Which feature should the engineer use to configure policies centrally only once and avoid configuring them on each site?

Scenario: A Citrix Engineer is managing a large Citrix Virtual Apps and Desktops environment with three sites. Users connecting to applications and VDI machines in these sites are using a common Citrix ADC Gateway. The engineer wants to configure peripheral federation and port redirection policies for secure access to the...

August 1, 2020 No Comments READ MORE +

Which PowerShell cmdlet is used to check the connection string, which connects the Citrix Delivery Controller to communicate to the site database?

Which PowerShell cmdlet is used to check the connection string, which connects the Citrix Delivery Controller to communicate to the site database?A . Get-BrokerServiceInstanceB . Get-BrokerDbconnectionC . Get-BrokerConnectionLogD . Get-BrokerInstalledDbVersionView AnswerAnswer: B Explanation: Reference: https://support.citrix.com/article/CTX238581

July 31, 2020 No Comments READ MORE +

What does the engineer need to do prior to enabling this feature?

A Citrix Engineer wants to enable the "Log Off Web Portal When Session is Launched" feature within Workspace Environment Management (WEM) transformer settings. What does the engineer need to do prior to enabling this feature?A . Set Workspace control to NOT automatically reconnect to the sessions when users log onto...

July 29, 2020 No Comments READ MORE +

Which file is used to store a subscription on the Storefront server?

Which file is used to store a subscription on the Storefront server?A . PersistentDictionary.edbB . Web.configC . Subscription.txtD . Style.csvView AnswerAnswer: B Explanation: Reference: https://www.carlstalhood.com/storefront-subscriptions/

July 29, 2020 No Comments READ MORE +

What should the engineer do to minimize the impact of the SQL outage?

Scenario: A Citrix Engineer noticed that a Citrix Virtual Apps and Desktops environment lost connection to the SQL servers where the Citrix databases are running. Due to this, the Site has become unmanaged and first-time users CANNOT connect to their Citrix Virtual Apps & Desktops resources. The setup was recently...

July 29, 2020 No Comments READ MORE +

Which database high availability option does Citrix recommend for Workspace Environment Management (WEM)?

Which database high availability option does Citrix recommend for Workspace Environment Management (WEM)?A . Always OnB . MirroringC . ReplicationD . ClusteringView AnswerAnswer: B Explanation: Reference: https://christiaanbrinkhoff.com/2017/06/09/how-to-configure-citrix-workspace-environment­management43-for-xenapp-or-xendesktop/

July 28, 2020 No Comments READ MORE +

Which command should a Citrix Engineer use to review recent connections and brokering attempts within a Citrix Virtual Apps and Desktops site?

Which command should a Citrix Engineer use to review recent connections and brokering attempts within a Citrix Virtual Apps and Desktops site?A . Get-BrokerConnectionB . Get-BrokerSessionC . Get-BrokerConnectionLogD . Get-BrokerSessionLogView AnswerAnswer: C Explanation: Reference: https://developer-docs.citrix.com/projects/citrix-virtual-apps-desktops-sdk/en/latest/Broker/Get-BrokerConnectionLog/

July 27, 2020 No Comments READ MORE +

Which two statements are true for a Workspace Environment Management (WEM) configuration set? (Choose two.)

Which two statements are true for a Workspace Environment Management (WEM) configuration set? (Choose two.)A . A WEM Agent can point to more than one WEM configuration set.B . The Environmental Settings within the WEM Administration Console are per machine, NOT per user.C . Multiple configuration sets are needed in...

July 27, 2020 No Comments READ MORE +

Which three considerations are accurate regarding the Enterprise Layer Manager (ELM) server? (Choose three.)

Which three considerations are accurate regarding the Enterprise Layer Manager (ELM) server? (Choose three.)A . It hosts the SMB file share for the Elastic Layers data.B . It manages and maintains copies of all layers and layered images.C . It is a Windows-based virtual appliance maintained on the hypervisor.D ....

July 26, 2020 No Comments READ MORE +

Which two steps can the engineer take to minimize attacks without interfering with user productivity?

Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking. Which two steps can the engineer take to minimize attacks without...

July 26, 2020 No Comments READ MORE +