|
Question 1. ITCertKeys.com has back-end databases that support HR+, MfgData+, and Outlook. If ITCertKeys.com decides to centralize the MfgData+ databases in New York, where should the Presentation Servers hosting the MfgData+ application be deployed? A. The Presentation Servers hosting MfgData+ should be deployed in all locations. B. The MfgData+ application should be deployed in Mexico City, Shanghai and Bangalore. C. Servers hosting the MfgData+ application should be deployed in New York, Mexico City, Shanghai and Bangalore. D. Servers hosting MfgData+ should be deployed in New York. Answer: B Question 2. ITCertKeys.com has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing. Why are only user-based Group Policies required? A. This is determined by the location of the timeout settings. B. User configuration Group Policies will satisfy the access requirements for the mission critical applications. C. Timeout settings must be applied to all user sessions to meet ITCertKeys.com's security requirements. D. Policies for Presentation Server can only be applied on the user level. Answer: A Question 3. ITCertKeys.com currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation. Why should Web Interface be deployed within the internal network? A. By placing the Web Interface servers on the internal network port 443 does not have to be opened. B. This prevents internal users from having to traverse the DMZ to access Web Interface through port 443 or port 80. C. By placing the Web Interface servers on the internal network, external access can be limited to the Access Gateway appliance through port 443. D. This is the only way to avoid opening port 80 on the internal firewall. Answer: A Question 4. ITCertKeys.com has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment. Why is downloading from the ITCertKeys.com intranet site the best option? A. All clients can be downloaded automatically. B. All clients can be downloaded. Clients for Windows and Java download automatically. C. Users have access to this source and can get clients. D. Users can get the most up-to-date clients independently. Answer: A Question 5. ITCertKeys.com plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. Which features of Access Gateway should they recommend to best maximize security? A. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point analysis features should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created. B. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point analysis features should be configured for the Access Gateway. Users will access by means of Active Directory guest accounts. C. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point analysis should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created. D. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point analysis should be configured for the Access Gateway. Users will access by means of Active Directory guest accounts. Answer: C Question 6. ITCertKeys.com plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor. Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for ITCertKeys.com's environment in a cost-effective manner? A. Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts. B. Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of Active Directory guest accounts. C. Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of Active Directory guest accounts. D. Split tunneling, two-factor authentication, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts. Answer: A Question 7. Which type of Terminal Services profile should be deployed? A. Mandatory profiles with folder redirection B. Mandatory profiles C. Roaming profiles with folder redirection D. Roaming profiles Answer: C Question 8. ITCertKeys.com plans to implement Presentation Server for users in Shanghai. Why should a static port be defined? A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is more secure. B. By defining a static port, system resources can be conserved. C. There is no other way to establish communication over firewalls other than defining a static port. D. A static port will allow for License Server communications to be more secure, this, this is optimal. Answer: D Question 9. How should ITCertKeys.com deploy required Citrix hot fixes? A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should be done. B. Emergency hot fixes should be deployed through manual installation with limited documentation. All other hot fixes should be deployed by means if Installation Manger with full documentation. C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be done. D. All required hot fixes should be deployed by means of Installation Manager. Testing should be done. Answer: D Question 10. In regard to ITCertKeys.com's Advanced Access Control deployment. Why should an Advanced Access Control web server be placed at this customer's location? A. Adding an Advanced Access Control deployment enables the customer to incorporate their own security standards. B. Adding an Advanced Access Control deployment expedites administrative changes because approval chain is closer to the customer. C. Adding an Advanced Access Control web server will provide better load balancing across existing hardware. D. Adding an Advanced Access Control deployment makes administration more cost-effective for the customer. Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.