1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 1

When establishing events to be logged in the Windows Event Viewer, which step should be taken in Advanced Access Control?


Options are :

  • Configure an event to be logged from the Server Configuration
  • Configure the types of events to be logged
  • Configure a network resource to log events
  • Configure a logging filter

Answer : Configure the types of events to be logged

1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 2

Scenario: An administrator wants to make documents from a defined file share open from a Citrix Presentation Server session. Which policy setting should be enabled for this purpose?


Options are :

  • Live Edit
  • HTML Preview
  • File type association
  • Download

Answer : File type association

Which task in the Server Configuration Tool should be selected to change farm membership of a server?


Options are :

  • Authentication Server
  • Server Farm Information
  • Configured Logon Points
  • Services
  • Service Account

Answer : Server Farm Information

Which two statements are true of adding an Access Gateway appliance to an Advanced Access Control deployment? (Choose two.)


Options are :

  • After configuring the Access Gateway appliance, at least one Advanced Access Control server in the farm must be rebooted.
  • The Access Gateway appliance must be assigned at least one IP address.
  • The administrator must execute the Add Gateway Appliance task from the Gateway Appliance node in order for the new Access Gateway appliance to appear in the Access Suite Console.
  • The Access Gateway appliance must be configured to point to the FQDN/IP address of one or more Advanced Access Control servers in the farm.

Answer : The Access Gateway appliance must be assigned at least one IP address. The Access Gateway appliance must be configured to point to the FQDN/IP address of one or more Advanced Access Control servers in the farm.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

When creating a typical filter that consists of three logon points, which logical operator is used to combine them?


Options are :

  • AND
  • OR
  • NOT
  • XOR

Answer : OR

While configuring a web email resource, what must an administrator do to ensure that users can email attachments from the web resource?


Options are :

  • Create a policy granting users the appropriate permissions
  • Configure email synchronization
  • Enable the "Access" policy setting
  • Configure an HTML Preview server

Answer : Create a policy granting users the appropriate permissions

Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.)


Options are :

  • The administrator must use the Access Gateway Administration Tool.
  • All the services must be manually stopped and then restarted again
  • The Access Suite Console must be closed.
  • The administrator must use the Server Configuration Tool.

Answer : The Access Suite Console must be closed. The administrator must use the Server Configuration Tool.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

A client device is scanned but the user receives a message that he is denied access to the network. Which two actions can help the administrator determine which endpoint analysis scans failed? (Choose two.)


Options are :

  • Export the results to a comma-separated list using an endpoint analysis command-line tool
  • Modify the Disallowed.ascx page to show the scan results
  • Examine the "Endpoint Analysis Scan Results" snap-in
  • View the event log on the Advanced Access Control server

Answer : Modify the Disallowed.ascx page to show the scan results View the event log on the Advanced Access Control server

Which two conditions must be included in the first rule for a scan to ensure that the same conditions are available for additional subsequent rules for the scan? (Choose two.)


Options are :

  • Authentication strength
  • Operating system
  • Logon point
  • Client device regional locale

Answer : Logon point Client device regional locale

Which two steps must an administrator take to remove an Access Gateway appliance server from an Advanced Access Control deployment? (Choose two.)


Options are :

  • The administrator must configure the Access Gateway appliance server so that it no longer points itself to an Advanced Access Control server in the deployment.
  • The administrator must uncheck the Access Gateway role checkbox for the Access Gateway appliance to be removed in the Manage Server Roles dialog of the Access Suite Console.
  • The administrator must execute the Remove Access Gateway task from the Gateway Appliances node in the Access Suite Console.
  • After configuring the Access Gateway appliance to be removed, at least one Advanced Access Control server in the farm must be rebooted.

Answer : The administrator must configure the Access Gateway appliance server so that it no longer points itself to an Advanced Access Control server in the deployment. The administrator must execute the Remove Access Gateway task from the Gateway Appliances node in the Access Suite Console.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

Scenario: Ken configured an Exchange Server and Outlook clients for email synchronization. Client devices are using Microsoft Outlook 2000 and running on Windows XP operating systems. The Secure Access Client is installed on all client devices. What are two requirements to perform the configurations required for this scenario? (Choose two.)


Options are :

  • The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens.
  • The administrator verifies that the client devices have Internet Explorer 5 or 6 with all critical updates installed.
  • The administrator grants the Download Email Attachment privilege for all users.
  • The administrator must create and configure a policy.

Answer : The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens. The administrator must create and configure a policy.

When creating a single web resource containing multiple URLs, which consideration must be taken into account?


Options are :

  • A website that is secure from cross-site scripting is the best candidate for creating web resources containing multiple URLs.
  • Bypassing the "web proxy URL rewriting" protects web resources from vulnerabilities before creating them as web resources from multiple URLs.
  • Applying the "same origin" Java script to the site will protect it from malicious scripts when it is created from multiple URLs.
  • A separate policy must be attached to each URL in the resource.

Answer : A website that is secure from cross-site scripting is the best candidate for creating web resources containing multiple URLs.

Which statement is true about access policies?


Options are :

  • If multiple policies apply to a resource, a policy that allows access permission wins over other policies that denies access permission.
  • It is possible to select policy settings on the configure settings page for types of resources that you did not select for the policy to control and add those types of resources to the policy at a later time.
  • Access to published applications and resources on a Citrix Presentation Server is controlled by Advanced Access Control Presentation Server policies.
  • Access to published resources on Citrix Presentation Server depends on the properties of Advanced Access Control policies and the logon point that is used to access the resources.

Answer : It is possible to select policy settings on the configure settings page for types of resources that you did not select for the policy to control and add those types of resources to the policy at a later time.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

Along with Active Directory, which other two authentications could be implemented in order to provide Advanced Authentication? (Choose two.)


Options are :

  • Smart Cards
  • Secure Computing SafeWord PremierAccess
  • RSA Security SecurID
  • LDAP authentication

Answer : Secure Computing SafeWord PremierAccess RSA Security SecurID

In the Access Suite Console, which steps must an administrator take to create an access policy that controls access to all visible servers and services in the network?


Options are :

  • Select the farm node and disable network policy enforcement.
  • Select "Network Resources" and choose "Entire Network."
  • Select the Access Policies node in the console tree and add all visible servers and services to the access policy.
  • Select the appropriate domain from the domain list and choose to make the access policy the default authentication for that domain.

Answer : Select "Network Resources" and choose "Entire Network."

Where can an administrator configure the endpoint analysis scan for an operating system?


Options are :

  • From the Operating System policy node
  • From the Operating System rule node
  • In the Endpoint Analysis scan node
  • From the Operating System scan group node

Answer : From the Operating System scan group node

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

Which type of filter should an administrator create, if a filter that specifies a particular NOT logic condition must exist in order for access to be granted?


Options are :

  • Negative Filter
  • Typical Filter
  • Custom Filter
  • Exclusion Filter

Answer : Custom Filter

An administrator needs to make a change to the default logon point settings for an Advanced Access Control implementation. Where can the administrator locate the default logon point?


Options are :

  • In the Access Suite Console
  • In the IIS Manager Console
  • In the Access Gateway Administration Portal
  • In the Access Gateway Administration Tool

Answer : In the Access Suite Console

Scenario: An administrator needs to provide users access to unique file shares named for users through the access server farm. The shares named for the users are in a folder called "users" located on the server named "corporateHQ1srv" and are linked directly to the user's profile as set up in Active Directory. In this environment, what is the UNC path that the administrator should specify when defining a web file resource that will grant each user access to their directory?


Options are :

  • \\corporateHQ1srv\users\%username%
  • \\corporateHQ1srv\users\%displayname%
  • \\corporateHQ1srv\users\#
  • \\corporateHQ1srv\users\#

Answer : \\corporateHQ1srv\users\#

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Which utility can an administrator use to audit a logged event for a specific server?


Options are :

  • Server Configuration Tools
  • Access Suite Console
  • Presentation Server Management Console
  • Windows Event Viewer

Answer : Windows Event Viewer

Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.)


Options are :

  • Secure Access Client
  • Client for Java
  • Web Client
  • Live Edit Client

Answer : Client for Java Web Client

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

In an environment where client devices must pass two file scans before being permitted access to the network, which logical expression should be used to create a continuous scan?


Options are :

  • NOT Y, where Y represents a failed scan
  • X AND Y, where X and Y represents the file scans
  • X OR Y, where X and Y represents the file scans
  • (X AND Y) OR Y, where X and Y represents the file scans

Answer : X AND Y, where X and Y represents the file scans

An administrator is creating logon points and needs to configure the session settings. What is true about the configuration of session settings for logon points?


Options are :

  • Published application usage through the web browser may require an increase in VPN client time-out.
  • Session time-out is set by default to 30 minutes.
  • Secure Access Client (VPN) time-out should always be longer than session time-out.
  • Domain prompting is used to determine whether the domain is available for access.

Answer : Secure Access Client (VPN) time-out should always be longer than session time-out.

Which Radius configuration would result in the first request going to the first Radius server, the second request going to the second server, and so on?


Options are :

  • Fault Tolerance
  • Load Balancing
  • Failover
  • Redundancy

Answer : Load Balancing

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

Whenever a RADIUS or LDAP profile is associated with a logon point, the administrator must ______. (Fill in the blank with a listed option.)


Options are :

  • use a Sample Logon Point
  • deploy the Secure Access Client on every client device
  • provide the associated credential during the deployment of the logon point
  • provide a decentralized database to store users' profiles

Answer : provide the associated credential during the deployment of the logon point

A network has multiple Presentation Server farms identified in the logon point. How can an administrator determine which server farm will be used for file type association?


Options are :

  • Prioritize the server farms.
  • Choose the default Presentation Server.
  • Prioritize the published applications.
  • Prioritize the Access Gateway appliance that connects to a specific server farm.

Answer : Prioritize the server farms.

Which two options are available for configuring licensing from the Server Configuration Wizard? (Choose two.)


Options are :

  • Use a licensing server that exists on another server.
  • Install a license onto the Access Gateway appliance.
  • Import licenses from the Access Gateway appliance.
  • Install Citrix License server on the Advanced Access Control server during configuration.

Answer : Use a licensing server that exists on another server. Install Citrix License server on the Advanced Access Control server during configuration.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

Which connection setting should be enabled during a connection policy configuration to ensure automatic drive mapping on client devices using a Windows logon script?


Options are :

  • Enable pass-through authentication
  • Execute logon scripts
  • Select file shares
  • Execute automatic drive mapping

Answer : Execute logon scripts

In which location must the Advanced Access Control Software be installed?


Options are :

  • On a server which can communicate with the Access Gateway appliance
  • On the license server in the internal network
  • On the system that hosts the configuration database
  • On the Access Gateway appliance in the DMZ

Answer : On a server which can communicate with the Access Gateway appliance

What happens when the Allow Logon Resources setting is NOT selected in the access policy?


Options are :

  • The access policy only controls whether users are allowed to log onto the farm.
  • The access policy only controls the denied logon privileges.
  • The access policy does not control whether users are allowed to log onto the farm.
  • The access policy does not control any settings except for those that are specified in the Allow Logon setting.

Answer : The access policy does not control whether users are allowed to log onto the farm.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 3

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions