Download Latest (June) Citrix 1Y0-308 Practice Test 61-70

Ensurepass

 

QUESTION 61  (Topic 0)

 

Scenario: The Citrix Administrator for an environment learns that the service account credentials were compromised. The administrator decides to change the service account credentials to protect the environment from intruders. What should the administrator do to ensure that the old service account can no longer be used?

 

A.

Run discovery after implementing the new account.

B.

Manually log onto all of the servers using the new service account.

C.

Manually remove the old service account from the local administrators group.

D.

Restart all the servers in the access server farm after implementing the new account.

 

Answer: C

 

 

QUESTION 62  (Topic 0)

 

Scenario: An administrator wants to provide access to a company intranet site from the access server farm. The home page for the intranet site includes several links to external web pages. The administrator wants to ensure that all links can be accessed through this resource. How can this be configured?

 

A.

Create a filter that allows access to all the websites linked from the home page.

B.

Enable URL rewriting to provide users access to the pages linked on the website.

C.

Include all the web pages linked from the home page using a URL that contains a wildcard.

D.

Within the New Web Resource Wizard add URLs for the home page and each page linked from the home page.

 

Answer: D

 

 

QUESTION 63  (Topic 0)

 

 

 

 

What is true about a server-side scan?

 

A.

They require the web client in order to run on client devices.

B.

They scan client devices to determine if the client has the right browser type.

C.

They do not require the endpoint analysis client software to run on client devices.

D.

They scan client devices to identify if there are applications on those devices that require certain browser types and if the client has permissions to download the required browser type.

 

Answer: C

 

 

QUESTION 64  (Topic 0)

 

Scenario: An administrator configuring authentication decides to use an index database with Global Catalog in order to improve the speed of LDAP queries. The administrator is instructed to use port number 3268.

 

Click the “Display” button to view a screenshot of the LDAP Profile Configuration.

 

Which two configuration settings should the administrator set when configuring LDAP profiles? (Choose two.)

 

 

 

 

 

clip_image002

 

A.

Deselect Use SSL.

B.

Type 3268 in the “Port” field.

C.

Type 3268:443 in the “Port” field.

D.

Delete the text in the attribute for user logon names field.

 

Answer: AB

 

 

QUESTION 65  (Topic 0)

 

In an environment where client devices that access resources through Access Gateway are required to have a specific version of Norton Anti-Virus software installed and a valid certificate, which two configurations are appropriate for this scenario? (Choose two.)

 

 

 

 

 

A.

Enable the “Allow Logon” option for the access policy.

B.

Enable the “Upload” action to allow user access to network resources.

C.

Apply the policy to those users who are located outside of the internal subnet.

D.

Create a filter that specifies the software, authentication strength and SSL requirements.

 

Answer: AD

 

 

QUESTION 66  (Topic 0)

 

Which network adapter requires a static IP address when configuring internal access for Access Gateway in a single network interface?

 

A.

Eth0 is the only n

etwork interface that can be used.

B.

Eth1 is the only network interface that can be used.

C.

Eth2 is the only network interface that can be used.

D.

Eth3 is the only network interface that can be used.

 

Answer: A

 

 

QUESTION 67  (Topic 0)

 

An administrator wants to ensure that a particular file is present on a client device while the device is being used to access information from the corporate network through Access Gateway 4.5 Advanced Edition. Which policy can be used for this purpose?

 

A.

Access Policy

B.

Network Policy

C.

Connection Policy

D.

Continuous Policy

 

Answer: C

 

 

Topic 1, B

B

 

 

QUESTION 68  (Topic 1)

 

A Citrix Administrator wants to configure client tunnel resources for clients connecting through Access Gateway to the corporate network. What are three methods that the administrator could use to define network resources? (Choose three.)

 

 

 

 

 

A.

UNC (e.g. servershare)

B.

IP address (e.g. 10.10.16.6)

C.

FQDN (e.g. server.domain.comany.com)

D.

IP address range (e.g. 10.10.16.1 – 10.16.6.255)

E.

IP address with a subnet mask (e.g. 10.0.0.0/255.0.0.0)

 

Answer: BCE

 

 

QUESTION 69  (Topic 1)

 

What must be enabled to control users access through a logon point?

 

A.

The Allow Logon property in the access filter

B.

The Allow Logon Resource in the access policy

C.

The Permit Logon option in the logon point properties

D.

The Show Logon setting in the Server Configuration tool

 

Answer: B

 

 

QUESTION 70  (Topic 1)

 

When creating a single web resource containing multiple URLs, which consideration must be taken into account?

 

A.

A separate policy must be attached to each URL in the resource.

B.

Applying the “same origin” Java script to the site will protect it from malicious scripts when the web resource is created.

C.

A website that is secure from cross-site scripting is the best candidate for creating web resources containing multiple URLs.

D.

Bypassing the “web proxy URL rewriting” protects web resources from vulnerabilities before creating them as web resources containing multiple URLs.

 

Answer: C

 

Free VCE & PDF File for Citrix 1Y0-308 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 1Y0-308 Practice Tests (June) and tagged , , , , , , . Bookmark the permalink.