Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Citrix > Citrix Virtual Apps > 1Y0-204

1Y0-204 Citrix Virtual Apps and Desktops 7 Administration Question and Answers

Question # 4

Scenario: A Citrix Administrator created a machine catalog using Machine Creation Services. The Desktop Experience was set to ‘Random’.

Where will the unique information for the virtual machines be stored?

A.

In the identity disk of each virtual machine

B.

In the PERSONALITY.INI file at the root directory of each virtual machine

C.

Only in the Site database

D.

In the differencing disk of each virtual machine

Full Access
Question # 5

Which PowerShell command can be used to display all the Citrix services installed on the Delivery Controller?

A.

Get-Service -DisplayName *site*

B.

Get-Service -DisplayName *citrix*

C.

Get-Service -DisplayName *controller*

D.

Get-Service -DisplayName *broker*

Full Access
Question # 6

Scenario: A Citrix Administrator will use PowerShell to configure a new restart schedule for the Windows 2016 Server OS group named “Win2016-ServerOS” within a Citrix Virtual Desktops infrastructure.

The administrator needs the machines in the Server OS group to restart at a time when no users will be accessing them: beginning at 23:00h (11:00 PM) each day, with 30-minute intervals between each machine restart.

Which PowerShell command should the administrator use?

A.

New-BrokerRebootSchedule -Name XYZ-ServerOS-DailyReboot -DesktopGroupName Win2016-ServerOS -Frequency Daily -StartTime “11:00” -Enabled $true - RebootDuration 30

B.

New-BrokerRebootScheduleV2 -Name XYZ-ServerOS-DailyReboot -DesktopGroupName Win2016-ServerOS -Frequency Daily -StartTime “23:00” -Enabled $true - RebootDuration 30

C.

Set-BrokerRebootScheduleV2 -Name XYZ-ServerOS-DailyReboot -DesktopGroupName Win2016-ServerOS -Frequency Daily -StartTime “11:00” -Enabled $true - RebootDuration 30

D.

Set-BrokerRebootSchedule -Name XYZ-ServerOS-DailyReboot -DesktopGroupName Win2016-ServerOS -Frequency Daily -StartTime “23:00” -Enabled $true - RebootDuration 30

Full Access
Question # 7

Scenario: A Citrix Administrator has deployed machines using Machine Creation Services (MCS). A user logs on to a desktop from a random/non-persistent pool of Windows 10 desktops. During the session, the user installs Microsoft Office 2016.

To which disk is the Microsoft Office installation data written during the session?

A.

Differencing

B.

Identity

C.

Temporary

D.

Personal

Full Access
Question # 8

Scenario: A Citrix Administrator needs to deploy Citrix Virtual Apps. Project requirements dictate that management and maintenance should be minimized for the administrator, while still maintaining control of the Virtual Delivery Agent (VDA) machines.

Which hosting platform should the administrator choose to meet these requirements?

A.

Service provider

B.

On-premises

C.

Public Cloud-hosted

D.

Citrix Cloud

Full Access
Question # 9

Which Citrix ADC Access Control List (ACL) command can a Citrix Administrator use to bridge traffic originating from 192.168.10.200?

A.

add ns simpleacl6

B.

add ns acl6

C.

add ns acl

D.

add ns simpleacl

Full Access
Question # 10

Scenario: A Citrix ADC MPX is using one of four 10G ports available in an environment. A Citrix Administrator found a traffic bottleneck at the Citrix ADC.

What can the administrator do to increase bandwidth on the Citrix ADC?

A.

Add another 10G Citrix ADC port to the switch and configure Link Aggregation Control Protocol (LACP).

B.

Purchase another Citrix ADC MPX appliance.

C.

Add two more 10 Citrix ADC ports to the network and configure VLAN.

D.

Plug another 10G Citrix ADC port into the router.

Full Access
Question # 11

A Citrix Administrator has deployed a non-domain-joined StoreFront server.

Which two options should the administrator be aware of with this deployment? (Choose two.)

A.

Authentication occurs at the Domain Controller.

B.

Two-factor authentication is NOT supported.

C.

Authentication occurs at the Citrix ADC.

D.

Server groups are NOT supported.

E.

Authentication occurs at the Delivery Controller.

F.

Server groups are supported.

Full Access
Question # 12

Scenario: A Citrix Administrator has been advised that additional Windows users will need to access the on-premises Citrix Virtual Apps and Desktop Site. The Site utilizes Citrix Profile Management for all users. The new users have been using Windows Roaming Profiles and will need their existing profile information when they use the Citrix Site. The administrator enables the Profile Management policy setting for 'Enable Migration of Existing Profiles'.

