Citrix 1Y0-440 Dumps PDF | 1Y0-440 Exam Study Material | Realexamdumps.com


Vicky114

Uploaded on Oct 30, 2019

Category Education

If you are going to appear in 1Y0-440 exam then you can prepare from 1Y0-440 dumps pdf to bring the best grades out of your efforts. You will get your desired grades with money back guarantee because the quality of this dumps material cannot be challenged. 1Y0-440 study material is the most suitable material for the preparation of this certification. It has been designed by considering the nature and requirements of exam and students’ inclination towards learning. For more info:https://www.realexamdumps.com/Citrix/1Y0-440-practice-test.html

Category Education

Comments

                     

Citrix 1Y0-440 Dumps PDF | 1Y0-440 Exam Study Material | Realexamdumps.com

Citrix 1Y0-440 Dumps PDF Architecting a Citrix Networking Solution For More Info: https://www.realexamdumps.com/citrix/1y0-440-practice-test.html Question: 1 A Citrix Architect has deployed NetScaler Management and Analytics System (NMAS) to monitor a high availability pair of NetScaler VPX devices. The architect needs to deploy automated configuration backup to meet the following requirements: The configuration backup file must be protected using a password. The configuration backup must be performed each day at 8:00 AM GMT. The configuration backup must also be performed if any changes are made in the ns.conf file. Once the transfer is successful, auto-delete the configuration file from the NMAS. Which SNMP trap will trigger the configuration file backup? A. netScalerConfigSave B. sysTotSaveConfigs C. netScalerConfigChange D. sysconfigSave Answer: A Question: 2 A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a NetScaler_________deployed_________. (Choose the correct option to complete sentence.) A. CPX; as part of a high availability pair B. CPX; as a stand alone device C. SDX; with less than 6 partitions and dedicated management interface D. MPX; as part of the cluster but Cluster IP is NOT configured E. SDX; with no partitions as a stand alone device Answer: C Question: 3 Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites. The requirements captured during the design discussion held for a NetScaler design project are as follows: Two (2) pairs of NetScaler MPX appliances deployed in the DMZ and internal network. High Availability will be accessible for each NetScaler MPX The external NetScaler MPX appliance will be deployed in multi-arm mode. The internal NetScaler MPX will be deployed in single-arm mode wherein it will be connected to Cisco ACI Fabric. All three (3) Workspacelab sites: Dc, NDR and DR, will have similar NetScaler configurations and design. How many NetScaler MPX appliances should the architect deploy at each site to meet the design requirements above? A. 4 B. 12 C. 6 D. 2 Answer: C Question: 4 Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a NetScaler design project. They captured the following requirements from this design discussion: A pair of NetScaler MPX appliances will be deployed in the DMZ network. High Availability will be accessible in the NetScaler MPX in the DMZ Network. Load balancing should be performed for the internal network services like Microsoft Exchange Client Access Services and Microsoft App-V. The load balancing should be performed for StoreFront. The NetScaler Gateway virtual server will be utilizing the StoreFront load-balancing virtual server. The NetScaler Gateway virtual server and StoreFront. The NetScaler Gateway virtual service and StoreFront and load-balancing services are publicly accessible. The traffic for internal and external services must be isolated. Click the Exhibit button to review the logical network diagram. Which two design decisions are incorrect based on these requirements? (Choose two.) A. LB StoreFront bound to traffic Domain 0 B. NetScaler Gateway VIP bound to Traffic Domain 1 C. LB APP-V bound to Traffic Domain 1 D. SNIP 192.168.20.2 bound to Traffic Domain 1 Answer: A,B Question: 5 Scenario: A Citrix Architect needs to plan for a customer environment in which more than 10,000 users will need access. The networking infrastructure needs to be able to handle the expected usage. Which business driver should be prioritized based on the customer’s requirement? A. Increase flexibility B. Enable mobile work styles C. Simplify management D. Increase Scalability E. Reduce Costs F. Increase Security Answer: D Question: 6 Scenario: A Citrix Architect needs to deploy SAML integration between NetScaler (Identity Provider) and ShareFile (Service Provider). The design requirements for SAML setup are as follows: NetScaler must be deployed as the Identity Provider (IDP). ShareFile server must be deployed as the SAML Service Provider (SP). The users in domain workspacelab.com must be able to perform Single Sign-on to ShareFile after authenticating at the NetScaler. The User ID must be UserPrincipalName. The User ID and Password must be evaluated by NetScaler against the Active Directory servers SFO-ADS- 001 and SFO-ADS-002. After successful authentication, NetScaler creates a SAML Assertion and passes it back to ShareFile. Single Sign-on must be performed. SHA 1 algorithm must be utilized. The verification environment details are as follows: Domain Name: workspacelab.com NetScaler AAA virtual server URL https://auth.workspacelab.com ShareFile URL https://sharefile.workspacelab.com Which SAML IDP action will meet the design requirements? A. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 – assertionConsimerServiceURL “https://auth.workspacelab.com/samIIssueName auth.workspacelab.com -signatureAlg RSA-SHA256-digestMethod SHA256-encryptAssertion ON -serviceProviderUD sharefile.workspacelad.com B. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 – assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs” –samIIssuerName sharefile.workspacelab.com –signatureAlg RSA-SHA256 –digestMethod SHA256 –serviceProviderID sharefile.workspacelab.com C. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 – assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs” –samIIssuerName auth.workspacelab.com –signatureAlg RSA-SHA1-digestMethod SHA1 –encryptAssertion ON – serviceProviderID sharefile.workspacelab.com D. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 – assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs” –samIIssuerName sharefile.workspacelab.com –signatureAlg RSA-SHA1 –digestMethod SHA1 –encryptAssertion ON – serviceProviderID sharefile.workspacelab.com Answer: C