1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 3

Which two tools are used to configure RADIUS authorization for an Advanced Access Control implementation in a Windows domain? (Choose two.)


Options are :

  • The Server Configuration Wizard
  • The Access Suite Console
  • The remote access policy in Microsoft Internet Authentication Service
  • The Access Gateway Administrator's Tool

Answer : The Access Suite Console The remote access policy in Microsoft Internet Authentication Service

1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 4

When changing the service account information for an access server farm, which statement is true?


Options are :

  • New service accounts must be manually added to the local administrators group on the local system.
  • The service account must be a domain administrator.
  • New service accounts will automatically be added to the Local Administrators group.
  • Once changed, the original service account is automatically removed from the local security policy.

Answer : New service accounts will automatically be added to the Local Administrators group.

From which node in the Access Suite Console can an administrator configure event logging?


Options are :

  • Resource node
  • Servers node
  • Access Server Farm node
  • Endpoint Analysis node

Answer : Access Server Farm node

Which type of IP addressing is needed to enable internal and external connection to the Access Gateway appliance?


Options are :

  • Default IP addressing
  • Dynamic IP addressing
  • Static IP addressing
  • Alternate IP addressing

Answer : Static IP addressing

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

Which two steps must an administrator take to ensure that a file share appears in the navigation page for users? (Choose two.)


Options are :

  • Make the file share the home page.
  • Create a policy that allows users access to the file share.
  • Select the file share in the properties of the navigation page.
  • Publish the file share.

Answer : Create a policy that allows users access to the file share. Publish the file share.

What are two available roles for assignment to a given server in the access server farm? (Choose two.)


Options are :

  • Agent server
  • Web server
  • State server
  • Access Gateway server

Answer : Agent server Web server

Scenario: An administrator creates three web resources: One, for the marketing portal which is restricted to partners and marketing employees; another, for Human Resources portal which is exclusively for employees of the Human Resources department and managers; and a third, which is for a sales web application. What must be done before users can access these resources?


Options are :

  • Policies must be created and applied to the resources.
  • Discovery must be run on the Advanced Access Control server to ensure that the resources are recognized by the farm.
  • Refresh the appropriate logon points.
  • Filters must be created and applied to the resources.

Answer : Policies must be created and applied to the resources.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

What are two required steps for creating a typical filter that would require users to logon using a specific URL and their client devices to be running a specific anti-virus software? (Choose two.)


Options are :

  • Run the Create Filter Wizard from the logon point
  • Choose to filter based on logon points
  • Choose to filter based on endpoint analysis scan results
  • Combine logon points and endpoint analysis results with the OR logical operator

Answer : Choose to filter based on logon points Choose to filter based on endpoint analysis scan results

To use tokens while defining a file share for an access server farm __________. (Choose the option which best completes the sentence.)


Options are :

  • you must have Active Directory implemented in the environment
  • you must have LDAP implemented in the environment
  • the file share must not be published
  • the service account in Server Configuration must be a local machine account

Answer : you must have Active Directory implemented in the environment

Which two resources require the Secure Access Client ? (Choose two.)


Options are :

  • Network resources
  • Email synchronization resources accessed using Outlook
  • File share resources accessed using the default navigation page (Access Navigator)
  • Web email resources accessed using the default navigation page (Access Navigator)

Answer : Network resources Email synchronization resources accessed using Outlook

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

Which statement regarding the rules for configuring a connection policy is true?


Options are :

  • IP address pools can be defined in the connection policy for dynamic IP addressing.
  • Multiple connection policies can be used for a single session.
  • Multiple connection policies cannot be used for a single logon point.
  • Names can be duplicated among several connection policies as long as the farm name is included.

Answer : IP address pools can be defined in the connection policy for dynamic IP addressing.

Scenario: UserA, an internal company user, types the following URL in a web browser to connect to the corporate site that is secured using Advanced Access Control: https://server1. UserB, an external appliance user, types the following URL in a web browser to connect to the corporate site that is secured using Advanced Access Control: https://gatewayappliance1 Which statement is true?


Options are :

  • UserA will get a 404 page "not found" error and UserB will be redirected to the default logon point.
  • Both UserA and UserB will be redirected to the corporate logon point.
  • Only UserA will be redirected to the corporate logon point.
  • Both users need to type the URL to the logon point or they will get a 404 page "not found" error.

Answer : UserA will get a 404 page "not found" error and UserB will be redirected to the default logon point.

Scenario: An administrator is configuring web email to use Outlook Web Access (OWA) as the front end for the Microsoft Exchange 5.5 Server for those users who require access to web email from their hand-held devices. Which two configurations are required for this environment to ensure that users' inboxes display correctly? (Choose two.)


Options are :

  • Configure email to display as HTML.
  • Update the %systemroot%\\system32\\MAPISVC.INF file.
  • Ensure the WebDAV Web services extension is set to "Prohibit."
  • Create a network resource that includes the Exchange server's FQDN.

Answer : Update the %systemroot%\\system32\\MAPISVC.INF file. Ensure the WebDAV Web services extension is set to "Prohibit."

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

Scenario: An administrator must configure a web email resource to be integrated with the corporate access center. In the access server farm there are three servers in use: "access_agent" is configured as an agent server;"access web" is configured as a web server; and "Access_1" is configured to serve as the agent and licence server. In addition, the Exchange server is named exchange_hq. Which configuration must the administrator perform to ensure that users are provided indirect access to the web email through the corporate access center?


Options are :

  • Configure the website viewer in the portal to point to http://Exchange_HQ/citrixfei/classic.asp
  • Configure the website viewer in the portal to point to http://Access_agent/citrixfei/classic.asp
  • Configure the website viewer in the portal to point to http://Access_web/citrixfei/classic.asp
  • Configure the website viewer in the portal to point to http://Access_1/citrixfei/classic.asp

Answer : Configure the website viewer in the portal to point to http://Access_web/citrixfei/classic.asp

Which policy setting should be enabled if an administrator wants users to be able to open documents with a published application?


Options are :

  • Email as Attachment
  • HTML Preview
  • File Type Association
  • Download

Answer : File Type Association

What does a port of zero (0) mean when defining a network resource?


Options are :

  • All ports
  • TCP Port 0
  • Variable port depending on the resource table
  • No ports

Answer : All ports

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

Scenario: An administrator wants to provide access to a company intranet site from the access server farm. The home page for the intranet site includes several links to external web pages. The administrator wants to ensure that all links can be accessed through this resource. How can this be configured?


Options are :

  • Enable URL rewriting to provide users access to the pages linked on the website.
  • Within the New Web Resource Wizard add URLs for the home page and each page linked from the home page.
  • Create a filter that allows access to all the websites lnked from the home page.
  • Include all the web pages linked from the home page using a URL that contains a wildcard.

Answer : Within the New Web Resource Wizard add URLs for the home page and each page linked from the home page.

When creating a custom filter that requires client devices to have a specific certificate installed and to enter from a specific logon point but NOT pass an endpoint analysis scan which detects a worm on the client system, which logical expression should be used to define the conditions under which a connection is permitted? (For all options, X represents the certificate filter, Y represents the logon point, and Z represents the passing of an endpoint analysis scan.)


Options are :

  • (X OR Y) AND NOT Z
  • (X OR Y) AND Z
  • (X AND Z) AND NOT Y
  • (X AND Y) AND NOT Z

Answer : (X AND Y) AND NOT Z

Scenario: Ken configured an Exchange Server and Outlook clients for email synchronization. Client devices are using Microsoft Outlook 2000 and running on Windows XP operating systems. The Secure Access Client is installed on all client devices. What are two requirements to perform the configurations required for this scenario? (Choose two.)


Options are :

  • The administrator must create and configure a policy.
  • The administrator grants the Download Email Attachment privilege for all users.
  • The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens.
  • The administrator verifies that the client devices have Internet Explorer 5 or 6 with all critical updates installed.

Answer : The administrator must create and configure a policy. The administrator verifies connectivity from the Access Gateway to the Exchange Server on all the ports to which the Exchange Server listens.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Scenario: An administrator is implementing Access Gateway with Advanced Access Control for use in his environment. The implementation will be used primarily for mobile workers who may access resources from diverse client devices, which may be locked down and may not allow files such as client software to be downloaded. For this environment, which type of access should be given to the clients?


