Citrix 1Y0-614 Access Suite 4.0 Design Practice Exam Set 3

Scenario: A mobile phone company has Citrix Presentation Server 4.0 implemented in its environment. The CIO has mandated that no single points of failure exist within the environment. The company has hired you to assess their Citrix environment. Which two statements explain why the installation of another license server, which will not be clustered, is not necessary?


Options are :

  • The addition of another license server will provide for load balancing. Presentation Servers will have the option to connect to the least busy license server or the license server closest to them. E. The addition of another license server will reduce current network bandwidth.
  • The addition of another license server will not help the company because Presentation Server users will still be able to connect for up to 30 days after connection is lost to the license server.
  • The addition of another license server will increase IT workload.
  • The addition of another license server does not address the requirement because two license servers cannot share the same license file.

Answer : The addition of another license server will not help the company because Presentation Server users will still be able to connect for up to 30 days after connection is lost to the license server. The addition of another license server does not address the requirement because two license servers cannot share the same license file.

Scenario: A credit-reporting agency has many applications installed in its Presentation Server 4.0 environment that require passwords. The company also has Password Manager 4.1 implemented in their Citrix environment, but currently only two web applications are configured to use Password Manager. The average user also needs to access seven Windows based and two host based applications that require complex passwords on a daily basis. Most users have resulted to copying and pasting their password on their monitor and in other unsafe areas. The CIO of the company wants the company to maintain complex passwords, while at the same time eliminating the need for employees to remember all of their passwords. Based on the current setup of this environment, which action will you recommend to the company as a means of optimizing their Password Manager deployment?


Options are :

  • Implementation of Password Manager Policies for all Active Directory users to remember their passwords once they authenticate to the network
  • Implementation of Question-Based Authentication for all authenticating users
  • Implementation of Password Manager Application Definition for all applications that require user authentication and add the application definitions to the proper user configurations
  • Implementation of Password Manager Application Definitions for theWndows and web- based applications only
  • Implementation of Identity Verification Questions in the Password Manager Console for all authenticating users

Answer : Implementation of Password Manager Application Definition for all applications that require user authentication and add the application definitions to the proper user configurations

Scenario: A law firm has asked you to assess their Presentation Server environment. At each of their three offices, the firm has implemented a SQL Server 2005-based leads database that includes all of the emergency calls from the previous day so that the business development team can pursue the potential need for legal services. The database is relatively lightweight in terms of the resource requirements, and it is maintained by the database administration team. The law firm has plans to move the data store database onto their BusDev database server. In addition, they plan to implement the Resource Manager summary database on this server. What should you advise them?


Options are :

  • This would be technically feasible. However, from an administrative standpoint, maintaining theBusDev, data store and Resource Manager summary databases on a single server provides significant administrative overhead.
  • This would be technically feasible. However, from an administrative standpoint, maintaining theBusDev, data store and Resource Manager summary databases on a single server creates database security issues.
  • This would be technically feasible. However, database replication should be implemented at all sites to improve response time.
  • This would be technically feasible. However, the resource requirements of theBusDev, data store, and Resource Manager Summary databases should be allocated in SQL server using strict parameters, and continuously monitored to ensure that sufficient resources are allocated to each database.

Answer : This would be technically feasible. However, the resource requirements of theBusDev, data store, and Resource Manager Summary databases should be allocated in SQL server using strict parameters, and continuously monitored to ensure that sufficient resources are allocated to each database.

Citrix 1Y0-614 Access Suite 4.0 Design Practice Exam Set 4

Scenario: Within the next two years, your client is planning to acquire a smaller company; this means that the company will double in size and must grow their current four-server, 150 concurrent user Presentation Server farm. The client recently deployed one module of a manufacturing application by means of Presentation Server and has plans to deploy additional modules in the near future. Office 2003 is already deployed in the environment; however, one of these new modules has dependencies on Microsoft Excel 97. In the future, your client plans on opening up the manufacturing application to remote users, including traveling salespeople. Currently, they are using Access Gateway Advanced Edition for remote access to their farm. Based on this information, which pair represents this customer's highest and lowest priorities?


Options are :

  • Security, growth
  • Growth, application deployment
  • Security, remote access
  • Remote access, application deployment

Answer : Growth, application deployment

Scenario: A company engaged your team to assess its Presentation Server environment. Approximately two months ago, they deployed five Presentation Servers using Citrix documentation, and thus far, users seem to be pleased with the environment. Users access the Presentation Server environment by means of Windows 2000 and Windows XP devices. During the course of the assessment, the CIO asks you about Terminal Services licensing. He explains that he recently met with his Microsoft representative and was advised that he needed Terminal Services Client Access Licenses because Presentation Server is deployed on Windows Server 2003. He asks you to make a recommendation regarding how this is generally configured. How should you respond?


Options are :

  • The Microsoft Terminal Services license server functionality cannot be shared with the Citrix license server.
  • The Terminal Services license server functionality must be shared with a domain controller.
  • Per-device licensing is the most common configuration and is optimal because the IT Department frequently rebuilds user computers rather than repair them.
  • At least one Terminal Services license server is required to provide Terminal Services Client Access Licenses to users; however, two are preferred.

Answer : At least one Terminal Services license server is required to provide Terminal Services Client Access Licenses to users; however, two are preferred.

Scenario: After a meeting with the CIO from your client organization, you learn that they plan to expand their environmental consulting practice and double in size in the next two years. Six of their Presentation Servers are used to host a specific application that facilitates writing environmental management plans. This application is accessed by field consultants through Access Gateway Advanced Edition. Users report that they are generally satisfied with the current access strategy, although they occasionally experience connection issues to the file server that houses customer documentation. They plan on adding two or three additional modules of the application within the next few months. The CIO has asked you to review their current environment to determine how it can be optimized in order to support their plans. Based on the information provided, what is the primary objective of the client organization?


Options are :

  • Growth
  • Security
  • Application deployment
  • User connectivity

Answer : Growth

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 1

Scenario: Your consulting firm must provide an Access Strategy Assessment to a company based on one Presentation Server farm consisting of 15 servers. The company has instructed the team to review specific configurations related to printing and Terminal Services profiles to address user complaints. Finally, you are required to talk directly with several users who have been experiencing issues. In discussing the Statement of Work with the customer, approximately how much time should be allotted for the Access Strategy Assessment?


Options are :

  • 14 - 20 business days
  • 2 - 3 business days
  • 1 - 2 weeks
  • 3 - 4 weeks

Answer : 1 - 2 weeks

Scenario: A bank, based in the Southeastern United States, has a very large customer base in Texas, Louisiana and Georgia. Two years ago, the bank purchased Citrix products. Recently, they upgraded their Citrix Access Suite environment to Access Suite 4.0. Users in their environment have been using generic application accounts because every time administrators try to assign individual passwords, users complained about having to remember new passwords. As a result, the IT team has no means of tracking who does and who has what permissions to which applications. The IT Manager wants to implement corporate requirements that will ensure the listed options or requirement are met: Users are using personalized passwords Passwords are changed every 45 days Passwords are 8 to 24 characters long Passwords are case sensitive and they most consist of one uppercase letter and a number Based on the bank's requirement and the current setup of this environment, which two actions will you recommend as a means of maximizing security?


Options are :

  • Implementation of password policies using Password Manager
  • Discontinuation of the use of generic accounts
  • Implementation of identification verification questions using Password Manager
  • Creation of an account with the same password for each user

Answer : Implementation of password policies using Password Manager Discontinuation of the use of generic accounts

Scenario: A company asked you to assess their Presentation Server environment. When you met with the Active Directory Administrator, you learned that the Presentation Servers are housed in the default computer OU (Organizational Unit). Which recommendation should you make to the Active Directory Administrator?


Options are :

  • Leaving the Presentation Servers in the Computers OU is an acceptable practice because GPOs (Group Policy Objects) cannot be applied to this container.
  • The Presentation Servers should be moved into their own OU and GPOs, such as Terminal Services-related configurations, should be applied.
  • Leaving the Presentation Servers in the Computers OU is an acceptable practice as long as no domain GPOs would have a negative impact.
  • The Presentation Servers should be moved into an OU with all other Terminal Servers.

Answer : The Presentation Servers should be moved into their own OU and GPOs, such as Terminal Services-related configurations, should be applied.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 2

Scenario: A breakfast food company has asked you to assess their access strategy. They currently have eight Presentation Servers that are accessed by traveling salespeople and other remote employees through a Secure Gateway server. The Secure Gateway server has not had any unplanned outages, and resource utilization is low. They have two Web Interface servers, one on their internal network to service internal application enumeration requests, and another in the DMZ with Secure Gateway.The company plans to acquire a new pig farm and hopes to double their business in the next few months. As such, they have requested that you provide recommendations for how they can support this expansion while ensuring that access is always available to their users. In particular, they want company-provided laptops to have access to their environment. What should you recommend to this company?


Options are :

  • Access Gateway Standard should be deployed in a redundant configuration.
  • Secure Gateway should be eliminated, and Web Interface should be deployed with certificates installed in a redundant configuration in the DMZ.
  • Access Gateway Advanced Edition should be deployed in a redundant configuration.
  • A second Secure Gateway server should be implemented to ensure redundancy.

Answer : Access Gateway Advanced Edition should be deployed in a redundant configuration.

Scenario: A corporation asked you to assess their five-server Presentation Server 4.0 deployment with a focus on the application environment. They have deployed MaxData+, an ERP application; the vendor has just released a new version of the application. Because their Gray Division, which will be sold in a few months, uses the current version, they need to have both versions available to users until the sale is completed. Some users in the CFO group also need access to both versions. To address this requirement, the corporation deployed the new version of MaxData+ into an application isolation environment. What recommendation or assessment can you make regarding this deployment decision?


Options are :

  • Instead of deploying the new version into the application isolation environment, a segregated Load Managed Group should have been deployed for the new version of the application.
  • Instead of deploying just the new version into the application isolation environment, both versions should have been deployed into application isolation environments.
  • Deploying the new version into an application isolation environment represented the best option
  • Instead of deploying the new version into the application isolation environment, the old version should have been redeployed into an application isolation environment and the new version should have been deployed as a regular application.

Answer : Instead of deploying the new version into the application isolation environment, the old version should have been redeployed into an application isolation environment and the new version should have been deployed as a regular application.

Scenario: Your customer does not have sufficient hardware to designate a dedicated Zone Data Collector based on a single-zone implementation consisting of ten servers. In order to ensure that this Zone Data Collector is not overloaded with hosting applications, the Citrix Administrator has moved the Farm Metric Server to another Presentation Server. In addition, connectivity to the Microsoft SQL Server Database Engine (MSDE)-based data store database has been changed from indirect to direct for all servers. Which two options are true for this environment?


Options are :

  • A custom load evaluator should be applied to all servers except the Zone Data Collector.
  • The resource requirements of the Zone Data Collector decrease by removing Farm Metric Server functionality.
  • The Farm Metric Server must connect indirectly to the data store.
  • This data store configuration is not supported.

Answer : The resource requirements of the Zone Data Collector decrease by removing Farm Metric Server functionality. This data store configuration is not supported.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Set 3

Scenario: A mining company has engaged your team to assess their Citrix Presentation Server printing environment, which users access from their Win32 based client devices. Several weeks ago, the Citrix Administrator realized that users were installing native drivers and that there were now almost 200 drivers installed on the various servers in the farm. Based on testing done on the various client device types supported, it is apparent that the universal printer driver will address all of the supported printers within the environment. Thus, in order to address this situation, the administrator has made plans to: Invoke a Citrix policy that would only allow the Universal Printer Driver to be used by all clients Delete all of the native drivers from each server The administrator has asked you to assess this plan. What is your assessment?


Options are :

  • In light of the testing that was performed, this plan seems adequate.
  • Although it is a best practice to do so, it is not necessary to delete all of the native drivers from each server because this has no impact on Presentation Server functionality.
  • The test results should be reviewed to ensure that all of the Presentation Server Clients in use were represented.
  • This plan will not address the requirements.

Answer : In light of the testing that was performed, this plan seems adequate.

Scenario: You have been asked to assess the Presentation Server environment at a corporation. As you learn more about the corporation, you find that inconsistencies abound within the environment, and as a result has led to user frustration and dissatisfaction. When questioning the administrator of the Presentation Server about the requirements for implementing changes, he states that he merely informs the other administrators verbally or by e-mail about major changes, such as a new application or server. Minor changes, such as configuration modifications, are commonly made as necessary. Which two recommendations would you make regarding the change control process?


