In which order is a client request to a protected web application processed?
A. CitrixWebApp Firewall, Load Balancing, Caching, Rewrite
B. Caching, Citrix Web App Firewall, Load Balancing, Rewrite
C. Citrix Web App Firewall, Caching, Load Balancing, Rewrite
D. Load Balancing, Citrix Web App Firewall, Caching, Rewrite
Scenario: A Citrix Engineer creates a Responder policy to redirect users attempting to access an application protected with Citrix Web App Firewall. Instead of being redirected, users are seeing an `Access Denied' page.
This is happening because Citrix Web App Firewall is processed. (Choose the correct option to complete the sentence.)
A. before Responder, and the redirection is invalid
B. after Responder, but the violation is applied to prevent access
C. before Responder, and a violation is occurring
D. after Responder, and the redirection is invalid
Scenario: A Citrix Engineer is asked to implement multi-factor authentication for Citrix Gateway. The engineer creates the authentication policies and binds the policies to the appropriate bind points. The engineer creates a custom form using Notepad++ to format the page which will capture the user's credentials. The engineer uploads the form and binds the form to the authentication policy.
When the engineer connects to the Citrix Gateway for validation testing, the form fields are NOT correctly displayed. What is the most likely cause of this display issue?
A. The login schema contains invalid XML syntax.
B. The authentication policies are bound in the wrong order
C. The first authentication server is offline.
D. The policy bindings are NOT consistent with the login schema.
Which report can a Citrix Engineer review to ensure that the Citrix ADC meets all PCI-DSS requirements.
A. Generate Application Firewall Configuration
B. PCI-DSS Standards
C. Application Firewall Violations Summary
D. Generate PCI-DSS
Scenario: A Citrix Engineer reviews the log files for a business-critical web application. The engineer notices a series of attempts to directly access a file, /etc/passwd.
Which feature can the engineer implement to protect the application against this attack?
A. Buffer Overflow
B. Start URL
C. Content Type
D. Form Field Consistency
A Citrix Engineer for an online retailer wants to ensure that customer address information is NOT stolen. Which protection can the engineer implement to prevent this?
A. Cross-Site Request Forgeries (CSFR)
B. HTML SQL Injection
C. For Field Consistency
D. Credit Card Check
Scenario: A Citrix Engineer notices that a web page takes a long time to display. Upon further investigation, the engineer determines that the requested page is referencing 48 other elements for download.
Which Front End Optimization technique can the engineer enable on the Citrix ADC to improve time-todisplay?
A. Shrink to Attributes
B. Remove comments from HTML
C. Domain Sharding
D. Move to Head Tag
Which Application-level Quality of Experience (AppQoE) Action setting modifies the communication characteristics of the connections established with the associated web application?
A. Priority
B. TCP Profile
C. Action Type
D. DOS Action
What can a Citrix Engineer implement to protect against the accidental disclosure of personally identifiable information (PII)?
A. Form Field Consistency
B. HTML Cross-Site Scripting
C. Safe Object
D. Cookie Consistency
A Web Application Engineer is reviewing log files and finds that a large number of bad HTTP requests are being sent to the web application servers.
What can the Citrix ADC Engineer to do prevent bad HTTP requests from getting to the web application?
A. Create an HTTP profile and select 'Drop invalid HTTP requests'. Assign the HTTP profile to the virtual server.
B. Create an HTTP profile and select 'Drop invalid HTTP requests'. Assign the HTTP profile to the Web App Firewall policy.
C. Modify the default HTTP profile and select 'Drop invalid HTTP requests'. Bind the default HTTP profile globally.
D. Select `Change HTTP Parameters' under System > Settings. Select 'Drop invalid HTTP requests'.