1Y0-231 Dumps 1Y0-231 Braindumps 1Y0-231 Real Questions 1Y0-231 Practice Test 1Y0-231 Actual Questions Citrix 1Y0-231 Deploy and Manage Citrix ADC 13 with Citrix Gateway https://killexams.com/pass4sure/exam-detail/1Y0-231 Question: 157 Which scenario will cause automatic high availability (HA) synchronization to fail? A. Different build versions B. A configuration change to the primary Citrix ADC C. A forced failover D. Manually forced synchronization Answer: A,C,D Explanation: Reference: https://support.citrix.com/article/CTX124439 Question: 158 Which authentication type can a Citrix Administrator use to enable Citrix ADC authentication, authorization, and auditing (AAA) dual-factor authentication from a userâs mobile device app? A. LDAP B. LOCAL C. SAML D. RADIUS Answer: A Explanation: Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/system/authentication-and-authorization-forsystem- user/two-factor-authentication-for-system-users-and-external-users.html Question: 159 Scenario: To meet the security requirements of the organization, a Citrix Administrator needs to configure a Citrix Gateway virtual server with time-outs for user sessions triggered by the behaviors below: â Inactivity for at least 15 minutes. â No keyboard or mouse activity for at least 15 minutes Which set of time-out settings can the administrator configure to meet the requirements? A. Session time-out and client idle time-out set to 15 B. Session time-out and forced time-out set to 15 C. Client idle time-out and forced time-out set to 15 D. Client idle time-out and forced time-out set to 900 Answer: A Explanation: Reference: https://docs.citrix.com/en-us/citrix-gateway/current-release/vpn-user-config/configure- pluginconnections/configure-time-out-settings.html Question: 160 Scenario: A Citrix Administrator needs to test a SAML authentication deployment to be used by internal users while accessing several externally hosted applications. During testing, the administrator notices that after successfully accessing any partner application, subsequent applications seem to launch without any explicit authentication request. Which statement is true regarding the behavior described above? A. It is expected if the Citrix ADC appliance is the common SAML identity provider (IdP) for all partners. B. It is expected due to SAML authentication successfully logging on to all internal applications. C. It is expected if all partner organizations use a common SAML service provider (SP). D. It indicates the SAML authentication has failed and the next available protocol was used. Answer: B Question: 161 A Citrix Administrator needs to deploy a Citrix ADC between the servers and the client, with servers only allowed to reach the client through the Citrix ADC. In which mode should the administrator deploy the Citrix ADC? A. Inline B. Direct server return C. Transparent D. One-arm Answer: C Question: 162 Scenario: A Citrix Administrator needs to configure an authentication workflow on Citrix ADC with the below requirements. All internal users must use their corporate credentials to authenticate. Users from partner organizations must be authenticated using their own directory services without replication or a synchronization process. How can the administrator meet the above requirements while authenticating the users? A. Deploy SAML on Citrix ADC in the service provider (SP) role for users from partner organizations. B. Create two LDAP and two SAML authentication policies on the authentication, authorization, and auditing (AAA) virtual server. C. Configure nFactor authentication with two LDAP advanced policies and one SAML advanced policy. D. Configure two dedicated AAA virtual servers for internal and partner users. Answer: C Question: 163 Which profile can a Citrix Administrator create to configure a default profile that disables TLSv1? A. DTLS B. TCP C. HTTP D. SSL Answer: A,D Explanation: Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/ssl/ssl-profiles/secure-front-end-profile.html Question: 164 Scenario: A Citrix Administrator needs to integrate LDAP for Citrix ADC system administration using current Active Directory (AD) groups. The administrator created the group on the Citrix ADC, exactly matching the group name in LDAP. What can the administrator bind to specify the permission level and complete the LDAP configuration? A. Users to the group on the Citrix ADC B. A nested group to the new group C. An authentication, authorization, and auditing (AAA) action to the group D. A command policy to the group Answer: A,C,D Explanation: Reference: https://support.citrix.com/article/CTX123782 Question: 165 A Citrix Administrator needs to configure a Citrix Gateway virtual IP to allow incoming connections initiated exclusively from web browser sessions. Which advanced policy will accomplish this? A. RE B. HTT C. HEADER User-Agent NOTCONTAINS CitrixReceiver D. RE E. HTT F. HEADER User-Agent CONTAINS Chrome/78.0.3904.108 Safari/537.36 G. HTT H. RE I. HEADER(âUser-Agentâ).CONTAINS(âMozillaâ) J. HTT K. RE L. HEADER(âUser-Agentâ).CONTAINS(âCitrixReceiverâ) Answer: A,E Explanation: Reference: https://stalhood2.rssing.com/chan-58610415/all_p2.html Question: 166 The Citrix ADC SDX architecture allows instances to share _____________ and _____________. (Choose the two correct options to complete the sentence.) A. the kernel B. CPU C. memory D. physical interfaces Answer: B,D Question: 167 Scenario: A Citrix Administrator made changes to a Citrix ADC, deleting parts of the configuration and saving some new ones. The changes caused an outage that needs to be resolved as quickly as possible. There is no Citrix ADC backup. What does the administrator need to do to recover the configuration quickly? A. Restore from the revision history. B. Run high availability (HA) file synchronization. C. Restart the Citrix AD D. Run saved versus running configuration. Answer: A Question: 168 Scenario: While performing a disaster recovery test, a Citrix Administrator decides to failover the Citrix ADC high availability (HA) pair appliances. The administrator notices that the failover is NOT working as expected, and the secondary Citrix ADC is NOT taking over as primary. The administrator suspects that networking issues may be causing the failure. What could be the cause of this issue? A. HA monitoring is enabled on an interface of the secondary node that shows as ENABLED, DOW B. HA monitoring is enabled on a disabled interface of the primary node. C. HA heartbeats are only seen on some enabled interfaces of the secondary node. D. The Independent Network Configuration (INC) mode is enabled on the primary node. Answer: A Question: 169 Scenario: A Citrix Administrator needs to create local, limited-privilege user accounts for other administrators. The other administrators will require only: â The ability to enable and disable services and servers â Read-only access Which built-in command policy permission level can the administrator use? A. Read-only B. Operator C. Sysadmin D. Network Answer: B Question: 170 What can a Citrix Administrator configure to filter IPv4 addresses? A. Pattern set B. Data set C. Citrix Web App Firewall D. URL set Answer: C 6$03/( 48(67,216 7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV .LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP $FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP ([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP 3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV *XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV 8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV 7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\ 'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU .LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG