Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter?
After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.
What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)
Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
How should the architect design the image management process using XenServer Fast Clone?
Scenario:
CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as a published application on Windows Server 2012 R2 with Provisioning Services the best solution?
Scenario:
To ensure the security of its new solution, CGE wants to limit end-user access to USB peripherals. Policies have been implemented to disable USB redirection for all end users. As a company policy, only the Research end-user group will be allowed to access USB peripheral devices.
What could a Citrix Architect design to meet the stated requirements?
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by end user and Delivery Group, ensure full control over which GPOs are applied?
Scenario:
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.
Individuals in the Research end-user group need to be able to remotely access a centrally stored database.
Which FlexCast model should the Citrix architect recommend for this group?
Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.
What should an architect recommend to optimize printer bandwidth?
Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.
What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?
Which two risks exist in the access layer of the CGE environment? (Choose two.)
Which two issues should a Citrix Architect address for end users? (Choose two.)
Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)
Scenario:
CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling 'Profile streaming' when configuring group profiles benefit CGE's Sales end-user group?
Scenario:
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.
Which solution could reduce the read IOPS requirements on a shared storage array?
Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Which tool should a Citrix Architect recommend for those groups?
Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
Why is Machine Creation Services the best image management process for this environment?
Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Why does using Provisioning Services and leveraging snapshots help manage the image versioning process?
Scenario:
CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling 'Active write back' when configuring Citrix Profile management without folder redirection benefit CGE's Sales end-user group?
Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types in use?
Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?
Scenario:
The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.
Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?
What should a Citrix Architect identify as a potential security risk that should be resolved in the next design, based on the current provision for external access?
Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?
Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?
Which action would improve the end-user experience for Technicians and Engineers?
Scenario:
CGE decided to disable USB device redirection by default for all end users in the new environment using Citrix policies. The only exception is if there is a clear requirement for end users to have this functionality.
For which two end-user groups should a Citrix Architect configure an exception policy to enable USB device redirection? (Choose two.)
Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.)
CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment.
Which two sites will be able to support this requirement for Citrix Receiver for iOS and Android? (Choose two.)
Why is configuring regional shared storage locations on a CIFS server using XenServer with HA enabled the best design choice for vDisk storage?
How should the architect configure the NetScaler virtual servers on the four appliances?
How should the architect deploy the NetScaler appliances to increase site resiliency?
Scenario:
Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.
How should the architect configure XenServer?
Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server for each appliance binded to a session policy, the best remote access design for the environment?
How should the architect implement high availability (HA) with 12 NetScaler appliances?
How should the architect configure high availability (HA) on a XenServer VM to support an iSCSI NAS?
Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded to a session policy, the best remote access design?
Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server binded to a redirection policy, the best remote access design?
Why is configuring CIFS on a NAS the best design solution for vDisk storage?
What are the benefits of using SSL to meet the company’s compliance requirements?
Why does using hypervisor templates help manage the image release process?
All nurses currently use Windows XP workstations to access critical medical applications and require different applications depending on their role. Which two delivery models meet the nurses’ requirements? (Choose two.)
How can the architect identify if the Delivery Controller is the source of a bottleneck?
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
Why does using IPsec meet CGE's compliance requirements?
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by Client Name, ensure full control over which GPOs are applied?
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents ensure full control over which Group Policies are applied?
Scenario:
A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.
Which configuration should the architect recommend for the new external access architecture?
Users must be able to connect remotely from their own mobile devices.
What should the architect consider to increase the security of the current authentication solution?
Scenario:
CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that SecureICA be implemented?
Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would implementing one GPO in each region ensure full control over which GPOs are applied?