Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?

Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?
A. Responder
B. Authorization
C. Session
D. Traffic

Answer: D

Which NetScaler platform will the administrator choose to accommodate the increasing demand for bandwidth and performance?

Scenario: A Citrix Administrator needs to implement an Application Delivery Controller (ADC) solution. The administrator needs the appliance to be able to grow with the increasing demand for bandwidth and performance.
Which NetScaler platform will the administrator choose to accommodate the increasing demand for bandwidth and performance?
A. SDX
B. VPX
C. MPX
D. CPX

Answer: D

How can the administrator meet the needs of this environment?

Scenario: A company recently acquired three smaller companies; this adds more than 1500 employees to the company. The current NetScaler appliance does NOT support adding that many users.
A Citrix Administrator needs to use a Mufti-Tenancy solution, giving each newly acquired company its own NetScaler tor VPN access, had balancing, and at least 20 GBPS of throughput.
How can the administrator meet the needs of this environment?
A. Install XenServer and configure a NetScaler VPX 3000 for each newly acquired company.
B. Purchase a NetScaler MPX appliance for each newly acquired company.
C. Purchase a NetScaler CPX for each newly acquired company.
D. Purchase a NetScaler SDX appliance and configure a NetScaler Instance for each newly acquired company.

Answer: C

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)
A. The Independent Network Configuration (INC) mode should be enabled.
B. Both the devices should have different SNIP addresses.
C. The nsroot password should be same on both nodes.
D. HA Monitoring should be disabled on all the unused interfaces.
E. Configure the HA status of the Primary Node as STAYPRIMARY.

Answer: AB

Scenario: A Citrix Administrator needs to add 10 new servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.

Scenario: A Citrix Administrator needs to add 10 new servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.
To ensure that only the 10 new servers are receiving twice the connections of the old servers without changing the load balancing to the rest of the environment, the administrator needs to add a weight of ___________to the services attached to the__________servers. (Choose the correct option to complete the sentence.)
A. 2; new
B. 2; old
C. 50; old
D. 50; new

Answer: CD

How can troubleshooting continue using the ns.log?

Scenario: A Citrix Administrator is troubleshooting a NetScaler issue. The administrator goes to the command line and from the Shell, tails the ns.log to view the log in real time to find the issue. After a few minutes, the administrator noticed that the logs stopped scrolling and the issue was missed.
How can troubleshooting continue using the ns.log?
A. The ns.log service has stopped and needs to be restarted.
B. The ns.log needs to be downloaded to the client machine for full viewing.
C. The ns.log has reached its 100 KB limit. Press ‘CTRL+C’ to stop it from running and issue the command "tail -f ns.log" to resume.
D. The ns.log is still running. Press ‘Enter’ and the ns.log will resume.

Answer: A

In which mode should the administrator deploy the NetScaler?

A Citrix Administrator has deployed a new NetScaler MPX appliance in the demilitarized zone (DMZ) with one interface in the DMZ and the other on the internal network.
In which mode should the administrator deploy the NetScaler?
A. One-Arm
B. Two-Arm
C. Forward Proxy
D. Transparent

Answer: C

Which type of virtual server can the administrator configure to fulfill this requirement?

A Citrix Administrator needs to configure a setup with a single URL so that users can log on once and achieve seamless single sign-on to the NetScaler Gateway virtual server and web application being load balanced on the NetScaler.
Which type of virtual server can the administrator configure to fulfill this requirement?
A. GSLB
B. AAA
C. Unified Gateway
D. Load Balancing

Answer: B

How can a Citrix Administrator provide two-factor authentication with tokens in a XenDesktop with NetScaler Gateway environment?

How can a Citrix Administrator provide two-factor authentication with tokens in a XenDesktop with NetScaler Gateway environment?
A. Create a SAML IDP policy and bind it to the existing virtual server.
B. Configure a TACACS authentication policy and bind it to the existing virtual server.
C. Configure a RADIUS authentication policy and bind it to the existing virtual server.
D. Create an authorization policy and bind it to the existing virtual server.

Answer: B

To what are these messages related?

Scenario: A Citrix Administrator configured SNMP to send traps to an external SNMP system. When reviewing the messages, the administrator noticed several entity UP and entity DOWN messages.
To what are these messages related?
A. High availability synchronization
B. Load balancing virtual servers
C. High availability heartbeats
D. Network interface

Answer: B