At which stage will the new users' Roaming Profiles be migrated to the existing Profile Management store?

A.

When the new policy is updated automatically in Active Directory after 90 minutes

B.

When the new users initiate their first domain authentication

C.

When the Virtual Delivery Agent (VDA) machines configured with the new policy are restarted

D.

When the new users initiate their first logon to a Virtual Delivery Agent (VDA) machine

Full Access
Question # 13

Which utility can a Citrix Administrator use to resolve the Domain Name System (DNS) request being looked up frequently?

A.

nslookup

B.

dig +trace

C.

curl –K –d

D.

ping

Full Access
Question # 14

Which step does a Citrix Administrator need to take to enable Citrix XML Service trust for user access within a Citrix Virtual Apps and Desktops infrastructure?

A.

Enable XML Service trust using the StoreFront console.

B.

Run the Set-BrokerSite -TrustRequestsSentToTheXMLServicePort $true PowerShell command from within a Virtual Delivery Agent (VDA) machine.

C.

Run the Set-BrokerSite -TrustRequestsSentToTheXMLServicePort $true PowerShell command from within a Controller.

D.

Configure the appropriate XML Service trust settings using HDX policy within Citrix Studio.

Full Access
Question # 15

Scenario: A Citrix Administrator has executed the following command:

What will be the outcome of this configuration?

A.

The users trying to access HTTP://SERVER.CITRIX.LAB will NOT be connected to the Vserver MYVPN_http.

B.

The users trying to access HTTP://SERVER.CITRIX.LAB will be connected to the Vserver MYVPN_http.

C.

The users trying to access http://server.citrix.lab will be connected to CS Vserver Vserver-CS-1.

D.

The users trying to access HTTP://SERVER.CITRIX.LAB will be connected to CS Vserver Vserver-CS-1.

Full Access
Question # 16

Scenario: All users’ files, folders, and registry settings are managed by Citrix Profile Management in a Citrix Virtual Apps and Desktops environment. Recently, a Citrix Administrator received reports of profile corruption from users, resulting in lost personal settings, preferences, and lost data from their Documents folder. No .INI file is being used to manage the Profile Management setup; only GPOs are being used.

Which setting can the administrator use to help prevent further data loss from these users’ profiles?

A.

Enable File Exclusions

B.

Enable NTUSER.DAT backup

C.

Enable Folder Exclusions

D.

Enable Migration of Existing Profiles

E.

Enable Directory Synchronization

Full Access
Question # 17

Which PowerShell command should a Citrix Administrator run to obtain the name of a deployment, the local host cache configuration and the license level?

A.

Get-BrokerCatalog

B.

Get-BrokerController

C.

Get-BrokerResource

D.

Get-BrokerSite

Full Access
Question # 18

A Citrix Administrator needs to block all the DNS requests from subnet 10.107.149.0/24.

Which expression can the administrator use to match the required traffic?

A.

CLIENT.IP.SRC.IN_SUBNET(10.107.149.0/24)&& client UDP.DSTPORT.EQ(53) || client. TCP.DSTPORT.EQ(53)

B.

CLIENT.IP.SRC.IN_SUBNET(10.107.149.0/24)&& (client UDP.DSTPORT.EQ(53) || client. TCP.DSTPORT.EQ(53))

C.

CLIENT.IP.SRC(10.107.149.0) && (client.UDP.DSTPORT.EQ(53) || client.TCP.DSTPORT.EQ(53))

D.

CLIENT.IP.SRC(10.107.149.0) && client.UDP.DSTPORT.EQ(53) || client.TCP.DSTPORT.EQ(53)

Full Access
Question # 19

Scenario: A Citrix Administrator would like to grant access to a Junior Administrator on the Citrix ADC. The administrator would like to grant full access to everything except the following:

  • Shell Access
  • User Configuration access
  • Partition Configuration access

Which pre-existing command policy would meet the needs of the scenario?

A.

Operator

B.

Sysadmin

C.

Network

D.

Superuser

Full Access
Question # 20

Scenario: A Citrix Administrator has executed the following command:

set httpcallout httpcallout1 –cacheForSecs 120

What will be the effect of this command?

A.

The cache duration of the HTTP request is set to 120 seconds.

B.

The cache duration of the HTTP callout request is set to 120 seconds.

C.

The cache duration of the HTTP response is set to 120 seconds.

D.

The cache duration of the HTTP callout response is set to 120 seconds.

