Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID?
A. LDAP password
B. Firewall access rule
C. Authentication policy
D. RADIUS shared secret
Which command-line interface command could an administrator use to display communication between the LDAP server and the NetScaler system?
A. cat jetcjkrb5.conf
B. cat jetcjkrb5.keytab
C. cat jtmpjaaad.debug
D. cat jvarjlogjaaad.debug
E. tail -f jvarjlogjaaad.debug
Scenario: Several users in an environment connect to corporate network resources through NetScaler
Gateway.
Sometimes these users only need to connect to the corporate XenDesktop environment. Some of the
users do NOT need a vPN connection.
How couldan administrator configure accessusing NetScaler Gatewayfor thisscenario?
A. Enable Client Choices.
B. Set Clientless Access to Allow.
C. Configure a virtual server in Basic mode.
D. Configure the Plug-in Type as WindowsjMac OS X.
A Citrix Administrator needs to flush the cache for a specific URL. Which step should the administrator take to remove only the required cached data?
A. Flushcache
B. Flush content group
C. Reboot the NetScaler
D. Flush the specific object
Scenario: A Citrix Administrator needs to configure a virtual server to load balance Citrix StoreFront.
Corporate policy states that all communication must be encrypted coming into and going out of the
NetScaler; however, the administrator needs to inspect the client HTTP header information.
Which type of service and virtual server are needed?
A. SSL service; SSL virtual server
B. HTTP service; SSL virtual server
C. HTTP service; HTTP virtual Server
D. SSL BRIDGE service; SSL BRIDGE virtual server
Scenario: A company requires two-factor authentication using RSA tokens and Active Directory. The Citrix Administrator configured the following two authentication policies with these parameters:
The policy named RSA policy is used for RSA token authentication
Thepolicy namedAD policyis usedfor ActiveDirectory authentication
What should the administrator do to protect the NetScaler Gateway virtual server from an attack against Active Directory?
A. Bind the RSA policy in Primary Authentication Policies and bind the AD policy in Secondary Authentication Policies.
B. Bind the AD policy in Primary Authentication Policies and bind the RSA policy in Secondary Authentication Policies.
C. Bind the AD policy and the RSA policy in Primary Authentication Policies and set the RSA policy priority higher than the AD policy.
D. Bind the AD policy and the RSA policy in Primary Authentication Policies and set the AD policy priority higher than the RSA policy.
Which two parameters are required for adding a new node to a cluster? (Choose two.)
A. Cluster IP of the new cluster node
B. NetScaler IP of the new cluster node
C. NetScaler IP of the existing cluster node
D. Remote NetScaler user name and password
E. Backplane interface of the existing cluster node
Scenario: A Citrix Administrator is configuring RSA as a two-factor authentication solution, using default settings on the NetScaler. While testing the configuration, the administrator notices that users cannot log on. The administrator should verify that traffic is allowed to flow over through thefirewalltoresolvethis issue. (Choose the correct option to complete the sentence.)
A. UDP port 1850
B. TCP port 1812
C. TCP port 1850
D. UDP port 1812
Scenario: An organization currently has three different web servers for accessing Japanese, French and English languagewebpages, and management has requested that a single URLbe used instead.This site
also needs to meet these requirements:
Users should access one web page and URL for all languages.
One IP address should be used for all client connections.
Users should be automatically sent to the correct language-specific web content.
What should the Citrix Administrator configure on the NetScaler to accomplish all requirements?
A. Content switching virtual server.
B. Policy-based routing to send users to the correct resources.
C. Content Filtering with language-based policies to detect each language.
D. A Responder policy with Inon-addressableI load balancers to conserve IPs.
Which protocol should be used to configure a secure LDAP virtual server for a NetScaler Gateway deployment?
A. SSL
B. DTLS
C. SSL TCP
D. SSL BRIDGE