A Citrix Architect has deployed NetScaler Management and Analytics System (NMAS) to monitor a high availability pair of NetScaler VPX devices.
The architect needs to deploy automated configuration backup to meet the following requirements:
1.
The configuration backup file must be protected using a password.
2.
The configuration backup must be performed each day at 8:00 AM GMT.
3.
The configuration backup must also be performed if any changes are made in the ns.conf file.
4.
Once the transfer is successful, auto-delete the configuration file from the NMAS.
Which SNMP trap will trigger the configuration file backup?
A. netScalerConfigSave
B. sysTotSaveConfigs
C. netScalerConfigChange
D. sysconfigSave
Scenario: A Citrix Architect has implemented two high availability pairs of MPX 5500 and MPX 11500 devices respectively with 12.0.53.13 nc version. The NetScaler devices are set up to handle NetScaler Gateway, Load Balancing, Application Firewall, and Content Switching. The Workspacelab infrastructure is set up to be monitored with NMAS version 12.0.53.13 nc by the Workspacelab administrators. The Workspacelab team wants to implement one more pair of NetScaler MPX 7500 devices with version
12.0.53.13 nc.
The Citrix consulting team has assigned the task to implement these NetScaler devices in the infrastructure and set them up to be monitored and managed by NMAS.
The following are the requirements that were discussed during the project initiation call:
1.
NMAS should be configured to get the infrastructure information under sections such as HDX Insight, WEB Insight, and Security Insight.
2.
Configuration on the new MPX devices should be identical to MPX 11500 devices.
3.
Configuration changes after the deployment and initial setup should be optimized using NMAS.
4.
NMAS should be utilized to configure templates that can be utilized by the Workspacelab team in future deployment.
5.
As per the requirement from the Workspacelab team, NMAS should be store the audited data for only 15 days.
Which process should the architect utilize to ensure that the deployment of MPX 11500 devices are optimized and that it is correct, before deploying the devices in production?
A. Under Stylebooks; Inbuilt and composite stylebook templates should be utilized prior to deployment.
B. Under Stylebooks; Public and composite stylebook templates should be utilized prior to deployment.
C. Under Configuration Management; Configuration Audit and Advice should be used prior to deployment.
D. Under Configuration jobs; Configuration Audit and Advice should be used prior to deployment.
Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.
The issue was isolated to several endpoint analysis (EPA) scan settings.
Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.
Which setting is preventing the security requirements of the organization from being met?
A. Item 1
B. Item 4
C. Item 2
D. Item 3
Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion. They have captured the following requirements for NetScaler design project:
1.
The authentication must be deployed for the users from the workspacelab.com and vendorlab.com domains.
2.
The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP.
3.
The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS.
4.
The vendorlab users should be authenticated using Active Directory Federation Service.
5.
The user credentials must NOT be shared between workspacelab and vendorlab.
6.
Single Sign-on must be performed between StoreFront and NetScaler Gateway.
7.
A domain drop down list must be provided if the used connects to the NetScaler gateway virtual server externally.
Which method must the architect utilize for user management between the two domains?
A. Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain.
B. Create a global catalog containing the objects of Vendorlab and Workspacelab domains.
C. Create shadow accounts for the Vendorlab domain in the Workspacelab domain.
D. Create a two-way trust between the Vendorlab and Workspacelab domains.
Scenario: More than 10,000 users will access a customer's environment. The current networking infrastructure is capable of supporting the entire workforce of users. However, the number of support staff is limited, and management needs to ensure that they are capable of supporting the full user base.
Which business driver is prioritized, based on the customer's requirements?
A. Simplify Management
B. Increase Scalability
C. Increase Flexibility
D. Reduce Costs
E. Enable Mobile Work Styles
F. Increase Security
Scenario: A Citrix Architect is asked by management at the Workslab organization to review their existing configuration and make the necessary upgrades. The architect recommends small changes to the preexisting NetScaler configuration. Currently, the NetScaler MPX devices are configured in a high availability pair, and the outbound traffic is load-balanced between two Internet service providers 9ISPs). However, the failover is NOT happening correctly.
The following requirements were discussed during the design requirements phase:
1.
The return traffic for a specific flow should be routed through the same path while using Link Load Balancing.
2.
The link should fail over if the ISP router is up and intermediary devices to an ISP router are down.
3.
Traffic going through one ISP router should fail over to the secondary ISP, and the traffic should NOT flow through both routers simultaneously.
What should the architect configure with Link Load balancing (LLB) to meet this requirement?
A. Net Profile
B. Mac-based forwarding option enabled.
C. Resilient deployment mode
D. Backup route
Under which two circumstances will a service be taken out of the slow start phase with automated slow start? (Choose two.)
A. The service does NOT receive traffic for three successive increment intervals.
B. The server request rate parameters are set above 25 requests per second.
C. The actual request rate is slower than the new service request rate.
D. The percentage of traffic that the new service must receive is greater or equal to 50.
E. The request rate has been incremented 100 times.
Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that certain user groups were receiving access to an internal web server with an authorization configuration that does NOT align with the designed security requirements.
Click the Exhibit button view the configured authorization settings for the web server.
Which item should the architect change or remove to align the authorization configuration with the security requirements of the organization?
A. Item 1
B. Item 3
C. Item 4
D. Item 5
E. Item 2
For which three reasons should a Citrix Architect perform a capabilities assessment when designing and deploying a new NetScaler in an existing environment? (Choose three.)
A. Understand the skill set of the company.
B. Assess and identify potential risks for the design and build phase.
C. Establish and prioritize the key drivers behind a project.
D. Determine operating systems and application usage.
E. Identify other planned projects and initiatives that must be integrated with the design and build phase.
Which step does a Citrix Architect need to ensure during the Define phase when following the Citrix Methodology?
A. Testing steps were integrated.
B. The project manager agrees with road map timelines.
C. A phased roll out was completed.
D. Existing networking infrastructure is ready.
E. The redundancy deployment decision was made.