Download Latest (June) Citrix 1Y0-308 Practice Test 31-40

Ensurepass

 

 

QUESTION 31  (Topic 0)

 

Scenario: A company currently has one Access Gateway Standard VPN appliance implemented. It is only used for VPN connections. There are plans to migrate to Access Gateway 4.5 Advanced Edition so that the gateway appliance can be used for VPN connections and ICA tunneling. In the new implementation, users will be able to communicate with internal servers using FQDNs, not IP addresses. In order to implement this, the administrator will need to use DNS for name resolution. Where are the Access Gateway DNS settings configured?

 

A.

In the Server Configuration Tool

B.

In the Access Management Console

C.

In the Access Gateway Administration Tool

D.

In the Access Gateway Administration Portal

 

Answer: C

 

 

QUESTION 32  (Topic 0)

 

Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.)

 

 

 

 

 

A.

Web Client

B.

Client for Java

C.

Live Edit Client

D.

Secure Access Client

E.

Endpoint Analysis Client

 

Answer: AB

 

 

QUESTION 33  (Topic 0)

 

Scenario: An administrator wants to perform automatic drive mapping for clients who have a specific antivirus software installed after those clients log onto the network. How can the administrator implement this through a connection policy?

 

A.

By enabling “Connect drive”

B.

By configuring “Run DRIVEMAP.EXE”

C.

By configuring “Execute logon scripts”

D.

By enabling “Launch scripts” on the server

 

Answer: C

 

 

QUESTION 34  (Topic 0)

 

Which statement is true about access policies?

 

A.

If the specific policy settings are not configured at the time when the policy was created, they can be configured at a later time.

B.

If multiple policies apply to a resource, a policy that allows access permission takes precedence over other policies that deny access permission.

C.

Access to published applications and resources on a Citrix Presentation Server is controlled by the Presentation Server settings in the access policy.

D.

Access to published resources on Citrix Presentation Server depends on the properties of the Presentation Server access policy and the logon point that is used to access the resources.

 

Answer: A

 

 

QUESTION 35  (Topic 0)

 

 

 

 

Scenario: An administrator wants to scan client devices to ensure that all clients running either Windows XP or 2000 have the appropriate service pack installed. Newly acquired offices will obtain access to corporate resources through Access Gateway. These clients will be running on different operating system platforms. By configuring the rules for the endpoint analysis scan, the administrator can ensure that only those client devices meeting the minmum requirements will obtain full access to company resources.

 

What should the administrator do to ensure that client devices connecting through Access Gateway have the appropriate service pack level?

 

A.

Configure two rules for the scan with client device locale conditions and the remote language selected.

B.

Configure two rules for the scan with logon point conditions and the remote logon point added to the property value for the scan.

C.

Configure two rules for the scan with operating system conditions and the respective service pack as the property values for the scan.

D.

Configure two rules for the scan using another scan that looks for a particular file as a condition and the respective service pack as the property values for the scan.

 

Answer: C

 

 

QUESTION 36  (Topic 0)

 

Which two steps should an administrator take to remove an Access Gateway appliance from an Access Gateway 4.5 Advanced Edition deployment? (Choose two.)

 

A.

The administrator should execute the “Remove Access Gateway” task from the “Gateway Appliances” node in the Access Management Console.

B.

The administrator should restart at least one Advanced Access Control server in the farm after configuring the Access Gateway appliance to be removed.

C.

The administrator should configure the Access Gateway appliance server so that it no longer points itself to an Advanced Access Control server in the deployment.

D.

The administrator should uncheck the “Access Gateway” role checkbox for the Access Gateway appliance to be removed in the “Manage Server Roles” dialog of the Access Management Console.

 

Answer: AC

 

 

QUESTION 37  (Topic 0)

 

Scenario: A Citrix Administrator wants to ensure that every client device that connects

 

 

 

 

through the external logon point into the network has the latest version of McAfee antivirus software and that the device is a member of the corporate domain.

 

How can the administrator implement these checks through a connection policy?

 

A.

Configure a custom filter for McAfee antivirus scan and domain membership scan and apply the filter to the connection policy.

B.

Configure a filter that defines the logon point used and the endpoint analysis results associated with the client device at logon and apply the filter to the connection policy.

C.

Configure a continuous scan to check for the presence of the McAfee Antivirus and the domain name on the computer and apply the scan in a filter to the connection policy.

D.

Configure a continuous scan to check for the presence of the McAfee Antivirus and a registry scan to check for the company’s asset tag and apply the scan in a filter to the connection policy.

 

Answer: B

 

 

QUESTION 38  (Topic 0)

 

Which two items are required to change the server farm membership? (Choose two.)

 

A.

Farm name

B.

License server name

C.

Database server name

D.

Authentication Server FQDN

 

Answer: AC

 

 

QUESTION 39  (Topic 0)

 

Scenario: A user is denied access on the logon page after entering the appropriate logon credentials. The administrator verifies that Allow Logon setting is enabled and that the user has permissions to logon. Which tool can the Citrix Administrator use to determine what is affecting the user’s ability to log on?

 

A.

Policy Manager

B.

Session Viewer

C.

Network Manager

D.

Resource Manager

E.

Event Log Consolidator

 

 

 

 

 

Answer: E

 

 

QUESTION 40  (Topic 0)

 

Scenario: A company currently has one Access Gateway Standard VPN appliance. It is used for ICA tunneling in replacement of Secure Gateway. When users access the Access Gateway appliance, they are tunneled to a Web Interface server located in the DMZ. These users then authenticate to Web Interface. The STA service is running on one of the Presentation Servers in the environment. The administrator plans to upgrade to Access Gateway 4.5 Advanced Edition. In the planned implementation, users will get their applications from Web Interface embedded in the Access Interface of the access server farm. The Web Interface server will also be moved to the internal network. In the planned implementation, what will have to be done so that the Access Gateway appliance uses the STA service to verify ICA connections?

 

A.

Install the STA service onto the Web Interface server.

B.

Install the STA service on the server running Advanced Access Control.

C.

Add the STA service address of the current STA to the gateway appliance settings.

D.

Configure the STA service address of the current STA in the Access Gateway Administration Tool.

 

Answer: C

Free VCE & PDF File for Citrix 1Y0-308 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 1Y0-308 Practice Tests (June) and tagged , , , , , , . Bookmark the permalink.