Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

1Y0-401 Questions and Answers

Question # 6

Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter?

A.

Server infrastructure

B.

Network connectivity

C.

Storage infrastructure

D.

Power and cooling infrastructure

Full Access
Question # 7

After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.

What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)

A.

It allows the end users to install custom software.

B.

It gives the end users full rights over the system drive.

C.

It requires less storage space than dedicated desktops.

D.

It allows for high availability in a disaster recovery scenario.

Full Access
Question # 8

Scenario:

CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.

How should the architect design the image management process using XenServer Fast Clone?

A.

Install a new Windows image utilizing a XenServer virtual machine prepared as the master image.

B.

Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and convert the virtual machine image to a template.

C.

Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and convert the virtual machine image to a vDisk using XenConvert.

D.

Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and include XenTools.

Full Access
Question # 9

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT as a published application on Windows Server 2012 R2 with Provisioning Services the best solution?

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Full Access
Question # 10

Scenario:

To ensure the security of its new solution, CGE wants to limit end-user access to USB peripherals. Policies have been implemented to disable USB redirection for all end users. As a company policy, only the Research end-user group will be allowed to access USB peripheral devices.

What could a Citrix Architect design to meet the stated requirements?

A.

A GPO that allows USB redirection, linked to the CGE OU.

B.

A GPO that allows USB redirection, linked only to the Aberdeen and Houston OUs.

C.

A Citrix policy that allows USB redirection, with a filter on the IP range for CGE's Aberdeen and Houston subnets.

D.

A Citrix policy that allows USB redirection, with a filter on the Delivery Group for the Research end-user group desktop.

Full Access
Question # 11

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would creating Citrix policies within a GPO, filtered by end user and Delivery Group, ensure full control over which GPOs are applied?

A.

It provides central management and control.

B.

It ensures that only policies with the correct filter in Active Directory are applied.

C.

It ensures that only settings located in the root OU are applied.

D.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

Full Access
Question # 12

Scenario:

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

Individuals in the Research end-user group need to be able to remotely access a centrally stored database.

Which FlexCast model should the Citrix architect recommend for this group?

A.

Hosted Shared

B.

Hosted VDI

C.

Streamed VHD

D.

Local VM

Full Access
Question # 13

Scenario: Users from a remote research lab have very limited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.

What should an architect recommend to optimize printer bandwidth?

A.

Optimize WAN traffic through CloudBridge.

B.

Increase the WAN bandwidth through a WAN link upgrade.

C.

Restrict overall session bandwidth through a HDX bandwidth policy.

D.

Restrict printer redirection bandwidth through a HDX bandwidth policy.

Full Access
Question # 14

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Full Access
Question # 15

Which two risks exist in the access layer of the CGE environment? (Choose two.)

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Full Access
Question # 16

Which two issues should a Citrix Architect address for end users? (Choose two.)

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Full Access
Question # 17

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Full Access
Question # 18

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Profile streaming' when configuring group profiles benefit CGE's Sales end-user group?

A.

It allows faster logons.

B.

It simplifies home drive cleanup.

C.

It minimizes the required storage needed for folder redirection.

D.

It improves application performance.

Full Access
Question # 19

Scenario:

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

Which solution could reduce the read IOPS requirements on a shared storage array?

A.

IntelliCache

B.

Personal vDisk

C.

Provisioning Services

D.

Machine Creation Services

Full Access
Question # 20

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Which tool should a Citrix Architect recommend for those groups?

A.

Provisioning Services

B.

Hypervisor templates and snapshots

C.

Windows Deployment Services

D.

Machine Creation Services

Full Access
Question # 21

Scenario:

CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.

Why is Machine Creation Services the best image management process for this environment?

A.

It provides centralized image management and has fewer infrastructure requirements.

B.

It results in less network complexity.

C.

It reduces network traffic.

D.

It does NOT require TFTP and DHCP configuration.

Full Access
Question # 22

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Why does using Provisioning Services and leveraging snapshots help manage the image versioning process?

A.

It enables rollbacks.

B.

It manages version control.

C.

It leverages storage array features to offload host processing.

D.

It automatically deploys the latest drivers and patches.

Full Access
Question # 23

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Active write back' when configuring Citrix Profile management without folder redirection benefit CGE's Sales end-user group?

A.

It improves application performance.

B.

It simplifies home drive cleanup.

C.

It minimizes the required storage needed for folder redirection.

D.

It improves data accuracy in volatile environments.

Full Access
Question # 24

Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types in use?

A.

A physical token carried by the end user

B.

X509 certificates stored on a Smart Card

C.

A complex Active Directory password enforced by Group Policy

D.

RADIUS authentication with an Employee ID Number

Full Access
Question # 25

Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?

A.

HDX Monitor

B.

Citrix Director

C.

Citrix EdgeSight

D.

Citrix AppCenter Console

Full Access
Question # 26

Scenario:

The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.

Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?

A.

