Scenario: Multiple virtual servers are configured in a NetScaler Gateway implementation. Corporate policy requires that an administrator restrict the number of users who can log on through each virtual server.
What could the administrator specify to meet the needs of this scenario?
A. Max Users in a session policy
B. Max Users on the virtual server
C. Max Connections on the virtual server
D. Allowed users to logon in the Access Gateway Global Settings
Scenario: Two NetScaler Gateway virtual servers are configured on a NetScaler appliance. Each NetScaler Gateway virtual server is used to enable secure remote access to dedicated XenDesktop sites for separate divisions:
NetScaler Gateway: NG-A
XenDesktop Controller: DDC-A
NetScaler Gateway: NG-B
XenDesktop Controller: DDC-B
Each XenDesktop site is placed in its own Active Directory. Firewalls prevent any communication between the divisions.
An administrator should configure the Secure Ticket Authority on the NetScaler for Division B, without causing any configuration issues for NG-A, by binding __________. (Choose the correct option to complete the sentence.)
A. DDC-B to NG-A
B. DDC-B to NG-B
C. DDC-B to NG-A and DDC-A
D. DDC-A and DDC-B to a load-balancing virtual server
Scenario: An administrator has configured several load balancing virtual servers on a NetScaler to accelerate the Web content. After an update on the Web content platform, all the servers need the client IP address to perform tracking operations.
Which two tasks should the administrator complete to pass the client IP address to all the load balancing virtual servers? (Choose two.)
A. Activate the Source-IP feature on the service.
B. Configure a rewrite policy, then bind it globally.
C. Activate the Client-IP Header insertion on the services.
D. Configure a responder policy, then bind it to all servers.
Scenario: A virtual server has been configured in the Content Switching node to provide multiple Web services using the full website path location. This website contains details that can only be displayed using a specific Web browser such as Internet Explorer.
Which two actions must an administrator perform to ensure that users are informed of the browser requirements? (Choose two.)
A. Configure Advanced Expression policies to determine the type of browser used.
B. Create a backup server to display a website that informs users of the browser requirements.
C. Configure a redirect URL to redirect users to a website that informs them of the browser requirements.
D. Configure a default policy to redirect users to a website that informs them of the browser requirements.
Which action could an administrator take to configure auditing of logon events for all the employees who connected through the NetScaler Gateway for the current day?
A. Run “df -h” from the NetScaler command-line interface.
B. Configure a Syslog policy to send events to a remote server.
C. Run “cat aaa.debug” from the NetScaler command-line interface.
D. Review logon events through Reporting > Access Gateway > AAA > AAA Sessions.
An administrator is reviewing the following output:
VIP(22.214.171.124:80:UP:WEIGHTEDRR): Hits(38200495, 18/sec) Mbps(1.02) Pers(OFF) Err(0)
Pkt(186/sec, 610 bytes) actSvc(4) DefPol(NONE) override(0)
Conn: Clt(253, 1/sec, OE[252\]) Svr(3)
S(126.96.36.199:80:UP) Hits(9443063, 4/sec, P[2602342, 0/sec\]) ATr(5) Mbps(0.23)BWlmt(100 kbits) RspTime(112.58 ms)
Other: Pkt(36/sec, 712 bytes) Wt(10000) RHits(31555)
Conn: CSvr(42, 0/sec) MCSvr(20) OE(16) RP(11) SQ(0)
How much traffic is being passed through the public IP address based on the output displayed above?
A. 100 kbits
B. 1.02 Mbps
C. 0.23 Mbps
D. 112.58 ms
Scenario: An administrator has configured LDAPS authentication, but users are unable to log on to the NetScaler Gateway virtual server. The same users are able to log on to other systems.
Which action could the administrator take to troubleshoot this issue?
A. Run “telnet ldapsrv.example.com 389” from a PC.
B. Run telnet from a LDAPS server to the NSIP address.
C. Run “telnet ldapsrv.example.com 636” from the NetScaler shell.
D. Run “telnet ldapsrv.example.com:636” from the NetScaler command-line interface.
Scenario: An administrator needs to deliver production applications to users. Encryption must be maintained between the users’ managed devices.
Which two certificates could the administrator use to meet this requirement? (Choose two.)
Scenario: An administrator plans to publish 2010 Outlook Web Access through Citrix NetScaler AAA and allow users to authenticate using domain credentials and their RSA tokens. Users must also have the ability to change the password when it has expired.
The administrator should configure ________ for user authentication and ________ for RSA token authentication. (Choose the correct set of options to complete the sentence.)
A. LDAP; LDAPS
B. SAML; RADIUS
C. LDAPS; RADIUS
D. RADIUS; RADIUS
An administrator is setting up two-factor authentication, using Active Directory and RSA SecurID.
Which actions could the administrator take to protect the environment from a brute force attack?
A. Bind Active Directory as Primary authentication priority 100.
Bind RSA SecurID as Primary authentication priority 110.
B. Bind Active Directory as Primary authentication priority 110.
Bind RSA SecurID as Primary authentication priority 100.
C. Bind Active Directory as Secondary authentication priority 100.
Bind RSA SecurID as Primary authentication priority 100.
D. Bind Active Directory as Primary authentication priority 100.
Bind RSA SecurID as Secondary authentication priority 100.
If you want to pass the Citrix 1Y0-250 Exam sucessfully, recommend to read latest Citrix 1Y0-250 Dump full version.