Question 26

When the NetScaler marks a client connection as "non-trackable", the default behavior of the NetScaler without making any change to the HTTP Profile is to ______. (Choose the correct option to complete the sentence.)
  • Question 27

    Scenario: A hacker accessed the HTML code from a product page and manipulated the HTML code as shown:
    Original Value: <input type=hidden name=price value=2379.73> Manipulated Value: <input type=hidden name=price value=9.24> Which security check can the engineer configure to counter the manipulation?
  • Question 28

    A Citrix Engineer needs to configure an application firewall profile to ensure that the images uploaded on the website are NOT malicious. The engineer needs to create a policy to filter the upload requests and ensure that they are in JPEG format. Which expression can the engineer use to fulfill this requirement?
  • Question 29

    Scenario: A Citrix Engineer configured signature protections for Citrix Web App Firewall.
    Signature Auto- Update has been enabled. Upon reviewing the log files, the engineer notices that the auto update process has an error. In the settings for Signature Auto Update the engineer notices that the URL is blank.
    Which URL should the engineer enter to restore the update process?
  • Question 30

    A Citrix Engineer needs to implement a rate limiting policy to permit an average of one request in
    40 ms using NetScaler.
    Which Limit Identifier will meet this requirement?