1Y0-401 Designing Citrix XenDesktop 7.6 Solutions Test Set 5

Which endpoint devices must be replaced to support the Streamed VHD method of desktop delivery?


Options are :

  • PCs running Internet Explorer 7
  • Linux thin clients
  • Windows 7
  • Windows XP

Answer : Linux thin clients

An architect recommends full SSL VPN connections for remote users.

Which type of NetScaler license should be applied for these users?


Options are :

  • Platform
  • User
  • Device
  • Universal

Answer : Universal

1Y0-731 Citrix Netscaler 8.0 Administration Practice Test Set 1

The company plans to reduce their storage requirement by using thin provisioning with XenServer hosts. Which storage option should the architect verify for

capability in the current environment?


Options are :

  • NFS
  • iSCSI
  • CIFS
  • Fibre Channel

Answer : NFS

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that SecureICA be implemented?


Options are :

  • By enabling SecureICA on delivery groups
  • By installing an SSL certificate in the master image
  • By implementing an Active Directory Group Policy to configure SecureICA
  • By using NetScaler

Answer : By enabling SecureICA on delivery groups

The architect recommended pooled desktop OS machines with Personal vDisks for the Nurses, Imaging and Radiology user group. How should an engineer

implement antivirus software on these desktop OS machines?


Options are :

  • Deploy the antivirus software through a Group Policy startup script
  • Deploy the antivirus package as an App-V application
  • Install the antivirus software in the master Personal vDisk as a user-installed application.
  • Install the antivirus software into the base image.

Answer : Install the antivirus software into the base image.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

An architect is assessing the existing backup strategy and recommending changes to suit the new virtual desktop environment.

Which critical components should the architect recommend for nightly backup, as they cannot be easily recreated in the event of a disaster?


Options are :

  • Servers hosting StoreFront roles
  • User’s Personal vDisks
  • Servers hosting Delivery Controller roles
  • Pooled desktop master image

Answer : User’s Personal vDisks

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded

to a session policy, the best remote access design?


Options are :

  • It segments the Gateway and load-balancing features of the NetScaler appliances.
  • It provides redundancy, while optimizing external WAN traffic
  • It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.
  • It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

Answer : It segments the Gateway and load-balancing features of the NetScaler appliances.

Which two budgetary items should the architect consider to meet the needs of remote users in the new environment?


Options are :

  • Additional mobile devices
  • Microsoft licenses
  • B & D
  • NetScaler infrastructure
  • Two-factor authentication solution

Answer : B & D

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with two NetScaler virtual servers for each appliance, each

binded to a redirection policy, the best remote access design?


Options are :

  • It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs
  • It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
  • It segments the Gateway and load-balancing features of the NetScaler appliances
  • It provides redundancy, while optimizing external WAN traffic

Answer : It provides redundancy, while optimizing external WAN traffic

Which user groups require remote access?


Options are :

  • Human Resources
  • IT
  • All of the above
  • Emergency Response Team

Answer : All of the above

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Why does using SecureICA meet CGE's compliance requirements?


Options are :

  • It encrypts internal ICA traffic.
  • It encrypts ICA traffic from remote end users
  • It complies with industry-standard SSL encryption requirements
  • It enables the SSL Relay service.

Answer : It complies with industry-standard SSL encryption requirements

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Why does using IPsec meet CGE's compliance requirements?


Options are :

  • It enables the SSL Relay service.
  • It encrypts internal network traffic.
  • It complies with industry-standard SSL encryption requirements.
  • It encrypts ICA traffic from remote end users.

Answer : It encrypts ICA traffic from remote end users.

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the

Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback

plan must also be available after upgrades, since it can often result in system instability.

How should the architect deploy MGMT using Remote PC?


Options are :

  • On Windows 8 with Machine Creation Services
  • On Windows 8 with Provisioning Services
  • On Windows 7 with Machine Creation Services
  • On Windows 7 with Provisioning Services

Answer : On Windows 7 with Provisioning Services

An architect is explaining options for profile management.

What is one issue that the architect must address in the current environment?


Options are :

  • Folder redirection is implemented
  • Startup scripts are used in the environment
  • Roaming users have local profiles
  • PositivelyFinance does NOT work with roaming profiles

Answer : PositivelyFinance does NOT work with roaming profiles

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that SSL be implemented?