Full Access
Question # 21

Scenario: A Citrix Administrator is configuring the Citrix Workspace app to allow users to access their applications and desktops. Management requires users to be logged on to the Citrix Workspace app without entering their credentials and for sessions to be pre-launched in the background for expedited application access.

Which experience does the administrator need to configure for users in this environment?

A.

Citrix Workspace app for Windows

B.

Citrix Workspace for Web

C.

Citrix Workspace app for Universal Windows Platform

D.

Citrix Workspace app for HTML5

Full Access
Question # 22

Scenario: A Citrix Administrator needs to power-manage a group of Server OS Virtual Delivery Agent (VDA) machines that are all in the same Delivery Group. The administrator needs all the machines to be restarted once a week during the weekend. Additionally, a subset of the machines should be restarted every day during non-peak hours.

Which feature must the administrator change from the default values in order to fulfill the requirements?

A.

Restart duration

B.

Weekday and weekend hours

C.

Peak and non-peak hours

D.

Tag restrictions

Full Access
Question # 23

Scenario: A Citrix Administrator suspects an attack on a load balancing virtual server. The administrator needs to restrict access to the load balancing virtual server (192.168.100.25) for 10 minutes.

Which Access Control List (ACL) will help to accomplish this requirement?

A.

add simpleacl rule1 DENY –srcIP 192.168.100.25-TTL 600

B.

add ns acl rule1 DENY –destIP 192.168.100.25 –TTL 600

C.

add simpleacl rule1 DENY –srcIP 192.168.100.25 –TTL 600000

D.

add ns acl rule1 DENY –destIP 192.168.100.25 –TTL 600000

Full Access
Question # 25

When creating a new Delegated Administrator with a custom scope, a Citrix Administrator notices that the Full Administrator role is NOT available.

The administrator is experiencing this behavior because the custom scope _______________. (Choose the correct option to complete the sentence.)

A.

created did NOT contain all the required objects

B.

must use the Read Only role

C.

was created with the hosting object selected

D.

cannot use the Full Administrator role

Full Access
Question # 26

Scenario: A Citrix Administrator needs to ensure that a user request is redirected to the next available data center in order to ensure the best user experience based upon location.

Below are the Global Server Load Balancing (GSLB) vserver settings:

To which setting should the administrator change the configured method?

A.

StaticProximity

B.

RoundRobin

C.

LeastConnection

D.

LeastBandwidth

Full Access
Question # 27

Which Citrix ADC hardware or software platform offers a Multi-Tenant solution?

A.

VPX

B.

MPX

C.

CPX

D.

SDX

Full Access
Question # 28

Which two options should a Citrix Administrator configure to stop the First-Time wizard from automatically popping up? (Choose two.)

A.

Host Name is NOT configured on the appliance.

B.

The Default Admin Password has NOT been changed.

C.

Licenses are NOT present on the appliance.

D.

The appliance is configured with the default IP address (192.168.100.1)

Full Access
Question # 29

Scenario: A Citrix Administrator maintains a Citrix Virtual Apps and Desktops Site where mandatory profiles are being used for all users. Users need to maintain the different printer property settings that are available for their HDX sessions. The administrator has enabled the HDX Printer properties retention policy for the Site.

Which setting could the administrator use for this environment?

A.

Held in profile only if NOT saved on client

B.

Do NOT retain printer properties

C.

Saved on the client device only

D.

Retained in user profile only

Full Access
Question # 30

By default, what is the printing behavior when no printing policy is configured?

A.

Direct connections to print servers are prohibited.

B.

All client printers are auto-created.

C.

The generic universal printer is automatically created.

D.

The Universal Print Server is enabled.

Full Access
Question # 31

Which Citrix Profile Management feature maintains a backup of the NTUSER.DAT file?

A.

Active Write Back

B.

Profile Caching

C.

Profile Streaming

D.

Profile Protection

Full Access
Question # 32

Which method, according to Citrix leading practices, can a Citrix Administrator use to successfully make a configuration change for a StoreFront server group?

A.

Make the change on one StoreFront server in the group, then restart all servers in the group to synchronize the change.

B.

Make the same change manually on all StoreFront servers in the group, then run a Site health check.

C.

Make the same change on all StoreFront servers in the group using remote PowerShell commands.

D.

Make the change on one StoreFront server in the group, then use the Propagate Changes feature.

Full Access
Question # 33

Which log records detailed information such as statistics, metrics and debug information on the Citrix ADC in a proprietary binary format?

A.

Syslog

B.

Nstrace

C.

Nsconfig

D.

