Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1Y0-614" Exam

Citrix Access Suite 4.0: Design

 Question 1.
ITCertKeys.com has back-end databases that support HR+, MfgData+, and Outlook. If ITCertKeys.com decides to centralize the MfgData+ databases in New York, where should the Presentation Servers hosting the MfgData+ application be deployed?

A. The Presentation Servers hosting MfgData+ should be deployed in all locations.
B. The MfgData+ application should be deployed in Mexico City, Shanghai and Bangalore.
C. Servers hosting the MfgData+ application should be deployed in New York, Mexico City, 
    Shanghai and Bangalore.
D. Servers hosting MfgData+ should be deployed in New York.

Answer: B

Question 2.
ITCertKeys.com has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing.

Why are only user-based Group Policies required?

A. This is determined by the location of the timeout settings.
B. User configuration Group Policies will satisfy the access requirements for the mission critical 
    applications.
C. Timeout settings must be applied to all user sessions to meet ITCertKeys.com's security 
    requirements.
D. Policies for Presentation Server can only be applied on the user level.

Answer: A

Question 3.
ITCertKeys.com currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation.

Why should Web Interface be deployed within the internal network?

A. By placing the Web Interface servers on the internal network port 443 does not have to be 
    opened.
B. This prevents internal users from having to traverse the DMZ to access Web Interface through 
    port 443 or port 80. 
C. By placing the Web Interface servers on the internal network, external access can be limited to 
    the Access Gateway appliance through port 443.
D. This is the only way to avoid opening port 80 on the internal firewall.

Answer: A

Question 4.
ITCertKeys.com has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment.

Why is downloading from the ITCertKeys.com intranet site the best option?

A. All clients can be downloaded automatically.
B. All clients can be downloaded. Clients for Windows and Java download automatically.
C. Users have access to this source and can get clients.
D. Users can get the most up-to-date clients independently.

Answer: A

Question 5.
ITCertKeys.com plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. 

Which features of Access Gateway should they recommend to best maximize security?

A. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point 
    analysis features should be configured for the Access Gateway. Active Directory authentication 
    should be used, making it necessary that user account be created.
B. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point 
    analysis features should be configured for the Access Gateway. Users will access by means of 
    Active Directory guest accounts.
C. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point 
    analysis should be configured for the Access Gateway. Active Directory authentication should  
   be used, making it necessary that user account be created.
D. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point 
    analysis should be configured for the Access Gateway. Users will access by means of Active 
    Directory guest accounts.

Answer: C

Question 6.
ITCertKeys.com plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor. 

Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for ITCertKeys.com's environment in a cost-effective manner?

A. Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication 
    should be used, necessitating the need for the creation of user accounts.
B. Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of 
    Active Directory guest accounts.
C. Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of 
    Active Directory guest accounts.
D. Split tunneling, two-factor authentication, and endpoint analysis. Active Directory 
    authentication should be used, necessitating the need for the creation of user accounts.

Answer: A

Question 7.
Which type of Terminal Services profile should be deployed?

A. Mandatory profiles with folder redirection
B. Mandatory profiles
C. Roaming profiles with folder redirection
D. Roaming profiles

Answer: C

Question 8.
ITCertKeys.com plans to implement Presentation Server for users in Shanghai.

Why should a static port be defined?

A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is 
    more secure.
B. By defining a static port, system resources can be conserved.
C. There is no other way to establish communication over firewalls other than defining a static 
    port.
D. A static port will allow for License Server communications to be more secure, this, this is 
    optimal.

Answer: D

Question 9.
How should ITCertKeys.com deploy required Citrix hot fixes?

A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should 
    be done.
B. Emergency hot fixes should be deployed through manual installation with limited 
    documentation. All other hot fixes should be deployed by means if Installation Manger with full 
    documentation.
C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be 
    done.
D. All required hot fixes should be deployed by means of Installation Manager. Testing should be 
    done.

Answer: D

Question 10.
In regard to ITCertKeys.com's Advanced Access Control deployment. 

Why should an Advanced Access Control web server be placed at this customer's location?

A. Adding an Advanced Access Control deployment enables the customer to incorporate their 
    own security standards.
B. Adding an Advanced Access Control deployment expedites administrative changes because 
    approval chain is closer to the customer.
C. Adding an Advanced Access Control web server will provide better load balancing across 
    existing hardware.
D. Adding an Advanced Access Control deployment makes administration more cost-effective for 
    the customer.

Answer: A

Question 11.
In the context of the endpoint analysis solution of ITCertKeys.com which is implemented to meet the requirements for employees and customers. To meet the access requirements for remote employees, how should the scanning solution be implemented.

A. Creating an endpoint analysis that checks for security updates, scans the operating system 
    and ensures that the appropriate version of the antivirus software is installed. Create a 
    continuous scan to check the registry for the asset tag and to ensure that the proper antivirus 
    software is running on the client device while connected to the network.
B. Creating a continuous scan that checks for security updates, scans the operating system and 
    ensures that the appropriate version of the antivirus software is installed. Create an endpoint 
    analysis to check the registry for the asset tag and to ensure that the proper antivirus software 
    is running on the client device while connected to the network.
C. Creating an endpoint analysis that ensures that the appropriate version of the antivirus 
    software is installed. Create a continuous scan to check the registry for the asset tag and to 
    ensure that the proper antivirus software is running on the client device while connected to the 
    network.
D. Creating an endpoint analysis that checks against the registry for asset tags, scan the 
    operating system and ensures that the appropriate versions of antivirus software is installed. 
    Create a continuous scan to ensure that the proper antivirus software is running on the client 
    device while connected to the network.

Answer: A



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.