farm membership of server? A. Run discovery in the Access Suite Console B. Restart the server for which the farm membership was changed C. Provide the credentials used to access the configuration database server D. Restart the license server for the access server farm where the server was added Correct Answer: C /Reference: QUESTION 9 Which statement regarding the rules for configuring a connection policy is true? A. Multiple connection policies can be used for a single session. B. Multiple connection policies cannot be used for a single logon point. C. IP address pools can be defined in the connection policy for dynamic IP addressing. D. Names can be duplicated among several connection policies as long as the farm name is included. Correct Answer: C /Reference: QUESTION 10 Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.) A. The Access Suite Console must be closed. B. The administrator must use the Server Configuration Tool.

C. All the services must be manually stopped and then restarted again. D. The administrator must use the Access Gateway Administration Tool. Correct Answer: AB /Reference: QUESTION 11 Which policy setting is the only permission that can be set for network resources? A. Upload B. Access C. VPN Tunnel D. File Type Association Correct Answer: B /Reference: QUESTION 12 In an environment where client devices must pass two file scans before being permitted access to the network, which logical expression should be used to create a continuous scan? A. NOT Y, where Y represents a failed scan B. X OR Y, where X and Y represents the file scans C. X AND Y, where X and Y represents the file scans D. (X AND Y) OR Y, where X and Y represents the file scans Correct Answer: C /Reference: QUESTION 13 An administrator is instructed to configure advanced authentication using RADIUS profile and must define RADIUS authentication. Which node in the console tree should the administrator select to define RADIUS authentication? (Click on the exhibit button to display the screen shot.) Exhibit:

A. Servers node B. Resources node C. Configuration Tools node D. Access Server Farm node /Reference: QUESTION 14 When a logon point is renamed just after it is deployed,. (Fill in the blank with a listed option.) A. it can no longer be used B. it must be redeployed using the update function in the Access Suite Console C. the Advanced Access Control setup CD must be used to redeploy the updated logon D. it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources /Reference:

QUESTION 15 From which node in the Access Suite Console can an administrator configure event logging? A. Servers node B. Resource node C. Endpoint Analysis node D. Access Server Farm node /Reference: QUESTION 16 Scenario: To ensure that a service pack level scan is run whenever Windows XP or 98 operating system is encountered, which configuration is required? A. Configure two rules for the scan with client device locale conditions and the remote language selected. B. Configure two rules for the scan with logon point conditions and the remote logon point added to the property value for the scan. C. Configure two rules for the scan with the logon point and operating system conditions and SP1 as the property values for the scan. D. Configure two rules for the scan with operating system conditions and the respective service pack as the property values for the scan. /Reference: QUESTION 17 If migrating from a MetaFrame Secure Access Manager 2.X implementation to Advanced Access Control, which file must be specified during the initial configuration of the access server farm? A. NFE.XML B. XPS.CAB C. NFUSE.CONF D. MSAM2.X CAB /Reference: QUESTION 18 What does a port of zero (0) mean when defining a network resource? A. All ports B. No ports

C. TCP Port 0 D. Variable port depending on the resource table Correct Answer: A /Reference: QUESTION 19 Which server role must be selected for Advanced Access Control servers that will process CDAs? A. Web server B. State server C. Agent server D. HTML Preview server Correct Answer: C /Reference: QUESTION 20 In the Access Suite Console, which steps must an administrator take to create an access policy that controls access to all visible servers and services in the network? A. Select "Network Resources" and choose "Entire Network." B. Select the farm node and disable network policy enforcement. C. Select the Access Policies node in the console tree and add all visible servers and services to the access policy. D. Select the appropriate domain from the domain list and choose to make the access policy the default authentication for that domain. Correct Answer: A /Reference: QUESTION 21 Which utility can an administrator use to audit a logged event for a specific server? A. Access Suite Console B. Windows Event Viewer C. Server Configuration Tools D. Presentation Server Management Console Correct Answer: B

/Reference: QUESTION 22 Which three URL addresses are valid when creating a web resource? (Choose three.) A. https://www.*.com/users/ B. http://server1/pilotresource C. file://server1/pilotresource/index.html D. http://server1/pilotresource/index.html E. https://www.yourcompany.net/users/ #<username> Correct Answer: BDE /Reference: QUESTION 23 An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished? A. Create a new scan package when updated signatures are released. B. Create a scan rule which has a parameter that specifies the maximum age of the signatures. C. Configure the Anti-Virus package to automatically download the latest pattern file periodically. D. Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters. /Reference: QUESTION 24 What are two required steps for creating a typical filter that would require users to logon using a specific URL and their client devices to be running a specific anti-virus software? (Choose two.) A. Choose to filter based on logon points B. Run the Create Filter Wizard from the logon point C. Choose to filter based on endpoint analysis scan results D. Combine logon points and endpoint analysis results with the OR logical operator Correct Answer: AC /Reference: QUESTION 25 Which type of filter should an administrator create, if a filter that specifies a particular NOT logic condition must exist in order for access to be granted?

A. Typical Filter B. Custom Filter C. Negative Filter D. Exclusion Filter Correct Answer: B /Reference: QUESTION 26 Which policy setting should be enabled if an administrator wants users to be able to open documents with a published application? A. Download B. HTML Preview C. Email as Attachment D. File Type Association /Reference: QUESTION 27 What is required to administer an access server farm using the Access Suite Console? A. An account which is in the Administrators role for the SQL server database. B. An account which is in the Guest role of the Access Gateway Server COM+ application. C. An account which is in the Systems role of the Access Gateway Server COM+ application. D. An account which is in the Administrators role of the Access Gateway Server COM+ application. /Reference: QUESTION 28 Scenario: An administrator gives a user the URL https://accounting1.net/citrixlogonpoint/accountaccess to access a logon page. "Accounting1.net" is the FQDN of the Advanced Access Control server hosting the logon point and "AccountAccess" is the name of the logon point. From the URL given to the user, which access method will be used to obtain resources from the access server farm? A. Default logon point B. Secure Web Client C. Browser-only access D. Secure Access Client Correct Answer: C

/Reference: QUESTION 29 Scenario: An administrator wants to make documents from a defined file share open from a Citrix Presentation Server session. Which policy setting should be enabled for this purpose? A. Live Edit B. Download C. HTML Preview D. File type association /Reference: QUESTION 30 Which two conditions must be included in the first rule for a scan to ensure that the same conditions are available for additional subsequent rules for the scan? (Choose two.) A. Logon point B. Operating system C. Authentication strength D. Client device regional locale Correct Answer: AD /Reference: QUESTION 31 Scenario: An administrator is implementing Access Gateway with Advanced Access Control for use in his environment. The implementation will be used primarily for mobile workers who may access resources from diverse client devices, which may be locked down and may not allow files such as client software to be downloaded. For this environment, which type of access should be given to the clients? A. Direct access B. VPN Client access C. Kiosk Mode access D. Browser-only access /Reference:

QUESTION 32 Which type of IP addressing is needed to enable internal and external connection to the Access Gateway appliance? A. Static IP addressing B. Default IP addressing C. Dynamic IP addressing D. Alternate IP addressing Correct Answer: A /Reference: QUESTION 33 Scenario: Certkiller.com's Contractors Acitve Directory group is allowed to launch Outlook and SAP only when using a corporate-supplied laptop. The same users are allowed to view Office and Adobe Reader applications regardless of the accessing device. Which type of scan can the administrator perform to ensure that the requirements for this scenario are met? A. Citrix scans for hardware types B. Citrix scans for MAC addresses C. Citrix scans for antivirus software D. Citrix scans for operating systems Correct Answer: B /Reference: QUESTION 34 Which connection setting should be configured in a connection policy if a connection will be made using the Secure Access Client? A. Launch Secure Access Client if access is allowed B. Launch and execute Secure Access Client logon scripts C. Launch Secure Access Client in the default connection D. Launch the Secure Access Client and enable scripting on the client device Correct Answer: A /Reference: QUESTION 35 Scenario: You just added a new server to the access server farm however it is not displaying in the Access Suite Console. Which two steps can you take to display this server in the Access Suite Console? (Choose two.) A. Stop and restart the agent server. B. Close and reopen the Access Suite Console.

