Exam : 1Y0-306. Citrix Access Gateway 4.2 with Advanced Access Control:Admin. Title : Version : DEMO



Similar documents
App Orchestration 2.5

Exam Name: Citrix Password Manager 4.0 Administration

How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.

App Orchestration 2.0

Deploying RSA ClearTrust with the FirePass controller

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

WHITE PAPER Citrix Secure Gateway Startup Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

TS:MS SQL Server 2005 Business Intelligence-Implem & Mainte

Click Studios. Passwordstate. Installation Instructions

Pearl Echo Installation Checklist

NSi Mobile Installation Guide. Version 6.2

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Configuring Sponsor Authentication

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Citrix Access Gateway Plug-in for Windows User Guide

Exam : 1Y Citrix Access Gateway 8.0 Enterprise Edition: Administration. Title : Version : DEMO

VMware Identity Manager Administration

VMware Identity Manager Administration

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

NETASQ ACTIVE DIRECTORY INTEGRATION

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Deploying NetScaler Gateway in ICA Proxy Mode

Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server.

Websense Support Webinar: Questions and Answers

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Defender Token Deployment System Quick Start Guide

External Authentication with Citrix Access Gateway Advanced Edition

Configuring User Identification via Active Directory

Installation Overview

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

XenDesktop 5 with Access Gateway

Network Configuration Settings

How To - Implement Single Sign On Authentication with Active Directory

Siteminder Integration Guide

RSA SecurID Ready Implementation Guide

1. Installation Overview

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

DualShield Authentication Platform

Deployment Guide ICA Proxy for XenApp

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

Citrix Receiver for Mobile Devices Troubleshooting Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Multi-factor Authentication using Radius

Security Provider Integration RADIUS Server

PDFDumps. PDFDumps can solve all your IT exam problems and broaden your knowledge

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

IIS, FTP Server and Windows

Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop

2X ApplicationServer & LoadBalancer Manual

XIA Configuration Server

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

System Administration Training Guide. S100 Installation and Site Management

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Integrating LANGuardian with Active Directory

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Managing Identities and Admin Access

How to Logon with Domain Credentials to a Server in a Workgroup

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Enabling single sign-on for Cognos 8/10 with Active Directory

Using LDAP Authentication in a PowerCenter Domain

Configuring Load Balancing

Remote Application Server Version 14. Last updated:

JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者

McAfee Cloud Identity Manager

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

ECA IIS Instructions. January 2005

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Application Note 02 Advanced SMTP setup

Remote Application Server Version 14. Last updated:

Agent Configuration Guide

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions

Click Studios. Passwordstate. Installation Instructions

2X Cloud Portal v10.5

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

RSA Authentication Manager 7.1 Basic Exercises

icrosoft TMG Replacement with NetScaler

Configuring Global Protect SSL VPN with a user-defined port

Implementing a SAS Metadata Server Configuration for Use with SAS Enterprise Guide

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

Transcription:

Exam : 1Y0-306 Title : Citrix Access Gateway 4.2 with Advanced Access Control:Admin Version : DEMO 1 / 6

1.Where does an administrator configure the conditions that users must meet to be able to see the logon page? A.In a filter B.In a policy C.In logon point properties D.In the properties of an endpoint analysis scan 2.Which two clients can be used to access published applications on Citrix Presentation Servers? (Choose two.) A.Web Client B.Client for Java C.Live Edit Client D.Secure Access Client E.Endpoint Analysis Client Correct:A B 3.Scenario: An administrator wants to make documents from a defined file share open from a Citrix Presentation Server session. Which policy setting should be enabled for this purpose? A.Live Edit B.Download C.HTML Preview D.File type association 4.Scenario: An administrator gives a user the URL https://accounting1.net/citrixlogonpoint/accountaccess to access a logon page. "Accounting1.net" is the FQDN of the Advanced Access Control server hosting the logon point and "AccountAccess" is the name of the logon point. From the URL given to the user, which access method will be used to obtain resources from the access server farm? A.Default logon point B.Secure Web Client C.Browser-only access D.Secure Access Client 5.Along with Active Directory, which other two authentications could be implemented in order to provide Advanced Authentication? (Choose two.) A.Smart Cards B.LDAP authentication C.RSA Security SecurID D.Secure Computing SafeWord PremierAccess D 6.Which two tools are used to configure RADIUS authorization for an Advanced Access Control implementation in a Windows domain? (Choose two.) A.The Access Suite Console B.The Server Configuration Wizard C.The Access Gateway Administrator's Tool 2 / 6

