1Y0-309 Citrix Access Gateway 8.0 Enterprise Edition Test Set 2

What must an administrator configure on an Access Gateway 8.0 Enterprise Edition appliance to allow intranet applications to initiate connections successfully back to VPN users?


Options are :

  • Intranet IP
  • Subnet IP
  • Direct IP
  • Mapped IP

Answer : Intranet IP

Which three Internet Explorer settings could a user configure to use the Access Gateway Enterprise Edition ActiveX client? (Choose three.)


Options are :

  • Set "Download signed ActiveX controls" to Prompt or Enable
  • Enable "Automatic prompting for file downloads"
  • Set "Run ActiveX controls and plug-ins" to Prompt or Enable
  • Enable "Automatic prompting for ActiveX controls"

Answer : Set "Download signed ActiveX controls" to Prompt or Enable Set "Run ActiveX controls and plug-ins" to Prompt or Enable Enable "Automatic prompting for ActiveX controls"

1Y0-309 Citrix Access Gateway 8.0 Enterprise Edition Test Set 3

What is responsible for performing the client side decompression for HTTP/Web response compression for the Access Gateway 8.0 Enterprise Edition appliance?


Options are :

  • Java Client
  • Presentation Server client
  • JavaScript
  • Web browser

Answer : Web browser

At which level can an administrator configure a single intranet IP address?


Options are :

  • Virtual server
  • User
  • Group
  • Global

Answer : User

Can users change their password through the portal page?


Options are :

  • Yes, users can change their passwords, but they can only do so when they are prompted due to password expiration
  • Yes, users can change their passwords through the portal page.
  • No, users cannot change their passwords. However, they can still log in through the portal page even when their password is expired.
  • No, users cannot change their passwords because there is no option to change a password from the portal page.

Answer : Yes, users can change their passwords, but they can only do so when they are prompted due to password expiration

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

Scenario: An administrator needs to configure an audit policy that will log major errors on the Access Gateway appliance as well as problems that might cause the Access Gateway appliance to function incorrectly, but which are not critical to its operation. Which two options need to be selected in the log level to configure the audit policy to meet these requirements? (Choose two.)


Options are :

  • Emergency
  • Notice
  • Alert
  • Warning

Answer : Alert Warning

Under which two conditions does the Secure Access Client commit hara-kiri and download a new version of itself? (Choose two.)


Options are :

  • When it connects to an Access Gateway appliance that has a version that is less than the client.
  • When it connects to an Access Gateway appliance that has a version that is greater than the client.
  • When it connects to an Access Gateway appliance that has the same version and if the administrator has configured a forced refresh timeout.
  • When it connects to a competitive VPN appliance and does not like it.

Answer : When it connects to an Access Gateway appliance that has a version that is less than the client. When it connects to an Access Gateway appliance that has a version that is greater than the client.

Will the client cleanup feature clean any data before the SSL VPN session begins?


Options are :

  • No. Client cleanup will not delete any Internet Explorer temporary files.
  • Yes. Client cleanup cleans up data regularly during the SSL VPN session.
  • No. Client cleanup will not clean up any data before the SSL VPN session begins
  • Yes. Access Gateway 8.0 Enterprise Edition kills existing connections, so all data will be lost.

Answer : No. Client cleanup will not clean up any data before the SSL VPN session begins

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

An IT organization has a client certificate configured. The administrator did not enable the cleanup client certificate option. The administrator decided not to prompt a user with the Windows cleanup dialog box. Will the cleanup client certificate be installed in Internet Explorer after logout?


Options are :

  • Yes, client cleanup code will do it.
  • Yes, the user has a chance to click on client cleanup windows to cleanup the client certificate.
  • Yes, Windows Client cleanup does the cleanup work even though it is not configured.
  • No, the SSL client certificate needs manual cleanup.

Answer : No, the SSL client certificate needs manual cleanup.

An administrator needs to provide users with access to the company's intranet through the VPN, while also providing them with access to printers on their local area network. Which option must the administrator turn on in order to meet this requirement?


Options are :

  • Compression
  • Split Tunneling
  • Transparent Interception
  • Single Sign-On

Answer : Split Tunneling

When configuring an intranet application in proxy mode, which protocol must the administrator select?


Options are :

  • FTP
  • UDP
  • TCP
  • HTTP

Answer : TCP

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

Scenario: An administrator has created a few personal folder files (*.PST) on the system when accessing Outlook over the VPN session. The administrator wants to delete these *.PST files created after logging out of the VPN session. How must the administrator configure client side cleanup to meet the above requirements?


Options are :

  • Configure it to clean up application data.
  • Configure it to clean up cookies.
  • Configure it to clean up temporary files.
  • Configure it to clean up the address bar.

Answer : Configure it to clean up application data.

In company A, an administrator needs to map the users' local network drive 'Z:' to one of the intranet shared servers as soon as the users log in to the VPN successfully. What should the administrator configure to meet this requirement?


Options are :

  • A file system authorization policy that will map the drives
  • An intranet application that will map the drives
  • A login script that will map the drives
  • An authentication policy that will map the drives

Answer : A login script that will map the drives

Scenario: A company recently acquired two other companies. Users from these two companies have been using different forms of Access Gateway authentication. An administrator in the environment of the parent company has been instructed to reconfigure the parent company's Access Gateway infrastructure such that all the users in the environment can have the opportunity to authenticate to the same virtual server using different forms of authentication. If the users from the newly acquired companies are using RADIUS and TACACS authentications, which Access Gateway 8.0 Enterprise Edition authentication would allow these users to authenticate to the RADIUS server first, and if the server does not respond, then to the TACACS server?


Options are :

  • Cascading
  • Local
  • Double-source
  • Inherited

Answer : Cascading

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

The Policy Precedence Model for Access Gateway 8.0 Enterprise Edition evaluates which type(s) of policy priorities?


Options are :

  • Authentication and authorization types
  • Same type
  • Pre-authentication types only
  • Different types

Answer : Same type

An administrator is in the process of installing Access Gateway 8.0 Enterprise Edition in an environment and is considering implementing split DNS lookups. When would the administrator enable split DNS lookups in this environment?


Options are :

  • There is a need to look up all domain names on the remote network regardless of the split tunneling configuration
  • There is a need to allow clients to send ICA packets through Access Gateway from one domain to another using the DNS names of the destination clients or servers in the other domain.
  • There is a need for internal users to access external resources without revealing the IP addresses of the servers hosting those resources.
  • There is a need to look up domain names both on the internal and external networks when split tunneling is enabled.

Answer : There is a need to look up domain names both on the internal and external networks when split tunneling is enabled.

Which pre-authentication expression must be used if an administrator needs to indicate that Trend Micro version 11.25 or Symantec version 7.5 is running and McAfee version 8.0 is not running?


Options are :

  • (av_5_TrendMicro_11_25 || av_5_Symantec_7_5) && CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
  • av_5_TrendMicro_11_25 || av_5_Symantec_7_5 && CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
  • (av_5_TrendMicro_11_25 && av_5_Symantec_7_5) || CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
  • av_5_TrendMicro_11_25 && av_5_Symantec_7_5 || CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0

Answer : (av_5_TrendMicro_11_25 || av_5_Symantec_7_5) && CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

How can an administrator disable the SSL warning message?


Options are :

  • Select SSL VPN global settings > Client Experience Advanced > General, deselect SSL warning message
  • he SSL warning message cannot be disabled in the Configuration Utility
  • Select SSL VPN global settings > Client Experience Advanced > Client Options, deselect SSL warning message
  • Select SSL VPN global settings > Security Settings Advanced > Client Security, enable SSL warning message

Answer : he SSL warning message cannot be disabled in the Configuration Utility

Scenario: An administrator needs to bind a policy that changes specific configuration settings to certain users. To make the users' sign-on to intranet applications seamless, the administrator enables single sign-on within the profile of the policy. Which type of policy must the administrator use in order to complete the task?


Options are :

  • Authorization
  • Authentication
  • Session
  • TCP Compression

Answer : Session

CompanyA runs maintenance on ServerA every Friday between 9:00PM-11:00PM. The Network Administrator would like to deny VPN access to ServerA during this period only. Could Access Gateway 8.0 Enterprise Edition be configured to meet this requirement?


Options are :

  • Access Gateway 8.0 Enterprise Edition can be configured using Authorization policy based on ServerA's IP address.
  • Access Gateway 8.0 Enterprise Edition can be configured using an Authentication policy based on date and time
  • Access Gateway 8.0 Enterprise Edition can be configured using Authorization policies based on date and time.
  • Access Gateway 8.0 Enterprise Edition does not support this scenario.

Answer : Access Gateway 8.0 Enterprise Edition can be configured using Authorization policies based on date and time.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Scenario: An administrator wants users to be able to access back-end resources running on file servers and application servers in an environment. The administrator has Access Gateway 8.0 Enterprise Edition deployed, and the Secure Access client is used to establish VPN tunnels to the corporate network. There are no intranet applications configured in this environment, and split tunneling is turned off. Which two statements are true regarding why users in this environment will be able to access applications on file and application servers? (Choose two.)


Options are :

  • Users will be able to access file and application servers because the back-end resources have been assigned specific intranet IP addresses.
  • Users will be able to access file and application servers because the back-end resources in this environment have been configured as published applications.
  • Users will be able to access file and application servers as long as an authorization policy is configured to allow them access to resources on the file and application servers.
  • Users will be able to access file and application servers as long as they can authenticate through the VPN.

Answer : Users will be able to access file and application servers as long as an authorization policy is configured to allow them access to resources on the file and application servers. Users will be able to access file and application servers as long as they can authenticate through the VPN.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

Scenario: Currently an administrator is using an administration audit policy that has been configured to display more information in the audit log. The IT Manager has requested that the administrator modifies the audit policy to just display potential issues that may result in an error or critical error. Which option(s) must the administrator check in the audit policy to meet this new requirement?


Options are :

  • Alert, Critical and Notice
  • Warning
  • Emergency, Alert, Critical, Error and Warning
  • Notice and Warning

Answer : Emergency, Alert, Critical, Error and Warning

Scenario: A company currently has Secure Gateway in its environment. The company has been undergoing major expansions, & the number of employees has grown by 60% over the past three years. Recently, the company acquired a new company and is planning on integrating that company into its environment. Because of the growing number of employees, more servers and rack space are being consumed to support the growing user traffic. Which Access Gateway 8.0 Enterprise Edition deployment type would meet the needs of this environment?


Options are :

  • Access Gateway in Secure Gateway mode
  • Access Gateway in Web Interface mode
  • Access Gateway in VPN mode
  • Access Gateway in Presentation Server mode

Answer : Access Gateway in Secure Gateway mode

When creating the server certificate for an Access Gateway 8.0 Enterprise Edition virtual server in ICA Proxy mode, the Common Name (CN) should match that of the FQDN of the______. (Choose the correct option to complete the sentence.)


Options are :

  • Secure Ticket Authority server
  • VPN virtual server
  • Presentation Server
  • Web Interface server

Answer : VPN virtual server

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

Which three pieces of information are logged by the Access Gateway 8.0 Enterprise Edition appliance in its audit logs? (Choose three.)


Options are :

  • System status events (for example: device up/down) and Configuration events log records
  • Individual group's Login/Logout statistics and Authentication failure log records
  • Individual user's HTTP request, TCP connection and UDP flow statistics
  • Individual user's ICMP flow statistics and Authorization failure log records
  • Individual user's Login/Logout, Group membership and Authentication failure log records

Answer : System status events (for example: device up/down) and Configuration events log records Individual user's HTTP request, TCP connection and UDP flow statistics Individual user's Login/Logout, Group membership and Authentication failure log records

An administrator is concerned that the default Access Gateway password for an appliance in the first DMZ has been compromised, so the default password needs to be changed. The administrator should connect to the appliance to change the nsroot password through ______. (Choose the correct option to complete the sentence.)


Options are :

  • the Configuration Utility
  • SSH
  • Telnet
  • a serial port

Answer : a serial port

Scenario: A consultant is in charge of a new Access Gateway 8.0 Enterprise Edition deployment at a large customer site. The customer gave the consultant the following information and IP addresses to use when configuring the Access Gateway 8.0 Enterprise Edition appliance: Internal Citrix Presentation Server 4.0 IP address: 192.168.100.12 Time Zone to be used: Eastern Standard Time (EST) IP addresses to use when configuring the Access Gateway 8.0 Enterprise Edition deployment NSIP: 10.165.30.45 MIP: 10.165.30.60 VIP: 12.15.30.62 Which two configuration options could be configured on the Access Gateway 8.0 Enterprise Edition appliance in order to communicate with the Citrix Presentation Server? (Choose two.)


Options are :

  • Virtual Server in the 192.168.100.x subnet
  • Intranet IP in the 192.168.100.x subnet
  • Subnet IP in the 192.168.100.x subnet
  • Static Route to the 192.168.100.x subnet

Answer : Subnet IP in the 192.168.100.x subnet Static Route to the 192.168.100.x subnet

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

Scenario: An administrator wants to ensure that whenever VPN users try to access corporate network resources and servers by name, the name of those resources and servers resolve to the IP addresses in the corporate network. What are two ways the administrator can configure settings to meet the needs of this environment? (Choose two.)


Options are :

  • Set split tunneling to OFF
  • Configure an intranet application and set split tunneling to OFF
  • Configure an intranet IP address and set split tunneling to OFF
  • Set split tunneling to ON and DNS to Remote

Answer : Set split tunneling to OFF Set split tunneling to ON and DNS to Remote

An administrator wants to configure an IP address that will be used by the Access Gateway appliance as a source IP address to connect to internal servers on the corporate network. Which IP type must be configured by the administrator?


Options are :

  • Virtual IP
  • NetScaler IP
  • Global Server Load Balancing site IP
  • Mapped IP

Answer : Mapped IP

When accessing an intranet site through Access Gateway 8.0 Enterprise Edition, which mechanism will load with a list of pre-configured resource IP addresses & port numbers?


Options are :

  • ActiveX Plug-in
  • JavaScript
  • Java Client
  • Presentation Server Client

Answer : Java Client

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 3

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions