Download Latest (June) Citrix 1Y0-308 Practice Test 51-60

Ensurepass

 

QUESTION 51  (Topic 0)

 

From which node in the Access Management Console can an administrator configure event logging?

 

A.

Servers node

B.

Resource node

C.

Server Farm node

D.

Gateway Appliances node

 

Answer: C

 

 

 

 

 

QUESTION 52  (Topic 0)

 

Which connection settings should be configured if users are required to re-authenticate after their system goes into hibernation?

 

A.

Authenticate after system failure.

B.

Authenticate after lost connection.

C.

Authenticate after system resume.

D.

Authenticate after network interruption.

 

Answer: C

 

 

QUESTION 53  (Topic 0)

 

A user connecting to the corporate network needs to edit documents in the internal network using local applications. Which tool should a Citrix Administrator use to determine the action controls that are enabled for the resource?

 

A.

Policy Manager

B.

Session Viewer

C.

Network Manager

D.

Resource Manager

E.

Windows Event Viewer

 

Answer: A

 

 

QUESTION 54  (Topic 0)

 

Which option is used in the Access Management Console to move the configuration files from one access server farm to another?

 

A.

Load Farm

B.

Merge Farm

C.

Import Farm

D.

Migrate Farm

 

Answer: C

 

 

QUESTION 55  (Topic 0)

 

 

 

 

Scenario: A company’s Contractors Active Directory group is allowed to launch Outlook and SAP only when using a corporate-supplied laptop. The same users are allowed to view Office and Adobe Reader applications regardless of the accessing device. Which type of scan can the administrator perform to ensure that the requirements for this scenario are met?

 

A.

Citrix scans for hardware types

B.

Citrix scans for MAC addresses

C.

Citrix scans for antivirus software

D.

Citrix scans for operating systems

 

Answer: B

 

 

QUESTION 56  (Topic 0)

 

Which statement is true regarding Workspace Control?

 

A.

Only disconnected sessions can be reconnected.

B.

Workspace Control can only be set per logon point.

C.

Users always have options to disconnect or keep launched applications when they are logged off.

D.

Workspace Control is not supported if more than two Presentation Server farms are assigned to a single logon point.

 

Answer: B

 

 

QUESTION 57  (Topic 0)

 

Scenario: An administrator is deploying Advanced Access Control. The corporate IT policy requires that all users have access to the company’s employee portal website. Only the sales team can have access to the site web-based CRM application. Which set of configurations best meets the requirements of the described environment?

 

A.

Create a single web resource and add the URL for both the employee portal and the CRM application. Create a single access policy and grant only the sales team access to the CRM application.

B.

Create two separate web resources, one for the employee portal and one for the CRM application. Create a single access policy and deny all non-sales team employees access to the CRM application.

C.

Create two separate web resources, one for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Add a filter to the CRM policy that denies all non-sales

 

 

 

 

team employees access.

D.

Create two separate web resources, one for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Grant everyone access to the employee portal policy and only the sales team access to the CRM application policy.

 

Answer: D

 

 

QUESTION 58  (Topic 0)

 

Which objects should be selected during the creation of custom filters?

 

A.

Users and Groups

B.

Multiple resource type

C.

AND, OR or NOT logical operators

D.

The selection of multiple resource types

 

Answer: C

 

 

QUESTION 59  (Topic 0)

 

A Citrix Administrator wants to configure client tunnel resources for clients connecting through Access Gateway to the corporate network. What are three methods that the administrator could use to define network resources? (Choose three.)

 

A.

UNC (e.g. servershare)

B.

IP address (e.g. 10.10.16.6)

C.

FQDN (e.g. server.domain.comany.com)

D.

IP address range (e.g. 10.10.16.1 – 10.16.6.255)

E.

IP address with a subnet mask (e.g. 10.0.0.0/255.0.0.0)

 

Answer: BCE

 

 

QUESTION 60  (Topic 0)

 

Scenario: An administrator applies a policy to the external users’ logon point to check for the company asset tag in the registry of client devices. Which scan type is used for this purpose?

 

 

 

 

 

A.

Continuous scan

B.

Server-side scan

C.

Access Policy scan

D.

Machine Identification scan

 

Answer: A

 

Free VCE & PDF File for Citrix 1Y0-308 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 1Y0-308 Practice Tests (June) and tagged , , , , , , . Bookmark the permalink.