Citrix 1Y0-614 Access Suite 4.0 Design Practice Exam Set 4

Scenario: A company asked you to assess their Presentation Server environment. Based on discussions and observations, you learn that: A single Citrix license server has been deployed. Three zones exist: Headquarters, Disaster Recovery, and Test/Dev, each with two servers. A Citrix policy for Zone Preference and Failover has been implemented that fails over the headquarter site to the Disaster Recovery site. The company is planning to expand its environment by adding 12 servers in the Headquarters location and 4 servers in the Disaster Recovery site. Based on this information, which three assessments can you make about their environment?


Options are :

  • One Citrix License Server is not adequate for supporting this farm.
  • Zone Preference and Failover has not been implemented correctly.
  • The test environment is not configured correctly. (Correct)
  • The test environment is configured correctly.
  • One Citrix License Server is adequate for supporting this farm. (Correct)

Answer : The test environment is not configured correctly. One Citrix License Server is adequate for supporting this farm.

Citrix 1Y0-327 Password Manager 4.5 Administration Test Set 7

Scenario: A recording company, based in Alaska, recently began an expansion effort and has since opened a satellite office in Seattle. The company also relocated approximately 15% of its Alaska staff there. The company's current environment includes Access Gateway Advanced Edition integrated with Presentation Server 4.0 in VPN mode as the single point of entry. Users in the satellite office need to access MetReg, a recording database that contains the company's customer data. The company is very careful about allowing access to important information from external entry points. The IT team wants to have the capability to provide external users with restricted access to this SQL database. The IT Director is currently seeking consultation to implement the new access strategy. Based on the current situation at this company, how would you recommend the IT team optimize their Access Gateway Advanced Edition environment?


Options are :

  • Implement access to the database application as a web resource with File Type Association for external users. (Correct)
  • Implement access to the database application as a file share but deny theSeattle users read permissions
  • Implement access to the database application as a web resource with the Download action control for external users
  • Implement access to the database application as a network resource with File Type Association for external users.

Answer : Implement access to the database application as a web resource with File Type Association for external users.

Scenario: A company currently has a single server farm based on two zones: Headquarters: 8 servers London Office: 4 servers The company plans to add a third zone for disaster recovery with two servers that will only be used if the Headquarters site is unavailable. They plan to implement these two Citrix policies London Zone Preference and Failover: Primary zone is London, first backup zone is Headquarters, second backup zone is Disaster Recover Headquarters Zone Preference and Failover: Primary zone is Headquarters, first backup is Disaster Recovery What is your assessment of the company's plans?


Options are :

  • The Zone Preference and Failover configuration is incorrect because a third policy for the Disaster Recovery zone is required.
  • The Zone Preference and Failover configuration is correct. (Correct)
  • The Zone Preference and Failover configuration is incorrect because each backup zone must have the same number of servers as the primary zone
  • he Zone Preference and Failover configuration is correct; however, it would be better to implement this configuration under one policy.

Answer : The Zone Preference and Failover configuration is correct.

Scenario: An environmental company engaged your team to assess their application deployment strategy. Based on your discussions and observations, you learned that: Users access applications on the Presentation Server through a published desktop The published desktop is locked down extensively by means of group policy objects (GPOs) Multiple versions of the same application are required for use by different users When preparing your findings and recommendations to the company, which statement should you make?


Options are :

  • Your company should continue to offer applications to users through published desktops because Active Directory GPOs address all of the necessary security and control requirements.
  • Your company should offer applications to users as published applications even though isolated applications can be used with published desktops.
  • Your company should offer applications to users as published applications because user access to applications can be controlled more granularly. (Correct)
  • Your company should continue to offer applications to users through published desktops because they are easy to use.

Answer : Your company should offer applications to users as published applications because user access to applications can be controlled more granularly.

1Y0-309 Citrix Access Gateway 8.0 Enterprise Edition Test Set 3

Scenario: A company has asked you to assess their application environment. Based on your discussions and observations, you have learned that: Users access the Presentation Servers based on published applications. All applications are configured similarly in terms of display and other configuration settings. Servers are locked down extensively by means of Group Policy Objects (GPOs). The new IT Manager comes from a company where the published desktop was made available to all users and has asked you whether this practice should be implemented here. Given all of this information, which statement represents your assessment?


Options are :

  • The company should offer applications to users based on the published desktop because of the ease of administrative control associated with publishing a single desktop instead of multiple published applications.
  • The company should offer applications to users based on the published desktop because Active Directory GPOs address all of the necessary security and control requirements.
  • The company should continue to offer applications to users based on published applications because access to applications can be controlled more granularly. (Correct)
  • The company should continue to offer applications to users based on published applications because this is the way that it has always been done.

Answer : The company should continue to offer applications to users based on published applications because access to applications can be controlled more granularly.

Scenario: A corporation asked you to assess their five-server Presentation Server 4.0 deployment with a focus on the application environment. They have deployed MaxData+, an ERP application; the vendor has just released a new version of the application. Because their Gray Division, which will be sold in a few months, uses the current version, they need to have both versions available to users until the sale is completed. Some users in the CFO group also need access to both versions. To address this requirement, the corporation deployed the new version of MaxData+ into an application isolation environment. What recommendation or assessment can you make regarding this deployment decision?


Options are :

  • Deploying the new version into an application isolation environment represented the best option.
  • Instead of deploying the new version into the application isolation environment, a segregated Load Managed Group should have been deployed for the new version of the application.
  • Instead of deploying the new version into the application isolation environment, the old version should have been redeployed into an application isolation environment and the new version s hould have been deployed as a regular application. (Correct)
  • Instead of deploying just the new version into the application isolation environment, both versions should have been deployed into application isolation environments.

Answer : Instead of deploying the new version into the application isolation environment, the old version should have been redeployed into an application isolation environment and the new version s hould have been deployed as a regular application.

Scenario: A company asked you to assess their Presentation Server 4.0 environment paying specific attention to their network configuration because some users have reported that their applications usually freeze and then disconnect. This is most commonly reported by users accessing over WinCE/PocketPC-based wireless WAN connections using the WinCE/Pocket PC Client, which do not require printing or the use of any other virtual channels. In reviewing their environment, you see that no customizations other than the Citrix License Server location have been made to the farm properties. By means of Citrix policies, all virtual channels have been disabled for this user group. What additional recommendation should you make?


Options are :

  • The Presentation Server Client for Java should be used instead of the WinCE/Pocket PC Client.
  • Workspace control should be enabled.
  • SpeedScreen Browser Acceleration should be enabled so that it is automatically used if less bandwidth is available.
  • Session reliability timeout should be extended. (Correct)

Answer : Session reliability timeout should be extended.

Citrix 1Y0-327 Password Manager 4.5 Administration Exam Set 1

Scenario: An enterprise deployed a Presentation Server farm which includes five servers. These servers were built manually using a documented process. They are planning to expand the environment by one to two servers per quarter and seek guidance from you regarding how they should facilitate the server build process. What should you recommend?


Options are :

  • They should create the base server build based on the operating system and Citrix Presentation Server using a scripting or cloning tool. All applications should be deployed using Installation Manager. (Correct)
  • They should continue to use the manual process as it is suitable for the provided projections.
  • They should create a base server build based on the operating system, Citrix Presentation Server, and all applications using a scripting or cloning tool.
  • They should create a base server build based on the operating system using a scripting or cloning tool. Citrix Presentation Server and all applications should be deployed using Installation Manager.

Answer : They should create the base server build based on the operating system and Citrix Presentation Server using a scripting or cloning tool. All applications should be deployed using Installation Manager.

