1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 2

An administrator wants to grant internal users access to resources in an access server farm. Which two things should be provided to the users to ensure that they have access to published resources? (Choose two.)


Options are :

  • The FQDN of an Access Gateway appliance in a network
  • The FQDN of the Presentation Server
  • The name of the logon point
  • The FQDN of the Advanced Access Control server hosting the logon point

Answer : The name of the logon point The FQDN of the Advanced Access Control server hosting the logon point

Which type of filter can be applied to a connection policy?


Options are :

  • An email filter from Microsoft Outlook
  • A continuous scan filter
  • A group policy filter
  • A policy filter created on Citrix Presentation Server

Answer : A continuous scan filter

Which two syntaxes can be used when entering the administrator's credentials into the "Administrator Bind DN" field to configure LDAP authentication against Active Directory? (Choose two.)


Options are :

  • [email protected]
  • cn=administrator,cn=users,dc=citrix,dc=com
  • username/domain
  • ou=administrator,dc=citrix,dc=com

Answer : [email protected] cn=administrator,cn=users,dc=citrix,dc=com

1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 3

What is required to administer an access server farm using the Access Suite Console?


Options are :

  • An account which is in the Administrators role of the Access Gateway Server COM+ application.
  • An account which is in the Systems role of the Access Gateway Server COM+ application.
  • An account which is in the Administrators role for the SQL server database.
  • An account which is in the Guest role of the Access Gateway Server COM+ application.

Answer : An account which is in the Administrators role of the Access Gateway Server COM+ application.

Which policy setting is the only permission that can be set for network resources?


Options are :

  • VPN Tunnel
  • File Type Association
  • Upload
  • Access

Answer : Access

Scenario: Advanced Access Control is configured to use LDAP for primary authentication and authorization. An administrator needs to enable pass-through authentication in order for Active Directory credentials to be passed automatically to applications. What is the administrator required to do to meet the requirements of this scenario?


Options are :

  • Ensure that LDAP and Active Directory use the same trusted root certificate.
  • Ensure that the LDAP server is on the same network as the Active Directory server.
  • Ensure that the same logon account exists for LDAP and Active Directory.
  • Ensure that the same administrative account exists for the LDAP and Active Directory.

Answer : Ensure that the same logon account exists for LDAP and Active Directory.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

When enabled which three policy settings allow users to access email attachments? (Choose three.)


Options are :

  • Live Edit
  • Download
  • Upload
  • Email as Attachment
  • HTML Preview

Answer : Live Edit Download HTML Preview

Scenario: You are in the process of deploying Advanced Access Control in your company's IT environment. The corporate IT policy requires that all users have access to the company's employee portal website, but only the sales team has access to their webbased CRM application. Which configurations best meet the requirements of the described environment?


Options are :

  • Create two separate web resources; once for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Grant everyone access to the employee portal policy and only the sales team access to the CRM application policy.
  • Create two separate web resources; one for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Add a filter to the CRM policy that denies all non-sales team employees access.
  • Create two separate web resources; one for the employee portal and one for the CRM application. Create a single access policy and deny all non-sales team employees access to the CRM application.
  • Create a single web resource and add the URL for both the employee portal and the CRM application. Create a single access policy and grant only the sale team access to the CRM application.

Answer : Create two separate web resources; once for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Grant everyone access to the employee portal policy and only the sales team access to the CRM application policy.

An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished?


Options are :

  • Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters.
  • Configure the Anti-Virus package to automatically download the latest pattern file periodically.
  • Create a new scan package when updated signatures are released.
  • Create a scan rule which has a parameter that specifies the maximum age of the signatures.

Answer : Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

Which connection setting should be configured in a connection policy if a connection will be made using the Secure Access Client?


Options are :

  • Launch Secure Access Client if access is allowed
  • Launch Secure Access Client in the default connection
  • Launch the Secure Access Client and enable scripting on the client device
  • Launch and execute Secure Access Client logon scripts

Answer : Launch Secure Access Client if access is allowed

Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.)


Options are :

  • The administrator must use the Server Configuration Tool.
  • The administrator must use the Access Gateway Administration Tool.
  • The Access Suite Console must be closed.
  • All the services must be manually stopped and then restarted again.

Answer : The administrator must use the Server Configuration Tool. The Access Suite Console must be closed.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

Scenario: Tim, a member of the Sales and Marketing groups, calls the Help Desk to report difficulties accessing email when connecting to the corporate Advanced Access Control access server farm. Using the Policy Overview Tool you notice that the web-based email resource belongs to multiple policies which have different access rights to the resource. The environment has these policy configurations: In Policy A, web-based email is set to "Not Configured" for all authenticated users. In Policy B, web-based email is set to "Allow" for the Marketing Group and the Sales Group. In Policy C, web-based email is set to "Deny" for the Marketing Group. Based on the listed policy configurations, which statement accurately describes the outcome of the policies?


Options are :

  • The "Not Configured" setting on Policy A takes precedence over Policy B and C. No users will be granted access to web-based email.
  • The "Deny" setting in Policy C takes precedence over Policy A and B. Tim will be denied access to web-based email.
  • The "Deny" setting in Policy C is overridden by the "Not Configured" and "Allow" settings in Policy A and C respectively. Tim will be granted access to web-based email
  • The "Allow" setting in Policy B takes precedence over Policy A and C. Tim will be granted access to web-based email.

Answer : The "Deny" setting in Policy C takes precedence over Policy A and B. Tim will be denied access to web-based email.

How can an administrator control whether users are allowed or denied logon privileges through policies?


Options are :

  • Include the Allow Logon property in the access filter
  • Include the Allow Logon property in the access policy
  • Include the Allow Logon Resource in the access filter
  • Include the Allow Logon Resource in the access policy

Answer : Include the Allow Logon Resource in the access policy

When a logon point is renamed just after it is deployed, __________. (Fill in the blank with a listed option.)


Options are :

  • it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources
  • it can no longer be used
  • the Advanced Access Control setup CD must be used to redeploy the updated logon
  • it must be redeployed using the update function in the Access Suite Console

Answer : it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

Scenario: An administrator is implementing Access Gateway with Advanced Access Control for use in his environment. The implementation will be used primarily for mobile workers who may access resources from diverse client devices, which may be locked down and may not allow files such as client software to be downloaded. For this environment, which type of access should be given to the clients?


Options are :

  • VPN Client access
  • Browser-only access
  • Direct access
  • Kiosk Mode access

Answer : Browser-only access

Scenario: An administrator is required to configure the setting that determines whether users can reconnect to both active and disconnected sessions or only to disconnected sessions while creating a logon point. Which option should the administrator enable?


Options are :

  • Session Time-out
  • Window
  • Workspace Control
  • Domain Prompting

Answer : Workspace Control

What is the name of the policy setting that can be applied to a network resource?


Options are :

  • Download
  • Network Authentication
  • File Type Association
  • Access

Answer : Access

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

If migrating from a MetaFrame Secure Access Manager 2.X implementation to Advanced Access Control, which file must be specified during the initial configuration of the access server farm?


Options are :

  • NFE.XML
  • NFUSE.CONF
  • XPS.CAB
  • MSAM2.X CAB

Answer : MSAM2.X CAB

An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished?


Options are :

  • Create a new scan package when updated signatures are released.
  • Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters.
  • Configure the Anti-Virus package to automatically download the latest pattern file periodically.
  • Create a scan rule which has a parameter that specifies the maximum age of the signatures.

Answer : Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters.

What is required to administer an access server farm using the Access Suite Console?


Options are :

  • An account which is in the Administrators role of the Access Gateway Server COM+ application.
  • An account which is in the Administrators role for the SQL server database.
  • An account which is in the Guest role of the Access Gateway Server COM+ application.
  • An account which is in the Systems role of the Access Gateway Server COM+ application.

Answer : An account which is in the Administrators role of the Access Gateway Server COM+ application.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Which two settings(action controls) should be enabled to allow users to open and edit documents on servers using published resources in server farms running Presentation Server? (Choose two.)


Options are :

  • Access
  • Download
  • Live Edit
  • File Type Association

Answer : Access File Type Association

After providing the configuration database server and the access server farm name, which additional step must an administrator perform to change the farm membership of server?


Options are :

  • Provide the credentials used to access the configuration database server
  • Run discovery in the Access Suite Console
  • Restart the server for which the farm membership was changed
  • Restart the license server for the access server farm where the server was added

Answer : Provide the credentials used to access the configuration database server

When using an MSDE database to store configuration data for your access server farm, what must be specified during the initial configuration of the Advanced Access Control server?


Options are :

  • A name for the database
  • An account in the Administrators group on the Advanced Access Control server
  • The name of the access server farm
  • The location of the MSDE database

Answer : The name of the access server farm

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

Scenario: An environment requires that client devices accessing resources through the Access Gateway have a specific antivirus software installed. In addition, all client devices must have a valid SSL certificate installed. Which detail must be included when configuring a filter to meet the SSL certificate requirement?


Options are :

  • The presence of an SSL client certificate must be specified
  • The common name included on the SSL client certificate
  • The name of the organization on the SSL client certificate
  • The location of the the SSL client certificate

Answer : The presence of an SSL client certificate must be specified

In an environment where client devices must pass a file scan or a registry scan before being permitted access to the network, which logical expression should be used to create a continuous scan? (For all options, X represents the file scan and Y the registry scan.)


Options are :

  • (NOT X) AND (NOT Y)
  • X OR NOT Y
  • X OR Y
  • X AND Y

Answer : X OR Y

When is the "Authentication Credentials" option used in the deployment of a logon point?


Options are :

  • When RSA SecurID will be used along with the logon point
  • When a RADIUS or LDAP profile will be used along with the logon point
  • When the logon point is used by devices to access resources from a secure network over a connection that is not secure
  • When the logon point is used to connect devices that are not secure

Answer : When a RADIUS or LDAP profile will be used along with the logon point

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

Scenario: An administrator gives a user the URL https://Accounting1.net/CitrixLogonPoint/AccountAccess to access a logon page. "Accounting1.net" is the FQDN of the Advanced Access Control server hosting the logon point and "AccountAccess" is the name of the logon point. From the URL given to the user, which access method will be used to obtain resources from the access server farm?


Options are :

  • Secure Web Client
  • Browser-only access
  • Default logon point
  • Secure Access Client

Answer : Browser-only access

When implementing Advanced Access Control in an environment in which users will access resources through a VPN tunnel created by an Access Gateway appliance, which client must be used?


Options are :

  • Secure Access Client
  • Endpoint Analysis Client
  • Presentation Server Client
  • Web Client

Answer : Secure Access Client

Which three URL addresses are valid when creating a web resource? (Choose three.)


Options are :

  • https://www.yourcompany.net/users/ #
  • https://www.*.com/users/
  • http://Server1/Pilotresource/index.html
  • http://Server1/Pilotresource

Answer : https://www.yourcompany.net/users/ # http://Server1/Pilotresource/index.html http://Server1/Pilotresource

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

Which three options are available to deploy the Endpoint Analysis Client? (Choose three.)


Options are :

  • Citrix Instant Client Download
  • Active X /Plug-in
  • Endpoint Analysis Client MSI
  • Access Client Packager

Answer : Active X /Plug-in Endpoint Analysis Client MSI Access Client Packager

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions