Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?

Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?A . ResponderB . AuthorizationC . SessionD . TrafficView AnswerAnswer: A

September 4, 2018 No Comments READ MORE +

Which two components need to be configured for SmartAccess? (Choose two.)

Which two components need to be configured for SmartAccess? (Choose two.)A . Configuration loggingB . XenDesktop policiesC . XML TrustD . StoreFront server groupsView AnswerAnswer: CD Explanation: Reference: http://www.carlstalhood.com/smartaccess-smartcontrol-netscaler-11/

September 1, 2018 No Comments READ MORE +

Which mode on the NetScaler will the administrator utilize to meet this requirement?

A Citrix Administrator needs to utilize the client IP Address as the resource IP address for the NetScaler to server connections. Which mode on the NetScaler will the administrator utilize to meet this requirement?A . Layer2B . USIPC . Layer 3D . USNIPView AnswerAnswer: B

August 29, 2018 No Comments READ MORE +

What can a Citrix Administrator do to prevent users from viewing this message?

Scenario: A user is attempting to access a web server, which is load-balanced by the NetScaler using HTTPS. The user received the following message: SSL/TLS error: You have not chosen to trust “Certificate Authority” the issuer of the server’s security certificate. What can a Citrix Administrator do to prevent users...

August 27, 2018 No Comments READ MORE +

Which two timeout settings can the administrator configure to meet the requirements?

Scenario: A Citrix Administrator needs to configure a NetScaler Gateway virtual server in order to meet the security requirements of the organization. The administrator needs to configure timeouts for end-user sessions, to be triggered by the following behaviors: - Inactivity for at least 15 minutes - No keyboard or mouse...

August 26, 2018 No Comments READ MORE +