Scenario: An electrical company recently upgraded to Windows Server 2003, including Active Directory. Because the Active Directory team did not communicate with the Citrix team, no Terminal Services-related group policy objects (GPOs) were incorporated as part of the initial rollout. The company engaged your team to provide an assessment of the current environment. The CIO has asked that you participate in the Terminal Services GPO discussion and make recommendations to improve scalability, as additional users will require the growth of the environment at the company from 5 servers to 25 with remote access capability. Currently, Terminal Services roaming profiles and home directories aredesignated by means of individual user properties. Within farm properties, keep-alives are set. Within Citrix policies, audio, COM port and drive mappings are disabled. Within the Citrix Connection Configuration, timeout settings are configured. Which two settings should be centralized within Active Directory GPOs so that the environment will scale?


Options are :

  • Timeout settings (Correct)
  • Terminal Services roaming profiles and home directories (Correct)
  • Session reliability settings
  • Keep-alive settings

Answer : Timeout settings Terminal Services roaming profiles and home directories

Scenario: A company has engaged your team to review their Citrix Access Suite deployment with a focus on their security environment. Their Security Manager has advised the Citrix Administrators that corporate security must be tightened because of a recent leak of corporate information. Based on discussions and observations, you learned that: Physical security within the data center is based on card access that is limited to specific individuals. Administrators use the RDP protocol to remotely access servers. Users cannot access any resources using RDP. Web Interface servers and Presentation Servers are located behind the internal firewall. Access Gateway devices are located in the DMZ. Two-factor authentication is required for Access Gateway connections. Pass-through authentication is enabled for users. Based on these data points, what should you recommend to this company?


Options are :

  • Administrators should be prohibited from using RDP protocol as well.
  • Place an additional Web Interface server in the DMZ for external users only.
  • Two-factor authentication should be disabled for users and a single sign-on solution should be implemented.
  • Pass-through authentication should be disabled. (Correct)

Answer : Pass-through authentication should be disabled.

Citrix 1Y0-731 Netscaler 8.0 Administration Practice Exam Set 1

Harder Electronics has decided to implement all of the Access Suite 4.0 components. Where should the Web interface server(s) and the server(s) hosting the Citrix XML Service be placed to maximize security?


Options are :

  • Web Interface should be placed in the DMZ, and the server(s) hosting the Citrix XML Service should be placed within the internal network.
  • Web interface and the server(s) hosting the Citrix XML Service should be co-located on the same same server(s) and placed within the DMZ.
  • Web Interface and the server(s) hosting the Citrix XML Service should be placed within the internal network. (Correct)
  • Web Interface and the server(s) hosting the Citrix XML Service should be placed within the DMZ.

Answer : Web Interface and the server(s) hosting the Citrix XML Service should be placed within the internal network.

1Y0-253 Citrix NetScaler 10.5 for App Desktop Solutions Exam Set 3

Harder Electronics has asked you to co-locate Access Gateway Advanced Edition functionality with other servers but yet maximize security. Where should be Access Gateway Advanced Edition functionality be installed?


Options are :

  • The Advanced Access Control farm database should be co-located with the Presentation Server data store. The Advanced Access Control Agent Server should be installed on a Presentation Server
  • The Advanced Access Control farm database should be co-located with the Presentation Server data store. The Advanced Access Control Web server and Advanced Access Control Agent Server should be installed on the License Server.
  • The Advanced Access Control farm database should be co-located with the Presentation Server data store. The Advanced Access Control Web server and Advanced Access Control Agent Server should be installed on a separate machine. (Correct)
  • Install all Advanced Access Control components on a single server.

Answer : The Advanced Access Control farm database should be co-located with the Presentation Server data store. The Advanced Access Control Web server and Advanced Access Control Agent Server should be installed on a separate machine.

How should Harder Electronics deploy required Citrix hot fixes?


Options are :

  • All required hot fixes should be deployed by means of Installation Manager. Testing should be done. (Correct)
  • All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should be done.
  • All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be done.
  • Emergency hot fixes should be deployed through manual installation with limited documentation. All other hot fixes should be deployed by means if Installation Manger with full documentation.