Options are :

  • By installing an SSL certificate in the master image
  • By installing a certificate authority server in the DMZ
  • By configuring an Active Directory Group Policy to distribute SSL certificates
  • By installing certificates on Citrix infrastructure components

Answer : By configuring an Active Directory Group Policy to distribute SSL certificates

Scenario: An architect is designing a NetScaler solution that implements GSLB. The solution must provide StoreFront access through a single URL worldwide and

maintain a highly available configuration globally as well as locally.

How many StoreFront servers are recommended to implement this configuration?


Options are :

  • Three, one in each datacenter
  • Six, one site for each store
  • Four, two in the primary and two in the backup datacenter
  • Six, two in each datacenter

Answer : Six, two in each datacenter

Which current infrastructure limitation prevents doctors in London from working remotely if the London datacenter shuts down unexpectedly?


Options are :

  • There is no failover datacenter for London
  • There are no backups of the SQL Server databases
  • There are no roaming user profiles
  • There is no disaster recovery plan for the mobile workforce

Answer : There is no disaster recovery plan for the mobile workforce

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

The architect should recommend a Universal License because it is required for __________.


Options are :

  • ICA Proxy
  • two-factor authentication
  • SmartAccess
  • SSL access inside the network

Answer : SmartAccess

Which consideration is unnecessary for the PositivelyPeople application in the new environment?


Options are :

  • Access to legacy mainframe
  • Secure remote access
  • File security
  • Support for secured print jobs

Answer : Access to legacy mainframe

In the new environment, the PositivelyFinance application will be deployed as a server OS-hosted application. Which two policy settings should an architect

recommend to prevent data leakage from the PositivelyFinance application?


Options are :

  • A & B
  • HDX policy setting with File redirection on Client Network drives to ‘Prohibited’
  • HDX policy setting with Client Clipboard Redirection set too ‘Prohibited’
  • HDX policy setting with Client drive mapping set to ‘Prohibited

Answer : A & B

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Which design decisions should the architect recommend to improve the user experience?


Options are :

  • None
  • Configure Flash redirection
  • Configure Clipboard policy
  • Configure Drive encryption

Answer : Configure Flash redirection

Which business drivers are critical for the Contractors user group?


Options are :

  • Support for mobile devices
  • Secure remote access
  • Printing security
  • None

Answer : Secure remote access

Which tool should the architect use in preparation for migration to Windows Server 2012 to determine application compatibility and suitability for virtualization


Options are :

  • EdgeSight for End Points
  • Windows Upgrade Advisor
  • AppDNA
  • App-V Sequence

Answer : AppDNA

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server for each appliance binded to a

session policy, the best remote access design for the environment?


Options are :

  • It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
  • It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs
  • It segments the Gateway and load-balancing features of the NetScaler appliances.
  • It provides redundancy, while optimizing external WAN traffic.

Answer : It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs

Scenario:

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high

availability for all nodes in the different geographical regions.

Individuals in the Research end-user group need to be able to remotely access a centrally stored database.

Which FlexCast model should the Citrix architect recommend for this group?


Options are :

  • Streamed VHD
  • Local VM
  • Hosted Shared
  • Hosted VDI

Answer : Hosted VDI

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server binded to a redirection policy,

the best remote access design?


Options are :

  • It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.
  • It segments the Gateway and load-balancing features of the NetScaler appliances
  • It provides redundancy, while optimizing external WAN traffic.
  • It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

Answer : It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

The company’s HDX policies must apply to a pooled virtual desktop environment without affecting any virtual applications. How should an architect apply the HDX

policies?


Options are :

  • By using a client name policy filter
  • By using a SmartAccess filter
  • By giving the virtual desktop policy a higher priority than the virtual application policy
  • By using a delivery group type policy filter

Answer : By using a delivery group type policy filter

Given the current desktop build process, what should an architect recommend on the new virtual platform for this environment while minimizing the number of

required management servers?


Options are :

  • Use Ghost to clone a master image
  • Continue with current process
  • Use Machine Creation Services to clone a master image
  • Use Provisioning Services servers to create a master target device

Answer : Use Machine Creation Services to clone a master image

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that IPsec be implemented?


Options are :

  • By using NetScaler
  • By configuring a local IPsec policy in the master image
  • By implementing secure Delivery Groups
  • By implementing an Active Directory Group Policy

Answer : By implementing an Active Directory Group Policy

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Why does using SSL meet CGE's compliance requirements?


Options are :

  • It encrypts end-to-end traffic from remote end users.
  • It enables the SSL Relay service
  • It encrypts network traffic between XenDesktop, StoreFront, and NetScaler
  • It eliminates the need to distribute an internal root certificate

Answer : It encrypts network traffic between XenDesktop, StoreFront, and NetScaler

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions