How can the administrator isolate department-level administration?

A Citrix Administrator wants to configure independent and isolated access on a single appliance for three different departments to allow them to manage and isolate their own applications.

How can the administrator isolate department-level administration?
A . Configure dedicated routes in the admin partitions for each department.
B . Configure Policy-based Routes for each department in the nsroot partition.
C . Configure admin partitions that use dedicated VLANs.
D . Configure a SNIP in each partition and bind a VLAN for the department.

Answer: B

Which action can the administrator take to use a single SSL virtual server?

Scenario: A Citrix Administrator manages an environment that has three SSL websites, all serving the same content.

www.company.com

www.company.net

www.company.org

The administrator would like to consolidate the website into a single, load-balanced SSL virtual server.

Which action can the administrator take to use a single SSL virtual server?
A . Bind the certificate of each website to a single SSL virtual server.
B . Bind a multiple Subject Alternative Name (SAN) certificate to a single SSL virtual server.
C . Bind a Wildcard certificate to a single SSL virtual server.
D . Bind a Wildcard certificate to a Content Switching virtual server.

Answer: D

Which feature of NetScaler Management and Analytics System (NetScaler MAS) can the administrator configure to monitor and troubleshoot in detail for an environment of this size?

Scenario: A Citrix Administrator is running applications on thousands of load-balanced backend servers in a large infrastructure. It is difficult to track and troubleshoot problems due to the large volume of traffic received.

Which feature of NetScaler Management and Analytics System (NetScaler MAS) can the administrator configure to monitor and troubleshoot in detail for an environment of this size?
A . AppFlow Analytics
B . Advanced Analytics with Telemetry Node installed
C . Application Performance Analytics
D . Application Security Analytics

Answer: B

Which pre-existing command policy would meet the needs of the scenario?

Scenario: A Citrix Administrator would like to grant access to a Junior Administrator on the NetScaler. The administrator would like to grant full access to everything except the following:

Shell Access User Configuration access Partition Configuration access

Which pre-existing command policy would meet the needs of the scenario?
A . Superuser
B . Network
C . Operator
D . Sysadmin

Answer: A

Which policy can the administrator use in this scenario?

Scenario: A Load Balancing virtual server (lb_vsrv_www) is configured to load balance service_1 and service_2. A Citrix Administrator needs to bind a content filter policy to the virtual server, such that if the user tries to access http://xenapp.citrix.com, then the request should go to service_1.

Which policy can the administrator use in this scenario?
A . add filter action Redirect_Service_1_Act redirect Service_1add filter policy Redirect_Service_1_Pol -rule “RE
B . HTT
C . HEADER HOSTANME CONTAINS xenapp.citrix.com” reqAction Redirect_Service_1_Act
D . add filter action Redirect_Service_1_Act forward Service_1add filter policy Redirect_Service_1_Pol -rule “RE
E . HTT
F . HEADER HOSTANME CONTAINS xenapp.citrix.com” reqAction Redirect_Service_1_Act
G . add filter action Redirect_Service_1_Act forward Service_1add filter policy Redirect_Service_1_Pol -rule “RE
H . HTT
. HEADER HOSTANME CONTAINS xenapp.citrix.com”
. add filter action Redirect_Service_1_Act respond Service_1add filter policy Redirect_Service_1_Pol -rule “RE
. HTT
. HEADER HOSTANME CONTAINS xenapp.citrix.com”

Answer: A

Which action should the administrator recommend in order to handle the increased web traffic?

Scenario: A Citrix Administrator manages an environment that has multiple websites running through a NetScaler MPX 5550. The NetScaler meets the needs of the environment throughout the year, except in December, when the capacity doubles. The administrator needs to handle this increased web traffic with a temporary, cost-effective solution.

Which action should the administrator recommend in order to handle the increased web traffic?
A . Purchase a license to upgrade the MPX 5550 to a MPX 5650.
B . Purchase a BurstPack License.
C . Purchase Universal License.
D . Purchase NetScaler Gateway Platform License.

Answer: B

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)

Which two options should a Citrix Administrator consider when adding a secondary device in a high availability (HA) pair? (Choose two.)
A . Configure the HA status of the Primary Node as STAYPRIMAR
C . HA Monitoring should be disabled on all the unused interfaces.
D . Both the devices should have different SNIP addresses.
E . The nsroot password should be the same on both nodes.
F . The Independent Network Configuration (INC) mode should be enabled.

Answer: A,E

How can troubleshooting continue using the ns.log?

Scenario: A Citrix Administrator is troubleshooting a NetScaler issue. The administrator goes to the command line and from the Shell, tails the ns.log to view the log in real time to find the issue. After a few minutes, the administrator noticed that the logs stopped scrolling and the issue was missed.

How can troubleshooting continue using the ns.log?
A . The ns.log needs to be downloaded to the client machine for full viewing.
B . The ns.log service has stopped and needs to be restarted.
C . The ns.log is still running. Press ‘Enter’ and the ns.log will resume.
D . The ns.log has reached its 100 KB limit. Press ‘CTRL+C’ to stop it from running and issue the command “tail-f ns.log” to resume.

Answer: A

What can a Citrix Administrator do to prevent users from viewing this message?

Scenario: A user is attempting to access a web server which is load balanced by the NetScaler using HTTPS. The user received the following message:

SSL/TLS error: You have not chosen to trust “Certificate Authority” the issuer of the server’s security certificate.

What can a Citrix Administrator do to prevent users from viewing this message?
A . Ensure that the intermediate Certificate is linked to the Root Certificate.
B . Ensure that the user has the Server Certificate installed.
C . Ensure that the user has the Certificate’s Public key.
D . Ensure that the intermediate Certificate is linked to the Server Certificate.

Answer: A