Download Latest (June) Citrix 1Y0-259 Practice Test 51-60

Ensurepass

 

QUESTION 51  (Topic 0)

 

Scenario: A manager has directed the Citrix Administrator to deploy Web Interface into the DMZ for access by external customers and asked for recommendations about how to maximize security and minimize support requirements. Which two options should the administrator recommend? (Choose two.)

 

A.

Use the Client for Web

B.

Enable workspace control

C.

Implement Secure Gateway

D.

Implement Citrix Secure XML

 

Answer: AC

 

 

QUESTION 52  (Topic 0)

 

Scenario: A company increased the security of sensitive employee information by hosting the Human Resource applications on a dedicated server and printing materials from these applications on one network printer in a secured room within that department. The administrator wants to ensure that users cannot circumvent this new security policy. Which configuration setting should the administrator apply?

 

A.

Disable the “Native driver auto install” policy rule

B.

Enable the “Turn off client printer mapping” policy rule

C.

Remove all native printer drivers from the Presentation Server

D.

Set the Auto-creation policy rule to “Do not auto-create client printers”

E.

Set the Auto-creation policy rule to “Auto-create local client printers only”

 

Answer: B

 

 

QUESTION 53  (Topic 0)

 

Which benefit is the result of enabling Memory Optimization?

 

A.

Memory is allocated to each user proportionately.

B.

Each server can more efficiently initiate applications.

C.

Memory is dynamically reallocated based on specific user need.

D.

The administrator controls the maximum amount of memory per user.

 

Answer:
B

 

 

QUESTION 54  (Topic 0)

 

Scenario: An administrator is configuring an environment containing Presentation Server for remote access. The Secure Gateway server and the server running Presentation Server will be separated by a firewall that performs Network Address Translation. In this scenario, Web Interface must be configured to use _____. (Choose the appropriate phrase to complete the sentence.)

 

A.

normal addressing

B.

alternate addressing

C.

Secure Gateway with normal addressing

D.

Secure Gateway with alternate addressing

 

Answer: D

 

 

QUESTION 55  (Topic 0)

 

Scenario: An administrator wants to create and deploy a client package that includes the Web Client using the Client Packager.

 

The administrator wants:

 

To be able to make modifications to the file

 

The client name to be different from the computer name

 

Users to specify a username and password to log on to a session

 

Clients to be deployed from a web page using Web Interface

 

Based on these requirements, which two steps must be completed when creating and deploying the client package? (Choose two.)

 

A.

Create a network share.

B.

Select the manage client deployment task.

C.

Accept the default value for the client name option.

D.

Enable users to choose how their applications are launched.

E.

Select UNCOMPRESSED in the “Create a Windows Installer” option.

F.

Select use of Kerberos Authentication in combination with Security Support Provider Interface.

 

Answer: BE

 

 

QUESTION 56  (Topic 0)

 

Scenario: An administrator notices that there are occasional issues with traffic traversing TCP port 2512, in the farm running Citrix Presentation Server. Which Health Monitoring and Recovery test should the administrator configure?

 

A.

Citrix IMA Service

B.

Citrix XTE Service

C.

Citrix XML Service

D.

Terminal Services

 

Answer: A

 

 

QUESTION 57  (Topic 0)

 

Scenario: A company recently implemented Citrix Presentation Server. The company plans to use the shadowing feature to improve their help desk activities. Specifically, the company wants the help desk personnel to be able to shadow all users in the company’s domain and manipulate their work stations remotely. For security and privacy reasons, the company wants to ensure that users must accept shadowing before help desk personnel can shadow them. During the Presentation Server installation, the administrator allowed shadowing but did not configure any settings for remote control or shadow acceptance. The administrator has just created a policy titled “Shadowing.” Which two steps are required to accomplish this task? (Choose two.)

 

A.

Enable permissions for all users and set status to allow.

B.

Enable permissions for all help desk users and set status to allow.

C.

Enable shadowing in a policy and prohibit being shadowed without notification.

D.

Enable shadowing in a policy and prohibit remote input when being shadowed.

 

Answer: BC

 

 

QUESTION 58  (Topic 0)

 

Scenario: In preparation for rolling out a pilot environment, the administrator learns that a new CAD application was added to the list of applications to be deployed. The application vendor explained that this application will run on a server running Presentation Server and Microsoft Office but warned that some of the CAD drawing activities will be processor- intensive.

 

Because the administrator does not want the impact of this application to affect general users, he has decided to deploy it and Microsoft Office to a subset of servers.

 

As the administrator plans the Load Manager strategy, which load rule should be applied?

 

A.

CPU Utilization applied to a server-based load evaluator

B.

Memory Usage applied to a server-based load evaluator

C.

CPU Utilization applied to an application-based load evaluator

D.

Memory Usage applied to an application-based load evaluator

 

Answer: A

 

 

QUE

STION 59  (Topic 0)

 

Scenario: Users in the Human Resources department experience long wait times when loading graphics in published Internet Explorer and Microsoft Outlook. Which SpeedScreen solution should be configured to lower the resolution of these graphics and optimize the user experience?

 

A.

SpeedScreen Image Acceleration

B.

SpeedScreen Progressive Display

C.

SpeedScreen Browser Acceleration

D.

SpeedScreen Multimedia Acceleration

 

Answer: C

 

 

QUESTION 60  (Topic 0)

 

Scenario: An administrator is setting up an environment for Presentation Server so that connection limits in the server farm only allow each user to launch a maximum of two sessions while simultaneously allowing users in the Technical Support Department the ability to launch five sessions each.

 

 

 

 

 

How can the administrator accomplish both goals?

 

A.

Set the connection limits for all users and the Technical Support Department users in the properties of the server farm.

B.

Create a policy, set the Overall Session rule to five sessions and assign it to the Technical Support Department users.

C.

Configure all applications used by the Technical Support Department to run on one server and change the connection limit to five in the properties of that server.

D.

Create a policy to limit the total concurrent sessions to five and assign it to the Technical Supp

ort Department users. Change the connection limit to two in the properties of the server farm.

 

Answer: D

 

Free VCE & PDF File for Citrix 1Y0-259 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 1Y0-259 Practice Tests (June) and tagged , , , , , , . Bookmark the permalink.