5AnadministratorcreatedaserviceforaWebInterfaceserverthatisencryptedbyanSSLcertificate. Which command should the administrator run at the command-line interface to create a monitor that will check the Web Interface by logging on to it with a test user's credentials?
A. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath IjCitrixjXenAppI -userName user domain DomainName -password P@ssw0rd -encrypted
B. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath IjCitrixjXenAppI -userName user domain DomainName -password P@ssw0rd -secure YES
C. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath IjCitrixjXenAppI -userName user domain DomainName -password P@ssw0rd -destPort 443
D. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath IjCitrixjXenAppI -userName user domain DomainName -password P@ssw0rd -encrypted -secure YES
Scenario:For auditing requirements, NetScaler administrators are required to use their Active Directory accounts to log on to NetScaler. All NetScaler administrators belong to the NSAdmins Active Directory group. Which configuration must an administrator create in NetScaler to meet the requirements of the scenario?
A. User accounts
B. NSAdmins group
C. Authorization policy
D. Service Groups policy
Scenario: An administrator plans to implement NetScaler to load balance Web Interface traffic. The Web Interface servers are using standard non-secure ports. Company policy states that all external traffic must be secure. The administrator has added the servers for the Web Interface under Load Balancing. In order to load balance the Web Interface traffic and comply with company policy, the administrator should add services for and create an . (Choose the correct set of options to complete the sentence.)
A. SSL; SSL virtual server
B. SSL; HTTP virtual server
C. HTTP; SSL virtual server
D. HTTP; HTTP virtual server
Scenario: An administrator needs to deliver production applications to users. Encryption must be
maintained between the users' managed devices.
Which two certificates could the administrator use to meet this requirement? (Choose two.)
A. Public
B. Private
C. Trusted
D. Intermediate
Which two methods could an administrator use to ensure that all HTTP traffic will be redirected to the NetScaler Gateway virtual server after configuring a NetScaler Gateway virtual server? (Choose two.)
A. Configure a URL transformation policy, then bind it globally.
B. Configure a rewrite policy to change all the HTTP requests, then bind it to the NetScaler Gateway virtual server.
C. Configure a responder policy based on the FQDN pointing to the NetScaler Gateway virtual server, then bind it globally.
D. Configure an HTTP virtual server with the same NetScaler Gateway virtual server IP address, then configure a redirect URL on it.
Scenario: An entire shift of workers arrives at the office at 09:00. All two thousand users turn on their thin
client terminals and launch the line of business application within a ten minute timeframe. The resultant
traffic is so intense that it takes 15-20 minutes until everybody is able to start working.
How can the administrator prevent this issue from affecting the user experience?
A. Implement a NetScaler load balancer to distribute the XML traffic.
B. Configure a Pre-launch application to be started for users before they arrive.
C. Upgrade the XenApp farm database server to a cluster with real time replication.
D. Configure additional zone data collectors to manage the numerous concurrrent logins.
Scenario: A Citrix Administrator is configuring RADIUS as a two-factor authentication solution on the NetScaler. While testing the configuration the administrator observes that there are no incoming RADIUS requests. To resolve this issue, the administrator should change the setting of the IRADIUS client IP addressI to the address. (Choose the correct option to complete the sentence.)
A. virtual IP (vIP)
B. Client IP (CIP)
C. NetScaler IP (NSIP)
D. Global Server Load Balancing IP (GSLB IP)
Where can the license.log file be found in the NetScaler folder structure?
A. jvarjlog
B. jvarjnetscaler
C. jvarjnsproflog
D. jvarjnetscalerjhelp
Which two items are needed to import an SSL certificate? (Choose two.)
A. A public key
B. A private key
C. A root certificate
D. A server certificate
E. An intermediate certificate
A Citrix Administrator needs to set up two-factor authentication on NetScaler Gateway for mobile devices. Which two actions should the administrator take to allow users to log on using mobile devices? (Choose two.)
A. Create a pre-authentication policy
B. Create a RADIUS authentication policy
C. Bind the LDAP policy for primary authentication
D. Bind the RADIUS policy for primary authentication
E. Bind the RADIUS policy for secondary authentication