Question 41

Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking.
Which two steps can the engineer take to minimize attacks without interfering with user productivity? (Choose two.)
  • Question 42

    Scenario: A Citrix Engineer needs to make a change to the OS Layer. The OS Layer is currently used in several layered images that include different application layers.
    Which two steps should the engineer take to make the necessary changes to the OS Layer and the layered images while minimizing administrative effort? (Choose two.)
  • Question 43

    A Citrix Engineer wants to enable the "Log Off Web Portal When Session is Launched" feature within Workspace Environment Management (WEM) transformer settings.
    What does the engineer need to do prior to enabling this feature?
  • Question 44

    Which file is used to store a subscription on the Storefront server?
  • Question 45

    Scenario: A Citrix Engineer is managing a large environment with multiple locations. The setup is as follows:
    - The setup has a single Citrix Virtual Apps and Desktops site with multiple zones such as a Primary zone and 3 Satellite zones.
    -Virtual Delivery Agents (VDAs) are available for all applications in all 3 Satellite zones.
    -An application 'app1' has its application database located in Satellite zone.
    -As a sovereign mandate, it is desirable that this application database should NOT be accessible from zones 2 and 3.
    -The application does NOT create any database cache and cannot work if the database is NOT reachable. - The outage is acceptable for complying with the sovereign mandate.
    Which zone preference should the engineer configure to achieve this setup?