|
Question 1. In a deployment where the internal servers are NOT accessible by the mapped IP or through the default router, how many IP addresses are needed for the Access Gateway implementation? A. 2 B. 3 C. 4 D. 5 Answer: C Question 2. Which option in the Configuration Utility allows an administrator to limit the number of users who can log in to an Access Gateway 8.1, Enterprise Edition environment? A. Select Access Gateway > Virtual Servers, Maximum Users B. Select Systems > Virtual Servers > Policies, Maximum Users C. Select Systems > Connections > Authentication settings, Maximum number of users D. Select Access Gateway > Global > Authentication settings, Maximum number of users Answer: D Question 3. Scenario: A network administrator is planning the remote access infrastructure for an Access Gateway 8.1, Enterprise Edition environment. In this environment, employees, vendors and customers will need to use different methods of authentication. The administrator would like to ensure that each authentication is hosted on a separate server. Which authentication method must the administrator implement when configuring this environment? A. Cascading B. Client-Based C. Server-Based D. Double-source Answer: A Question 4. Scenario: An administrator configuring Access Gateway 8.1, Enterprise Edition in an environment that consists of a double-hop DMZ deployment wants connections from the Citrix XepApp Plugin for Hosted Apps on the Internet to go through the first firewall in order to connect to the Access Gateway appliance in the first DMZ. Which port should the administrator enable on the first firewall? A. 80 B. 389 C. 443 D. 1494 E. 1812 Answer: C Question 5. Scenario: A major technology company wants to upgrade their current Access Gateway deployment to ensure that it meets their growing remote access needs as they acquire new companies. Currently, the company is supporting nearly 3,000 concurrent users on their existing Access Gateway virtual server. Due to a recent merger, the company expects the concurrent user sessions through Access Gateway to increase by 40% over the next year. Which Access Gateway appliance platform series handles the most concurrent user traffic and would be appropriate for this company? A. 2000 B. 7000 C. 10000 D. 11000 Answer: C Question 6. Scenario: A network administrator needs to configure access to published resources in a Citrix XenApp farm through Access Gateway. The administrator has been instructed to implement Access Gateway as a replacement for the current Secure Gateway deployment which does NOT have SmartAccess. Which three steps does the administrator need to take to meet these requirements? (Choose three.) A. Set NT Domain B. Set ICA Proxy to ON C. Configure split tunneling D. Configure the Secure Ticket Authority server E. Set the Access Gateway home page to the Web Interface URL Answer: B, D, E Question 7. Scenario: Employees connect to the corporate network remotely using devices that are running Windows, Mac and Linux operating systems. The administrator in this environment is configuring Access Gateway 8.1, Enterprise Edition and has been instructed by the IT Manager to ensure that remote users have uniform access to the environment regardless of the operating system running on their client devices. Which plugin should the administrator deploy or require employees to obtain in order to access this environment? A. CitrixXenApp plugin B. Citrix Access GatewayPlugin for Java C. Citrix Access GatewayPlugin for ActiveX D. Citrix Access GatewayPlugin for Windows Answer: B Question 8. Scenario: An administrator wants users to be able to access resources running on file servers and application servers in an environment. The administrator has deployed Access Gateway 8.1, Enterprise Edition. The Citrix Access Gateway Plugin for Windows is used to establish connections to the corporate network. There are no intranet applications configured in this environment and split tunneling is turned off. The default authorization policy is set to "Deny."Users in this environment will be able to access applications on file and application servers as long as _______. (Choose the correct phrase to complete the sentence.) A. they can authenticate on the Access Gateway appliance B. an authorization policy is configured to grant them access C. internal resources have been assigned specific intranet IP addresses D. internal resources in this environment have been configured as published applications Answer: B Question 9. Scenario: An administrator created a new Access Gateway virtual server. The administrator did NOT bind any session policies to the virtual server. What is the default authorization action for users logging in to this virtual server? A. ALLOW, this is the default behavior. B. ALLOW, but place users in a quarantine group. C. DENY, the default authentication policy must be applied. D. DENY, either a session policy or a traffic policy must exist. Answer: A Question 10. An administrator has been instructed to give a specific employee in the Finance group access to Engineering resources. To which level should the administrator assign the policy when configuring access for this employee? A. User B. Team C. Group D. Organization E. Virtual server Answer: A Question 11. Scenario: Dual-source authentication is configured on the Access Gateway 8.1, Enterprise Edition appliance. The appropriate group extraction configuration is configured on both the primary and secondary authentication servers, and a user named "User1" exists on both authentication servers. How will groups be extracted for user "User1?" A. Only the groups in the secondary authentication server will be extracted and matched to the group names configured on the primary authentication server. B. Only the groups from the primary authentication server will be extracted and matched to the group names configured on the secondary authentication server. C. The applicable groups from both the primary and secondary authentication servers will be extracted and matched to the group names configured on the appliance. D. The groups from the primary authentication server will be extracted and matched to the group names configured on the secondary authentication server by the administrator. Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.