Nslog

Full Access
Question # 34

Creating Application Groups requires the delegated administration permission of the ___________ Administration built-in role. (Choose the correct option to complete the sentence.)

A.

Host

B.

Delivery Group

C.

machine catalog

D.

Help Desk

Full Access
Question # 35

Scenario: A Citrix Administrator is managing a Citrix ADC SDX running eight Citrix ADC instances. The administrator first needs to upgrade the firmware on the instances. However; the administrator is concerned that it needs to be done all at once.

What upgrading flexibility does SDX provide in this scenario?

A.

The Citrix ADC instances have to be upgraded at the same time.

B.

It is NOT possible to upgrade the Citrix ADC instances to different firmware versions.

C.

The Citrix ADC instance can be upgraded at the SDX management level, allowing all instances to be upgraded at once.

D.

The Citrix ADC instance can be upgraded on an individual basis, allowing all instances to run different firmware versions.

Full Access
Question # 36

A Citrix Administrator configured the Responder policy to redirect the request for root page to the home page.

However, after executing the command, the webpage access entered a loop, as shown in the second screenshot.

Click on the ‘Exhibit’ buttons to view the screenshots.

How will the administrator rectify this issue?

A.

Change Responder action expression to “/”

B.

Change Responder Policy expression to http.REQ.URL.Contains(“/”)

C.

Change Responder Action expression to http.REQ.URL

D.

Change Responder Policy expression to http.REQ.URL.EQ(“/”)

Full Access
Question # 37

Which three report file formats can a Citrix Administrator export from Citrix Director with SCOM integration? (Choose three.)

A.

.DOC

B.

.XLS

C.

.CSV

D.

.PDF

E.

.TXT

Full Access
Question # 38

What is the first thing a Citrix Administrator should create when creating a Server Certificate for Citrix ADC to secure traffic?

A.

A Private Key

B.

A Certificate key-pair

C.

A Certificate Signing Request

D.

A Certificate Revocation list

Full Access
Question # 39

A master image that will be used to deploy machines for a Citrix Virtual Apps and Desktops environment should have the ___________ installed on it so that ___________. (Choose the correct option to complete the sentence.)

A.

Virtual Delivery Agent (VDA); users can access resources on the machines

B.

Citrix Workspace app; users can access resources on the machines

C.

Virtual Delivery Agent (VDA); machines can communicate with the Site database

D.

Citrix Workspace app; machines can communicate with the Site database

Full Access
Question # 40

Scenario: Users report that they are receiving new sessions instead of reconnecting to their disconnected sessions. A Citrix Administrator investigates the issues and finds the sessions are in a disconnected state when the users leave work.

What should the administrator configure to allow the users to reconnect to their disconnected sessions while roaming?

A.

Session Pre-launch

B.

Workspace Control

C.

Session Lingering

D.

Session Timeout

Full Access
Question # 41

A Citrix Administrator executed the following command in the Global Server Load Balancing (GSLB) environment:

set gslb site SiteB –triggerMonitor MEPDOWN

What will be the effect of this command to the default service monitoring behavior on the remote site?

A.

The service monitor will take precedence over Metric Exchange Protocol (MEP)

B.

The service monitor is invoked only when Metric Exchange Protocol (MEP) has marked the service as DOWN for any reason.

C.

The state of the GSLB service will always be controlled by Metric Exchange Protocol (MEP).

D.

The service monitor is invoked only when Metric Exchange Protocol (MEP) connectivity has been lost between SiteA and SiteB.

Full Access
Question # 42

Scenario: A Citrix Administrator has configured an Authentication, Authorization, and Auditing (AAA) action policy to allow users access through the Citrix ADC. The Administrator bound the policy to a specific vServer.

Which policy expression will allow all users access through the vServer?

A.

ns_disallow

B.

ns_false

C.

ns_true

D.

ns_allow

Full Access
Question # 43

Scenario: Client connections to certain virtual servers are abnormally high. A Citrix Administrator needs to be alerted whenever the connections pass a certain thershold.

How can the administrator use Citrix Application Delivery Management to accomplish this requirement?

A.

Configure TCP Insight on the Citrix Application Delivery Management.

B.

Configure specific alerts for virtual servers using Citrix Application Delivery Management.

C.

Configure SMTP Reporting on the Citrix Application Delivery Management by adding the threshold and email address.

D.

Configure Network Reporting on the Citrix Application Delivery Management by setting the threshold and email address.

Full Access
Question # 44

A Citrix Administrator is in the process of installing Citrix Cloud Connector, but the installation fails.

What could be causing the Citrix Cloud Connector installation to fail on the machine?

A.

It is in sync with UTC time instead of local time.

B.

Enhanced Security Configuration (ESC) is set to 'off'.

C.

It cannot run on a machine template cloned across multiple machines.

D.

It is NOT joined to the domain.

Full Access
Question # 45

Which two options would provide an end-to-end encryption of data, while allowing the Citrix ADC to optimize the responses? (Choose two.)

A.

SSL Bridge protocol for the services

B.

SSL Bridge protocol for the virtual server

C.

HTTP protocol for the services

D.

HTTP protocol for the virtual server

E.

SSL protocol for the services

F.

SSL protocol for the virtual server

Full Access
Question # 46

Scenario: A Lead Citrix Administrator for a large company hired a new administrator for the team to help manage a Citrix Virtual Desktops infrastructure. The new administrator will need to manage user sessions and power-manage machines within the Delivery Group but should NOT be able to create any new objects.

Which role should the lead administrator create for the new administrator?

A.

Delivery Group Administrator

B.

Machine Catalog Administrator

C.

Help Desk Administrator

D.

Host Administrator

Full Access
Question # 47

According to Citrix leading practices, what is the minimum number of Delivery Controllers required to deploy Citrix Virtual Apps and Desktops for 500 users?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 48

When deploying an on-premises resource location for a Citrix Cloud-managed Site, a Citrix Administrator should configure the Virtual Delivery Agent (VDA) machines to communicate with a ___________ that is located in the ___________ location in order to become registered with the Site. (Choose the correct option to complete the sentence.)

A.

Delivery Controller, Citrix Cloud

B.

Cloud Connector, Citrix Cloud

C.

Delivery Controller, on-premises

D.

Cloud Connector, on-premises

Full Access
Question # 49

Scenario: A Citrix Administrator is configuring load balancing on a Citrix ADC appliance for the company web servers. The administrator needs to create a custom monitor that will look for a specific keyword response from the website and will be used to keep the services in an UP state.

Which type of monitor can the administrator create to accomplish this scenario?

A.

HTTP-ECV monitor with the keyword in the Special Parameters – Receive String field.

B.

A HTTP monitor with the keyword in the Special Parameters – Response Codes field.

C.

A TCP monitor with the keyword in the Special Parameters – Response Code field.

D.

An UDP-ECV monitor with the keyword in the Special Parameters – Receive String field.

Full Access
Question # 50

The “Limit Visibility” option should be configured when a Citrix Administrator wants to ____________. (Choose the correct option to complete the sentence.)

A.

define what a custom administrator role can view within Citrix Studio

B.

restrict which Windows administrative menus can be accessed within a virtual desktop session

C.

prevent all access to an application which is installed on a Virtual Delivery Agent (VDA) machine

D.

hide a published application on Citrix Workspace app for specified users

Full Access
Question # 51

A user calls the help desk and states that launching a pooled random desktop takes as long as five minutes.

Which Citrix Director report can a Citrix Administrator review to find out what might be causing the delay?

A.

Resource Utilization

B.

Connection Failures

C.

Logon Performance

D.

Load Evaluators

Full Access
Question # 52

Scenario: A Citrix Administrator needs to configure StoreFront to allow external users access to internal resources. The external users will authenticate on StoreFront.

Which StoreFront authentication method can the administrator configure?

A.

Smart card

B.

Pass-through from NetScaler Gateway

C.

HTTP Basic

D.

Username and password

Full Access
Question # 53

Scenario: A StoreFront store supports 150 users who have full access to all enterprise resources. A Citrix Administrator needs to create a new StoreFront store for contractors who will work onsite for two months. The contractors need access to specific resources but will NOT be Active Directory users.

Which option should the administrator select while creating the store for contractors?

A.

HTTP Basic

B.

Unauthenticated

C.

Smart card

D.

Pass-through

Full Access
Question # 54

Scenario: A Citrix Administrator is configuring the Workspace Experience to provide users with access to their applications and desktops. The administrator deployed Microsoft Azure Active Directory (AD) already and wants to leverage it to support user access to the Workspace Experience.

Which two steps does the administrator need to take to enable users to authenticate using Azure AD to the Workspace Experience? (Choose two.)

A.

Add Cloud Connector information to the Azure AD console.

B.

Enable Azure AD authentication under Workspace Configuration in Citrix Cloud.

C.

Add Azure AD Account under Identity Providers in Citrix Cloud.

D.

Deploy Cloud Connectors to support Azure AD authentication.

Full Access