If you are going to appear in 1Y0-440 exam then you can prepare from 1Y0-440 dumps pdf to bring the best grades out of your efforts. You will get your desired grades with money back guarantee because the quality of this dumps material cannot be challenged. 1Y0-440 study material is the most suitable material for the preparation of this certification. It has been designed by considering the nature and requirements of exam and students’ inclination towards learning. For more info:https://www.realexamdumps.com/Citrix/1Y0-440-practice-test.html
Citrix 1Y0-440 Dumps PDF | 1Y0-440 Exam Study Material | Realexamdumps.com
Citrix 1Y0-440 Dumps PDF
Architecting a Citrix Networking Solution
For More Info:
https://www.realexamdumps.com/citrix/1y0-440-practice-test.html
Question: 1
A Citrix Architect has deployed NetScaler Management and Analytics System (NMAS) to monitor a high
availability pair of NetScaler VPX devices.
The architect needs to deploy automated configuration backup to meet the following requirements:
The configuration backup file must be protected using a password.
The configuration backup must be performed each day at 8:00 AM GMT.
The configuration backup must also be performed if any changes are made in the ns.conf file.
Once the transfer is successful, auto-delete the configuration file from the NMAS.
Which SNMP trap will trigger the configuration file backup?
A. netScalerConfigSave
B. sysTotSaveConfigs
C. netScalerConfigChange
D. sysconfigSave
Answer: A
Question: 2
A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a
NetScaler_________deployed_________. (Choose the correct option to complete sentence.)
A. CPX; as part of a high availability pair
B. CPX; as a stand alone device
C. SDX; with less than 6 partitions and dedicated management interface
D. MPX; as part of the cluster but Cluster IP is NOT configured
E. SDX; with no partitions as a stand alone device
Answer: C
Question: 3
Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the
MPX Logical layout for Workspacelab has been created across three (3) sites.
The requirements captured during the design discussion held for a NetScaler design project are as
follows:
Two (2) pairs of NetScaler MPX appliances deployed in the DMZ and internal network.
High Availability will be accessible for each NetScaler MPX
The external NetScaler MPX appliance will be deployed in multi-arm mode.
The internal NetScaler MPX will be deployed in single-arm mode wherein it will be connected to Cisco
ACI Fabric.
All three (3) Workspacelab sites: Dc, NDR and DR, will have similar NetScaler configurations and design.
How many NetScaler MPX appliances should the architect deploy at each site to meet the design
requirements above?
A. 4
B. 12
C. 6
D. 2
Answer: C
Question: 4
Scenario: A Citrix Architect and a team of Workspacelab members met to discuss a NetScaler design
project. They captured the following requirements from this design discussion:
A pair of NetScaler MPX appliances will be deployed in the DMZ network.
High Availability will be accessible in the NetScaler MPX in the DMZ Network.
Load balancing should be performed for the internal network services like Microsoft Exchange Client
Access Services and Microsoft App-V.
The load balancing should be performed for StoreFront.
The NetScaler Gateway virtual server will be utilizing the StoreFront load-balancing virtual server.
The NetScaler Gateway virtual server and StoreFront.
The NetScaler Gateway virtual service and StoreFront and load-balancing services are publicly
accessible.
The traffic for internal and external services must be isolated.
Click the Exhibit button to review the logical network diagram.
Which two design decisions are incorrect based on these requirements? (Choose two.)
A. LB StoreFront bound to traffic Domain 0
B. NetScaler Gateway VIP bound to Traffic Domain 1
C. LB APP-V bound to Traffic Domain 1
D. SNIP 192.168.20.2 bound to Traffic Domain 1
Answer: A,B
Question: 5
Scenario: A Citrix Architect needs to plan for a customer environment in which more than 10,000 users
will need access. The networking infrastructure needs to be able to handle the expected usage.
Which business driver should be prioritized based on the customer’s requirement?
A. Increase flexibility
B. Enable mobile work styles
C. Simplify management
D. Increase Scalability
E. Reduce Costs
F. Increase Security
Answer: D
Question: 6
Scenario: A Citrix Architect needs to deploy SAML integration between NetScaler (Identity Provider) and
ShareFile (Service Provider). The design requirements for SAML setup are as follows:
NetScaler must be deployed as the Identity Provider (IDP).
ShareFile server must be deployed as the SAML Service Provider (SP).
The users in domain workspacelab.com must be able to perform Single Sign-on to ShareFile after
authenticating at the NetScaler.
The User ID must be UserPrincipalName.
The User ID and Password must be evaluated by NetScaler against the Active Directory servers SFO-ADS-
001 and SFO-ADS-002.
After successful authentication, NetScaler creates a SAML Assertion and passes it back to ShareFile.
Single Sign-on must be performed.
SHA 1 algorithm must be utilized.
The verification environment details are as follows:
Domain Name: workspacelab.com
NetScaler AAA virtual server URL https://auth.workspacelab.com
ShareFile URL https://sharefile.workspacelab.com
Which SAML IDP action will meet the design requirements?
A. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –
assertionConsimerServiceURL “https://auth.workspacelab.com/samIIssueName auth.workspacelab.com
-signatureAlg RSA-SHA256-digestMethod SHA256-encryptAssertion ON -serviceProviderUD
sharefile.workspacelad.com
B. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –
assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs” –samIIssuerName
sharefile.workspacelab.com –signatureAlg RSA-SHA256 –digestMethod SHA256 –serviceProviderID
sharefile.workspacelab.com
C. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –
assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs” –samIIssuerName
auth.workspacelab.com –signatureAlg RSA-SHA1-digestMethod SHA1 –encryptAssertion ON –
serviceProviderID sharefile.workspacelab.com
D. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –
assertionConsimerServiceURL https://sharefile.workspacelab.com/saml/acs” –samIIssuerName
sharefile.workspacelab.com –signatureAlg RSA-SHA1 –digestMethod SHA1 –encryptAssertion ON –
serviceProviderID sharefile.workspacelab.com
Answer: C
Comments