C. Enter the name of the new server into the Access Suite Console. D. Run discovery from the Servers node in the Access Suite Console. Correct Answer: BD /Reference: QUESTION 36 In which two ways can an accessible network be specified for an Access Gateway appliance? (Choose two.) A. Using the access server farm name B. Using Classless Inter Domain Routing (CIDR) C. Using the IP address and subnet mask of the network D. Using the FQDN of the primary server in the access server farm Correct Answer: BC /Reference: QUESTION 37 Scenario: An IT environment has Access Gateway with Advanced Access Control implemented as a VPN solution to provide external users access to internal network resources. The implementation design requires that external users obtain access to these resources through the appliance and that users' permissions to internal resources be defined. The design also requires that client devices be able to access local networks while logged on. Which two tasks must an administrator perform to ensure that the requirements included in the scenario are met? (Choose two.) A. Grant all users permissions to the internal network. B. Ensure that split tunneling is enabled for the appliance. C. Create a network resource which includes the IP address of the LAN. D. Deploy the Secure Access Client to all users in the environment before they log on. Correct Answer: BC /Reference: QUESTION 38 Why would an administrator need to setup a network resource? A. To share files on the local network B. To share a network drive with users C. To allow users to access a file share on the company's intranet D. To allow users direct access to a subnet on the company's intranet

/Reference: QUESTION 39 Which two tools are used to configure RADIUS authorization for an Advanced Access Control implementation in a Windows domain? (Choose two.) A. The Access Suite Console B. The Server Configuration Wizard C. The Access Gateway Administrator's Tool D. The remote access policy in Microsoft Internet Authentication Service Correct Answer: AD /Reference: QUESTION 40 Which three can directly reference scan outputs? (Choose three.) A. Filters B. Policies C. Other scans D. Logon points E. Web resources Correct Answer: ACD /Reference: http://www.gratisexam.com/ QUESTION 41 When establishing events to be logged in the Windows Event Viewer, which step should be taken in Advanced Access Control? A. Configure a logging filter B. Configure the types of events to be logged C. Configure a network resource to log events D. Configure an event to be logged from the Server Configuration Correct Answer: B

/Reference: QUESTION 42 Which rule must be followed when attempting to change the service account for an access server farm in which the credentials have been compromised? A. An administrator must use the Access Suite Console to change the service account on all servers. B. A user account in the same domain as the service account must be used to change the credentials. C. The new account must be granted System Administrator privileges by the administrator during the change. D. The administrator must use the Server Configuration Tool to change the service account on each server in the farm. /Reference: QUESTION 43 Which setting must be configured in a policy to secure the privilege of logging onto an access server farm? A. Access Action Control B. Allow Logon Resource C. Permit Access Control D. Show Logon Resource Correct Answer: B /Reference: QUESTION 44 When enabled which three policy settings allow users to access email attachments? (Choose three.) A. Upload B. Live Edit C. Download D. HTML Preview E. Email as Attachment Correct Answer: BCD /Reference: QUESTION 45 From which node in the Access Suite Console can an administrator configure event logging?

A. Servers node B. Resource node C. Endpoint Analysis node D. Access Server Farm node /Reference: QUESTION 46 An administrator wants to grant internal users access to resources in an access server farm. Which two things should be provided to the users to ensure that they have access to published resources? (Choose two.) A. The name of the logon point B. The FQDN of the Presentation Server C. The FQDN of an Access Gateway appliance in a network D. The FQDN of the Advanced Access Control server hosting the logon point Correct Answer: AD /Reference: QUESTION 47 Which two statements are true of adding an Access Gateway appliance to an Advanced Access Control deployment? (Choose two.) A. The Access Gateway appliance must be assigned at least one IP address. B. After configuring the Access Gateway appliance, at least one Advanced Access Control server in the farm must be rebooted. C. The Access Gateway appliance must be configured to point to the FQDN/IP address of one or more Advanced Access Control servers in the farm. D. The administrator must execute the Add Gateway Appliance task from the Gateway Appliance node in order for the new Access Gateway appliance to appear in the Access Suite Console. Correct Answer: AC /Reference: QUESTION 48 An administrator is creating logon points and needs to configure the session settings. What is true about the configuration of session settings for logon points? A. Session time-out is set by default to 30 minutes. B. Domain prompting is used to determine whether the domain is available for access. C. Secure Access Client (VPN) time-out should always be longer than session time-out.

D. Published application usage through the web browser may require an increase in VPN client time-out. Correct Answer: C /Reference: QUESTION 49 Where does an administrator configure the conditions that users must meet to be able to see the logon page? A. In a filter B. In a policy C. In logon point properties D. In the properties of an endpoint analysis scan Correct Answer: C /Reference: QUESTION 50 Which data included in each event included in the event log consolidator correlates with the error message that an end-user reports? A. Start time B. Resource C. Reference ID D. Resource group Correct Answer: C /Reference: QUESTION 51 What are two requirements for enabling access to file share resources from the default navigation page (Access Navigator)? (Choose two.) A. The file share must contain at least one file. B. Permission to the share must be granted in an access policy. C. The share must exist in the location specified when created as a resource. D. The file server hosting the file share must be accessible to the Advanced Access Control servers on the network. Correct Answer: BD /Reference:

QUESTION 52 Which procedure should an administrator implement when a RADIUS or LDAP profile is associated with a logon point during the deployment of the logon point? A. Refresh the logon page information. B. Provide a decentralized database to store user profiles. C. Deploy the Secure Access Client on every client device. D. Type the global or server-specific password into the appropriate field. /Reference: QUESTION 53 In order to import a scan package into a different scan group than that which it was originally a part of, an administrator must. (Complete the sentence with an option from the list.) A. edit the.cab file B. delete all rules and filters that refer to the scan package C. reinstall the Endpoint Analysis Client on all client devices D. uninstall any files in the original group that are already saved in the desired destination Correct Answer: B /Reference: QUESTION 54 Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.) A. Web Client B. Client for Java C. Live Edit Client D. Secure Access Client E. Endpoint Analysis Client Correct Answer: AB /Reference: QUESTION 55 Scenario: Tim, a member of the Sales and Marketing groups, calls the Help Desk to report difficulties accessing email when connecting to the corporate Advanced Access Control access server farm. Using the Policy Overview Tool you notice that the web-based email resource belongs to multiple policies which have different access rights to the resource. The environment has these policy configurations: In Policy A, web-based email is set to "Not Configured" for all authenticated users. In Policy B, web-based email

is set to "Allow" for the Marketing Group and the Sales Group. In Policy C, web-based email is set to "Deny" for the Marketing Group. Based on the listed policy configurations, which statement accurately describes the outcome of the policies? A. The "Deny" setting in Policy C takes precedence over Policy A and B. Tim will be denied access to webbased email. B. The "Allow" setting in Policy B takes precedence over Policy A and C. Tim will be granted access to webbased email. C. The "Not Configured" setting on Policy A takes precedence over Policy B and C. No users will be granted access to web-based email. D. The "Deny" setting in Policy C is overridden by the "Not Configured" and "Allow" settings in Policy A and C respectively. Tim will be granted access to web-based email. Correct Answer: A /Reference: QUESTION 56 An administrator needs to make a change to the default logon point settings for an Advanced Access Control implementation. Where can the administrator locate the default logon point? A. In the IIS Manager Console B. In the Access Suite Console C. In the Access Gateway Administration Tool D. In the Access Gateway Administration Portal Correct Answer: B /Reference: QUESTION 57 Which two syntaxes can be used when entering the administrator's credentials into the "Administrator Bind DN" field to configure LDAP authentication against Active Directory? (Choose two.) A. username/domain B. user@domain.com C. ou=administrator,dc=citrix,dc=com D. cn=administrator,cn=users,dc=citrix,dc=com Correct Answer: BD /Reference: QUESTION 58 While configuring a web email resource, what must an administrator do to ensure that users can email attachments from the web resource?