Use client printing and the Universal Printer Driver.

B.

Use network printers connected with Citrix Policies.

C.

Use the Universal Print Server and Universal Printer Driver.

D.

Use network printers connected with Group Policy Preferences.

Full Access
Question # 27

What should a Citrix Architect identify as a potential security risk that should be resolved in the next design, based on the current provision for external access?

A.

Web Interface is used

B.

Online Plug-in 12.1 is used

C.

NetScaler Gateway is used to load balance StoreFront

D.

Single-factor authentication is used for external access

Full Access
Question # 28

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

A.

CDFControl utility

B.

Citrix EdgeSight console

C.

Citrix AppCenter console

D.

Group Policy Management console

Full Access
Question # 29

Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?

A.

A Smart Card reader is installed to allow the end user to log on with an X509 certificate issued by the Active Directory Certificate Authority.

B.

The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO).

C.

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

D.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Full Access
Question # 30

Which action would improve the end-user experience for Technicians and Engineers?

A.

Apply a Citrix policy to enable lossless graphics

B.

Apply a Citrix policy to disable Queuing and Tossing

C.

Apply a Citrix policy to enable Desktop Composition Redirection

D.

Apply a Citrix policy to limit graphics quality based on available bandwidth

Full Access
Question # 31

Scenario:

CGE decided to disable USB device redirection by default for all end users in the new environment using Citrix policies. The only exception is if there is a clear requirement for end users to have this functionality.

For which two end-user groups should a Citrix Architect configure an exception policy to enable USB device redirection? (Choose two.)

A.

Research

B.

Engineers

C.

Back Office

D.

Technicians

Full Access
Question # 32

Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.)

A.

Single-factor authentication is used for external access.

B.

There are single Secure Gateway servers in some locations.

C.

NetScaler Gateway is being used to load balance StoreFront.

D.

There is no automatic failover between regions for end users.

Full Access
Question # 33

CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment.

Which two sites will be able to support this requirement for Citrix Receiver for iOS and Android? (Choose two.)

A.

Tulsa

B.

Jurong

C.

London

D.

Odessa

E.

Houston

F.

Aberdeen

G.

Makassar

Full Access
Question # 34

Why is configuring regional shared storage locations on a CIFS server using XenServer with HA enabled the best design choice for vDisk storage?

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Full Access
Question # 35

How should the architect configure the NetScaler virtual servers on the four appliances?

A.

Create one NetScaler virtual server for each appliance, and on each appliance bind a session policy to the NetScaler virtual server configured in ICA Proxy mode using the StoreFront server.

B.

Create one NetScaler virtual server for each appliance and on each appliance bind a redirection policy to the NetScaler virtual server configured in ICA Redirection mode using the StoreFront server.

C.

Create two NetScaler virtual servers for each appliance, and bind a redirection policy to them that is configured in ICA Redirection mode using the StoreFront server.

D.

Create four NetScaler virtual servers for each appliance, and bind a session policy to them that is configured in ICA Redirection mode using the StoreFront server.

Full Access
Question # 36

How should the architect deploy the NetScaler appliances to increase site resiliency?

A.

Configure Global Server Load Balancing (GSLB) for end-user connectivity.

B.

Configure a Gateway vServer.

C.

Configure a backup vServer.

D.

Configure failover sites within the NetScaler Gateway.

Full Access
Question # 37

Scenario:

Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.

How should the architect configure XenServer?

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Full Access
Question # 38

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server for each appliance binded to a session policy, the best remote access design for the environment?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 39

How should the architect implement high availability (HA) with 12 NetScaler appliances?

A.

In each datacenter, deploy an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic.

B.

In each datacenter, deploy an HA pair in the internal network for Gateway traffic and an HA pair in the DMZ for load balancing.

C.

Create three NetScaler virtual servers configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server.

D.

Create six NetScaler virtual servers in HA pairs configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server.

Full Access
Question # 40

How should the architect configure high availability (HA) on a XenServer VM to support an iSCSI NAS?

A.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.

B.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

C.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.

D.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.

Full Access
Question # 41

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded to a session policy, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 42

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server binded to a redirection policy, the best remote access design?

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Full Access
Question # 43

Why is configuring CIFS on a NAS the best design solution for vDisk storage?

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Full Access
Question # 44

What are the benefits of using SSL to meet the company’s compliance requirements?

A.

It eliminates the need to distribute an internal root certificate

B.

It encrypts end-to-end traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It provides secure internal and external network communication

Full Access
Question # 45

How should the components be set up for this environment?

A.

Configure a NetScaler cluster. Place the StoreFront servers and Delivery Controllers in the internal network.

B.

Configure NetScaler high availability. Place the StoreFront servers and Delivery Controllers in the internal network.

C.

Configure a back-up vServer. Place the StoreFront servers and Delivery Controllers in the internal network.

D.

Configure GSLB for the StoreFront servers and Delivery Controllers and place them in the internal network.

