Users within the environment are struggling with a new app that is being rolled out. It has been decided that the help desk should be able to view the user’s session to offer troubleshooting and support. When setting up the VDA, which additional feature should be selected to accomplish this?
Which PowerShell command should a Citrix Administrator run to obtain the name of a deployment, the local host cache configuration and the license level?
Scenario: A Citrix Administrator needs to configure StoreFront to allow external users access to internal resources. The external users will authenticate on StoreFront.
Which StoreFront authentication method can the administrator configure?
Scenario: A Citrix Administrator needs to add 10 new web servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.
To ensure that only the 10 new servers are receiving twice the connections of the old servers without changing the load balancing to the rest of the environment, the administrator needs to add a weight of _____________ to the services attached to the _________ servers. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Administrator has received user complaints about issues connecting to the domain through the Citrix ADC using AAA. The administrator investigated the issue and found that the domain session cookie that was used during authentication is failing due to resolution issues.
What can the administrator do to fix the issue?
Enlightened Data Transport (EDT) has been disabled in a new Citrix Virtual Apps and Desktops site. A Citrix Administrator deploys a NetScaler Gateway behind the corporate firewall to allow remote users to access internal Citrix resources.
Which port and protocol must be opened in the firewall to allow external access?
Which Front-End Optimization (FEO) action can a Citrix Administrator use to achieve the results shown in the screenshots?
Click the Exhibit button to view the screenshots.
Which three database high availability features are supported for on-premises deployments of Citrix Virtual Apps and Desktops? (Choose three.)
Scenario: The Director of network security in a financial organization wants to protect the enterprise network from any external malware threats. To do this, the director needs to gain visibility into otherwise-bypassed traffic and control access to malicious web sites. The director is required to do the following:
Intercept and examine all the traffic, including SSL/TLS (encrypted traffic), coming in, and going out of the enterprise network.
Block access to URLs identified as serving harmful or insecure content.
Identify users (employees) in the enterprise who are accessing malicious websites.
Which Citrix ADC deployment mode should a Citrix Administrator use to achieve this requirement?
Which two resource locations are supported for machines running the Virtual Delivery Agent (VDA) when using the Citrix Virtual Apps and Desktops service? (Choose two.)