Options are :

  • Only two administrators should be allowed to make changes.
  • Administrators should be allowed to make changes only after having tested the change thoroughly.
  • Administrators should be allowed to make changes only after informing the other administrators.
  • Administrators should be allowed to make changes only when following a fully documented process.

Answer : Administrators should be allowed to make changes only after having tested the change thoroughly. Administrators should be allowed to make changes only when following a fully documented process.

Scenario: A company engaged your team to assess their Presentation Server environment. They are planning to replace their Secure Gateway server with Access Gateway appliances as a part of the next phase of the project but have asked you to assess their current Web Interface/Secure Gateway deployment now. The company deployed Secure Gateway and Web Interface on the same server within the DMZ so that managers can track retail sales at each of the 86 store locations from a centralized location. In conversing with the project manager, you learn that they purchased two Access Gateway Standard Edition appliances. Which two options identify the strength and risk for this company?


Options are :

  • Strength: Thecompany has recognized the single point of failure of a Secure Gateway device; this is why they are upgrading to Access Gateway.
  • Risk: Access Gateway Standard Edition does not provide the full functionality of Secure Gateway unless the Advanced Edition is purchased.
  • Risk: A single point of failure still exists because Web Interface is on a single server.
  • Strength: The current environment is based on single points of failure unless the Access Gateway access mechanisms are used.
  • Strength: Thecompany is upgrading Secure Gateway to Access Gateway, which will provide a hardened Linux-based device that can be placed on the internal network.

Answer : Strength: Thecompany has recognized the single point of failure of a Secure Gateway device; this is why they are upgrading to Access Gateway. Risk: A single point of failure still exists because Web Interface is on a single server.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 1

Scenario: The new CIO of a company has engaged your team to assess their Presentation Server environment. The current environment was originally deployed as a three-server farm and has since grown to 30 servers. Very little tuning and optimization has been done, and most of the original defaults have not been modified. The company deployed Web Interface for internal users and now plans on deploying Access Gateway Advanced Edition for traveling and telecommuting employees. The known facts regarding this new group of users are: Some users will be accessing from company-assigned Win32 and Macintosh laptops. The most recent native Presentation Server Client has been installed on these devices. Some users will be accessing from non-company assigned computers based on Windows 2000 or Windows XP. These devices do not have a Presentation Server Client installed. Client installation and access should create a minimal number of help desk calls. Which two recommendations should you make to the company's CIO?


Options are :

  • The non-company assigned computers should use the Citrix Access Client package.
  • The non-company assigned computers should use the Win32 Web Client.
  • The Macintosh devices will need to use the Access Client for Java.
  • The non-company assigned computers should use Program Neighborhood Agent.

Answer : The non-company assigned computers should use the Win32 Web Client. The Macintosh devices will need to use the Access Client for Java.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 2

Scenario: A resort company has asked you to assess their Citrix Access Suite environment. Because they have salespeople who regularly travel to expositions and other events, they must provide external access to their reservation booking application. Based on your assessment of the current environment, you learn that: Presentation Servers are located behind the internal firewall. The Access Gateway device and Web Interface server are located in the DMZ (Demilitarized Zone). Windows 2000 Active Directory authentication is required for connections that use Access Gateway. Which two recommendations should you make to the company to improve the security of their Access Suite deployment?


Options are :

  • Two-factor authentication should be deployed.
  • Upgrading to Windows 2003 Active Directory will provide improved logon security.
  • The Web Interface servers should be moved behind the internal firewall.
  • The server hosting the Citrix XML Service should be co-located with the Web Interface server in the DMZ.

Answer : Two-factor authentication should be deployed. The Web Interface servers should be moved behind the internal firewall.

Scenario: A company asked you to assess their Presentation Server environment with special emphasis on making recommendations that will improve logon times. Current configurations include: Presentation Server policies are used to map all client drives. Roaming profiles are used; folder redirection is not used. All printers are autocreated. Web Interface does not upgrade the Presentation Server Client. Printer properties are retained in the user profile. Two-factor authentication is used. Based on this information, which two recommendations should you make to the company?


Options are :

  • Client drive mapping should be disabled.
  • A logon script should be implemented.
  • Only the default printer should be auto-created.
  • Folder redirection should be implemented.
  • Printer properties should be retained on the client device.

Answer : Only the default printer should be auto-created. Folder redirection should be implemented.

