March Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Citrix 1Y0-401 Designing Citrix XenDesktop 7.6 Solutions Exam Practice Test

Page: 1 / 45
Total 449 questions

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$36  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$31.5  $104.99
Question 1

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

Options:

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Question 2

Which two issues should a Citrix Architect address for end users? (Choose two.)

Options:

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Question 3

Which two risks exist in the access layer of the CGE environment? (Choose two.)

Options:

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Question 4

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

Options:

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Question 5

Which profile type would NOT be suitable for the Back Office end-user group?

Options:

A.

Local

B.

Roaming

C.

Mandatory

D.

Citrix Profile management

Question 6

Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?

Options:

A.

A Smart Card reader is installed to allow the end user to log on with an X509 certificate issued by the Active Directory Certificate Authority.

B.

The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO).

C.

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

D.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Question 7

What should CGE do to all corporate-owned and non-corporate-owned Windows client devices to ensure an optimal end-user experience?

Options:

A.

Upgrade all clients to Receiver 4.2.

B.

Install native printer drivers on all clients.

C.

Install the CloudBridge Plug-in on all clients.

D.

Install Citrix Profile management on all clients.

Question 8

Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types in use?

Options:

A.

A physical token carried by the end user

B.

X509 certificates stored on a Smart Card

C.

A complex Active Directory password enforced by Group Policy

D.

RADIUS authentication with an Employee ID Number

Question 9

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

Options:

A.

CDFControl utility

B.

Citrix EdgeSight console

C.

Citrix AppCenter console

D.

Group Policy Management console

Question 10

Scenario:

The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.

Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?

Options:

A.

Use client printing and the Universal Printer Driver.

B.

Use network printers connected with Citrix Policies.

C.

Use the Universal Print Server and Universal Printer Driver.

D.

Use network printers connected with Group Policy Preferences.

Question 11

Why should CPU consumption be used to identify bottlenecks?

Options:

A.

High CPU utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load.

B.

High CPU utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks.

C.

High CPU utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users.

D.

High CPU utilization of the Delivery Controller can indicate the presence of a virus or malware.

Question 12

Why should disk I/O and page file utilization be used to identify bottlenecks?

Options:

A.

High disk I/O and page file utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load.

B.

High disk I/O and page file utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks.

C.

High disk I/O and page file utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users.

D.

High disk I/O and page file utilization of the Delivery Controller can indicate the presence of a virus or malware.

Question 13

In the new environment, the PositivelyFinance application will be deployed as a server OS-hosted application. Which two policy settings should an architect recommend to prevent data leakage from the PositivelyFinance application? (Choose two.)

Options:

A.

HDX policy setting with Client drive mapping set to ‘Prohibited’

B.

HDX policy setting with Client Clipboard Redirection set too ‘Prohibited’

C.

HDX policy setting with File redirection on Client Network drives to ‘Prohibited’

D.

Active Directory group policy with the Do not allow clipboard redirection setting set to ‘Disabled’

E.

Active Directory group policy with the Prevent access to drives setting set to ‘Restrict all drives’

Question 14

Why does installing Windows applications into an image help manage the image release process?

Options:

A.

Because it reduces application deployment time

B.

Because it standardizes the application deployment process

C.

Because it facilitates the use of App-V packages

D.

Because it automatically deploys the latest drivers and patches

Question 15

Why should disk queue length above zero be used to identify bottlenecks?

Options:

A.

This indicates excessive I/O and a disk bottleneck

B.

This indicates excessive swap file utilization

C.

This indicates insufficient RAM

D.

This indicates a failed disk

Question 16

Why does using SmartAuditor help the company comply with its security policy?

Options:

A.

Because it records ICA sessions

B.

Because it uses proprietary codec

C.

Because it enables sessions to be searched

D.

Because it provides configuration changes for an audit trail

Question 17

How should a hosted shared environment be implemented to allow user-installed applications?

Options:

A.

By adding users to the Local Administrators group

B.

By using Personal vDisk

C.

By adding users to the Remote Desktop Users Group

D.

By providing access to the network share that contains the App-V packages

Question 18

What are the benefits of using SSL to meet the company’s compliance requirements?

Options:

A.

It eliminates the need to distribute an internal root certificate

B.

It encrypts end-to-end traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It provides secure internal and external network communication

Question 19

Why does using SysLog help the company comply with its security policy?

Options:

A.

Because it is a centralized, industry-standard log that is easily queried

B.

Because it password-protects the audit logs for added security

C.

Because it uses a standard TCP port

D.

Because it collects logs from multiple devices

Question 20

Which two design decisions should the architect recommend to improve the user experience? (Choose two.)

Options:

A.

Configure Clipboard policy

B.

Configure Drive encryption

C.

Configure Flash redirection

D.

Configure Media redirection

Question 21

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What are the benefits of using Hosted Shared servers with Provisioning Services?

Options:

A.

It provides the highest end-user density at the lowest cost.

B.

It provides the greatest level of end-user personalization and control.

C.

It facilitates rapid provisioning and offers the highest end-user density.

D.

It offers the lowest cost and the greatest application compatibility.

Question 22

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT in a Hosted Shared environment on Windows Server 2008 R2 with Machine Creation Services the best solution?

Options:

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Question 23

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What are the benefits of using Hosted Shared servers provisioned from cloned VM templates?

Options:

A.

It provides the highest end-user density at the lowest cost.

B.

It provides the greatest level of end-user personalization and control.

C.

It offers the lowest storage performance requirement and the highest end-user density.

D.

It facilitates rapid provisioning.

Question 24

Scenario:

A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency.

Why does implementing high-speed local storage with deduplication satisfy the requirements?

Options:

A.

It provides striping.

B.

It provides the highest performance.

C.

It provides fault tolerance.

D.

It provides minimal disk usage.

Question 25

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

How should the architect recommend that the Synchronizer be deployed?

Options:

A.

By using a Hyper-V virtual appliance on Hyper-V

B.

By installing the Synchronizer software on a Hyper-V server

C.

By booting from the Synchronizer ISO image

D.

By installing a Synchronizer virtual appliance on XenServer

Question 26

Why would having one farm with three configured sites, with one Provisioning Services server in each datacenter, meet the requirements of a regional, single-image management strategy with minimal WAN traffic across datacenters?

Options:

A.

It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability within each region.

B.

It ensures that Provisioning Services targets will NOT load balance across regions, and reduces management overhead.

C.

It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability between regions.

D.

It ensures that Provisioning Services targets will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead.

Question 27

Scenario:

A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency.

Why does implementing RAID 1 satisfy the requirements?

Options:

A.

It provides striping.

B.

It provides the highest performance.

C.

It provides fault tolerance.

D.

It provides minimal disk usage.

Question 28

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT as a published application on Windows Server 2008 R2 with Machine Creation Services the best solution?

Options:

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Question 29

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What are the benefits of using Hosted VDI by using cloned VM templates?

Options:

A.

It provides the highest end-user density at the lowest cost.

B.

It offers the greatest level of end-user personalization and control.

C.

It offers the lowest storage performance requirement and the highest end-user density.

D.

It facilitates rapid provisioning.

Question 30

How many Provisioning Services servers should the architect install in each of the three farms?

Options:

A.

B.

One server in each farm

C.

Two servers in each farm

D.

Two servers in the primary farm, two servers in the secondary farm, and one server in the remaining farm

Question 31

Which two issues could CGE's current home directory storage strategy cause? (Choose two.)

Options:

A.

Slow logons

B.

Unverified data backups

C.

High IOPS on the storage appliance

D.

High CPU usage on the XenApp servers

Question 32

Which two current licensing issues should a Citrix Architect resolve in CGE's new virtualization design? (Choose two.)

Options:

A.

There are more RDS CALs than Citrix licenses.

B.

The Citrix and RDS licenses share the same server.

C.

There are many different license servers in the environment.

D.

There is a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.

Question 33

Which end-user group does a Citrix Architect need to consider when designing a remote access solution for CGE?

Options:

A.

Sales

B.

Back Office

C.

Technicians

D.

Executives/Management

Question 34

Which risk could lead to a lengthy farm outage in the event of a corrupt SQL data store?

Options:

A.

SQL server backups are encrypted

B.

An untested SQL backup and restoration process

C.

SQL servers that are NOT running on the same service packs

D.

The use of SQL Mirroring instead of SQL AlwaysOn Availability Groups

Question 35

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

Options:

A.

Two StoreFront servers in a single StoreFront server group.

B.

Two NetScalers in a high availability pair, with load balancing pointing to a single StoreFront server.

C.

Three NetScalers in a cluster, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

D.

Two NetScalers in a high availability pair, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Question 36

A Citrix Architect plans to update the virtual environment in CGE's Jurong datacenter.

Which constraint should the architect address to satisfy CGE's stated business needs?

Options:

A.

Lack of shared storage

B.

1 Gb network infrastructure

C.

Datacenter power and cooling

D.

Mixed-server hardware landscape

Question 37

Which two factors should a Citrix Architect consider with regard to CGE’s Back Office end-user group? (Choose two.)

Options:

A.

Their need for a special application set

B.

Their need to access additional printers

C.

Their need to install their own applications

D.

Their need to use non-corporate-owned devices

Question 38

A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image.

Which two factors helped guide the architect's recommendation? (Choose two.)

Options:

A.

A reduction in Hotfix testing time

B.

CGE's planned upgrade to Microsoft Office 2013

C.

The use of both applications by all CGE end users

D.

End-user complaints about slow application launch times

Question 39

What should a Citrix Architect do to simplify printer driver management for CGE's Back Office end-user group?

Options:

A.

Use the Citrix Universal Print Server.

B.

Enforce the use of the Citrix Universal Printer Driver.

C.

Manually install printer drivers on the XenApp servers.

D.

Modify the printer driver format of the Citrix Universal Printer Driver.

