Bybbybdddg
Ddd
Ddd
Fichier Détails
Cartes-fiches | 117 |
---|---|
Langue | Deutsch |
Catégorie | Autres |
Niveau | Autres |
Crée / Actualisé | 08.12.2024 / 08.12.2024 |
Lien de web |
https://card2brain.ch/box/20241208_bybbybdddg
|
Intégrer |
<iframe src="https://card2brain.ch/box/20241208_bybbybdddg/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Créer ou copier des fichiers d'apprentissage
Avec un upgrade tu peux créer ou copier des fichiers d'apprentissage sans limite et utiliser de nombreuses fonctions supplémentaires.
Connecte-toi pour voir toutes les cartes.
Scenario: A Citrix Engineer needs to configure passthrough for user authentication on the Workspace front. The engineer confirmed that Single Sign-on process is running on the user machine and all the other settings are in place on the machine.
Which two steps should the engineer follow to make passthrough authentication work for the users? (Choose two.)
Which two statements are true regarding Publishing Platform Layer? (Choose two.)
Which three statements are true about building multiple Elastic Layers? (Choose three.)
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps and Desktops environment. The engineer recently deployed Citrix App Layering for improved image management with Machine Creation Services (MCS). The infrastructure requires various 32-bit and 64-bit operating system platforms.
Which three considerations does the engineer need to be aware of when creating various OS Layers for the company infrastructure? (Choose three.)
Scenario: A Citrix Engineer has implemented a multi-zone Citrix Virtual Apps and Desktops site. The setup is as follows:The Primary zone has been implemented in Sweden. The Satellite zones have been implemented in Finland, Norway and Denmark.
The Application named ‘Sys-QA’ is hosted on Virtual Delivery Agent (VDA) machines which are available in all the Satellite zones only. The Application home zone for Sys-CA has been configured as Finland. A user with user ID ‘test1’ has a disconnected session for Sys-QA in Norway.
Where will the session launch, if user test1 tries to reconnect to application Sys-QA?
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps and Desktops environment. The engineer has deployed Workspace Environment Management
(WEM) within the infrastructure. The engineer has recently noticed that the two most commonly used applications are consuming excessive disk contention and causing bottlenecks on the servers.
Which WEM System Optimization does the engineer need to use to address this issue?
In which location is the resulting .VHD file stored by the Enterprise Layer Manager (ELM), when creating layers or layered images with Citrix App Layering?
Which two statements are valid for Enterprise Layer Manager (ELM) storage? (Choose two.)
Which tool allows a Citrix Engineer to monitor and identify inconsistent or suspicious activities on the network?
A Citrix Engineer configured two Workspace Environment Management (WEM) brokers that are load-balanced by Citrix ADC.
How do the WEM brokers synchronize their information?
What are two valid options to manage antivirus definition updates in a Citrix App Layering deployment? (Choose two.)
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps and Desktops environment. The engineer recently received reports from users that logons have been slow, and their desktops take a long time to load.
The engineer has decided to implement Workspace Environment Management (WEM) within the infrastructure and utilize its Profile Management capabilities to address the user issue.
Which option should the engineer configure to improve the users' desktop load time?
The main transformer setting within Workspace Environment Management (WEM) changes the WEM Agent machine so that it __________.
After a Citrix Engineer configured FAS and SAML in a Citrix Virtual Apps and Desktops site, the Virtual Delivery Agent (VDA) machine requests the ________ from ________ in order to complete the VDA Windows logon process.
How can a Citrix Engineer use Session-Based Computing/Hosted Virtual Desktop (SBC/HVD) Tuning to optimize a user's desktop?
Scenario: There are two domains in an organization: Domain A and Domain B. A Citrix Engineer configured SAML authentication for Domain A, without implementing Citrix Federated Authentication Service (FAS).
While launching the Citrix apps, the Single Sign-on will __________.
Scenario: A Citrix Engineer is managing a large environment with multiple locations. The setup is as follows:
- The setup has a single Citrix Virtual Apps and Desktops site with multiple zones such as a Primary zone and 3 Satellite zones.
-Virtual Delivery Agents (VDAs) are available for all applications in all 3 Satellite zones.
-An application 'app1' has its application database located in Satellite zone.
-As a sovereign mandate, it is desirable that this application database should NOT be accessible from zones 2 and 3.
-The application does NOT create any database cache and cannot work if the database is NOT reachable. -The outage is acceptable for complying with the sovereign mandate.
Which zone preference should the engineer configure to achieve this setup?
Scenario: A Citrix Engineer noticed that a Citrix Virtual Apps and Desktops environment lost connection to the SQL servers where the Citrix databases are running. Due to this, the Site has become unmanaged and first-time users CANNOT connect to their Citrix Virtual Apps & Desktops resources.
The setup was recently upgraded from Citrix Virtual Apps and Desktops 7.11 to Citrix Virtual Apps and Desktops 7.15 CU4.
What should the engineer do to minimize the impact of the SQL outage?
A Citrix Engineer wants to enable the "Log Off Web Portal When Session is Launched" feature within Workspace Environment Management (WEM) transformer settings.
What does the engineer need to do prior to enabling this feature?
Which three layers can a Citrix Engineer include in an image template? (Choose three.)
Which two statements are true for a Workspace Environment Management (WEM) configuration set? (Choose two.)
Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A
Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking.
Which two steps can the engineer take to minimize attacks without interfering with user productivity? (Choose two.)
Which command should a Citrix Engineer use to review recent connections and brokering attempts within a Citrix Virtual Apps and Desktops site?
What is a Citrix App Layering recipe?
Which file is used to store a subscription on the Storefront server?
Which database high availability option does Citrix recommend for Workspace Environment Management (WEM)?
Scenario: A Citrix Engineer is managing a large Citrix Virtual Apps and Desktops environment with three sites. Users connecting to applications and VDI machines in these sites are using a common Citrix ADC Gateway. The engineer wants to configure peripheral federation and port redirection policies for secure access to the site resources.
Which feature should the engineer use to configure policies centrally only once and avoid configuring them on each site?
Scenario: An existing setup of session recording has stopped working. After investigating, a Citrix Engineer finds that the Session Recording Agent cannot connect to the Session Recording Server. The following error is displayed:
"The underlying connection was closed. Could not establish a trust relationship for the SSL/TLS secure channel. "
Which two issues could cause this error? (Choose two.)
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps environment. The engineer has recently noticed two single-threaded applications consistently consuming 25% of the CPU resources, causing substantial performance issues for users of these servers. The engineer has deployed Workspace Environment
Management (WEM) within the infrastructure and enabled CPU Spikes Protection.
What else can the engineer enable within WEM to address this issue?
Scenario: A Citrix Engineer created four application layers with different applications at different time stamps as shown below:
App Layer A `" Microsoft Office Professional `" 15/08/2019, 14:28
App Layer B `" Adobe Acrobat Reader and Cisco Webex `" 14/07/2019, 11:45
App Layer C `" Active Directory Users & Computers, Citrix Studio `" 20/08/2019, 16:10
App Layer D `" Google Chrome and GoToMeeting `" 27/07/2019, 10:35
Which layer would hold the highest priority in this scenario?
-
- 1 / 117
-