Scenario: An airline company has been using Citrix products for approximately six years. Recently, the company upgraded their environment from Citrix Access Suite 3.0 to Citrix Access Suite 4.0. The IT staff is not certified on Access Gateway Advanced Edition. They recently implemented Access Gateway Advanced Edition in Access Gateway stand-alone mode. The CIO has been mounting pressure on the IT Team to implement a lot of new security measure offered by their competitors in the aviation industry. The CIO wants two- factor authentication implemented, which requires users to login using their Active Directory accounts; he has also asked for some other form of advanced authentication tools. The single point of entry to the Citrix environment must be through Access Gateway Advanced Edition. Browser only access, file type association and download should be allowed to users based on their access scenario. The IT staff also wants to implement more services that will enhance productivity for both IT member and other employees. Based on the current setup of this environment, what would you recommend a better implementation to the CIO of this airline?


Options are :

  • Implement Access Gateway Advanced Edition in VPN mode by integrating the Access Gateway appliance with Advanced Access Control servers.
  • Implement more lenient policies in the Gateway mode for clients connecting through the Access Gateway appliance.
  • Implement Access Gateway Advanced Edition in Proxy mode by integrating the Access Gateway appliance with Web Interface.
  • Implement Active Directory policies for users connecting through the Access Gateway appliance

Answer : Implement Access Gateway Advanced Edition in VPN mode by integrating the Access Gateway appliance with Advanced Access Control servers.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 3

Scenario: In an environment in which you are assessing the Citrix Access Suite implementation, all the Citrix servers are assigned static IP addresses, and on more than one occasion, administrators have accidentally re-assigned an IP address, causing duplicate IP assignments. What should you recommend to avoid this problem in the future?


Options are :

  • A centralized repository should be created to track IP addresses. Alternatively, DHCP reserved addresses could be used.
  • Administrators should ping the new IP address before assigning it to a server.
  • Dynamic DHCP addresses should be used to ensure that servers always have a valid IP address.
  • Administrators should first release the IP address to be used before re-assigning it.

Answer : A centralized repository should be created to track IP addresses. Alternatively, DHCP reserved addresses could be used.

Scenario: Your customer is an Application Service Provider that deploys applications to customers based on the complete allocation of servers. Thus, a customer can contract for two or more segregated servers and a reasonable number of applications that can be supported on each of these servers. The customer engages your team to assess their application environment in order to determine how they can optimize their environment. Based on your discussions, you have learned that: Customers are charged on a per-server basis (minimum of two servers), plus server resources and usage time based on Resource Manager billing reports. Customers are required to contract for segregated servers because of perceived security issues; that is, customers must be able to see or use another customer's applications. Based on previous editions of Presentation Server, it was not possible to support multiple versions of an application on a single server. Now that the environment has grown to 80 servers and there are 30 customers, the Application Service Provider would like to change their sales and billing model to enable customers to purchase application ac cess based solely on usage time with the stipulation that servers are shared amongst customers. Applications that use more resources would have a higher per-hour fee. The administrators at the company plan to do the following: Combine applications on servers where business and technical reasoning is sound based on thorough testing. The designations will be based on application performance that meet or exceed the current metrics. Implement CPU and memory optimization on the server farm. Lock down servers by means of Windows 2003 Group Policy Objects (GPOs). What is your assessment of the customer's plans?


Options are :

  • The planned application redeployment is reasonable as long as keep-alives are enabled.
  • The planned application deployment is reasonable as long as only the universal printer drivers (UPDs) are used.
  • The planned application redeployment is reasonable as long as all applications are deployed into isolation environments.
  • The planned application redeployment is reasonable based on thorough testing.

Answer : The planned application redeployment is reasonable based on thorough testing.

Scenario: Your client has a Presentation Server farm that is based on five servers. Because the server farm is small, they implemented Microsoft Access as the data store database. Business has grown considerably and they now need to double the number of users and servers. They would also like to implement the Resource Manager Summary Database using the same database type as the data store. Which database recommendation should you make to your client?


Options are :

  • Microsoft SQL Server Express
  • Microsoft SQL Server
  • Microsoft SQL Server Database Engine (MSDE)
  • Microsoft Access

Answer : Microsoft SQL Server

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Exam Set 4

Scenario: A hospital has Password Manager 4.1 configured for use with four published applications in its Presentation Server 4.0 farm. As a result of an expansion, which included the acquisition of other hospitals, the company has added several new applications to enhance the productivity of their employees. The number of applications that require users to authenticate has increased by 100%. These users also have no means of changing/resetting their own passwords. Requirement: The IT Manager wants to meet these requirements: Applications that require authentication should be configured so that users can save their credentials and avoid the extra time spent entering them every time in order to use the same applications. Helpdesk load must be kept at a reduced level by enabling users with capabilities to change their own primary passwords. Users will have to change their passwords every eight weeks. Passwords will have to be a minimum of eight characters and contain at least one numeric character. Based on the current setup of their environment, which three recommendations would you make to the CIO as a better means of optimizing Password Manager?


Options are :

  • Implement an Active Directory central store to allow pass-through authentication.
  • Implement a Password Manager policy in order to ensure that users' passwords are changed according to the requirements.
  • Implement a Presentation Server policy to allow pass-through authentication to Presentation Server published applications.
  • Implement a Password Manager policy for applications that require credentials so that users' passwords are stored after they authenticate for the first time.
  • Implement Password Manager Account Self-Services to allow users to change their own primary passwords.

Answer : Implement a Password Manager policy in order to ensure that users' passwords are changed according to the requirements. Implement a Password Manager policy for applications that require credentials so that users' passwords are stored after they authenticate for the first time. Implement Password Manager Account Self-Services to allow users to change their own primary passwords.

Scenario: A corporation recently implemented Voice Over IP and set voice traffic to the highest priority queue. They deployed all Citrix Access Suite components and now have plans to prioritize Citrix traffic on the internal routers to ensure that it has secondary priority because this is business-critical network traffic. As part of the Access Suite assessment, you have been asked to provide a recommendation for prioritizing the ICA traffic. All Citrix servers are located within the headquarters-based data center and are together on the same segregated subnet session reliability is implemented. The corporation has accepted all Citrix default ports. Your client plans to prioritize traffic based on TCP 1494 for inbound traffic to the Presentation Servers and has asked you to comment on their plans. What should you advise this client?


Options are :

  • Use TCP port 2598 for inbound traffic to the Presentation Servers, and TCP port 81 for Web Interface and Citrix XML Service browsing; these ports should be prioritized.
  • Because TCP port 1494 is used for inbound traffic to the Presentation Servers, and TCP port 81 is used for Web Interface and Citrix XML Service browsing, prioritizing the traffic is paramount.
  • Because all Citrix servers are located within one subnet, prioritizing inbound and outbound traffic from that subnet would be the easiest configuration.
  • Use TCP port 443 for inbound traffic to the Presentation Servers, and TCP port 81 for Web Interface and Citrix XML Service browsing; these ports should be prioritized.

Answer : Because all Citrix servers are located within one subnet, prioritizing inbound and outbound traffic from that subnet would be the easiest configuration.

Scenario: After a meeting with the CIO from your client organization, you learn that they plan to expand their environmental consulting practice and double in size in the next two years. Six of their Presentation Servers are used to host a specific application that facilitates writing environmental management plans. This application is accessed by field consultants through Access Gateway Advanced Edition. Users report that they are generally satisfied with the current access strategy, although they occasionally experience connection issues to the file server that houses customer documentation. They plan on adding two or three additional modules of the application within the next few months. The CIO has asked you to review their current environment to determine how it can be optimized in order to support their plans. Based on the information provided, what is the primary objective of the client organization?


Options are :

  • Growth
  • Security
  • User connectivity
  • Application deployment

Answer : Growth

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 1

Scenario: A corporation has deployed Citrix Presentation Server 4.0 and has asked your team to assess their printing environment. Citrix Presentation Server is currently configured to import print servers and the automatic assignment of printers to users based on the physical location. Each floor has three printers, and a specific IP range is used by DHCP for each floor. To date, this has worked well. However, the IT Team will be piloting a wireless LAN solution for the Engineering group, which spans two floors of the building. The Engineering users move around considerably within this area. The Citrix Administrator plans to invoke a Citrix policy that assigns all of the printers on those two floors to the IP range of the wireless LAN device and has asked you to comment on this proposed solution. Which statement represents the correct response?


Options are :

  • A better solution would be to apply the policy based on the Engineering group.
  • A better solution would be to enable printer auto-creation for all users.
  • A better solution would be to apply two policies based on the floor where the Engineering users customarily work and map the three printers to that floor.
  • This solution addresses the requirements adequately.

Answer : This solution addresses the requirements adequately.

Scenario: A company engaged your team to assess their Presentation Server environment. Users in the remote offices are experiencing slow Presentation Server sessions at certain times during the day; however, users in the headquarters office do not experience slow sessions. In reviewing their environment, you have learned that printing policies are configured for all users as listed: All printers are autocreated Only the universal printer driver is used. No printer bandwidth policies are invoked. No session printing policies are configured.User devices are running on Win32, WinCE/Pocket PC, and Macintosh devices, all of which use the most recent and appropriate Presentation Server Client. Which two risks can you associate with the printing environment?


Options are :

  • The universal printer driver is used if the native driver is unavailable for all users.
  • Not limiting printer bandwidth is having an adverse impact on all users.
  • Auto-creating all printers could be taking additional time.
  • Network printing is configured.
  • Not all clients can take advantage of the latest universal printer driver.
  • No printer bandwidth policies are invoked.

Answer : Not all clients can take advantage of the latest universal printer driver. No printer bandwidth policies are invoked.

Scenario: A company has eight applications currently deployed in its environment, including Microsoft Office, by means of Citrix Presentation Server. In preparing for an upgrade, the Citrix Administrator tested the new version of their mission-critical application and found that it uses more CPU than the previous version. Although implementing CPU Optimization improved the application response time slightly, the administrator seeks your guidance regarding which additional measures can be taken because purchasing higher-powered servers is not feasible at this time. How should you respond?


Options are :

  • The new version of the application should be deployed onto another logical server drive.
  • The new version of the application should be deployed into an application isolation environment.
  • The new version of the application should be deployed into its own load managed group.
  • The new version of the application should be deployed with a higher CPU priority than the previous version.

Answer : The new version of the application should be deployed with a higher CPU priority than the previous version.

1Y0-200 Managing Citrix XenDesktop 7 Solutions Practice Test Set 2

Scenario: A new Network Administrator recently deployed Web Interface 4.2 integrated with Secure Gateway to secure access to published applications in his company's Citrix Access Suite 4.0 environment. During the integration, the administrator deployed several server load balancers. These load balancers contain built-in SSL accelerator cards. The environment was setup to ensure redundancy; therefore, multiple Secure Gateway Servers were deployed. The implementation turned out to be a failure. Secure Gateway could not connect to the Presentation Server farm. Based on their current environment, how would you advise the administrator optimize his Secure Gateway and Web Interface implementation?


Options are :

  • Implement Secure Gateway with SSL accelerators turned off on the load balancers.
  • Implement the firewall(s) to operate in proxy mode.
  • Implement Secure Gateway Proxy to optimize connection.
  • Implement Secure Gateway inside the internal network.

Answer : Implement Secure Gateway with SSL accelerators turned off on the load balancers.

Scenario: A distributing company asked you to assess their Presentation Server environment, with special focus on reviewing their Terminal Services policies and profiles. Their users are primarily salespeople and warehouse clerks that use Terminal Services mandatory profiles that have been configured by means of a Windows 2003 Active Directory GPO. Users complain that they are prompted to enter their credentials for Microsoft Office applications, and that they must reconfigure their email settings as part of each logon. For this reason, they frequently keep their ICA sessions open for several days at a time. The Presentation Server administrator is concerned about not having sufficient licenses to service their concurrent users once the new distribution center in Vancouver is opened. Thus, they plan to limit the connection time of some of the users to a period of four hours instead of the current five-day limit. Which two recommendations can you give the company?


Options are :

  • By means of a Group Policy Object, disconnect timeouts should be set to four hours.
  • By means of a Group Policy Object, roaming profiles should be configured as the replacement for mandatory profiles.
  • By means of a Group Policy Object, folder redirection of the Application Data folder should be enabled.
  • By means of the Citrix Connection Configuration, disconnect timeouts should be set to four hours.

Answer : By means of a Group Policy Object, disconnect timeouts should be set to four hours. By means of a Group Policy Object, folder redirection of the Application Data folder should be enabled.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions