Question 11
Which Front End Optimization technique reduces the number of files to be requested for download?
Question 12
Scenario: A Citrix Engineer has configured an IP Reputation policy and Profile in Application Firewall. However, the engineer is NOT able to see any hits on the policy during testing. Which logs can the engineer check to ensure that IP Reputation is configured correctly?
Question 13
Scenario: A Citrix Engineer is setting up Citrix Application Delivery Management (ADM) in High Availability (HA) mode. The engineer creates both nodes and connects them to the same subnet.
Which IP address must the engineer configure on the Citrix ADM HA pair to allow instances to reconnect to Citrix ADM after a failover?
Which IP address must the engineer configure on the Citrix ADM HA pair to allow instances to reconnect to Citrix ADM after a failover?
Question 14
Which meta-character can be used as a wildcard to match a single character in a given position?
Question 15
Statistics for which three types of violations are presented on the App Security Dashboard? (Choose three.)