image


1Y0-241 Dumps

1Y0-241 Braindumps 1Y0-241 Real Questions 1Y0-241 Practice Test

1Y0-241 Actual Questions


Citrix


1Y0-241


Deploy and Manage Citrix ADC with Traffic Management


https://killexams.com/pass4sure/exam-detail/1Y0-241


Question: 47


A Citrix Administrator needs to configure a rate-limiting policy setting DNS requests to a threshold of 1,000 per second.


Which command does the administrator need to run to correctly configure this policy?

  1. HTT

  2. RE

  3. LIMIT(<limit_identifier>)

  4. SY

  5. CHEC

  6. LIMIT(<limit_identifier>)

  7. SY

  8. CHEC

. LIMIT(<limit_identifier>) || CONNECTIO

. I

. LIMIT(<limit_identifier>)

. SY

. CHEC

. LIMIT(<limit_identifier>) || HTT

. RE

. LIMIT(<limit_identifier>)


Answer: B


Question: 48


Scenario: A Citrix Administrator needs to configure a Responder policy, so that the string “/mytraining” is added to every URL path received.


The administrator should use these commands to accomplish this:


>add responder action Redirect_Act redirect “HTTP.REQ.URL.PATH_AND_QUERY+”mytraining”” C responseStatusCode 302

>add responder policy Redirect_Pol Redirect_Act


>bind lb vServer lb_vsrv_www CpolicyName Redirect_Pol Cpriority 100 CgotoPriorityExpression END C type

(Choose the correct option to complete the set of commands.)

  1. “(HTT

  2. RE

  3. UR

  4. STARTSWITH(”mytraining”))” REQUEST

  5. “(HTT

  6. RE

  7. UR

  8. STARTSWITH(”mytraining”))” RESPONSE

. “!(HTT

. RE

. UR

. ENDSWITH(”mytraining”))” REQUEST

. “!(HTT

. RE

. UR

. ENDSWITH(”mytraining”))” RESPONSE


Answer: B


Question: 49


Scenario: After deploying a Citrix ADC in production, a Citrix Administrator notices that client requests are NOT being evenly distributed among backend resources. The administrator wants to change from the default loadbalancing method to one that will help distribute the load more evenly.


Which load-balancing method would ensure that the server with the least amount of network utilization is receiving new connections?

  1. Least connection

  2. Least bandwidth

  3. Least response time

  4. Least packets


Answer: A Explanation:

Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/getting-started-with-citrix-adc/loadbalancing.html


Question: 50


Scenario: A Citrix Administrator would like to grant access to a Junior Citrix Administrator on the Citrix ADC. The administrator would like to grant full access to everything except the following:

Shell User configuration Partition configuration

Which preexisting command policy would meet the needs of this scenario?

  1. Sysadmin

  2. Operator

  3. Network

  4. Superuser


Answer: A


Question: 51


Scenario: The Citrix Administrator of a Linux environment needs to load balance the web servers. Due to budget constraints, the administrator is NOT able to implement a full-scale solution.


What can the administrator purchase and install to load balance the webservers?

  1. Citrix ADC MPX

  2. Citrix ADC VPX

  3. Citrix ADC SDX

  4. Citrix ADC CPX


Answer: D Explanation:

Reference: https://www.citrix.com.br/products/citrix-adc/cpx-express.html


Question: 52


Scenario: A load-balancing vServer is configured to utilize the least bandwidth load-balancing method. A service attached to this vServer is brought into the effective state during production hours.


During the startup of a vServer, which load-balancing method is used by default?

  1. Least connections

  2. Least bandwidth

  3. Custom load

  4. Round-robin


Answer: A Explanation:

Reference: https://www.eginnovations.com/documentation/Citrix-Netscaler-VPX-MPX/Load-Balancing-Virtual- Servers.htm


Question: 53

A Citrix Administrator needs to protect the HTTP backend server type without actually removing the header.


Which rewrite action type can the administrator apply to the Citrix ADC configuration to accomplish this?

  1. REPLACE

  2. CORRUPT_HTTP_HEADER

  3. REPLACE_HTTP_REQ

  4. REPLACE_ALL


Answer: A


Question: 54


Scenario: While attempting to access web server that is load balanced by a Citrix ADC using HTTPS, a user receives the message below.

SSL/TLS error: You have not chosen to trust “Certificate Authority” the issuer of the server’s security certificate. What can a Citrix Administrator do to prevent users from viewing this message?

  1. Ensure that users have the certificate’s private key.

  2. Ensure that users have the certificate’s public key.

  3. Ensure that the server certificate is linked to its respective intermediate and root certificates.

  4. Ensure that users have the server certificate installed.


Answer: B Explanation:

Reference: https://docs.citrix.com/en-us/citrix-gateway/12-1/citrix-gateway-12.1.pdf (80)


Question: 55


To protect an environment against Hash DoS attacks, which two configurations can a Citrix Administrator use to block all post requests that are larger than 10,000 bytes? (Choose two.)

  1. > add policy expression expr_hashdos_prevention “http.RE

  2. METHO

  3. EQ(”POST”)&& http.RE

  4. CONTENT_LENGT E. GT(10000)”

> add rewrite policy drop_rewrite expr_hashdos_prevention DROP

> bind rewrite global drop_rewrite 100 END Ctype REQ_OVERRIDE

  1. > add policy expression expr_hashdos_prevention “http.RE

  2. METHO

  3. EQ(”POST”)&& http.RE

. CONTENT_LENGT

. GT(10000)”

> add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP

> bind responder global pol_resp_hashdos_prevention 70 END Ctype REQ_OVERRIDE

. > add policy expression expr_hashdos_prevention “http.RE

. METHO

. EQ(”POST”) || http.RE

. CONTENT_LENGT

. GT(10000)”

> add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP

> bind responder global pol_resp_hashdos_prevention 70 END Ctype REQ_OVERRIDE

. > add policy expression expr_hashdos_prevention “http.RE

. METHO

. EQ(”POST”) || http.RE

. CONTENT_LENGT

. GT(10000)”

> add rewrite policy drop_rewrite expr_hashdos_prevention DROP

> bind rewrite global drop_rewrite 70 END Ctype REQ_OVERRIDE

. > add policy expression expr_hashdos_prevention “http.RE

. METHO

. EQ(”POST”) || http.RE

. CONTENT_LENGT

. GT(10000)”

> add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP

> bind responder global pol_resp_hashdos_prevention 100 END Ctype REQ_OVERRIDE

. > add policy expression expr_hashdos_prevention “http.RE

. METHO

. EQ(”POST”) || http.RE

. CONTENT_LENGT

. GT(10000)”

> add rewrite policy drop_rewrite expr_hashdos_prevention DROP

> bind rewrite global drop_rewrite 100 END Ctype REQ_OVERRIDE


Answer: B,E Explanation:

Reference: https://support.citrix.com/article/CTX131868


Question: 56


Scenario: A company has three departments with proprietary applications that need to be load balanced on a Citrix ADC. The three department managers would like to use the same IP address to access their individual applications. This would mean configuring three load-balanced vServers, all using the same IP address.


What can the Citrix Administrator configure for this scenario?

  1. Three SNIPs with the same IP address on a Citrix ADC

  2. Three different Citrix ADCs that use the same IP address

  3. Three different admin partitions that allow use of the same IP address for each load-balanced vServer on a Citrix ADC

  4. Three different load-balanced vServers with three different IP addresses on a Citrix ADC


Answer: A


Question: 57


Scenario: The primary content switching vServer has gone down. To troubleshoot, a Citrix Administrator has issued

the following command:


> show csvserver CSV


CSV (10.1.100.100:443) C HTTPS Type: CONTENT


State: UP


Last state change was at Mon Jun 29 15:20:43 2020 Time since last state change: 1 day, 06:47:58 610 Client Idle Timeout: 180 sec

Down state flush: ENABLED


Disable Primary vServer On Down: DISABLED Appflow logging: ENABLED

Port Rewrite: DISABLED State Update: DISABLED

Default: Content Precedence: URL vServer IP and Port insertion: OFF

Persistence: NONE redirect: http://www.site1.com/mysite1/maintenance Backup: vServerCLBC2

Listen Policy: NONE IcmpResponse: PASSIVE RHIstate: PASSIVE Traffic Domain: 0

Based on this output, where will the subsequent request be redirected?

  1. http://www.site1.com/mysite1/maintenance

  2. vServerCLB-2

  3. Backup content switching vServer D. 10.1.100.100:443


Answer: A

www.company.com www.company.net www.company.org

The administrator would like to consolidate the websites into a single, load-balanced SSL vServer.


What can the administrator bind to use a single SSL vServer?

  1. A wildcard certificate to a single SSL vServer

  2. A wildcard certificate to a content-switching vServer

  3. The certificate of each website to a single SSL vServer

  4. A multiple SAN certificate to a single SSL vServer


Answer: C


Question: 59


What is the effect of the “set cs vServer-CS-1 CredirectURL http://www.newdomain.com/mysite/” command?

  1. If the vServer-CS-1 encounters a high connection rate, then users will be redirected to http://www.newdomain.com/mysite/.

  2. If the status of vServer-CS-1 is DOWN, then users will be redirected to http://www.newdomain .com/mysite/.

  3. All the requests to vServer-CS-1 will be redirected to http://www.newdomain.com/mysite/.

  4. All the requests without URL path/mysite/ will be redirected to http://www.newdomain.com/mysite/.


Answer: B


Question: 60


A Citrix Administrator receives user complaints about latency while accessing an application that is load balanced on the Citrix ADC.


Which tool can the administrator use to gather information regarding response time, client network latency, and server- side processing time?

  1. Citrix Application Delivery Management (ADM)

  2. HDX Insight

  3. WAN Insight

  4. Security Insight


Answer: B Explanation:

Reference: https://docs.citrix.com/en-us/citrix-application-delivery-management-service/analytics/hdxinsight.html

new ones. The changes caused an outage that needs to be resolved as quickly as possible. There is no Citrix ADC backup.


What does the administrator need to do to recover the configuration quickly?

A. Restart the Citrix AD

  1. Restore from the revision history.

  2. Run saved versus running configuration.

  3. Run highly availability (HA) file synchronization.


Answer: B


Question: 62


Scenario: A Citrix Administrator needs to configure persistence on a global server load balancing (GSLB) vServer to which a service is bound. Service must continue to handle requests from the client even after it is disabled manually C accepting new requests or connections only to honor persistence. After a configured period of time, no new requests or connections are directed to the service and all existing connections are closed.


To achieve these requirements, which parameter can the administrator configure while disabling the service?

  1. Persistence threshold

  2. Persistence time-Out

  3. Wait time

  4. Request threshold


Answer: B


Question: 63


Scenario: A Citrix Administrator needs to improve website loading speed. End users are reporting slow GIF image rendering speeds as they scroll down a website, which affects overall page load time.


Which Citrix ADC feature can the administrator enable to improve website performance?

  1. Domain sharding

  2. Image lazy loading

  3. Image optimization

  4. Image shrink-to attributes


Answer: C Question: 64 Scenario: POLICY 1:

add rewrite action ACT_1 corrupt_http_header Accept-Encoding

POLICY 2:


add rewrite action ACT_2 insert_http_header Accept-Encoding “”identity”” add rewrite policy POL_2 “HTTP.REQ.IS_VALID “ ACT_2

How can a Citrix Administrator successfully bind the above rewrite policies to the load-balancing vServer


lb_vsrv so that POL_2 is evaluated after POL_2 is evaluated?

  1. bind lb vServer lb_vsrv CpolicyName POL_1 Cpriority 110 CgotoPriorityExpression NEXT Ctype REQUEST bind lb vServer lb_vsrv CpolicyName POL_2 Cpriority 100 CgotoPriorityExpression END Ctype REQUEST

  2. bind lb vServer lb_vsrv CpolicyName POL_1 Cpriority 90 CgotoPriorityExpression NEXT Ctype REQUEST bind lb vServer lb_vsrv CpolicyName POL_2 Cpriority 100 CgotoPriorityExpression END Ctype REQUEST

  3. bind lb vServer lb_vsrv CpolicyName POL_1 Cpriority 90 CgotoPriorityExpression END Ctype REQUEST bind lb vServer lb_vsrv CpolicyName POL_2 Cpriority 80 CgotoPriorityExpression NEXT Ctype REQUEST

  4. bind lb vServer lb_vsrv CpolicyName POL_1 Cpriority 90 Ctype REQUEST bind lb vServer lb_vsrv CpolicyName POL_2 Cpriority 100 Ctype REQUEST


Answer: A


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG