Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1Y0-401 Questions and Answers

Note! Following 1Y0-401 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

1Y0-401 Questions and Answers

Question # 6

Which two current licensing issues should a Citrix Architect resolve in CGE's new virtualization design? (Choose two.)

A.

There are more RDS CALs than Citrix licenses.

B.

The Citrix and RDS licenses share the same server.

C.

There are many different license servers in the environment.

D.

There is a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.

Full Access
Question # 7

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

A.

Two StoreFront servers in a single StoreFront server group.

B.

Two NetScalers in a high availability pair, with load balancing pointing to a single StoreFront server.

C.

Three NetScalers in a cluster, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

D.

Two NetScalers in a high availability pair, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Full Access
Question # 8

Which end-user group does a Citrix Architect need to consider when designing a remote access solution for CGE?

A.

Sales

B.

Back Office

C.

Technicians

D.

Executives/Management

Full Access
Question # 9

Which two issues could CGE's current home directory storage strategy cause? (Choose two.)

A.

Slow logons

B.

Unverified data backups

C.

High IOPS on the storage appliance

D.

High CPU usage on the XenApp servers

Full Access
Question # 10

Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter?

A.

Server infrastructure

B.

Network connectivity

C.

Storage infrastructure

D.

Power and cooling infrastructure

Full Access
Question # 11

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with a Gateway vServer the best design solution?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 12

A Citrix Architect plans to update the virtual environment in CGE's Jurong datacenter.

Which constraint should the architect address to satisfy CGE's stated business needs?

A.

Lack of shared storage

B.

1 Gb network infrastructure

C.

Datacenter power and cooling

D.

Mixed-server hardware landscape

Full Access
Question # 13

Why is a design with 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 14

Why deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with a backup vServer the best design solution?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 15

Scenario: A Citrix Architect recommends upgrading CGE’s Provisioning Services 6.1 environment to Provisioning Services 7.6. Currently, vDisks in Provisioning Services 6.1 are configured with the write cache location on the target device hard drive.

Which two applications will show increased application performance due to the upgrade to Provisioning Services 7.6? (Choose two.)

A.

SAP

B.

Salesforce

C.

OpenGL (CAD)

D.

Proprietary Energy App

Full Access
Question # 16

Why would the architect choose active-passive bonding when configuring network interfaces for storage networks?

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Full Access
Question # 17

Scenario:

Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure XenServer?

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Full Access
Question # 18

Why is configuring an iSCSI LUN on a NAS the best design choice for vDisk storage?

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Full Access
Question # 19

Scenario:

Each XenServer host has six 10GB network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic. All switches in the environment support 802.3ad and adaptive load balancing.

How should the architect configure the storage network interfaces?

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Full Access
Question # 20

Why is configuring regional shared storage locations on a CIFS server using Clustered File Services the best design choice for vDisk storage?

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Full Access
Question # 21

How should the architect configure high availability (HA) on a XenServer host to support an iSCSI SAN?

A.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.

B.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

C.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.

D.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.

Full Access
Question # 22

How should the architect configure high availability (HA) on a XenServer VM to support an iSCSI NAS?

A.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.

B.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

C.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.

D.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.

Full Access
Question # 23

How can the architect implement high availability?

A.

Configure three high-availability pairs: one pair in New York, one pair in London, and one pair in Hong Kong

B.

Configure three high-availability pairs: one pair between New York and London, one pair between New York and Hong Kong, and one pair between Hong Kong and London

C.

Configure two high-availability pairs: one pair for New York and London, and one pair for London and Hong Kong

D.

Configure one cluster instance containing all six appliances.

Full Access
Question # 24

An architect is evaluating the user profile management solution for the desktop and application virtualization solution. Which two pieces of information should the architect collect? (Choose two.)

A.

User time zone

B.

User profile size

C.

Installed language pack

D.

Client device CPU/RAM

E.

Application compatibility of profile type

Full Access
Question # 25

After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.

What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)

A.

It allows the end users to install custom software.

B.

It gives the end users full rights over the system drive.

C.

It requires less storage space than dedicated desktops.

D.

It allows for high availability in a disaster recovery scenario.

Full Access
Question # 26

How should the resource pools be designed to host the server workloads and virtual desktops by ensuring availability?

A.

Resource pools of a maximum of 16 XenServer hosts should be created for the virtual solution. The virtual disks of the server workloads should be backed up on a daily basis and third-party backup solutions should be implemented for the desktops.

B.

Resource pools of a maximum of 32 XenServer hosts should be created for the virtual solution. The virtual disks of the server workloads should be on a storage repository to provide XenMotion and high availability capabilities. The virtual disks of the server workloads should be backed up on a daily basis.

C.

Resource pools of a maximum of 16 XenServer hosts should be created for the virtual solution. The virtual disks of all workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Furthermore, the virtual machine meta information and data should be replicated to the failover site by the new storage solution.

D.

Resource pools of a maximum of 32 XenServer hosts should be created for the virtual solution. The virtual disks of the server workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Furthermore, the virtual machine meta information and data should be copied by a backup function.

Full Access
Question # 27

Which two manually performed tasks can be streamlined by implementing a Citrix environment? (Choose two.)

A.

Database backup

B.

Application patching

C.

Security assessment

D.

Certificate management

E.

Operating system installation

Full Access
Question # 28

What are the benefits of using SSL to meet the company’s compliance requirements?

A.

It consumes lower CPU resources than other encryption technologies

B.

It is supported on industry-standard devices

C.

It is required to enable the SSL Relay service

D.

It enables two-factor authentication

Full Access
Question # 29

Why is database high availability an essential component of a production environment?

A.

Because the Delivery Controller is stateless

B.

Because server maintenance can be performed online

C.

Because it prevents local host cache corruption

D.

Because user data loss is prevented if a session is disconnected

Full Access
Question # 30

Given the current desktop build process, what should an architect recommend on the new virtual platform for this environment while minimizing the number of required management servers?

A.

Continue with current process

B.

Use Ghost to clone a master image

C.

Use Machine Creation Services to clone a master image

D.

Use Provisioning Services servers to create a master target device

Full Access
Question # 31

What are the benefits of using local VMs?

A.

It retains the single image management function while allowing users to install applications

B.

Because it enables the creation of a database to store logs

C.

It has a low storage performance requirement and high user density

D.

It delivers low-cost and high application compatibility

Full Access
Question # 32

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network.

How should the architect implement a highly available Provisioning Services server by using NetScaler App Firewall?

A.

By implementing NetScaler App Firewall policies

B.

By deploying GSLB on NetScaler

C.

By deploying TFTP load balancing using NetScaler

D.

By load balancing Provisioning Services streaming services using NetScaler

Full Access
Question # 33

How many Provisioning Services servers should the architect install in the configured site?

A.

Two servers in the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter

B.

Three servers in each datacenter

C.

Two servers in each datacenter

D.

One server in each datacenter

Full Access
Question # 34

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling file and folder exclusions when configuring group profiles benefit CGE's Sales end-user group?

A.

It minimizes the required storage needed for folder redirection.

B.

It simplifies home drive cleanup.

C.

It improves application performance.

D.

It allows faster logons and logoffs.

Full Access
Question # 35

Scenario: StoreFront is installed on dedicated servers. A Citrix Architect needs to supply CGE’s corporate IT team with the critical Citrix services to be monitored.

Which two Citrix services on the StoreFront servers should the architect recommend be monitored? (Choose two.)

A.

Monitor Service

B.

StoreFront Service

C.

Peer Resolution Service

D.

Credential Wallet Service

Full Access
Question # 36

Scenario:

A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency.

What should the architect recommend?

A.

Configure a separate local vDisk store on each Provisioning Services server and a daily robocopy script across the two stores.

B.

Configure a separate local vDisk store on each Provisioning Services server and configure the two stores in a DFS-R group.

C.

Configure a vDisk store on a CIFS share on a NAS for each Provisioning Services server.

D.

Create the Provisioning Services vDisk store on a configured, single DFS namespace.

Full Access
Question # 37

Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.)

A.

Single-factor authentication is used for external access.

B.

There are single Secure Gateway servers in some locations.

C.

NetScaler Gateway is being used to load balance StoreFront.

D.

There is no automatic failover between regions for end users.

Full Access
Question # 38

CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment.

Which two sites will be able to support this requirement for Citrix Receiver for iOS and Android? (Choose two.)

A.

Tulsa

B.

Jurong

C.

London

D.

Odessa

E.

Houston

F.

Aberdeen

G.

Makassar

Full Access
Question # 39

Which two CGE end-user groups do NOT currently have their profile settings retained between sessions? (Choose two.)

A.

Sales

B.

Engineers

C.

Technicians

D.

Executives/Management

Full Access
Question # 40

CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session.

Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

A.

Research

B.

Engineers

C.

Back Office

D.

Executives/Management

Full Access
Question # 41

What should a Citrix Architect identify as a potential security risk that should be resolved in the next design, based on the current provision for external access?

A.

Web Interface is used

B.

Online Plug-in 12.1 is used

C.

NetScaler Gateway is used to load balance StoreFront

D.

Single-factor authentication is used for external access

Full Access
Question # 42

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

A.

CDFControl utility

B.

Citrix EdgeSight console

C.

Citrix AppCenter console

D.

Group Policy Management console

Full Access
Question # 43

Which action would improve the end-user experience for Technicians and Engineers?

A.

Apply a Citrix policy to enable lossless graphics

B.

Apply a Citrix policy to disable Queuing and Tossing

C.

Apply a Citrix policy to enable Desktop Composition Redirection

D.

Apply a Citrix policy to limit graphics quality based on available bandwidth

Full Access
Question # 44

Scenario:

The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.

Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?

A.

Use client printing and the Universal Printer Driver.

B.

Use network printers connected with Citrix Policies.

C.

Use the Universal Print Server and Universal Printer Driver.

D.

Use network printers connected with Group Policy Preferences.

Full Access
Question # 45

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

How should a Hosted VDI FlexCast model be implemented to allow end-user-installed applications?

A.

By using Citrix Profile management

B.

By using Personal vDisks

C.

By using statically assigned virtual desktops

D.

By using a network share that contains the App-V packages

Full Access
Question # 46

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect implement a set of Group Policies for each OU?

A.

Configure loopback processing with merge at the root level.

B.

Configure loopback processing with replace at the root level.

C.

Configure loopback processing with merge at the regional level.

D.

Configure loopback processing with replace at the regional level.

Full Access
Question # 47

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied?

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.

B.

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.

C.

It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.

D.

It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

Full Access
Question # 48

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Full Access
Question # 49

Scenario:

CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.

Why is Windows Deployment Services the best image management method for this environment?

A.

It allows for user-installed applications.

B.

It reduces machine provisioning time.

C.

It allows for the use of local user profiles.

D.

It supports the use of customized language packs.

Full Access
Question # 50

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT in a Remote PC environment on Windows 7 with Provisioning Services the best solution?

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Full Access
Question # 51

Scenario:

CGE wants to deploy a new StoreFront 2.6 infrastructure. End users will need to access both the legacy XenApp environment and the new XenApp and XenDesktop environment before they are fully migrated. The legacy and new environments have published applications and desktops with conflicting names, so only one should be accessible at a time.

CGE does NOT want to reconfigure the client during the migration, so any changes must be centrally managed.

How should a Citrix Architect recommend that the StoreFront infrastructure be configured to achieve the desired result?

A.

Configure two stores with one Delivery Controller each, and configure the client using a configuration file.

B.

Configure two separate StoreFront server groups, one for each environment. Use NetScaler load balancing to manage connections between the server groups.

C.

Create one store, configured with Delivery Controllers from both environments. Use Active Directory Groups to associate end users to the appropriate environment.

D.

Create one store, configured with Delivery Controllers from both environments. Configure an Application Filter using PowerShell to only show applications from the legacy environment.

Full Access
Question # 52

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

How should the architect recommend that the Synchronizer be deployed?

A.

By using a Hyper-V virtual appliance on Hyper-V

B.

By installing the Synchronizer software on a Hyper-V server

C.

By booting from the Synchronizer ISO image

D.

By installing a Synchronizer virtual appliance on XenServer

Full Access
Question # 53

Scenario:

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

Which solution could reduce the read IOPS requirements on a shared storage array?

A.

IntelliCache

B.

Personal vDisk

C.

Provisioning Services

D.

Machine Creation Services

Full Access
Question # 54

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Offline profile support' when configuring group profiles benefit CGE's Sales end-user group?

A.

It allows faster logons and logoffs.

B.

It minimizes the required storage needed for folder redirection.

C.

It simplifies home drive cleanup.

D.

It improves data accuracy in volatile environments.

Full Access
Question # 55

Why should disk queue length above zero be used to identify bottlenecks?

A.

This indicates excessive I/O and a disk bottleneck

B.

This indicates excessive swap file utilization

C.

This indicates insufficient RAM

D.

This indicates a failed disk

Full Access
Question # 56

Scenario:

CGE decided to disable USB device redirection by default for all end users in the new environment using Citrix policies. The only exception is if there is a clear requirement for end users to have this functionality.

For which two end-user groups should a Citrix Architect configure an exception policy to enable USB device redirection? (Choose two.)

A.

Research

B.

Engineers

C.

Back Office

D.

Technicians

Full Access
Question # 57

Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types in use?

A.

A physical token carried by the end user

B.

X509 certificates stored on a Smart Card

C.

A complex Active Directory password enforced by Group Policy

D.

RADIUS authentication with an Employee ID Number

Full Access
Question # 58

Scenario:

CGE wants to use NetScaler Insight to capture network metrics for connections to the Citrix environment. Specifically, CGE wants to capture internal and external end users connecting to XenDesktop.

Where in the design should a Citrix Architect place NetScalers to capture the required metrics for internal end users without using ICA Proxy?

A.

In front of the StoreFront server group

B.

In-line between the clients and the Delivery Controllers

C.

In the network DMZ for NetScaler Gateway connections

D.

In-line between the clients and the XenDesktop virtual desktops

Full Access
Question # 59

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Why does using SecureICA meet CGE's compliance requirements?

A.

It encrypts internal ICA traffic.

B.

It encrypts ICA traffic from remote end users.

C.

It enables the SSL Relay service.

D.

It complies with industry-standard SSL encryption requirements.

Full Access
Question # 60

The architect recommended pooled desktop OS machines with Personal vDisks for the Nurses, Imaging, and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines?

A.

Install the antivirus software into the base image.

B.

Deploy the antivirus package as an App-V application.

C.

Deploy the antivirus software through a Group Policy startup script.

D.

Install the antivirus software in the master Personal vDisk as a user-installed application.

Full Access