Scenario: A Citrix Administrator has configured the following Access Control List (ACL) to block traffic from
the IP address 10.102.29.5.
add simpleacl rule1 DENY -srcIP 10.102.29.5
A week later, the administrator found that the ACL is no longer present on the NetScaler.
What could be the reason for this?
A. The administrator did NOT run the apply ACL command.
B. The NetScaler has been restarted without saving the configurations.
C. The Simple ACLs remain active for only 600 seconds.
D. The Simple ACLs remain active for only 60 seconds.
Scenario: A Citrix Administrator needs to configure persistence on a Global Server Load Balancing (GSLB) virtual server to which a service is bound, so that the service continues to serve requests from the client even after it is disabled manually, accepting new requests or connections only to honor persistence. After a configured period of time, no new requests or connections are directed to the service and all of the existing connections are closed.
Which parameter can the administrator configure while disabling the service to achieve this requirement?
A. Persistence Threshold
B. Wait Time
C. Request Threshold
D. Persistence Time-Out
Which two actions must be true for a client to connect to an SSL offload virtual server without any SSL errors? (Choose two.)
A. The Server Certificate is bound to the load-balancing virtual server.
B. The Server Certificate is from a private certificate authority (CA).
C. The Root Certificate is installed on the client's device.
D. The Root Certificate is installed on the NetScaler.
Which two options would provide an end-to-end encryption of data, while allowing the NetScaler to optimize the responses? (Choose two.)
A. SSL Bridge protocol for the services
B. HTTP protocol for the virtual server
C. HTTP protocol for the services
D. SSL protocol for the services
E. SSL Bridge protocol for the virtual server
F. SSL protocol for the virtual server
A user needs to resolve the domain training.citrix.com, and the information is NOT available in resolver cache and Local Domain Name Server (DNS).
Where will the request be forwarded next?
A. Root server
B. Authoritative Name server
C. Top-level Domain server
D. Second-level Domain server
Scenario: A NetScaler is configured with the following modes:
MBF
USIP
USNIP
Layer 3 mode
A Citrix Administrator configured a new router and now requires some of the incoming and outgoing traffic to take different paths through the new router. However, the administrator notices that this is failing and takes a network trace. After a short monitoring period, the administrator notices that the packets are still NOT getting to the new router from the NetScaler.
Which mode should the administrator disable on the NetScaler to facilitate the addition of the new router and successfully route the packets?
A. Layer 3 mode
B. USIP
C. MAC-based Forwarding
D. USNIP
Scenario: A Citrix Administrator is configuring a NetScaler high availability (HA) pair with an existing Primary NetScaler with all resources configured. The administrator added the Secondary NetScaler in high availability and found that the configuration on the existing primary was removed. It is now the Secondary NetScaler in the HA pair.
Which two configurations could the administrator have made to prevent this from happening? (Choose two.)
A. Set the Primary NetScaler to STAY PRIMARY in the Configure HA Node settings.
B. Set the Secondary Netscaler to STAY SECONDARY in the Configure HA Node settings.
C. Enable HA monitoring on all the interfaces of the PRIMARY device.
D. Enable HA monitoring on all the interfaces of the SECONDARY device.
Which qualifier is used to configure the Content filter action to modify the HTTP header of an HTTP Request?
A. Error Code
B. Add
C. Forward
D. Corrupt
Scenario: A Citrix Administrator has configured the rewrite action as follows:
add rewrite action sync_date replace http.res.date sys.time
What is the correct way to interpret this rewrite action?
A. The rewrite action replaces the Date header in the http response with the GMT time stamp.
B. The rewrite action replaces the Date header in the http response with the NetScaler system time in a conventional date format.
C. The rewrite action is invalid, as system time CANNOT be referenced in the system policy.
D. The rewrite action replaces the NetScaler system time with the Date header in a conventional date format.
Scenario: A Citrix Administrator is running applications on thousands of load-balanced backend servers in a large infrastructure. It is difficult to track and troubleshoot problems due to the large volume of traffic received.
Which feature of NetScaler Management and Analytics System (NetScaler MAS) can the administrator configure to monitor and troubleshoot in detail for an environment of this size?
A. AppFlow Analytics
B. Advanced Analytics with Telemetry Node installed
C. Application Performance Analytics
D. Application Security Analytics