Which protocol does NetScaler Management and Analytics System (NMAS) use when Discovery is run to locate instances?
A. RIP
B. TCP
C. ICMP
D. NITRO
A Citrix Engineer has configured NetScaler Web Logging on a Linux client machine. The engineer needs to verify if the log.conf file has been configured correctly and that there are NO syntax errors.
Which command can the engineer use to accomplish this?
A. nswl -verify -f/ns/etc/log.conf
B. nswl -verify -f/usr/local/netscaler/etc/log.conf
C. nswl -verify -f/usr/local/netscaler/bin/log.conf
D. nswl -verify -f/ns/bin/log.conf
A Citrix Engineer needs to implement Application Firewall to prevent the following tampering and
vulnerabilities:
-If web server does NOT send a field to the user, the check should NOT allow the user to add that field and
return data in the field.
-If a field is a read-only or hidden field, the check verifies that data has NOT changed.
-If a field is a list box or radio button field, the check verifies that data in the response corresponds to one
of the values in that field.
Which security check can the engineer enable to meet this requirement?
A. Field Formats
B. Form Field Consistency
C. HTML Cross-Site Scripting
D. CSRF Form Tagging
Scenario: A Citrix Engineer has configured LDAP group extraction on the NetScaler Management and Analytics System (NMAS) for the administration. The engineer observes that extraction is NOT working for one of the five configured groups.
What could be the cause of the issue?
A. The admin bind user has read-only permissions on the LDAP server.
B. The NMAS group does NOT match the one on the external LDAP servers.
C. The LDAP bind DN is incorrectly configured in the LDAP profile.
D. The user group extraction is NOT supported with plaintext LDAP.
A Citrix Engineer needs to implement a rate limiting policy to permit an average of one request in 40 ms using NetScaler.
Which Limit Identifier will meet this requirement?
A. adds ns limitIdentifier limit_req-threshold 40 –mode CONNECTION
B. set limitidentifier limit_req –mode request_rate –timeslice 2000 –Threshold 50 –limitType smooth
C. add ns limitIdentifier limit_req –threshold 1 –mode CONNECTION
D. set limitidentifier limit_req –mode request_rate –timeslice 2000 –Threshold 50 –limitType Bursty
The NetScaler Management and Analytics System (NMAS) needs to communicate with NetScaler instances on the Microsoft Azure and Amazon Web Services (AWS) clouds.
Which configuration must a Citrix Engineer make to meet this requirement?
A. Layer 2 tunnel between NetScaler MAS and the NetScaler VPX instances.
B. Layer 3 tunnel between NetScaler MAS and the NetScaler VPX instances.
C. Layer 2 Tunneling Protocol (L2TP) connection to the NetScaler VPX instances.
D. NetScaler MAS in the cloud.
Scenario: A Citrix Engineer is assigned applications using Role-based Access Control (RBAC) in NetScaler Management and Analytics Systems (NMAS). In the NMAS, the engineer can see all virtual servers under Web Insight > Applications, but is unable to access them.
What could be the cause of this behavior?
A. The RBAC is NOT supported for Orchestration.
B. The RBAC is NOT supported at the application level.
C. The Access Control policy is NOT configured on the NetScaler.
D. The Access Control policy name on NetScaler and NetScaler MAS should match.
A company has experienced an outage of their mission-critical website. Upon investigation, the Citrix Engineer determines that the following command was executed on the website:
DROP TABLE table_name
Which security check would have prevented this issue?
A. HTML SQL Injection
B. Form Field Consistency
C. HTML Cross-Site Scripting
D. Field Formats
A Citrix Engineer needs to optimize the Cascading Style Sheets (CSS) content sent from the backend server before being forwarded to the client.
Which option can the engineer use to accomplish CSS optimization?
A. Move to Head Tag
B. Shrink to Attributes
C. Lazy Load
D. Convert to WebP
Which mechanism does the NetScaler use to enable a safe and speedy data exchange between a client/ server initial TCP handshake?
A. TCP Fast Open (TFO)
B. TCP Burst Rate Control
C. TCP Hystart
D. TCP Time Stamp