Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

1Y0-240 Questions and Answers

Note! Following 1Y0-240 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

1Y0-240 Questions and Answers

Question # 6

Scenario: A NetScaler MPX is using one of four 10G ports available in an environment. A Citrix Administrator found a traffic bottleneck at the NetScaler.

What can the administrator do to increase bandwidth on the NetScaler?

A.

Plug another 10G NetScaler port into the router.

B.

Add two more 10 NetScaler ports to the network and configure VLAN.

C.

Add another 10G NetScaler port to the switch and configure Link Aggregation Control Protocol (LACP).

D.

Purchase another NetScaler MPX appliance.

Full Access
Question # 7

Scenario: A Citrix Administrator has made changes to the NetScaler, deleting parts of the configuration, and then saved the new configurations. The changes caused an outage which needs to be resolved as quickly as possible. There is no NetScaler backup.

What does the administrator need to do to recover the configuration quickly?

A.

Restore form revision history.

B.

Run HA file synchronization.

C.

Run Save v/s Running configuration.

D.

Restart the NetScaler

Full Access
Question # 8

Which two options should a Citrix Administrator configure to stop the First-Time wizard form automatically popping up? (Choose two.)

A.

Host Name is NOT configured on the appliance.

B.

The appliance is configured with the default IP address (192.168.100.1).

C.

Licenses are NOT present on the appliance.

D.

The Default Admin Password has NOT been changed.

Full Access
Question # 9

Scenario: A Citrix Administrator would like to grant access to a Junior Administrator on the NetScaler. The administrator would like to grant full access to everything except the following:

  • Shell Access
  • User Configuration access
  • Partition Configuration access

Which pre-existing command policy would meet the needs of the scenario?

A.

Superuser

B.

Network

C.

Operator

D.

Sysadmin

Full Access
Question # 10

Scenario: A Citrix Administrator needs to add 10 new web servers to an existing server farm. The new servers are configured to serve the same applications and connections and are twice the capacity of the existing servers. The administrator wants to ensure that they are being fully utilized. Currently in the environment, the default load-balancing method is being used.

To ensure that only the 10 new servers are receiving twice the connections of the old servers without changing the load balancing to the rest of the environment, the administrator needs to add a weight of ______________ to the services attached to the ______________ servers. (Choose the correct option to complete the sentence.)

A.

50; new

B.

50; old

C.

2; new

D.

2; old

Full Access
Question # 11

Scenario: A Citrix Administrator manages a NetScaler Gateway with a Standard Platform License, with remote employees in the environment. The administrator wants to increase employee access by 300 users through the NetScaler Gateway, using VPN access.

Which license should the administrator recommend purchasing for this environment?

A.

NetScaler Upgrade License

B.

NetScaler Burst Packs License

C.

NetScaler Gateway Universal License

D.

NetScaler Gateway Express License

Full Access
Question # 12

Scenario: A Citrix Administrator has executed the following command:

set httpcallout1 –cacheForSecs 120

What will be the effect of this command?

A.

The cache duration of the HTTP callout response is set to 120 seconds.

B.

The cache duration of the HTTP request is set to 120 seconds.

C.

The cache duration of the HTTP response is set to 120 seconds.

D.

The cache duration of the HTTP callout request is set to 120 seconds.

Full Access
Question # 13

Scenario: A Citrix Administrator suspects an attack on a load balancing virtual server.

The administrator needs to restrict the access to the load balancing virtual server (192.168.100.25) for 10 minutes.

Which Access Control List (ACL) will help to accomplish this requirement?

A.

add simpleacl rule1 DENY –srclP 192.168.100.25 –TTL 600000

B.

add ns acl rule1 DENY –destlP 192.168.100.25 –TTL 600000

C.

add ns acl rule1 DENY –destlP 192.168.100.25 –TTL 600

D.

add simpleacl rule1 DENY –srclP 192.168.100.25 –TTL 600

Full Access
Question # 14

Scenario: A Citrix Administrator is configuring load balancing on a NetScaler appliance for the company web servers. The administrator needs to create a custom monitor that will look for a specific keyword response from the website and will be used to keep the services in an UP state.

Which type of monitor can the administrator create to accomplish this scenario?

A.

A HTTP-ECV monitor with the keyword in the Special Parameters – Receive String field.

B.

An UDP-ECV monitor with the keyword in the Special Parameters – Receive String field.

C.

A TCP monitor with the keyword in the Special Parameters – Response Codes field.

D.

A HTTP monitor with the keyword in the Special Parameters – Response Codes field.

Full Access
Question # 15

Scenario: A Citrix Administrator has configured an HTTP load-balancing virtual server with Least Response Time as the load-balancing algorithm.

The administrator notices that requests to the virtual server appear to be using the Round Robin load-balancing algorithm.

What could be causing the virtual server to use Round Robin load-balancing algorithm?

A.

The services that are bound to the HTTP virtual server are using the PING monitor.

B.

The virtual server is in startup round robin mode.

C.

Least Response Time CANNOT be used as a load-balancing algorithm on an HTTP virtual server.

D.

The NetScaler configuration has NOT been saved yet.

Full Access
Question # 16

Which two actions must be true for a client to connect to an SSL offload virtual server without any SSL errors? (Choose two.)

A.

The Server Certificate is bound to the load-balancing virtual server.

B.

The Server Certificate is from a private certificate authority (CA).

C.

The Root Certificate is installed on the client’s device.

D.

The Root Certificate is installed on the NetScaler.

Full Access
Question # 17

A Citrix Administrator needs to block access to multiple URLs for security reasons.

Which configuration should the administrator use to accomplish this requirement?

A.

add policy patset BAD_URLbind policy patset BAD_URL badurl1.mylab.lab –index 11 –charset ASCllbind policy patset BAD_URL badurl2.mylab.lab –index 10 –charset ASClladd responder policy BAD_URL_DNS “DNS.REQ.QUESTION.DOMAIN.CONTAINS(\ “BAD_URL\”)” DROPbind responder global BAD_URL_DNS 100 END –type DNS_REQ_OVERRIDE

B.

add policy patset BAD_URLbind policy patset BAD_URL badurl1.mylab.lab –index 11 –charset ASCllbind policy patset BAD_URL badurl2.mylab.lab –index 10 –charset ASClladd responder policy BAD_URL_DNS “DNS.REQ.QUESTION.DOMAIN.CONTAINS_ANY(\ “BAD_URL\”)” RESETbind responder global BAD_URL_DNS 100 END –type DNS_REQ_OVERRIDE

C.

bind policy patset BAD_URL badurl1.mylab –index 11 –charset ASCllbind policy patset BAD_URL badurl2.mylab,lab –index 10 –charset ASClladd responder policy BAD_URL_DNS “DNS.REQ.QUESTION.DOMAIN.CONTAINS(\ “BAD_URL\”)” RESETbind responder global BAD_URL_DNS 100 END –type DNS_REQ

D.

add policy patset BAD_URLbind policy patset BAD_URL badurl1.mylab.lab –index 11 –charset ASCllbind policy patset BAD_URL badurl2.mylab.lab –index 10 –charset ASClladd responder policy BAD_URL_DNS “DNS.REQ.QUESTION.DOMAIN.CONTAINS(\ “BAD_URL\”)” RESETbind responder global BAD_URL_DNS 100 END –type DNS_REQ_OVERRIDE

Full Access
Question # 18

Scenario: A Citrix Administrator configured the rewrite policies below.

bind Ib vserver VPN_http –policyName POL_1 priority 120 –gotoPriorityExpression END –type REQUEST

bind Ib vserver VPN_http –policyName POL_2 priority 90 –gotoPriorityExpression NEXT –type REQUEST

bind Ib vserver VPN_http –policyName POL_3 priority 100 –gotoPriorityExpression NEXT –type REQUEST

bind Ib vserver VPN_http –policyName POL_4 priority 110 –gotoPriorityExpression NEXT –type REQUEST

In which order will the policies be evaluated?

A.

POL_2, POL_3

B.

POL_2

C.

POL_2, POL_3, POL_4, POL_1

D.

POL_2, POL_3, POL_4

Full Access