SAML is an authentication protocol based on _____________.
A. LDAP
B. XML
C. HTML
D. YAML
Scenario: A Citrix Administrator configured a new router that requires some incoming and outgoing traffic to take different paths through it. The administrator notices that this is failing and runs a network trace. After a short monitoring period, the administrator notices that the packets are still NOT getting to the new router from the Citrix ADC.
Which mode should the administrator disable on the Citrix ADC to facilitate the successful routing of the packets?
A. Layer3
B. USNIP
C. MAC-based forwarding (MBF)
D. USIP
Scenario: A Citrix Administrator is managing a Citrix Gateway with a standard platform license and remote employees in the environment. The administrator wants to increase access by 3,000 users through the Citrix Gateway using VPN access.
Which license should the administrator recommend purchasing?
A. Citrix Gateway Express
B. Citrix ADC Upgrade
C. Citrix Gateway Universal
D. Citrix ADC Burst Pack
Which four steps should a Citrix Administrator take to configure SmartAccess? (Choose four.)
A. Execute "set-BrokerSite -TrustRequestsSentToTheXMLServicePort $True" on any Citrix Delivery Controller in the Site.
B. Enable Citrix Workspace control within StoreFront.
C. Ensure that the SmartAccess filter name on the Delivery Group matches the name of the Citrix Gateway virtual server.
D. Ensure that the SmartAccess filter name on the Delivery Group matches the name of the Citrix Gateway policy.
E. Ensure that ICA Only is unchecked on the Citrix Gateway virtual server.
F. Ensure that the Callback URL is defined in the Citrix Gateway configuration within Store Front.
G. Ensure that ICA Only is checked on the Citrix Gateway virtual server.
While applying a new Citrix ADC device, a Citrix Administrator notices an issue with the time on the appliance.
Which two steps can the administrator perform to automatically adjust the time? (Choose two.)
A. Add an SNMP manager.
B. Add an SNMP trap.
C. Enable NTP synchronization.
D. Add an NTP server.
E. Configure an NTP monitor.
A Citrix Administrator needs to configure a Citrix Gateway virtual IP to allow incoming connections initiated exclusively from web browser sessions.
Which advanced policy will accomplish this?
A. REQ.HTTP.HEADER User-Agent NOTCONTAINS CitrixReceiver
B. REQ.HTTP.HEADER User-Agent CONTAINS Chrome/78.0.3904.108 Safari/537.36
C. HTTP.REQ.HEADER("User-Agent").CONTAINS("Mozilla")
D. HTTP.REQ.HEADER("User-Agent").CONTAINS("CitrixReceiver")
A Citrix Administrator deploys a new Citrix ADC MPX appliance in the demilitarized zone (DMZ), with one interface in the DMZ and the other on the internal network.
In which mode should the administrator deploy the Citrix ADC?
A. Two-arm
B. One-arm
C. Forward proxy
D. Transparent
Which scenario will cause automatic high availability (HA) synchronization to fail?
A. Different build versions
B. A configuration change to the primary Citrix ADC
C. A forced failover
D. Manually forced synchronization
Which authentication type can a Citrix Administrator use to enable Citrix ADC authentication, authorization, and auditing (AAA) dual-factor authentication from a user's mobile device app?
A. LDAP
B. LOCAL
C. SAML
D. RADIUS
A Citrix Administrator needs to deploy a Citrix ADC between the servers and the client, with servers only allowed to reach the client through the Citrix ADC.
In which mode should the administrator deploy the Citrix ADC?
A. Inline
B. Direct server return
C. Transparent
D. One-arm
Scenario: After deploying a Citrix ADC in production, a Citrix Administrator notices that client requests are NOT being evenly distributed among backend resources. The administrator wants to change from the default load-balancing method to one that will help distribute the load more evenly.
Which load-balancing method would ensure that the server with the least amount of network utilization is receiving new connections?
A. Least response time
B. Least bandwidth
C. Least connection
D. Least packets
Scenario: A Junior Citrix Administrator needs to create a content switching virtual server on a Citrix ADC high availability (HA) pair. The NSIP addresses are 192 168.20.10 and 192.168.20.11. The junior administrator connects to NSIP address 192.168.20.10 and saves the changes.
The following day, a Senior Citrix Administrator tests the new content switching virtual server, but it is NOT working. The senior administrator connects to the HA pair and discovers that everything the junior administrator configured is NOT visible.
Why has the Citrix ADC lost the newly added configurations?
A. The junior administrator made the changes and did NOT force a failover to save the configurations.
B. The junior administrator connected to the NSIP of the secondary Citrix ADC in the HA pair.
C. The Citrix ADC appliances have different firmware versions.
D. Both Citrix ADCs in the HA pair restarted overnight.
A Citrix Administrator needs to integrate an existing certification-based authentication policy into an existing Citrix Gateway virtual server.
Which three steps can the administrator take to accomplish this? (Choose three.)
A. Bind the existing CERT authentication policy to the Citrix Gateway virtual server.
B. Enable the two-factor option on the existing CERT authentication profile.
C. Enable client authentication on the SSL parameters of the virtual server.
D. Change the client certificate to mandatory on the SSL parameters of the virtual server.
E. Create a CERT authentication policy and bind it to the Citrix Gateway virtual server.
Scenario: A Citrix Administrator suspects an attack on a load-balancing virtual server (IP address 192.168.100.25). The administrator needs to restrict access to this virtual server for 10 minutes.
Which access control list (ACL) will accomplish this?
A. add ns acl rule1 DENY -destIP 192.168.100.25 -TTL 600000
B. add simpleacl rule1 DENY -srcIP 192.168.100.25 -TTL 600000
C. add ns acl rule1 DENY -destIP 192.168.100.25 -TTL 600
D. add simpleacl rule1 DENY -srcIP 192.168.100.25 -TTL 600
After being audited, a Citrix Administrator learns that additional security enhancements should be made to one of the virtual servers.
Which two actions can the administrator perform to accomplish this? (Choose two.)
A. Enable the TLSv1.2.
B. Enable the RC4 cipher suite.
C. Create a SHA1 key.
D. Disable the SSLv3.