Question 40

Which reason explains why a Citrix Architect would identify the SQL environment as a cause of potential issues in CGE's current deployment?

Options:

A.

Use of SQL authentication

B.

Lack of backup and restoration procedures

C.

Lack of identical servers in different datacenters

D.

Network bandwidth between congested datacenters

Question 41

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect ensure full control over which Citrix policies are applied?

Options:

A.

Configure the Citrix policies in the GPOs.

B.

Create one Citrix Policy for each region.

C.

Create Citrix policies filtered by end users and Delivery Groups.

D.

Create Citrix policies and filter settings based on Client Name.

Question 42

Which aspect of the new storage system's performance requirements is critical to the success of the project and should be determined before any purchase takes place?

Options:

A.

Whether it supports automatic tiering

B.

The number of SSD drives it will hold

C.

Whether 8Gb/s Fibre Channel or 10Gb/s Ethernet technology provides more storage bandwidth

D.

The number of IOPS it must support to host the required amount of pooled and dedicated virtual desktops

Question 43

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

What are the benefits of using a Hosted VDI FlexCast model with Personal vDisks?

Options:

A.

It retains the single-image management function while allowing end users to install applications.

B.

It provides a high level of security while allowing end-user customization.

C.

It has low storage performance requirements and high end-user density.

D.

It retains the single-image management function and reduces application compatibility issues.

Question 44

Why does using a shared VLAN with a Provisioning Services server in both the primary and secondary datacenters help segment streaming traffic?

Options:

A.

It separates disk and end-user data traffic.

B.

It enables disk data traffic to be encrypted with IPsec.

C.

It allows the necessary TCP offload settings to be configured on the streaming NIC.

D.

It provides multiple IP addresses that can be dedicated to streaming traffic.

Question 45

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would implementing one GPO in each region ensure full control over which GPOs are applied?

Options:

A.

It provides central management and control.

B.

It ensures that only policies with the correct filter in Active Directory are applied

C.

It ensures that only settings located in the root OU are applied.

D.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

Question 46

Which consideration is unnecessary for the PositivelyPeople application in the new environment?

Options:

A.

File security

B.

Secure remote access

C.

Access to legacy mainframe

D.

Support for secured print jobs

Question 47

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that IPsec be implemented?

Options:

A.

By using NetScaler

B.

By implementing secure Delivery Groups

C.

By implementing an Active Directory Group Policy

D.

By configuring a local IPsec policy in the master image

Question 48

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace at the regional level ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on.

B.

It ensures that only Group Policies located in the regional OU are applied at the regional level when end users log on.

C.

It ensures that only Citrix policies are applied at the regional level when end users log on.

D.

It ensures that Group Policies located in the regional OU are replaced with Citrix policies.

Question 49

Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.

What should an architect recommend to optimize printer bandwidth?

Options:

A.

Optimize WAN traffic through CloudBridge.

B.

Increase the WAN bandwidth through a WAN link upgrade.

C.

Restrict overall session bandwidth through a HDX bandwidth policy.

D.

Restrict printer redirection bandwidth through a HDX bandwidth policy.

Question 50

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

Which configuration should the architect recommend for the new external access architecture?

Options:

A.

One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device.

B.

A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.

C.

A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site.

D.

One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs.

Question 51

Scenario:

Each XenServer hypervisor host is configured with four 10GB NICS - two dedicated for storage and two bonded for guest VM networks and management separated by VLAN. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure the guest VM network?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Question 52

How should the architect configure high availability (HA) on a XenServer host to support an iSCSI SAN?

Options:

A.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.

B.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

C.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.

D.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.

Question 53

Scenario:

Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure XenServer?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Question 54

Why deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with a backup vServer the best design solution?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 55

How should the architect configure high availability (HA) on a NAS device share so that Provisioning Services has constant access to Provisioning Services images?

Options:

A.

By using storage replication between multiple NAS devices

B.

By using Distributed File Services Replication (DFSR) between multiple NAS devices.

C.

By using DNS Round Robin.

D.

By using XenServer with HA enabled.

Question 56

Why is a design with 12 NetScaler appliances, in which each datacenter deploys three NetScaler virtual servers configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront server, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 57

Why is configuring an iSCSI LUN on a NAS the best design choice for vDisk storage?

Options:

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Question 58

How should the architect configure high availability (HA) on a Windows File Server so that Provisioning Services always has access to the Provisioning Services images?

Options:

A.

By using Distributed File Services

B.

By using Clustered File Services

C.

By using DNS Round Robin

D.

By using XenServer with HA enabled

Question 59

Why would the architect choose active-active bonding when configuring network interfaces for guest VM networks?

Options:

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

Question 60

How should the architect implement high availability (HA) with 12 NetScaler appliances?

Options:

A.

In each datacenter, deploy an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic.

B.

In each datacenter, deploy an HA pair in the internal network for Gateway traffic and an HA pair in the DMZ for load balancing.

C.

Create three NetScaler virtual servers configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server.

D.

Create six NetScaler virtual servers in HA pairs configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server.

Page: 1 / 45
Total 449 questions