Question 11
Scenario: A Citrix Architect and a team of Workspacelab members have met for a design discussion about the NetScaler Design Project. They captured the following requirements:
* Two pairs of NetScaler MPX appliances will be deployed in the DMZ network and the internal network.
* High availability will be accessible between the pair of NetScaler MPX appliances in the DMZ network.
* Multi-factor authentication must be configured for the NetScaler Gateway virtual server.
* The NetScaler Gateway virtual server is integrated with XenApp/XenDesktop environment.
* Load balancing must be deployed for the users from the workspacelab.com and vendorlab.com domains.
* The logon page must show the workspacelab logo.
* Certificate verification must be performed to identify and extract the username.
* The client certificate must have UserPrincipalName as a subject.
* All the managed workstations for the workspace users must have a client identifications certificate installed on it.
* The workspacelab users connecting from a managed workstation with a client certificate on it should be
* authenticated using LDAP.
* The workspacelab users connecting from a workstation without a client certificate should be authenticated using LDAP and RADIUS.
* The vendorlab users should be authenticated using Active Directory Federation Service.
* The user credentials must NOT be shared between workspacelab and vendorlab.
* Single Sign-on must be performed between StoreFront and NetScaler Gateway.
* A domain drop down list must be provided if the user connects to the NetScaler Gateway virtual server externally.
* The domain of the user connecting externally must be identified using the domain selected from the domain drop down list.
On performing the deployment, the architect observes that users are always prompted with two-factor authentication when trying to assess externally from an unmanaged workstation.
Click the exhibit button to view the configuration.

What should the architect do to correct this configuration?
* Two pairs of NetScaler MPX appliances will be deployed in the DMZ network and the internal network.
* High availability will be accessible between the pair of NetScaler MPX appliances in the DMZ network.
* Multi-factor authentication must be configured for the NetScaler Gateway virtual server.
* The NetScaler Gateway virtual server is integrated with XenApp/XenDesktop environment.
* Load balancing must be deployed for the users from the workspacelab.com and vendorlab.com domains.
* The logon page must show the workspacelab logo.
* Certificate verification must be performed to identify and extract the username.
* The client certificate must have UserPrincipalName as a subject.
* All the managed workstations for the workspace users must have a client identifications certificate installed on it.
* The workspacelab users connecting from a managed workstation with a client certificate on it should be
* authenticated using LDAP.
* The workspacelab users connecting from a workstation without a client certificate should be authenticated using LDAP and RADIUS.
* The vendorlab users should be authenticated using Active Directory Federation Service.
* The user credentials must NOT be shared between workspacelab and vendorlab.
* Single Sign-on must be performed between StoreFront and NetScaler Gateway.
* A domain drop down list must be provided if the user connects to the NetScaler Gateway virtual server externally.
* The domain of the user connecting externally must be identified using the domain selected from the domain drop down list.
On performing the deployment, the architect observes that users are always prompted with two-factor authentication when trying to assess externally from an unmanaged workstation.
Click the exhibit button to view the configuration.

What should the architect do to correct this configuration?
Question 12
Scenario: A Citrix Architect has deployed Authentication for the SharePoint server through NetScaler. In order to ensure that users are able to edit or upload documents, the architect has configured persistent cookies on the NetScaler profile.
Which action should the architect take to ensure that cookies are shared between the browser and non- browser applications?
Which action should the architect take to ensure that cookies are shared between the browser and non- browser applications?
Question 13
Scenario: A Citrix Architect needs to design a hybrid XenApp and XenDesktop environment which will include Citrix Cloud as well as resource locations in an on-premises datacenter and Microsoft Azure.
Organizational details and requirements are as follows:
* Active XenApp and XenDesktop Service subscription
* No existing NetScaler deployment
* Global Server Load Balancing is used to direct connection requests to Location B, if the StoreFront server in Location B fails, connections should be directed to Location A.
Click the Exhibit button to view the conceptual environment architecture.

The architect should use _____ in Location A, and should use ________ in Location B.
(Choose the correct option to complete the sentence.)
Organizational details and requirements are as follows:
* Active XenApp and XenDesktop Service subscription
* No existing NetScaler deployment
* Global Server Load Balancing is used to direct connection requests to Location B, if the StoreFront server in Location B fails, connections should be directed to Location A.
Click the Exhibit button to view the conceptual environment architecture.

The architect should use _____ in Location A, and should use ________ in Location B.
(Choose the correct option to complete the sentence.)
Question 14
Scenario: The following NetScaler environment requirements were discussed during a design meeting between a Citrix Architect and the Workspacelab team:
* All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS.
* Single Sign-on should be created for Microsoft Outlook web access (OWA).
* NetScaler should recognize Uniform Resource Identifier (URI) and close the session to NetScaler when users hit the Logoff button in Microsoft Outlook web access.
* Users should be able to authenticate using user principal name (UPN).
* The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers and the monitor probes must be sent on SSL.
Which method can the architect use to redirect the user accessing https://mail.citrix.com to
https://mail.citrix.com?
* All traffic should be secured, and any traffic coming into HTTP should be redirected to HTTPS.
* Single Sign-on should be created for Microsoft Outlook web access (OWA).
* NetScaler should recognize Uniform Resource Identifier (URI) and close the session to NetScaler when users hit the Logoff button in Microsoft Outlook web access.
* Users should be able to authenticate using user principal name (UPN).
* The Layer 7 monitor should be configured to monitor the Microsoft Outlook web access servers and the monitor probes must be sent on SSL.
Which method can the architect use to redirect the user accessing https://mail.citrix.com to
https://mail.citrix.com?
Question 15
Scenario: A Citrix Architect has set up NetScaler MPX devices in high availability mode with version
12.0.53.13 nc. These are placed behind a Cisco ASA 5505 Firewall. The Cisco ASA Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.
The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer's security team:
The NetScaler MPX device:
* should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The NetScaler device should be able to stop the HTTP, TCP, and DNS based requests.
* needs to protect backend servers from overloading.
* needs to queue all the incoming requests on the virtual server level instead of the service level.
* should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and
* phishing proxies.
* should provide flexibility to enforce the decided level of security check inspections for the requests originating from a specific geolocation database.
* should block the traffic based on a pre-determined header length, URL length, and cookie length. The device should ensure that characters such as a single straight quote ("); backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.
Which security feature should the architect configure to meet these requirements?
12.0.53.13 nc. These are placed behind a Cisco ASA 5505 Firewall. The Cisco ASA Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall.
The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer's security team:
The NetScaler MPX device:
* should monitor the rate of traffic either on a specific virtual entity or on the device. It should be able to mitigate the attacks from a hostile client sending a flood of requests. The NetScaler device should be able to stop the HTTP, TCP, and DNS based requests.
* needs to protect backend servers from overloading.
* needs to queue all the incoming requests on the virtual server level instead of the service level.
* should provide protection against well-known Windows exploits, virus-infected personal computers, centrally managed automated botnets, compromised webservers, known spammers/hackers, and
* phishing proxies.
* should provide flexibility to enforce the decided level of security check inspections for the requests originating from a specific geolocation database.
* should block the traffic based on a pre-determined header length, URL length, and cookie length. The device should ensure that characters such as a single straight quote ("); backslash (\); and semicolon (;) are either blocked, transformed, or dropped while being sent to the backend server.
Which security feature should the architect configure to meet these requirements?