Options are :

  • Browser-only access
  • VPN Client access
  • Kiosk Mode access
  • Direct access

Answer : Browser-only access

When a logon point is renamed just after it is deployed, __________. (Fill in the blank with a listed option.)


Options are :

  • it must be redeployed using the update function in the Access Suite Console
  • it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources
  • it can no longer be used
  • the Advanced Access Control setup CD must be used to redeploy the updated logon

Answer : it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

An administrator wants to ensure that all clients have anti-virus signatures that are no more than three days old. How can this be accomplished?


Options are :

  • Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters.
  • Create a new scan package when updated signatures are released.
  • Create a scan rule which has a parameter that specifies the maximum age of the signatures.
  • Configure the Anti-Virus package to automatically download the latest pattern file periodically.

Answer : Use endpoint analysis command-line tools and scripts to update the anti-virus package parameters.

Scenario: An environment requires that client devices accessing resources through the Access Gateway have a specific antivirus software installed. In addition, all client devices must have a valid SSL certificate installed. Which detail must be included when configuring a filter to meet the SSL certificate requirement?


Options are :

  • The presence of an SSL client certificate must be specified
  • The location of the the SSL client certificate
  • The name of the organization on the SSL client certificate
  • The common name included on the SSL client certificate

Answer : The presence of an SSL client certificate must be specified

When using an MSDE database to store configuration data for your access server farm, what must be specified during the initial configuration of the Advanced Access Control server?


Options are :

  • The location of the MSDE database
  • The name of the access server farm
  • An account in the Administrators group on the Advanced Access Control server
  • A name for the database

Answer : The name of the access server farm

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

Which three options are available to deploy the Endpoint Analysis Client? (Choose three.)


Options are :

  • Active X /Plug-in
  • Endpoint Analysis Client MSI
  • Citrix Instant Client Download
  • Access Client Packager

Answer : Active X /Plug-in Endpoint Analysis Client MSI Access Client Packager

Which three URL addresses are valid when creating a web resource? (Choose three.)


Options are :

  • http://Server1/Pilotresource
  • https://www.yourcompany.net/users/ #
  • https://www.*.com/users/
  • http://Server1/Pilotresource/index.html

Answer : http://Server1/Pilotresource https://www.yourcompany.net/users/ # http://Server1/Pilotresource/index.html

Scenario: An administrator gives a user the URL https://Accounting1.net/CitrixLogonPoint/AccountAccess to access a logon page. "Accounting1.net" is the FQDN of the Advanced Access Control server hosting the logon point and "AccountAccess" is the name of the logon point. From the URL given to the user, which access method will be used to obtain resources from the access server farm?


Options are :

  • Secure Web Client
  • Secure Access Client
  • Browser-only access
  • Default logon point

Answer : Browser-only access

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

When is the "Authentication Credentials" option used in the deployment of a logon point?


Options are :

  • When the logon point is used to connect devices that are not secure
  • When the logon point is used by devices to access resources from a secure network over a connection that is not secure
  • When a RADIUS or LDAP profile will be used along with the logon point
  • When RSA SecurID will be used along with the logon point

Answer : When a RADIUS or LDAP profile will be used along with the logon point

Scenario: The password for the service account has been compromised. The administrator decides to use a new user name and password for the service account. What are two requirements for changing the service account? (Choose two.)


Options are :

  • All the services must be manually stopped and then restarted again.
  • The administrator must use the Access Gateway Administration Tool.
  • The Access Suite Console must be closed.
  • The administrator must use the Server Configuration Tool.

Answer : The Access Suite Console must be closed. The administrator must use the Server Configuration Tool.

What is required to administer an access server farm using the Access Suite Console?


Options are :

  • An account which is in the Guest role of the Access Gateway Server COM+ application.
  • An account which is in the Administrators role of the Access Gateway Server COM+ application.
  • An account which is in the Systems role of the Access Gateway Server COM+ application.
  • An account which is in the Administrators role for the SQL server database.

Answer : An account which is in the Administrators role of the Access Gateway Server COM+ application.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 3

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions