Download Latest (June) Citrix 1Y0-308 Practice Test 1-10

Ensurepass

 

QUESTION 1  (Topic 0)

 

Scenario: An administrator configuring Advanced Access Control to use LDAP for primary authentication and authorization, needs to enable pass-through authentication in order for Active Directory credentials to pass automatically to applications. What must the administrator do to meet the requirements of this scenario?

 

A.

Ensure that the same logon account exists for LDAP and Active Directory.

B.

Ensure that LDAP and Active Directory use the same trusted root certificate.

C.

Ensure that the LDAP server is on the same network as the Active Directory server.

D.

Ensure that the same administrative account exists for the LDAP and Active Directory.

 

Answer: A

 

 

QUESTION 2  (Topic 0)

 

For an environment where there are multiple connection policies configured, how can an administrator ensure that one policy takes precedence over the others?

 

A.

Assign the defualt policy the strictest conditions.

B.

Assign the preferred policy a higher priority than the others.

C.

Configure the default policy as the preferred policy for all users.

D.

Configure the preferred policy as the default policy for all users.

 

Answer: B

 

 

QUESTION 3  (Topic 0)

 

Which statement is true regarding authentication and authorization configurations?

 

A.

LDAP can be used for authorization with RSA authentication.

B.

RADIUS can be used for authorization with RSA authentication.

C.

LDAP can be used for authorization with RADIUS authentication.

D.

RADIUS can be used for authorization with SafeWord authentication.

 

Answer: C

 

 

 

 

 

QUESTION 4  (Topic 0)

 

Which two statements are true regarding licensing for a deployment that contains multiple Access Gateway appliances? (Choose two.)

 

A.

One server is configured as the license server.

B.

Each gateway appliance must contain its own license.

C.

The primary gateway appliance serves as the license server.

D.

The license server must be installed in the DMZ on a separate server.

 

Answer: AC

 

 

QUESTION 5  (Topic 0)

 

Scenario: An administrator would like to provide access to a Web Interface site through Advanced Access Control. The administrator would like the site to appear as the home page. What are the two required configurations for this scenario? (Choose two.)

 

A.

Configure the site as the application with the highest priority.

B.

Configure a logon point to display the navigation page as the home page.

C.

Configure the web resource for Citrix Web Interface 4.2 or later to bypass web proxy URL rewriting.

D.

Configure a published web resource with Citrix Web Interface 4.2 or later selected as the application type.

 

Answer: AD

 

 

QUESTION 6  (Topic 0)

 

User are experiencing problems with a web resource that is not showing up in their navigation page upon logon. Which tool should a Citrix Administrator use to determine whether users have permission to access the particular resource?

 

A.

Policy Manager

B.

Network Manager

C.

Resource Manager

D.

Event Log Consolidator

E.

Presentation Server Session Viewer

 

Answer: A

 

 

 

 

 

QUESTION 7  (Topic 0)

 

Which two steps are required when configuring email synchronization? (Choose two.)

 

A.

A connection policy must be configured to allow users to launch the Secure Access Client.

B.

An access policy must be associated with the email synchronization resource in order for users to synchronize their email.

C.

An access policy filter must be associated with the email synchronization resource in order for users to synchronize their email.

D.

< span lang="EN-US" style="font-family: ; mso-no-proof: yes">A custom filter must be configured for the policy associated with the email synchronization resource to allow users to launch the Secure Access Client.

 

Answer: AB

 

 

QUESTION 8  (Topic 0)

 

In an environment wherein access to resources is restricted to client devices running a specific version of a particular antvirus software, which step must be completed to create a continuous process scan to ensure that this requirement is met?

 

A.

Clear the MD5 field.

B.

Browse to the client version of the antivirus executable.

C.

Provide the registry path and values for the antivirus software.

D.

Type the earliest date stamp tha

t is acceptable for the process.

 

Answer: B

 

 

QUESTION 9  (Topic 0)

 

Scenario: The administrator wants to ensure that client devices running Internet Explorer

Q1

0 and above have access to edit documents on a remote server in the secure network using locally installed applications. Which type of access should be given to clients to meet this requirement?

 

A.

Access

B.

Live Edit

C.

Download

D.

File type association

 

Answer: B

 

 

 

 

 

QUESTION 10  (Topic 0)

 

When a user connects through Access Gateway, under which account is the endpoint analysis scans run?

 

A.

The user that is logged on

B.

The administrator for the local machine

C.

The user who installed the client operating systems

D.

The account of the user who installed the endpoint analysis client

 

Answer: A

 

Free VCE & PDF File for Citrix 1Y0-308 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 1Y0-308 Practice Tests (June) and tagged , , , , , , . Bookmark the permalink.