1Y0-306 Citrix Access Gateway 4.2 with Advanced Access Exam Set 4

Scenario: Tim, a member of the Sales and Marketing groups, calls the Help Desk to report difficulties accessing email when connecting to the corporate Advanced Access Control access server farm. Using the Policy Overview Tool you notice that the web-based email resource belongs to multiple policies which have different access rights to the resource. The environment has these policy configurations: In Policy A, web-based email is set to "Not Configured" for all authenticated users. In Policy B, web-based email is set to "Allow" for the Marketing Group and the Sales Group. In Policy C, web-based email is set to "Deny" for the Marketing Group. Based on the listed policy configurations, which statement accurately describes the outcome of the policies?


Options are :

  • The "Allow" setting in Policy B takes precedence over Policy A and C. Tim will be granted access to web-based email.
  • The "Deny" setting in Policy C is overridden by the "Not Configured" and "Allow" settings in Policy A and C respectively. Tim will be granted access to web-based email
  • The "Not Configured" setting on Policy A takes precedence over Policy B and C. No users will be granted access to web-based email.
  • The "Deny" setting in Policy C takes precedence over Policy A and B. Tim will be denied access to web-based email.

Answer : The "Deny" setting in Policy C takes precedence over Policy A and B. Tim will be denied access to web-based email.

In an environment where client devices must pass a file scan or a registry scan before being permitted access to the network, which logical expression should be used to create a continuous scan? (For all options, X represents the file scan and Y the registry scan.)


Options are :

  • X OR NOT Y
  • X OR Y
  • X AND Y
  • (NOT X) AND (NOT Y)

Answer : X OR Y

When implementing Advanced Access Control in an environment in which users will access resources through a VPN tunnel created by an Access Gateway appliance, which client must be used?


Options are :

  • Secure Access Client
  • Endpoint Analysis Client
  • Web Client
  • Presentation Server Client

Answer : Secure Access Client

1Y0-309 Citrix Access Gateway 8.0 Enterprise Edition Test Set 1

After providing the configuration database server and the access server farm name, which additional step must an administrator perform to change the farm membership of server?


Options are :

  • Restart the license server for the access server farm where the server was added
  • Restart the server for which the farm membership was changed
  • Provide the credentials used to access the configuration database server
  • Run discovery in the Access Suite Console

Answer : Provide the credentials used to access the configuration database server

How can an administrator control whether users are allowed or denied logon privileges through policies?


Options are :

  • Include the Allow Logon Resource in the access filter
  • Include the Allow Logon property in the access policy
  • Include the Allow Logon property in the access filter
  • Include the Allow Logon Resource in the access policy

Answer : Include the Allow Logon Resource in the access policy

Which two settings(action controls) should be enabled to allow users to open and edit documents on servers using published resources in server farms running Presentation Server? (Choose two.)


Options are :

  • Access
  • Live Edit
  • File Type Association
  • Download

Answer : Access File Type Association

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

Scenario: An administrator is required to configure the setting that determines whether users can reconnect to both active and disconnected sessions or only to disconnected sessions while creating a logon point. Which option should the administrator enable?


Options are :

  • Domain Prompting
  • Window
  • Session Time-out
  • Workspace Control

Answer : Workspace Control

If migrating from a MetaFrame Secure Access Manager 2.X implementation to Advanced Access Control, which file must be specified during the initial configuration of the access server farm?


Options are :

  • NFUSE.CONF
  • XPS.CAB
  • NFE.XML
  • MSAM2.X CAB

Answer : MSAM2.X CAB

Scenario: An administrator is implementing Access Gateway with Advanced Access Control for use in his environment. The implementation will be used primarily for mobile workers who may access resources from diverse client devices, which may be locked down and may not allow files such as client software to be downloaded. For this environment, which type of access should be given to the clients?


Options are :

  • Browser-only access
  • VPN Client access
  • Kiosk Mode access
  • Direct access

Answer : Browser-only access

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

What is the name of the policy setting that can be applied to a network resource?


Options are :

  • Download
  • Network Authentication
  • File Type Association
  • Access

Answer : Access

Scenario: An IT environment has Access Gateway with Advanced Access Control implemented as a VPN solution to provide external users access to internal network resources. The implementation design requires that external users obtain access to these resources through the appliance and that users' permissions to internal resources be defined. The design also requires that client devices be able to access local networks while logged on. Which two tasks must an administrator perform to ensure that the requirements included in the scenario are met? (Choose two.)


Options are :

  • Deploy the Secure Access Client to all users in the environment before they log on.
  • Create a network resource which includes the IP address of the LAN.
  • Grant all users permissions to the internal network
  • Ensure that split tunneling is enabled for the appliance.

Answer : Create a network resource which includes the IP address of the LAN. Ensure that split tunneling is enabled for the appliance.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

Scenario: An administrator would like to provide access to a Web Interface 4.2 site through Advanced Access Control. He would like the site to appear as the home page. What are the two required configurations for this scenario? (Choose two.)


Options are :

  • Create a published web resource with Citrix Web Interface 4.2 selected as the application type.
  • Configure the web resource for Citrix Web Interface 4.2 to bypass web proxy URL rewriting.
  • Configure a logon point to display the navigation page as the home page.
  • Configure the site as the application with the highest priority.

Answer : Create a published web resource with Citrix Web Interface 4.2 selected as the application type. Configure the site as the application with the highest priority.

Which procedure should an administrator implement when a RADIUS or LDAP profile is associated with a logon point during the deployment of the logon point?


Options are :

  • Deploy the Secure Access Client on every client device.
  • Type the global or server-specific password into the appropriate field.
  • Refresh the logon page information.
  • Provide a decentralized database to store user profiles.

Answer : Type the global or server-specific password into the appropriate field.

An administrator needs to add a file share as a resource to the default navigation page. In order for users to be able to access the file share resource from the default navigation page, which three steps are required? (Choose three.)


Options are :

  • Create a policy granting access to the file share to specified users in the Access Suite Console.
  • Publish the file share.
  • Ensure that the specified users have NTFS read permissions to the file share.
  • Create a policy granting access to specified users in the Access Gateway Administration Tool.

Answer : Create a policy granting access to the file share to specified users in the Access Suite Console. Publish the file share. Ensure that the specified users have NTFS read permissions to the file share.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

From which node in the Access Suite Console can an administrator configure event logging?


Options are :

  • Resource node
  • Endpoint Analysis node
  • Access Server Farm node
  • Servers node

Answer : Access Server Farm node

Where does an administrator configure the Allow Logon setting for users?


Options are :

  • In a policy
  • In a filter
  • In the properties of an endpoint analysis scan
  • In the logon point properties

Answer : In a policy

In order to import a scan package into a different scan group than that which it was originally a part of, an administrator must . (Complete the sentence with an option from the list.)


Options are :

  • uninstall any files in the original group that are already saved in the desired destination
  • reinstall the Endpoint Analysis Client on all client devices
  • delete all rules and filters that refer to the scan package
  • edit the .CAB file

Answer : delete all rules and filters that refer to the scan package

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

Scenario: An administrator wants to aggregate the Advanced Access Control events from six different servers and poll the activity on these servers every 50 seconds. What can be used to configure the poll interval?


Options are :

  • Event Log Consolidator
  • Server Configuration tool
  • Edit farm properties
  • CitrixAGE Audit

Answer : Event Log Consolidator

Which two Internet Explorer security settings should be enabled on the client device to allow users to log on to the access server farm? (Choose two.)


Options are :

  • Active scripting
  • File download
  • Do not save encrypted pages to disk
  • Per-session cookies

Answer : Active scripting Per-session cookies

Under which process context are endpoint analysis scans run on the client?