Answer : All required hot fixes should be deployed by means of Installation Manager. Testing should be done.

In the context of the endpoint analysis solution of Harder Electronics which is implemented to meet the requirements for employees and customers. To meet the access requirements for remote employees, how should the scanning solution be implemented.


Options are :

  • Creating an endpoint analysis that checks against the registry for asset tags, scan the operating system and ensures that the appropriate versions of antivirus software is installed. Create a continuous scan to ensure that the proper antivirus software is running on the client device while connected to the network.
  • Creating an endpoint analysis that ensures that the appropriate version of the antivirus software is installed. Create a continuous scan to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network.
  • Creating an endpoint analysis that checks for security updates, scans the operating system and ensures that the appropriate version of the antivirus software is installed. Create a continuous scan to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network. (Correct)
  • Creating a continuous scan that checks for security updates, scans the operating system and ensures that the appropriate version of the antivirus software is installed. Create an endpoint analysis to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network.

Answer : Creating an endpoint analysis that checks for security updates, scans the operating system and ensures that the appropriate version of the antivirus software is installed. Create a continuous scan to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network.

1Y0-309 Citrix Access Gateway 8.0 Enterprise Edition Test Set 1

Which type of Terminal Services profile should be deployed?


Options are :

  • Mandatory profiles with folder redirection
  • Roaming profiles
  • Mandatory profiles
  • Roaming profiles with folder redirection (Correct)

Answer : Roaming profiles with folder redirection

Harder Electronics has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment. Why is downloading from the Harder Electronics intranet site the best option?


Options are :

  • All clients can be downloaded automatically. (Correct)
  • Users can get the most up-to-date clients independently.
  • All clients can be downloaded. Clients for Windows and Java download automatically.
  • Users have access to this source and can get clients.

Answer : All clients can be downloaded automatically.

Harder Electronics has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing. Why are only user-based Group Policies required?


Options are :

  • Timeout settings must be applied to all user sessions to meet Harder Electronics's security requirements.
  • Policies for Presentation Server can only be applied on the user level.
  • User configuration Group Policies will satisfy the access requirements for the mission critical applications.
  • This is determined by the location of the timeout settings. (Correct)

Answer : This is determined by the location of the timeout settings.

Citrix 1Y0-351 NetScaler 10.5 Essentials and Networking Exam Set 9

How would the data store be designed?


Options are :

  • An MSDE data store database should be deployed inNew York with daily incremental backups and weekly full backups
  • An Oracle data store database should be deployed inNew York with updates occurring only once per day.
  • A SQL Server data store database should be deployed inNew York with daily incremental backups and weekly full backups. (Correct)
  • The Access data store database should be retained since it already contains all farm information.

Answer : A SQL Server data store database should be deployed inNew York with daily incremental backups and weekly full backups.

In regard to Harder Electronics's Advanced Access Control deployment. Why should an Advanced Access Control web server be placed at this customer's location?


Options are :

  • Adding an Advanced Access Control deployment expedites administrative changes because approval chain is closer to the customer.
  • Adding an Advanced Access Control web server will provide better load balancing across existing hardware.
  • Adding an Advanced Access Control deployment enables the customer to incorporate their own security standards. (Correct)
  • Adding an Advanced Access Control deployment makes administration more cost- effective for the customer

Answer : Adding an Advanced Access Control deployment enables the customer to incorporate their own security standards.

Harder Electronics plans to implement Presentation Server for users in Shanghai. Why should a static port be defined?


Options are :

  • By defining a static port, system resources can be conserved.
  • A static port will allow for License Server communications to be more secure, this, this is optimal. (Correct)
  • To avoid the unprecdictability of a dynamic port, a static port should be defined because it is more secure.
  • There is no other way to establish communication over firewalls other than defining a static port.

Answer : A static port will allow for License Server communications to be more secure, this, this is optimal.

Citrix 1Y0-327 Password Manager 4.5 Administration Test Set 6

Harder Electronics currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation. Why should Web Interface be deployed within the internal network?


Options are :

  • This prevents internal users from having to traverse the DMZ to access Web Interface through port 443 or port 80.
  • By placing the Web Interface servers on the internal network port 443 does not have to be opened. (Correct)
  • By placing the Web Interface servers on the internal network, external access can be limited to the Access Gateway appliance through port 443.
  • This is the only way to avoid opening port 80 on the internal firewall.

Answer : By placing the Web Interface servers on the internal network port 443 does not have to be opened.

A decision was made to deploy Office 2003 on all Citrix Presentation Servers. How would you install the applications into load managed groups and application isolation environments?


Options are :

  • TempoLicense/Access 97 should be installed into a load managed group, and MfgData+ and HR+ into the same application isolation environment.
  • TempoLicense/Access 97 should be installed into an application isolation environment, and MfgData+ and HR+ into separate load managed groups. (Correct)
  • TempoLicense/Access 97 should be installed into a load managed group, and MfgData+ and HR+ into separate application isolation environments.
  • TempoLicense/Access 97 should be installed into an application isolation environment, and MfgData+ and HR+ into the same load managed group.

Answer : TempoLicense/Access 97 should be installed into an application isolation environment, and MfgData+ and HR+ into separate load managed groups.

Harder Electronics plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. How would business partners access the Presentation Server resources that Harder Electronics wants to provide them and how would Presentation Server Client be distributed to the customer?


Options are :

  • A Web Interface 4.2 site will be made available as a Web Resource through the access server farm. The presentation server client for Windows with fallback to Java will automatically be deployed through the site
  • A Web Interface 4.2 site will be made available as a Web Resource with the logon point configured as the default navigation page through the access server farm. The Presentation Server Web Client will automatically be deployed through Advanced Access Control.
  • A Web Interface 4.2 site will be made available as a Web Resource with the logon point configured as the default navigation page through the access server farm. The Presentation Server Client for Java will automatically be deployed through Advanced Access Control (Correct)
  • A Web Interface 4.2 site will be made available as a Web Resource through the access server farm. A File Share Resources will be made available that houses each of the Presentation Server Clients so that the business partner can download the appropriate Client.

Answer : A Web Interface 4.2 site will be made available as a Web Resource with the logon point configured as the default navigation page through the access server farm. The Presentation Server Client for Java will automatically be deployed through Advanced Access Control

Citrix 1Y0-992 Meta Frame Presentation Server Feature Exam Set 4

In the context of Citrix Password Manager password policies for the application in Harder Electronics's internal environment. Why should this password policy be created?


Options are :

  • Both applications have internal and remote users.
  • It is easier to maintain this administratively.
  • The other security requirements can be through user configurations.
  • By creating this policy, it is scalable to any new mission critical applications that may be added in the future. (Correct)

Answer : By creating this policy, it is scalable to any new mission critical applications that may be added in the future.

Harder Electronics has a network print server in each office and manufacturing facility. In addition, most users have one or more printers pre-configured on their client devices, some of which are network printers. Some users do not require the ability to print, and other users, such as Accounts Payable Managers, need to be able to print to attached printers such as check printers. How should all client printers be auto created, and how should printer drivers be configured?


Options are :

  • Install key native drivers on the servers. All client printers should be auto created by means of a Citrix Policy. The Universal Print Driver should be used if the native driver is not available, and Windows drivers will be installed as needed.
  • Install key native drivers on the servers. All client printers should be auto created by means of a Citrix Policy. The Universal Print Driver should be used if the native driver is not available. (Correct)
  • reate two policies, one allowing to auto create all printers using the native driver, if available, otherwise using the Universal Print Driver, and the second policy has a higher priority, and does not allow auto creation of any printers to the groups not requiring the printers.
  • Create two policies, one allowing to auto create all printers using the native driver, if available, otherwise using the Universal Print Driver, and the second policy has a lower priority, and does not allow auto creation of any printers to groups not requiring printers.

Answer : Install key native drivers on the servers. All client printers should be auto created by means of a Citrix Policy. The Universal Print Driver should be used if the native driver is not available.

In regard to the type of the Terminal Services profile that should be deployed. Why should the roaming profiles and Application Data folders be stored on file servers in Mexico City and Shanghai?


Options are :

  • Because of security reasons, application data needs to be stored on the same file share as that of the roaming profiles. The roaming profiles are stored inMexico City and Shanghai because both of these data centers are the most secure in terms of disaster recovery.
  • The applications will fail to function without redirection of the Application Data folders. The Application Data folder needs to be stored in a location that is nearest to the roaming profiles.
  • The application customizations are stored in the Application Data folders. If these folders are not redirected, the customizations are not saved. AsShanghai is a manufacturing location, storing the profiles in the locations closest to the home location of Shanghai and the data center which hosts MfgData+ is optimal.
  • The Application Data folders are redirected to improve logon performance. Because MfgData+ stores its customized .INI file in the home directory, the roaming profiles should be located inMexico City. Storing the profiles in locations closest to the home location of Shanghai is also optimal. (Correct)

Answer : The Application Data folders are redirected to improve logon performance. Because MfgData+ stores its customized .INI file in the home directory, the roaming profiles should be located inMexico City. Storing the profiles in locations closest to the home location of Shanghai is also optimal.

Citrix 1Y0-992 Meta Frame Presentation Server Feature Exam Set 2

Harder Electronics plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor. Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for Harder Electronics's environment in a cost-effective manner?


Options are :

  • Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of Active Directory guest accounts.
  • Split tunneling, two-factor authentication, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts.
  • Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts. (Correct)
  • Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of Active Directory guest accounts.

Answer : Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts.

Harder Electronics plans to implement Presentation Server for users in Shanghai. A corporate License Server has been implemented for use by all farms except Shanghai. How should licenses that are currently stored on the corporate License Server be divided so that licenses can be allocated to the new Shanghai license server?


Options are :

  • Establish a network connection between the two License Servers so that licenses can be shared. (Correct)
  • Install the license file that is stored on the corporate License Server onto the Shanghai License Server, then modify the options file accordingly.
  • Install the license file that is stored on the corporate License Server onto the Shanghai License Server without making any changes to the options file.
  • Reallocate the license file so that the license count is split between the corporate License Server and the new License Server inShanghai.

Answer : Establish a network connection between the two License Servers so that licenses can be shared.

Harder Electronics has back-end databases that support HR+, MfgData+, and Outlook. Why should the Presentation Servers hosting MfgData+ be deployed in all locations?


Options are :

  • This way the users can be as close as possible to the Presentation Servers so they will have fast access.
  • Other sites have lower operating costs which offset the higher costs of NY,London and Sydney.
  • There are users located in all sites.
  • For redundancy it is good to have Presentation Servers in multiple locations. (Correct)

Answer : For redundancy it is good to have Presentation Servers in multiple locations.

Citrix 1Y0-351 NetScaler 10.5 Essentials and Networking Exam Set 9

Harder Electronics plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. Which features of Access Gateway should they recommend to best maximize security?


Options are :

  • To maximize security split tunneling, two-factor authentication, HTML Preview, and end- point analysis features should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created.
  • To maximize security split tunneling, SSL Client certificate, HTML Preview, and end- point analysis should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created. (Correct)
  • To maximize security split tunneling, two-factor authentication, HTML Preview, and end- point analysis features should be configured for the Access Gateway. Users will access by means of Active Directory guest accounts.
  • To maximize security split tunneling, SSL Client certificate, HTML Preview, and end- point analysis should be configured for the Access Gateway. Users will access by means of Active Directory guest accounts.

Answer : To maximize security split tunneling, SSL Client certificate, HTML Preview, and end- point analysis should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions