Scenario: A Citrix Engineer needs to deploy a XenMobile solution for a large organization. The organization will use XenMobile to manage Android and iOS devices.
To provide resilience, NetScaler appliances will communicate with XenMobile Servers. The engineer has deployed all necessary infrastructure and opened the required firewall ports. To load balance mobile device management traffic, the engineer has configured NetScaler to use SSL_Bridge to communicate with a XenMobile Server cluster.
Which persistence method should the engineer configure to facilitate consistent communication between the NetScaler and the XenMobile Servers?
A. SSLSESSION
B. CUSTOMSERVERID
C. DESTIP
D. COOKIEINSERT
A Citrix Engineer must delegate enrollment invitation management to Level 1 administrators. What should the engineer do to accomplish this objective?
A. Configure AAA groups on the NetScaler Gateway; allow only this group to access the console over port 4443.
B. Create a local group on the XenMobile Server; allow only Level 1 administrators access to it.
C. Configure a Delivery Group within the XenMobile Server; deploy the security policies only to the dedicated group of Level 1 administrators.
D. Configure Role-based Access Control (RBAC); assign only the desired permissions to the Active Directory group where the Level 1 administrators reside.
A Citrix Engineer downloaded the incorrect version of Worx Home on an Android device and is attempting to uninstall Worx Home, but attempts to uninstall have NOT been successful.
What should the engineer do to successfully uninstall Worx Home?
A. Restart the device.
B. Deactivate Worx Home as an administrator on the device.
C. Unenroll the device.
D. Remove all MDX applications from the device.
How could a Citrix Engineer ensure that user devices reflect a change to the Worx PIN security policy?
A. Log off from Worx Home and log on again.
B. Update to the latest version of Worx Home.
C. Refresh the policy in Worx Home.
D. Launch a Worx Home resource.
Which two triggers could a Citrix Engineer use to create an automated action to selectively wipe devices when a user account is disabled? (Choose two.)
A. Event
B. User property
C. Device property
D. Installed app name
A Citrix Engineer is adding a second node to an existing standalone XenMobile deployment. Which three steps must the engineer take when deploying additional nodes? (Choose three.)
A. Enable the cluster option on the existing node.
B. Connect to the existing XenMobile Server database.
C. Use the internal PKI certificate password from the existing node.
D. Use the same device certificate as the existing node.
E. Use the same host name as the existing node.
Scenario: A Citrix Engineer in a XenMobile deployment is in the process of implementing ShareFile Enterprise with Security Assertion Markup Language (SAML) support using Microsoft Active Directory Federation Services (ADFS). The Active Directory team has installed and configured ADFS and has provided the engineer with the information needed to configure ShareFile Enterprise and enable SAML Single Sign-On.
Which three pieces of information must the engineer configure for SAML in ShareFile Enterprise? (Choose three.)
A. Login URL
B. Logout URL
C. X.509 Certificate
D. IDP Issuer/ Entity IP
E. ShareFile Issuer / Entity ID
F. SP-Initiated SSO Certificate
G. SP-Initiated Authentication context
What must remain consistent between an old and new certificate when renewing an Apple Push Notification service (APNs) certificate?
A. Apple ID
B. Private key password
C. Certificate request server
D. Certificate common name
Scenario:XenMobile Device Manager is implemented to ensure Android and iOS users are compliant with corporate security policies.
A Citrix Engineer is required to set the following restrictions for all devices:
-Restrict device passcode to 4 digits
-
Disable the device camera
Which two configuration steps should the engineer take to meet the needs of the scenario? (Choose two.)
A.
Create a configuration policy for each device type.
B.
Create a configuration policy containing both restrictions.
C.
Create a deployment package with a device type property rule.
D.
Create a single deployment package to deploy to both device types.
E.
Create separate deployment packages and deploy to each device type.
Scenario: A company with 29,000 enrolled users recently acquired another company with 8,000 users. All new users also will need access to Enterprise applications. Each server's specifications include four vCPUs and 16 GB of RAM.
What is the minimum amount of XenMobile cluster nodes required to support this environment?
A. One
B. Two
C. Three
D. Four