D.The remote access policy in Microsoft Internet Authentication Service Correct:A D 7.When is the "Authentication Credentials" option used in the deployment of a logon point? A.When RSA SecurID will be used along with the logon point B.When the logon point is used to connect devices that are not secure C.When a RADIUS or LDAP profile will be used along with the logon point D.When the logon point is used by devices to access resources from a secure network over a connection that is not secure 8.When a logon point is renamed just after it is deployed,. (Fill in the blank with a listed option.) A.it can no longer be used B.it must be redeployed using the update function in the Access Suite Console C.the Advanced Access Control setup CD must be used to redeploy the updated logon D.it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources 9.An administrator is creating logon points and needs to configure the session settings. What is true about the configuration of session settings for logon points? A.Session time-out is set by default to 30 minutes. B.Domain prompting is used to determine whether the domain is available for access. C.Secure Access Client (VPN) time-out should always be longer than session time-out. D.Published application usage through the web browser may require an increase in VPN client time-out. 10.An administrator needs to make a change to the default logon point settings for an Advanced Access Control implementation. Where can the administrator locate the default logon point? A.In the IIS Manager Console B.In the Access Suite Console C.In the Access Gateway Administration Tool D.In the Access Gateway Administration Portal Correct:B 11.An administrator configuring advanced authentication decides to use an index database with Global Catalog in order to improve the speed of LDAP queries. The administrator is instructed to use Microsoft port number 3268. What should the administrator do in the "LDAP Profile Configuration" to implement this configuration? (Click on the exhibit button to display the screen shot.) 3 / 6

A.Type "3268" in the "Port" field and deselect "Use SSL". B.Type "3268" in the "Port" field and leave "Use SSL" selected. C.Type "3268" in the "Port" field and in the name field for the "Administrator Bind DN" and the "Base Bind DN". D.Type "3268" in the "Port" field and type ":3268" after the IP address in the "LDAP Server Name or IP Address" field. Correct:A 12.How can an administrator control whether users are allowed or denied logon privileges through policies? A.Include the Allow Logon property in the access filter B.Include the Allow Logon property in the access policy C.Include the Allow Logon Resource in the access filter D.Include the Allow Logon Resource in the access policy 13.Which type of filter should an administrator create, if a filter that specifies a particular NOT logic condition must exist in order for access to be granted? A.Typical Filter B.Custom Filter C.Negative Filter D.Exclusion Filter 4 / 6

Correct:B 14.In the Access Suite Console, which steps must an administrator take to create an access policy that controls access to all visible servers and services in the network? A.Select "Network Resources" and choose "Entire Network." B.Select the farm node and disable network policy enforcement. C.Select the Access Policies node in the console tree and add all visible servers and services to the access policy. D.Select the appropriate domain from the domain list and choose to make the access policy the default authentication for that domain. Correct:A 15.What are two required steps for creating a typical filter that would require users to logon using a specific URL and their client devices to be running a specific anti-virus software? (Choose two.) A.Choose to filter based on logon points B.Run the Create Filter Wizard from the logon point C.Choose to filter based on endpoint analysis scan results D.Combine logon points and endpoint analysis results with the OR logical operator Correct:A C 16.What is the name of the policy setting that can be applied to a network resource? A.Access B.Download C.File Type Association D.Network Authentication Correct:A 17.Scenario: You are in the process of deploying Advanced Access Control in your company's IT environment. The corporate IT policy requires that all users have access to the company's employee portal website, but only the sales team has access to their web-based CRM application. Which configurations best meet the requirements of the described environment? A.Create a single web resource and add the URL for both the employee portal and the CRM application. Create a single access policy and grant only the sale team access to the CRM application. B.Create two separate web resources; one for the employee portal and one for the CRM application. Create a single access policy and deny all non-sales team employees access to the CRM application. C.Create two separate web resources; one for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Add a filter to the CRM policy that denies all non-sales team employees access. D.Create two separate web resources; once for the employee portal and one for the CRM application. Create two separate policies; include the employee portal in one and include the CRM application in the second. Grant everyone access to the employee portal policy and only the sales team access to the CRM application policy. 18.Which connection setting should be enabled during a connection policy configuration to ensure automatic drive mapping on client devices using a Windows logon script? A.Select file shares B.Execute logon scripts C.Execute automatic drive mapping 5 / 6

D.Enable pass-through authentication Correct:B 19.Which two steps must be taken when creating a typical filter? (Choose two.) A.Construct a logical expression B.Select an authentication profile C.Provide a unique name for the filter D.Select endpoint analysis scan output E.Choose at least one condition to be included in the filter F.Enter SSL client certificate requirements will be used to filter access E 20.Which two settings(action controls) should be enabled to allow users to open and edit documents on servers using published resources in server farms running Presentation Server? (Choose two.) A.Access B.Live Edit C.Download D.File Type Association Correct:A D 6 / 6