Options are :

  • Under a local administrator account on the client device
  • Under the user account that is logged onto the client device
  • In the context of the user who installed the Endpoint Analysis Client
  • In the sandbox of the browser

Answer : Under the user account that is logged onto the client device

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Which two steps must be taken when creating a typical filter? (Choose two.)


Options are :

  • Enter SSL client certificate requirements will be used to filter access
  • Choose at least one condition to be included in the filter
  • Provide a unique name for the filter
  • Select endpoint analysis scan output

Answer : Choose at least one condition to be included in the filter Provide a unique name for the filter

In an environment that restricts access to resources to client devices running a specific version of Internet Explorer, which step must be completed to create a continuous registry scan?


Options are :

  • Provide the registry path, type and key values for the browser.
  • Type the earliest date stamp that is acceptable for the browser.
  • Browse to the software executable on the server.
  • Clear the MD5 field.

Answer : Provide the registry path, type and key values for the browser.

Scenario: An administrator of an enterprise, where users' actions are restricted in terms of downloading, installing, and running programs on their computers, receives a service ticket from a user who is complaining of not being able to install the Endpoint Analysis Client software. What could be the cause?


Options are :

  • The user account being used is a member of the administrator group
  • The user account being used is a member of a domain user account, which is a member of the local administrator group.
  • The user account being used is not a member of the power users group.
  • The user account being used is not a member of the users group.

Answer : The user account being used is not a member of the power users group.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

Scenario: An administrator wants to perform additional analysis in the Event Log Consolidator on aggregated data collected from multiple Advanced Access Control servers in the farm. In which three ways can this be done? (Choose three.)


Options are :

  • By using the Reference ID
  • By using the Domain
  • By using the logon point
  • By using the User Name

Answer : By using the Reference ID By using the logon point By using the User Name

What are two requirements for enabling access to file share resources from the default navigation page (Access Navigator)? (Choose two.)


Options are :

  • The share must exist in the location specified when created as a resource.
  • The file server hosting the file share must be accessible to the Advanced Access Control servers on the network.
  • The file share must contain at least one file
  • Permission to the share must be granted in an access policy.

Answer : The file server hosting the file share must be accessible to the Advanced Access Control servers on the network. Permission to the share must be granted in an access policy.

Scenario: The administrator wants a scan to run only for users who obtain access to the access server farm through an external entry point and do not have a mandated corporate security software on their client device. Which two conditions need to be taken into consideration when creating rules for this scan?(Choose two.)


Options are :

  • Logon point conditions
  • Client device regional locale conditions
  • Operating system conditions
  • Antivirus properties conditions

Answer : Logon point conditions Antivirus properties conditions

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

Scenario: A company's Contractors Acitve Directory group is allowed to launch Outlook and SAP only when using a corporate-supplied laptop. The same users are allowed to view Office and Adobe Reader applications regardless of the accessing device. Which type of scan can the administrator perform to ensure that the requirements for this scenario are met?


Options are :

  • Citrix scans for antivirus software
  • Citrix scans for operating systems
  • Citrix scans for hardware types
  • Citrix scans for MAC addresses

Answer : Citrix scans for MAC addresses

Scenario: A company's Contractors Acitve Directory group is allowed to launch Outlook and SAP only when using a corporate-supplied laptop. The same users are allowed to view Office and Adobe Reader applications regardless of the accessing device. Which type of scan can the administrator perform to ensure that the requirements for this scenario are met?


Options are :

  • Citrix scans for MAC addresses
  • Citrix scans for antivirus software
  • Citrix scans for hardware types
  • Citrix scans for operating systems

Answer : Citrix scans for MAC addresses

Which connection settings should be configured if the user is required to re-authenticate after their system goes into hibernation?


Options are :

  • Authenticate after system failure
  • Authenticate after network interruption
  • Authenticate after hibernation
  • Authenticate after system resume

Answer : Authenticate after system resume

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

Which three can directly reference scan outputs? (Choose three.)


Options are :

  • Other scans
  • Filters
  • Logon points
  • Policies

Answer : Other scans Filters Logon points

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions