Scenario: A Citrix Engineer noticed that a Citrix Virtual Apps and Desktops environment lost connection to the SQL servers where the Citrix databases are running. Due to this, the Site has become unmanaged and first-time users CANNOT connect to their Citrix Virtual Apps and Desktops resources.
The setup was recently upgraded from Citrix Virtual Apps and Desktops 7.11 to Citrix Virtual Apps and Desktops 7.15 CU4.
What should the engineer do to minimize the impact of the SQL outage?
A. Enable Connection Leasing.
B. Enable IntelliCache.
C. Enable Local Host Cache.
D. Configure Citrix Database Cache.
Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking.
Which two steps can the engineer take to minimize attacks without interfering with user productivity? (Choose two.)
A. Disable access to specific browsers.
B. Disable all the user plugins.
C. Implement HTTP Strict Transport Security (HSTS).
D. Use HTTP response headers to send security policies to endpoint browsers.
Which file is used to store a subscription on the Storefront server?
A. PersistentDictionary.edb
B. Web.config
C. Subscription.txt
D. Style.csv
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps environment. The engineer has recently noticed two single-threaded applications consistently consuming 25% of the CPU resources, causing substantial performance issues for users of these servers. The engineer has deployed Workspace Environment Management (WEM) within the infrastructure and enabled CPU Spikes Protection.
What else can the engineer enable within WEM to address this issue?
A. Exclude Specified Processes and add the two problem applications
B. Process Affinity and add the two problem applications
C. CPU Clamping and set it to 10% for the two problem applications
D. Limit Sample Time and set it to 10% for the two problem applications
Scenario: A Citrix Engineer created four application layers with different applications at different time stamps as shown below:
App Layer A – Microsoft Office Professional – 15/08/2019, 14:28 App Layer B – Adobe Acrobat Reader and Cisco Webex – 14/07/2019, 11:45 App Layer C – Active Directory Users and Computers, Citrix Studio – 20/08/2019, 16:10 App Layer D – Google Chrome and GoToMeeting – 27/07/2019, 10:35
Which layer would hold the highest priority in this scenario?
A. App Layer A
B. App Layer D
C. App Layer B
D. App Layer C
How can a Citrix Engineer use Session-Based Computing/Hosted Virtual Desktop (SBC/HVD) Tuning to optimize a user's desktop?
A. Control user permissions to external drives.
B. Intelligently modify CPU resource allocation.
C. Modify settings that improve the user experience.
D. Enable Single Sign-on to the virtual desktop.
Which three pre-requisites should a Citrix Engineer take into consideration when configuring Smart Card authentication in the Citrix Virtual Apps and Desktops environment? (Choose three.)
A. Install the vendor's Smart Card middleware on the virtual or physical machines running the Virtual Delivery Agent (VDA) that provide user's desktops and applications.
B. Enable pass-through with Smart Card authentication to ensure Smart Card readers type, middleware type and configuration, and middleware PIN caching policy permit this.
C. Enable a two-way trust relationship with the StoreFront server and the domain.
D. Ensure that the public-key infrastructure (PKI) is configured appropriately.
E. Ensure that Domain Passthrough authentication for the Store is on the StoreFront server.
Which command can a Citrix Engineer use to get information about a Citrix Virtual Apps and Desktops setup?
A. Get-BrokerSite
B. Get-BrokerController
C. Get-BrokerDesktop
D. Get-BrokerSession
What does a Citrix Engineer need to know when adding a new StoreFront server, in terms of StoreFront scalability?
A. StoreFront server groups containing a combination of operating systems are supported.
B. All servers in a server group must reside in the same location.
C. All servers in a server group can reside in multiple locations.
D. StoreFront server groups containing a combination of StoreFront versions are supported.
Which statement is true regarding Citrix Workspace Environment Management (WEM) Agent?
A. WEM Agent synchronizes with the WEM Infrastructure Service on port TCP 8287.
B. WEM Agent can be installed on the Citrix Workspace Environment Management Infrastructure Services server.
C. WEM Agent can be installed on either a Windows Desktop OS or on a Windows Server OS.
D. Norskale Agent Host Service manages WEM Agent and it runs under Network Service.
Which two components are hosted in Citrix Cloud when using Workspace Environment Management (WEM) service? (Choose two.)
A. Microsoft SQL Server database
B. Active Directory Infrastructure
C. WEM Infrastructure Service
D. All machines with WEM Agent installed
How often should a Citrix Engineer backup the Citrix database, based on Citrix recommendations?
A. After changes are made to the environment
B. Daily
C. Weekly
D. Before any change to the environment
Which two FlexCast Management Architecture (FMA) services will have an additional connection to a secondary database apart from having a connection with the Site database? (Choose two.)
A. Citrix Configuration service
B. Configuration Logging service
C. Monitoring service
D. Broker service
Which tool can a Citrix Engineer use as a first step in reviewing issues with Virtual Delivery Agent (VDA) session launch status?
A. Citrix Diagnostic Facility (CDF) control utility
B. Citrix XDPING utility
C. Citrix Health Assistant
D. Citrix Policy Reporter tool
Which three statements are true about building multiple Elastic Layers? (Choose three.)
A. There is no limit on how many Elastic Layers can be built as long as there is adequate SMB storage space and network bandwidth.
B. They are usually built to perform the majority of the application layer workload for users.
C. They appear identical to other application layers from a user perspective
D. They greatly reduce the number of golden images required to be managed by Citrix App Layering.
E. They are primarily for applications with compatibility issues for specific users or groups.