Full Access
Question # 46

How should the architect design the optimal write cache storage?

A.

By implementing RAID 5 on XenServer local storage

B.

By implementing RAID 10 on XenServer shared storage

C.

By implementing RAID 3 on a NAS device

D.

By implementing RAID 6 on a server hosting the CIFS share

Full Access
Question # 47

Why does using hypervisor templates help manage the image release process?

A.

Because they automatically upgrade virtual desktops to the latest operating system version

B.

Because they provide centralized, automated single image management

C.

Because they facilitate consistent deployment of base images

D.

Because they can be stored on shared or local storage

Full Access
Question # 48

Why should CPU and memory consumption be used to identify bottlenecks?

A.

Excessive CPU and memory consumption will slow the loading of vDisks and cache files by Provisioning Services

B.

Excessive CPU and memory consumption on the vDisk store will slow down the PXE boot process.

C.

Excessive CPU and memory consumption can increase fragmentation of the TFTP boot strap file.

D.

Excessive CPU and memory consumption can increase fragmentation of the vDisks.

Full Access
Question # 49

All nurses currently use Windows XP workstations to access critical medical applications and require different applications depending on their role. Which two delivery models meet the nurses’ requirements? (Choose two.)

A.

Local VM deployment with streamed applications

B.

Streamed VHD deployment with streamed applications

C.

Hosted server OS deployment with locally installed applications

D.

Hosted desktop OS deployment with locally installed applications

Full Access
Question # 50

Why does using PowerShell help manage the image release process?

A.

Because it can script automatic upgrades of the deployment template

B.

Because it provides centralized, automated single image management

C.

Because it facilitates consistent deployment of base images

D.

Because PowerShell scripts can be executed from the same network share as the deployment template

Full Access
Question # 51

How can the architect identify if the Delivery Controller is the source of a bottleneck?

A.

Identify excessive memory and network utilization

B.

Identify excessive CPU consumption

C.

Identify excessive disk and network I/O

D.

Identify excessive disk I/O and page file utilization

Full Access
Question # 52

Why should disk and network I/O be used to identify bottlenecks?

A.

Excessive disk and network I/O will slow the creation of new sessions.

B.

Excessive disk and network I/O on the data collector will slow down Web Interface authentication.

C.

Excessive disk and network I/O on the data collector will slow down application enumeration.

D.

Excessive disk and network I/O on the XenApp server will affect the local host cache.

Full Access
Question # 53

Why is this the best design for the XenServer resource pools?

A.

This design ensures that all server workloads and virtual desktop workloads are logically separated and do NOT interfere with each other. Furthermore, it ensures easier management and expansion capabilities.

B.

This design provides flexibility for all workloads to use available resources within a resource pool more efficiently and ensures expansion options if the environment should grow. Furthermore, performing a backup on a daily basis provides availability of critical workloads with some downtime.

C.

This design separates server workloads from virtual desktops according to the different resource usage characteristics and avoids conflicting situations. Also, critical database services have sufficient resources within their workload-specific resource pool and failover capabilities.

D.

This design ensures logical separation of all workloads and virtual desktops. Also, providing a backup solution reduces the risk of data loss and minimizes downtime.

Full Access
Question # 54

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

Why does using IPsec meet CGE's compliance requirements?

A.

It encrypts internal network traffic.

B.

It encrypts ICA traffic from remote end users.

C.

It enables the SSL Relay service.

D.

It complies with industry-standard SSL encryption requirements.

Full Access
Question # 55

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would creating Citrix policies within a GPO, filtered by Client Name, ensure full control over which GPOs are applied?

A.

It provides central management and control.

B.

It ensures that only policies with the correct filter in Active Directory are applied.

C.

It ensures that only settings located in the root OU are applied.

D.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

Full Access
Question # 56

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents ensure full control over which Group Policies are applied?

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on.

B.

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on.

C.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

D.

It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

Full Access
Question # 57

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

Which configuration should the architect recommend for the new external access architecture?

A.

One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device.

B.

A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.

C.

A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site.

D.

One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs.

Full Access
Question # 58

Users must be able to connect remotely from their own mobile devices.

What should the architect consider to increase the security of the current authentication solution?

A.

Adding a second authentication factor

B.

Placing domain controllers in the DMZ for remote users

C.

Shortening the Active Directory password expiration period

D.

Populating the RDS user profile path in the Active Directory user accounts

Full Access
Question # 59

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that SecureICA be implemented?

A.

By using NetScaler

B.

By implementing secure Delivery Groups

C.

By implementing an Active Directory Group Policy to configure SecureICA

D.

By installing an SSL certificate in the master image

Full Access
Question # 60

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would implementing one GPO in each region ensure full control over which GPOs are applied?

A.

It provides central management and control.

B.

It ensures that only policies with the correct filter in Active Directory are applied

C.

It ensures that only settings located in the root OU are applied.

D.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

Full Access