Download Latest (June) Citrix 1Y0-308 Practice Test 21-30

Ensurepass

 

 

QUESTION 21  (Topic 0)

 

 

 

 

Which setting should be configured in a connection policy if users will be granted access using the Secure Access Client?

 

A.

Launch Secure Access Client if access allowed.

B.

Launch Secure Access Client in the default connection.

C.

Launch Secure Access Client and enable scripting on the client device.

D.

Launch Secure Access Client if access is allowed and launch logon scripts.

 

Answer: A

 

 

QUESTION 22  (Topic 0)

 

Which utility can an administrator use to audit a logged event for a specific server?

 

A.

Web Proxy Log

B.

Windows Event Viewer

C.

Server Configuration tool

D.

Presentation Server Console

E.

Access Management Console

 

Answer: B

 

 

QUESTION 23  (Topic 0)

 

In an Access Gateway 4.5 Advanced Edition implementation, a Presentation Server farm can be specified using which two properties? (Choose two.)

 

A.

Policy Properties

B.

Logon Point Properties

C.

Access Gateway Properties

D.

Access Server Farm Properties

 

Answer: BD

 

 

QUESTION 24  (Topic 0)

 

Scenario: A company’s Advanced Access Control configuration allows internal and external users to connect to corporate resources. Two logon points were created for the associated access scenarios, named “internal” and “external” logon points. Corporate policy states

 

 

 

 

that only external users who passed an existing Windows service pack endpoint analysis scan have access to an existing web-based email resource using Microsoft Exchange. Which two steps will achieve the requirements of this scenario? (Choose two.)

 

A.

Apply the Windows Service Pack EPA scan to the Web-Based Email Policy.

B.

Apply a filter to the Web-Based email policy in order to limit access through external logon points.

C.

Create a filter and add the “external” logon point and Windows Service Pack endpoint analysis scan to the filter.

D.

Create a filter that allows access for users using the “external” logon point and denies access for users using the “internal” logon point.

 

Answer: BC

 

 

QUESTION 25  (Topic 0)

 

A Citrix Administrator wants to configure name resolution for Access Gateway. In which location can the administrator specify the DNS and WINS servers for Access Gateway?

 

A.

Server Configuration Tool

B.

DNS Management Console

C.

Access Management Console

D.

Access Gateway Administration Tool

 

Answer: D

 

 

QUESTION 26  (Topic 0)

 

Scenario: An environment has Access Gateway 4.5 Advanced Edition implemented to provide access for the mobile workforce. Managers require access to email from company- issued Blackberry devices. All end-users access email through Outlook which is configured to download email from an Exchange server. The administrator is required to provide the mobile users with access to the web email resource. When defining the web email resource for this environment, which three steps are required? (Choose three.)

 

A.

Update the %systemroot%system32MAPISVC.INF file on the Exchange server.

B.

Specify that Microsoft Exchange will be used and then enable web-based access.

C.

Provide the URL for the Exchange Server and specify the server as a new web application.

D.

Update the %systemroot%system32MAPISVC.INF file on all the Advanced Access Control servers.

E.

Select the email interface provided with Advanced Access Control and provide the URL

 

 

 

 

of Exchange server.

 

Answer: BDE

 

 

QUESTION 27  (Topic 0)

 

Which two options must be selected when configuring migration? (Choose two.)

 

A.

Target name

B.

Source name

C.

Target version

D.

Source version

E.

Target IP address

F.

Source IP address

 

Answer: CD

 

 

QUESTION 28  (Topic 0)

 

In an enterprise environment where users connect to the corportate network through Access Gateway from different client devices, what are two distribution methods that could be used to deploy endpoint analysis client software to users? (Choose two.)

 

A.

Access Gateway Administration Tool

B.

Citrix Access Client package from www.citrix.com

C.

Java Client from the Internet with the appropriate plug-in

D.

Client download from the Internet with ActiveX control or browser plug-in

 

Answer: BD

 

 

QUESTION 29  (Topic 0)

 

What is true about importing an endpoint analysis scan package?

 

A.

It does not appear under a scan group.

B.

It appears immediately under the scan node.

C.

It appears immediately under the scan policy.

D.

It does not appear directly under the endpoint analysis node.

 

 

 

 

 

Answer: A

 

 

QUESTION 30  (Topic 0)

 

Scenario: An administrator gives a user the URL

https://Accounting1.net/CitrixLogonPoint/AccountAccess to access a logon page. “Accounting1.net” is the FQDN of the Advanced Access Control server hosting the logon point and “AccountAccess” is the name of the logon point. From the URL given to the user, which method will be used to connect to the network?

 

A.

Secure Web Client

B.

Default logon point

C.

Browser-only access

D.

Secure Access Client

 

Answer: C

Free VCE & PDF File for Citrix 1Y0-308 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 1Y0-308 Practice Tests (June) and tagged , , , , , , . Bookmark the permalink.