Citrix Application Firewall 8.0: Administration Exam



Similar documents
IndusGuard Web Application Firewall Test Drive User Registration

Set Up a VM-Series Firewall on the Citrix SDX Server

Ignify ecommerce. Item Requirements Notes

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

Exam : 1Y Citrix Access Gateway 8.0 Enterprise Edition: Administration. Title : Version : DEMO

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

ExamPDF. Higher Quality,Better service!

Citrix XenApp and XenDesktop 7.6 FIPS Sample Deployments

Deploying the BIG-IP LTM with Microsoft Skype for Business

10 Configuring Packet Filtering and Routing Rules

SonicWALL NAT Load Balancing

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Deployment Guide for Microsoft Lync 2010

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

SonicOS Enhanced 4.0: NAT Load Balancing

Load Balancing SIP Quick Reference Guide v1.3.1

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Step by Step: vcenter Syslog Collector installation

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

Deploying BIG-IP LTM with Microsoft Lync Server 2010 and 2013

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing

Citrix Access on SonicWALL SSL VPN

Networking and High Availability

Citrix NetScaler Load Balancer Configuration

CNS-200-1I Basic Administration for Citrix NetScaler 9.0

Basic & Advanced Administration for Citrix NetScaler 9.2

How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.

WHITE PAPER Citrix Secure Gateway Startup Guide

How to set up Outlook Anywhere on your home system

Background. Industry: Challenges: Solution: Benefits: APV SERIES CASE STUDY Fuel Card Web Portal

Dell SonicWALL SRA 7.5 Citrix Access

F-Secure Messaging Security Gateway. Deployment Guide

Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.

Using Vasco IDENTIKEY Server with NetScaler

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Deployment Guide for Citrix XenDesktop

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Installing and configuring Microsoft Reporting Services

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Cisco EXAM Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product.

The safer, easier way to help you pass any IT exams. Exam : Implementing an Advanced Server Infrastructure. Title : 1 / 4

Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios

StruxureWare Power Monitoring 7.0. Side By Side Upgrade Guide For Distributed Systems

ENTERPRISE DATA CENTER CSS HARDWARE LOAD BALANCING POLICY

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

INTRODUCTION TO FIREWALL SECURITY

Designing and Developing Web Applications by using the Microsoft.NET Framework

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

WildFire Cloud File Analysis

Building a Systems Infrastructure to Support e- Business

Inspection of Encrypted HTTPS Traffic

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Click Studios. Passwordstate. High Availability Installation Instructions

How To Configure SSL VPN in Cyberoam

7.0 Self Service Guide

Features of a comprehensive application security solution

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

How To Plan A Desktop Workspace Infrastructure

Networking and High Availability

DMZ Network Visibility with Wireshark June 15, 2010

How To Manage A Netscaler On A Pc Or Mac Or Mac With A Net Scaler On An Ipad Or Ipad With A Goslade On A Ggoslode On A Laptop Or Ipa On A Network With

EXAM - VCP510-DT. VMware Certified Professional 5 - Desktop. Buy Full Product.

BASIC CLASSWEB.LINK INSTALLATION MANUAL

Click Studios. Passwordstate. High Availability Installation Instructions

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

The Hillstone and Trend Micro Joint Solution

Brocade Virtual Traffic Manager and Microsoft Skype for Business 2015 Deployment Guide

Dell One Identity Cloud Access Manager How to Configure for High Availability

Voice Over IP and Firewalls

Get Success in Passing Your Certification Exam at first attempt!

