Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1Y0-A04" Exam

Access Gateway 8.1 Enterprise Edition: Administration

 Question 1.
In a deployment where the internal servers are NOT accessible by the mapped IP or through the default router, how many IP addresses are needed for the Access Gateway implementation?

A. 2
B. 3
C. 4
D. 5

Answer: C

Question 2.
Which option in the Configuration Utility allows an administrator to limit the number of users who can log in to an Access Gateway 8.1, Enterprise Edition environment?

A. Select Access Gateway > Virtual Servers, Maximum Users
B. Select Systems > Virtual Servers > Policies, Maximum Users
C. Select Systems > Connections > Authentication settings, Maximum number of users
D. Select Access Gateway > Global > Authentication settings, Maximum number of users

Answer: D

Question 3.
Scenario: A network administrator is planning the remote access infrastructure for an Access Gateway 8.1, Enterprise Edition environment. In this environment, employees, vendors and customers will need to use different methods of authentication. The administrator would like to ensure that each authentication is hosted on a separate server. 

Which authentication method must the administrator implement when configuring this environment?

A. Cascading
B. Client-Based
C. Server-Based
D. Double-source

Answer: A

Question 4.
Scenario: An administrator configuring Access Gateway 8.1, Enterprise Edition in an environment that consists of a double-hop DMZ deployment wants connections from the Citrix XepApp Plugin for Hosted Apps on the Internet to go through the first firewall in order to connect to the Access Gateway appliance in the first DMZ. 

Which port should the administrator enable on the first firewall?

A. 80
B. 389
C. 443
D. 1494
E. 1812

Answer: C

Question 5.
Scenario: A major technology company wants to upgrade their current Access Gateway deployment to ensure that it meets their growing remote access needs as they acquire new companies. Currently, the company is supporting nearly 3,000 concurrent users on their existing Access Gateway virtual server. Due to a recent merger, the company expects the concurrent user sessions through Access Gateway to increase by 40% over the next year. 

Which Access Gateway appliance platform series handles the most concurrent user traffic and would be appropriate for this company?

A. 2000
B. 7000
C. 10000
D. 11000

Answer: C

Question 6.
Scenario: A network administrator needs to configure access to published resources in a Citrix XenApp farm through Access Gateway. The administrator has been instructed to implement Access Gateway as a replacement for the current Secure Gateway deployment which does NOT have SmartAccess. 

Which three steps does the administrator need to take to meet these requirements? (Choose three.)

A. Set NT Domain
B. Set ICA Proxy to ON
C. Configure split tunneling
D. Configure the Secure Ticket Authority server
E. Set the Access Gateway home page to the Web Interface URL

Answer: B, D, E

Question 7.
Scenario: Employees connect to the corporate network remotely using devices that are running Windows, Mac and Linux operating systems. The administrator in this environment is configuring Access Gateway 8.1, Enterprise Edition and has been instructed by the IT Manager to ensure that remote users have uniform access to the environment regardless of the operating system running on their client devices. 

Which plugin should the administrator deploy or require employees to obtain in order to access this environment?

A. CitrixXenApp plugin
B. Citrix Access GatewayPlugin for Java
C. Citrix Access GatewayPlugin for ActiveX
D. Citrix Access GatewayPlugin for Windows

Answer: B

Question 8.
Scenario: An administrator wants users to be able to access resources running on file servers and application servers in an environment. The administrator has deployed Access Gateway 8.1, Enterprise Edition. The Citrix Access Gateway Plugin for Windows is used to establish connections to the corporate network. There are no intranet applications configured in this environment and split tunneling is turned off. The default authorization policy is set to "Deny."Users in this environment will be able to access applications on file and application servers as long as _______. (Choose the correct phrase to complete the sentence.)

A. they can authenticate on the Access Gateway appliance
B. an authorization policy is configured to grant them access
C. internal resources have been assigned specific intranet IP addresses
D. internal resources in this environment have been configured as published applications

Answer: B

Question 9.
Scenario: An administrator created a new Access Gateway virtual server. The administrator did NOT bind any session policies to the virtual server. 

What is the default authorization action for users logging in to this virtual server?

A. ALLOW, this is the default behavior.
B. ALLOW, but place users in a quarantine group.
C. DENY, the default authentication policy must be applied.
D. DENY, either a session policy or a traffic policy must exist.

Answer: A

Question 10.
An administrator has been instructed to give a specific employee in the Finance group access to Engineering resources. 

To which level should the administrator assign the policy when configuring access for this employee?

A. User
B. Team
C. Group
D. Organization
E. Virtual server

Answer: A

Question 11.
Scenario: Dual-source authentication is configured on the Access Gateway 8.1, Enterprise Edition appliance. The appropriate group extraction configuration is configured on both the primary and secondary authentication servers, and a user named "User1" exists on both authentication servers. 

How will groups be extracted for user "User1?"

A. Only the groups in the secondary authentication server will be extracted and matched to the 
    group names configured on the primary authentication server.
B. Only the groups from the primary authentication server will be extracted and matched to the 
    group names configured on the secondary authentication server.
C. The applicable groups from both the primary and secondary authentication servers will be 
    extracted and matched to the group names configured on the appliance.
D. The groups from the primary authentication server will be extracted and matched to the group 
    names configured on the secondary authentication server by the administrator.

Answer: C



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.