A. Configure email synchronization B. Enable the "Access" policy setting C. Configure an HTML Preview server D. Create a policy granting users the appropriate permissions /Reference: QUESTION 59 Which three options are available to deploy the Endpoint Analysis Client? (Choose three.) A. Active X /Plug-in B. Access Client Packager C. Endpoint Analysis Client MSI D. Citrix Instant Client Download E. Secure Access Client Download Correct Answer: ABC /Reference: QUESTION 60 Scenario: An administrator is configuring web email to use Outlook Web Access (OWA) as the front end for the Microsoft Exchange 5.5 Server for those users who require access to web email from their hand-held devices. Which two configurations are required for this environment to ensure that users' inboxes display correctly? (Choose two.) A. Configure email to display as HTML. B. Update the %systemroot%\\system32\\mapisvc.inf file. C. Ensure the WebDAV Web services extension is set to "Prohibit." D. Create a network resource that includes the Exchange server's FQDN. Correct Answer: BC /Reference: QUESTION 61 Which type of IP addressing is needed to enable internal and external connection to the Access Gateway appliance? A. Static IP addressing B. Default IP addressing C. Dynamic IP addressing D. Alternate IP addressing

Correct Answer: A /Reference: QUESTION 62 What is required to administer an access server farm using the Access Suite Console? A. An account which is in the Administrators role for the SQL server database. B. An account which is in the Guest role of the Access Gateway Server COM+ application. C. An account which is in the Systems role of the Access Gateway Server COM+ application. D. An account which is in the Administrators role of the Access Gateway Server COM+ application. /Reference: QUESTION 63 When is the "Authentication Credentials" option used in the deployment of a logon point? A. When RSA SecurID will be used along with the logon point B. When the logon point is used to connect devices that are not secure C. When a RADIUS or LDAP profile will be used along with the logon point D. When the logon point is used by devices to access resources from a secure network over a connection that is not secure Correct Answer: C /Reference: QUESTION 64 Which connection setting should be enabled during a connection policy configuration to ensure automatic drive mapping on client devices using a Windows logon script? A. Select file shares B. Execute logon scripts C. Execute automatic drive mapping D. Enable pass-through authentication Correct Answer: B /Reference: QUESTION 65 Which type of filter can be applied to a connection policy?

A. A group policy filter B. A continuous scan filter C. An email filter from Microsoft Outlook D. A policy filter created on Citrix Presentation Server Correct Answer: B /Reference: QUESTION 66 Which two options are available for configuring licensing from the Server Configuration Wizard? (Choose two.) A. Import licenses from the Access Gateway appliance. B. Install a license onto the Access Gateway appliance. C. Use a licensing server that exists on another server. D. Install Citrix License server on the Advanced Access Control server during configuration. Correct Answer: CD /Reference: QUESTION 67 Which two Internet Explorer security settings should be enabled on the client device to allow users to log on to the access server farm? (Choose two.) A. File download B. Active scripting C. Per-session cookies D. Do not save encrypted pages to disk Correct Answer: BC /Reference: QUESTION 68 Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.) A. Web Client B. Client for Java C. Live Edit Client D. Secure Access Client E. Endpoint Analysis Client Correct Answer: AB

/Reference: QUESTION 69 Scenario: You just added a new server to the access server farm however it is not displaying in the Access Suite Console. Which two steps can you take to display this server in the Access Suite Console? (Choose two.) A. Stop and restart the agent server. B. Close and reopen the Access Suite Console. C. Enter the name of the new server into the Access Suite Console. D. Run discovery from the Servers node in the Access Suite Console. Correct Answer: BD /Reference: QUESTION 70 Scenario: An administrator wants to perform additional analysis in the Event Log Consolidator on aggregated data collected from multiple Advanced Access Control servers in the farm. In which three ways can this be done? (Choose three.) A. By using the Domain B. By using the logon point C. By using the User Name D. By using the Reference ID E. By using the service account Correct Answer: BCD /Reference: QUESTION 71 Scenario: An administrator needs to provide users access to unique file shares named for users through the access server farm. The shares named for the users are in a folder called "users" located on the server named "corporatehq1srv" and are linked directly to the user's profile as set up in Active Directory. In this environment, what is the UNC path that the administrator should specify when defining a web file resource that will grant each user access to their directory? A. \\corporatehq1srv\users\#<username> B. \\corporatehq1srv\users\%username% C. \\corporatehq1srv\users\%displayname% D. \\corporatehq1srv\users\#<homedirectory> Correct Answer: A /Reference:

QUESTION 72 Scenario: An administrator would like to provide access to a Web Interface 4.2 site through Advanced Access Control. He would like the site to appear as the home page. What are the two required configurations for this scenario? (Choose two.) A. Configure the site as the application with the highest priority. B. Configure a logon point to display the navigation page as the home page. C. Configure the web resource for Citrix Web Interface 4.2 to bypass web proxy URL rewriting. D. Create a published web resource with Citrix Web Interface 4.2 selected as the application type. Correct Answer: AD /Reference: QUESTION 73 In an environment that restricts access to resources to client devices running a specific version of Internet Explorer, which step must be completed to create a continuous registry scan? A. Clear the MD5 field. B. Browse to the software executable on the server. C. Provide the registry path, type and key values for the browser. D. Type the earliest date stamp that is acceptable for the browser. Correct Answer: C /Reference: QUESTION 74 An administrator configuring advanced authentication decides to use an index database with Global Catalog in order to improve the speed of LDAP queries. The administrator is instructed to use Microsoft port number 3268. What should the administrator do in the "LDAP Profile Configuration" to implement this configuration? (Click on the exhibit button to display the screen shot.) Exhibit:

A. Type "3268" in the "Port" field and deselect "Use SSL". B. Type "3268" in the "Port" field and leave "Use SSL" selected. C. Type "3268" in the "Port" field and in the name field for the "Administrator Bind DN" and the "Base Bind DN". D. Type "3268" in the "Port" field and type ":3268" after the IP address in the "LDAP Server Name or IP Address" field. Correct Answer: A /Reference: QUESTION 75 Which Radius configuration would result in the first request going to the first Radius server, the second request going to the second server, and so on? A. Failover B. Redundancy C. Fault Tolerance D. Load Balancing

/Reference: QUESTION 76 Scenario: An environment requires that client devices accessing resources through the Access Gateway have a specific antivirus software installed. In addition, all client devices must have a valid SSL certificate installed. Which detail must be included when configuring a filter to meet the SSL certificate requirement? A. The location of the the SSL client certificate B. The common name included on the SSL client certificate C. The name of the organization on the SSL client certificate D. The presence of an SSL client certificate must be specified /Reference: QUESTION 77 Where does an administrator configure the Allow Logon setting for users? A. In a filter B. In a policy C. In the logon point properties D. In the properties of an endpoint analysis scan Correct Answer: B /Reference: QUESTION 78 Which data included in each event included in the event log consolidator correlates with the error message that an end-user reports? A. Start time B. Resource C. Reference ID D. Resource group Correct Answer: C /Reference: QUESTION 79 Scenario: An administrator wants to aggregate the Advanced Access Control events from six different servers and poll the activity on these servers every 50 seconds. What can be used to configure the poll interval?

A. CitrixAGE Audit B. Edit farm properties C. Event Log Consolidator D. Server Configuration tool Correct Answer: C /Reference: QUESTION 80 To use tokens while defining a file share for an access server farm. (Choose the option which best completes the sentence.) A. the file share must not be published B. you must have LDAP implemented in the environment C. you must have Active Directory implemented in the environment D. the service account in Server Configuration must be a local machine account Correct Answer: C /Reference: http://www.gratisexam.com/ QUESTION 81 A network has multiple Presentation Server farms identified in the logon point. How can an administrator determine which server farm will be used for file type association? A. Prioritize the server farms. B. Prioritize the published applications. C. Choose the default Presentation Server. D. Prioritize the Access Gateway appliance that connects to a specific server farm. Correct Answer: A /Reference: QUESTION 82 Which two steps must an administrator take to remove an Access Gateway appliance server from an Advanced Access Control deployment? (Choose two.)

A. The administrator must execute the Remove Access Gateway task from the Gateway Appliances node in the Access Suite Console. B. After configuring the Access Gateway appliance to be removed, at least one Advanced Access Control server in the farm must be rebooted. C. The administrator must configure the Access Gateway appliance server so that it no longer points itself to an Advanced Access Control server in the deployment. D. The administrator must uncheck the Access Gateway role checkbox for the Access Gateway appliance to be removed in the Manage Server Roles dialog of the Access Suite Console. Correct Answer: AC /Reference: QUESTION 83 Which two resources require the Secure Access Client? (Choose two.) A. Network resources B. Email synchronization resources accessed using Outlook C. File share resources accessed using the default navigation page (Access Navigator) D. Web email resources accessed using the default navigation page (Access Navigator) Correct Answer: AB /Reference: QUESTION 84 Scenario: The administrator at Certkiller.com wants a scan to run only for users who obtain access to the access server farm through an external entry point and do not have a mandated corporate security software on their client device. Which two conditions need to be taken into consideration when creating rules for this scan? (Choose two.) A. Logon point conditions B. Operating system conditions C. Antivirus properties conditions D. Client device regional locale conditions Correct Answer: AC /Reference: QUESTION 85 When changing the service account information for an access server farm, which statement is true? A. The service account must be a domain administrator. B. New service accounts will automatically be added to the Local Administrators group. C. Once changed, the original service account is automatically removed from the local security policy.

D. New service accounts must be manually added to the local administrators group on the local system. Correct Answer: B /Reference: QUESTION 86 Where can an administrator configure the endpoint analysis scan for an operating system? A. In the Endpoint Analysis scan node B. From the Operating System rule node C. From the Operating System policy node D. From the Operating System scan group node /Reference: QUESTION 87 Scenario: Ken configured an Exchange Server and Outlook clients for email synchronization. Client devices are using Microsoft Outlook 2000 and running on Windows XP operating systems. The Secure Access Client is installed on all client devices. What are two requirements to perform the configurations required for this scenario? (Choose two.) A. The administrator must create and configure a policy. B. The administrator grants the Download Email Attachment privilege for all users. C. The administrator verifies that the client devices have Internet Explorer 5 or 6 with all critical updates installed. D. The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens. Correct Answer: AD /Reference: QUESTION 88 Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.) A. The Access Suite Console must be closed. B. The administrator must use the Server Configuration Tool. C. All the services must be manually stopped and then restarted again. D. The administrator must use the Access Gateway Administration Tool. Correct Answer: AB

/Reference: QUESTION 89 An administrator needs to add a file share as a resource to the default navigation page. In order for users to be able to access the file share resource from the default navigation page, which three steps are required? (Choose three.) A. Publish the file share. B. Ensure that the file share exists prior to defining it for the access server farm. C. Ensure that the specified users have NTFS read permissions to the file share. D. Create a policy granting access to specified users in the Access Gateway Administration Tool. E. Create a policy granting access to the file share to specified users in the Access Suite Console. Correct Answer: ACE /Reference: QUESTION 90 How can an administrator control whether users are allowed or denied logon privileges through policies? A. Include the Allow Logon property in the access filter B. Include the Allow Logon property in the access policy C. Include the Allow Logon Resource in the access filter D. Include the Allow Logon Resource in the access policy /Reference: QUESTION 91 Scenario: UserA, an internal company user, types the following URL in a web browser to connect to the corporate site that is secured using Advanced Access Control: https://server1. UserB, an external appliance user, types the following URL in a web browser to connect to the corporate site that is secured using Advanced Access Control: https://gatewayappliance1 Which statement is true? A. Only UserA will be redirected to the corporate logon point. B. Both UserA and UserB will be redirected to the corporate logon point. C. Both users need to type the URL to the logon point or they will get a 404 page "not found" error. D. UserA will get a 404 page "not found" error and UserB will be redirected to the default logon point.

/Reference: QUESTION 92 In which location must the Advanced Access Control Software be installed? A. On the license server in the internal network B. On the Access Gateway appliance in the DMZ C. On the system that hosts the configuration database D. On a server which can communicate with the Access Gateway appliance /Reference: QUESTION 93 In an environment where there are multiple logon points and an endpoint analysis scan that requires a specific browser version, which logical operators should be used to so that users who access from specific logon points are also scanned to ensure that they meet the browser version requirements for the implementation? (Choose the string that matches the need for this environment.) A. (logon point A and logon point B) or endpoint analysis_1 B. (logon point A or logon point B) and endpoint analysis_1 C. (logon point A and logon point B) and endpoint analysis_1 D. (logon point A or logon point B) and not endpoint analysis_1 Correct Answer: B /Reference: QUESTION 94 When implementing Advanced Access Control in an environment in which users will access resources through a VPN tunnel created by an Access Gateway appliance, which client must be used? A. Web Client B. Secure Access Client C. Endpoint Analysis Client D. Presentation Server Client Correct Answer: B /Reference: QUESTION 95 An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished?

A. Create a new scan package when updated signatures are released. B. Create a scan rule which has a parameter that specifies the maximum age of the signatures. C. Configure the Anti-Virus package to automatically download the latest pattern file periodically. D. Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters. /Reference: QUESTION 96 Which connection settings should be configured if the user is required to re-authenticate after their system goes into hibernation? A. Authenticate after hibernation B. Authenticate after system failure C. Authenticate after system resume D. Authenticate after network interruption Correct Answer: C /Reference: QUESTION 97 Scenario: An administrator is required to create a scan that will scan client devices to ensure that all clients running Windows XP Professional also have service pack 1(SP1) installed and running. All users in the environment are required to have a specific version of an antivirus software running on their systems. Due to the addition of a newly acquired office, the scan requirements have to be modified. Newly acquired remote offices, which will obtain access to company resources through Access Gateway, have client devices that run on Windows 98 and are not required to submit to the same scans that are required of the other users. By configuring rules for the end point analysis scan, the administrator can ensure that only the devices in the new offices will not be required to meet the same security requirements that are required for the other corporate users. Which condition type should be added to the rules for the scan to ensure that the requirements for the scenario are met? A. Logon point B. Property value C. Operating system D. Client device regional locale Correct Answer: C /Reference: QUESTION 98 Scenario: Advanced Access Control is configured to use LDAP for primary authentication and authorization. An administrator needs to enable pass-through authentication in order for Active Directory credentials to be passed automatically to applications. What is the administrator required to do to meet the requirements of this

scenario? A. Ensure that the same logon account exists for LDAP and Active Directory. B. Ensure that LDAP and Active Directory use the same trusted root certificate. C. Ensure that the LDAP server is on the same network as the Active Directory server. D. Ensure that the same administrative account exists for the LDAP and Active Directory. Correct Answer: A /Reference: QUESTION 99 What happens when the Allow Logon Resources setting is NOT selected in the access policy? A. The access policy only controls the denied logon privileges. B. The access policy only controls whether users are allowed to log onto the farm. C. The access policy does not control whether users are allowed to log onto the farm. D. The access policy does not control any settings except for those that are specified in the Allow Logon setting. Correct Answer: C /Reference: QUESTION 100 Scenario: An administrator must configure a web email resource to be integrated with the corporate access center. In the access server farm there are three servers in use: "access_agent"is configured as an agent server;"access_web"is configured as a web server;acess_1"is configured to server as the agent and licence server.in addition, the Exchange server is named exchange_hq. Which configuration must the administrator perform to ensure that users are provided indirect access to the web email through the corporate access center? A. Configure the website viewer in the portal to point to http://access_1/citrixfei/classic.asp B. Configure the website viewer in the portal to point to http://access_web/citrixfei/classic.asp C. Configure the website viewer in the portal to point to http://access_agent/citrixfei/classic.asp D. Configure the website viewer in the portal to point to http://exchange_hq/citrixfei/classic.asp Correct Answer: B /Reference: http://www.gratisexam.com/