Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?

Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?
A. Responder
B. Authorization
C. Session
D. Traffic

Answer: D

What additional step does the administrator need to perform on the XenDesktop environment to allow access for the remote users?

Scenario: A Citrix Administrator maintains a XenDesktop infrastructure with both internal and external users. The external users access the XenDesktop environment via NetScaler Gateway, which is configured to control access to published applications and desktops using NetScaler Gateway session policies.
What additional step does the administrator need to perform on the XenDesktop environment to allow access for the remote users?
A. Enable External beacons on the NetScaler Gateway device.
B. Enable trusts sent to XML Service via PowerShell on the Controllers.
C. Enable trusts sent to XML Service via PowerShell on the VDA.
D. Enable trusts sent to XML Service via HDX policies in Studio.

Answer: C

Which NetScaler platform will the administrator choose to accommodate the increasing demand for bandwidth and performance?

Scenario: A Citrix Administrator needs to implement an Application Delivery Controller (ADC) solution. The administrator needs the appliance to be able to grow with the increasing demand for bandwidth and performance.
Which NetScaler platform will the administrator choose to accommodate the increasing demand for bandwidth and performance?
A. SDX
B. VPX
C. MPX
D. CPX

Answer: D

How can the administrator meet the needs of this environment?

Scenario: A company recently acquired three smaller companies; this adds more than 1500 employees to the company. The current NetScaler appliance does NOT support adding that many users.
A Citrix Administrator needs to use a Mufti-Tenancy solution, giving each newly acquired company its own NetScaler tor VPN access, had balancing, and at least 20 GBPS of throughput.
How can the administrator meet the needs of this environment?
A. Install XenServer and configure a NetScaler VPX 3000 for each newly acquired company.
B. Purchase a NetScaler MPX appliance for each newly acquired company.
C. Purchase a NetScaler CPX for each newly acquired company.
D. Purchase a NetScaler SDX appliance and configure a NetScaler Instance for each newly acquired company.

Answer: C

Which type of machine supports this feature within a XenDesktop infrastructure?

A Citrix Administrator needs to perform Power Management on machines.
Which type of machine supports this feature within a XenDesktop infrastructure?
A. Virtual Desktop OS Machines
B. Remote PC Machines
C. Virtual Server OS Machines
D. Physical Server OS Machines

Answer: A

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)
A. The Independent Network Configuration (INC) mode should be enabled.
B. Both the devices should have different SNIP addresses.
C. The nsroot password should be same on both nodes.
D. HA Monitoring should be disabled on all the unused interfaces.
E. Configure the HA status of the Primary Node as STAYPRIMARY.

Answer: AB

In which order of precedence, from greatest to least, will VDA locate the Delivery Controller?

A Citrix Virtual Delivery Agent (VDA) needs to locate the Delivery Controller to register with it.
In which order of precedence, from greatest to least, will VDA locate the Delivery Controller?
A. Personality.ini file, ListOf DDC’s key in the registry, Policy settings from AD, Auto update of controllers
B. Policy Settings from AD, ListOf DDC’s key in the registry, Auto update of controllers, Personality.ini file
C. Auto update of controllers, Policy settings from AD, ListOf DDC’s key in the registry, Personality.ini file
D. Personality.ini file, Auto update of controllers, ListOf DDC’s key in the registry, Policy Settings from AD

Answer: B

Based on these policies, what will Accounting users be able to access?

“Baseline” configured without a filter. Client Network Drives and Client Fixed Drives are both disabled.
Based on these policies, what will Accounting users be able to access?
A. Client Fixed and Network Drives
B. Client Fixed Drives only
C. Client Network Drives only
D. Neither the Client Network Drive nor the Client Fixed Drive

Answer: B

Scenario: A Citrix Administrator needs to add 10 new servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.

Scenario: A Citrix Administrator needs to add 10 new servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.
To ensure that only the 10 new servers are receiving twice the connections of the old servers without changing the load balancing to the rest of the environment, the administrator needs to add a weight of ___________to the services attached to the__________servers. (Choose the correct option to complete the sentence.)
A. 2; new
B. 2; old
C. 50; old
D. 50; new

Answer: CD

How can troubleshooting continue using the ns.log?

Scenario: A Citrix Administrator is troubleshooting a NetScaler issue. The administrator goes to the command line and from the Shell, tails the ns.log to view the log in real time to find the issue. After a few minutes, the administrator noticed that the logs stopped scrolling and the issue was missed.
How can troubleshooting continue using the ns.log?
A. The ns.log service has stopped and needs to be restarted.
B. The ns.log needs to be downloaded to the client machine for full viewing.
C. The ns.log has reached its 100 KB limit. Press ‘CTRL+C’ to stop it from running and issue the command "tail -f ns.log" to resume.
D. The ns.log is still running. Press ‘Enter’ and the ns.log will resume.

Answer: A