SysAid Remote Discovery Tool

Introduction to Cyber Security / Information Security

Mediasite EX server deployment guide

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

FortiWeb 5.0, Web Application Firewall Course #251

Deployment Guide for Microsoft SharePoint 2010

Network Access Security. Lesson 10

Internet Redundancy How To. Version 8.0.0

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Application Control and URL Filtering

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Transcription:

Exam : 1Y0-700 Title : Citrix Application Firewall 8.0: Administration Exam Version : DEMO 1 / 7

1. An administrator is considering adding an Application Firewall deployment to an environment that contains two network firewalls, a public network and a private network. Where should the administrator place the Application Firewall? A. In the DMZ B. Behind the private network C. In front of the public network D. In front of the two network firewalls Answer:A 2. The positive security model as applied in the Application Firewall can protect against and attacks. (Choose the two options that best complete the sentence.) A. worms B. viruses C. zero day D. layer 3 network E. application layer Answer:CE 3. Scenario: A banking company has decided to deploy an Application Firewall in their network environment, which already has two third-party load balancers. The Application Firewall deployment will be used to inspect approximately 400 Mb/sec of traffic. How should an administrator deploy the system in this environment? A. As a module on a NetScaler appliance B. As a standalone Application Firewall appliance C. As a module on a NetScaler High Availability pair D. As a cluster of standalone Application Firewall appliances Answer:D 4. Scenario: A busy web application (400 Mb/sec) for an ecommerce company includes pictures of items for sale that are displayed to shoppers with text descriptions, an input field to accept customer reviews, a 2 / 7

shopping cart and an encrypted billing page for credit cards. Many more customers browse than buy. An administrator needs to create profiles for this web application on the Application Firewall. How many profiles should an administrator configure for this web application for security with maximum performance? A. One, an advanced profile for the reviews and billing pages B. Two, a basic profile for the reviews page and an advanced profile for the billing page C. Three, a basic profile for browsing and separate advanced profiles for the reviews and the billing pages D. Four, separate basic profiles for the images and text, and separate advanced profiles for the reviews and the billing pages Answer:B 5. An administrator is deploying a standalone Application Firewall in the network environment depicted in the exhibit. Click the Exhibit button to view the network diagram. What should the VIP address range be for the Application Firewall in this environment? 3 / 7

A. 1.1.100.0/24 B. 10.3.19.0/24 C. 172.16.1.0/24 D. 10.3.19.100/124 Answer:C 6. Scenario: The manufacturing department of a global biomedical company uses a web application to access manufacturing ratios and QA testing results from external plants that manufacture the biomedical devices. All the information for all the plants is stored in a data warehouse based on a Microsoft SQL server and accessed from the web application by running reports. Users receive instructions through a popup and then select the specific data for a report through a series of dynamically-generated drop-down menus populated from the Microsoft SQL database. Because the company is global, the web application also has language options that the user can select for the report to be delivered in. 4 / 7

Which part of the application can access sensitive data in this scenario? A. The popup B. The language options C. The resultant URL for a report D. The drop-down menus for the report details Answer:D 7. Scenario: A media corporation has a website where viewers can read articles on current topics and stream videos of daily newscasts. The streaming videos are provided by IPTV, a streaming media application utilizing UDP. The company decides to add an Application Firewall to their network deployment to protect their site from hackers. To determine how many devices are necessary, the administrator must determine which traffic requires protection. Which content data type(s) does the Application Firewall need to inspect in this environment? A. Text/html B. Images and text/html C. UDP packets and text D. Text/html, UDP packets and images Answer:A 8. The positive security model works with Application Firewall by. (Choose a phrase to complete this statement correctly.) A. protecting web servers based on learning B. protecting web servers based on signatures C. only allowing traffic that matches approved patterns D. allowing traffic that does not match blocked patterns Answer:C 9. Scenario: A banking company is planning on deploying an Application Firewall in their network environment. The company will need to use SSL, plans on using Advanced profiles, and requires redundancy in their network. The web servers never serve more than 300 Mb/sec of traffic. How should 5 / 7

an administrator deploy the Application Firewall in this environment? A. As a standalone appliance B. As a module on a NetScaler C. As a cluster of standalone appliances D. As a module on a NetScaler High Availability pair Answer:D 10. An administrator is deploying a standalone Application Firewall in the network environment depicted in the exhibit. Click the Exhibit button to view the network diagram. What should the NSIP address of the Application Firewall be in this environment? A. 10.3.19.0 B. 172.16.1.1 6 / 7

C. 172.16.1.2 D. 10.3.19.254 Answer:C 7 / 7