Exam : 1Y0-309. Citrix Access Gateway 8.0 Enterprise Edition: Administration. Title : Version : DEMO



Similar documents
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Scenario: IPsec Remote-Access VPN Configuration

Set Up a VM-Series Firewall on the Citrix SDX Server

ExamPDF. Higher Quality,Better service!

The safer, easier way to help you pass any IT exams. Exam : 1Y Designing, Deploying and Managing Citrix XenMobile Solutions.

Scenario: Remote-Access VPN Configuration

Chapter 6 Virtual Private Networking Using SSL Connections

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

How To Configure SSL VPN in Cyberoam

icrosoft TMG Replacement with NetScaler

Network Configuration Settings

Deploying NetScaler Gateway in ICA Proxy Mode

Securing Networks with PIX and ASA

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

WHITE PAPER Citrix Secure Gateway Startup Guide

Citrix Access on SonicWALL SSL VPN

To Configure Network Connect, We need to follow the steps below:

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Network Load Balancing

DIGIPASS Authentication for Cisco ASA 5500 Series

Deployment Guide for Microsoft Lync 2010

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Citrix Access Gateway Plug-in for Windows User Guide

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Deployment Guide ICA Proxy for XenApp

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Connecting an Android to a FortiGate with SSL VPN

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

SSL VPN Portal Options

Virtual Data Centre. User Guide

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

Dell SonicWALL SRA 7.5 Citrix Access

TechNote. Configuring SonicOS for MS Windows Azure

NEFSIS DEDICATED SERVER

App Orchestration 2.5

Citrix Receiver for Mobile Devices Troubleshooting Guide

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Firewall Defaults and Some Basic Rules

Introduction to Mobile Access Gateway Installation

VMware vcloud Air Networking Guide

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Citrix NetScaler Load Balancer Configuration

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

The steps will take about 4 hours to fully execute, with only about 60 minutes of user intervention. Each of the steps is discussed below.

vcloud Director User's Guide

Barracuda Link Balancer

Clientless SSL VPN Users

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

Deploying F5 with Microsoft Active Directory Federation Services

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

App Orchestration 2.0

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

HOWTO: How to configure IPSEC gateway (office) to gateway

Configuring Global Protect SSL VPN with a user-defined port

NETASQ MIGRATING FROM V8 TO V9

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

User-ID Best Practices

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Barracuda Link Balancer Administrator s Guide

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Understanding Slow Start

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

SSL-VPN 200 Getting Started Guide

Cisco SA 500 Series Security Appliance

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Improving Microsoft Exchange 2013 performance with NetScaler Hands-on Lab Exercise Guide. Johnathan Campos

Load balancing Microsoft IAG

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Using SonicWALL NetExtender to Access FTP Servers

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Deployment Guide for Citrix XenDesktop

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

How To Configure Apple ipad for Cyberoam L2TP

Configuration Guide BES12. Version 12.2

LDAP Authentication and Authorization

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Load Balancing VMware Horizon View. Deployment Guide

Transcription:

Exam : 1Y0-309 Title : Citrix Access Gateway 8.0 Enterprise Edition: Administration Version : DEMO 1 / 8

1. When accessing an intranet site through Access Gateway 8.0 Enterprise Edition, which mechanism will load with a list of pre-configured resource IP addresses and port numbers? A. JavaScript B. Java Client C. ActiveX Plug-in D. Presentation Server Client 2. Scenario: A Network Administrator needs to configure access to published resources in a farm for Presentation Server, through Access Gateway. The administrator has been instructed to implement Access Gateway as a replacement for the current Secure Gateway deployment without SmartAccess. Which three settings does the administrator need to implement to meet these requirements? (Choose three.) A. Set NT Domain B. Set ICA Proxy to ON C. Configure split tunneling D. Configure the Secure Ticket Authority server E. Set the Access Gateway home page to the Web Interface URL DE 3. Which option in the Configuration Utility allows an administrator to limit the number of users who can log in to an Access Gateway 8.0 Enterprise Edition environment? A. Select SSL VPN > Virtual Servers, Maximum Users B. Select Systems > Virtual Servers > Policies, Maximum Users C. Select SSL VPN > Global > Authentication settings, Maximum number of users D. Select Systems > Connections > Authentication settings, Maximum number of users Answer: C 4. Which policy must an administrator configure to ensure that every user device has personal firewall software installed and running before they connect to the network? A. Traffic 2 / 8

B. Session C. Authorization D. Authentication 5. Scenario: A company currently has Secure Gateway in its environment. The company has been undergoing major expansions, and the number of employees has grown by 60% over the past three years. Recently, the company acquired a new company and is planning on integrating that company into its environment. Because of the growing number of employees, more servers and rack space are being consumed to support the growing user traffic. Which Access Gateway 8.0 Enterprise Edition deployment type would meet the needs of this environment? A. Access Gateway in VPN mode B. Access Gateway in Web Interface mode C. Access Gateway in Secure Gateway mode D. Access Gateway in Presentation Server mode Answer: C 6. An administrator is configuring remote access to applications through the VPN for specific users. All of the applications require a unique source IP address to access back-end resources. Which type of IP address should the administrator assign to these applications in order to ensure that they are accessible to the users? A. MIP B. SNIP C. NSIP D. Intranet Answer: D 7. Scenario: A consultant is in charge of a new Access Gateway 8.0 Enterprise Edition deployment at a large customer site. The customer gave the consultant the following information and IP addresses to use when configuring the Access Gateway 8.0 Enterprise Edition appliance: Internal Citrix Presentation Server 4.0 IP address: 192.168.100.12Time Zone to be used: Eastern Standard Time (EST) IP addresses to use when configuring the Access Gateway 8.0 Enterprise Edition deployment NSIP: 10.165.30.45 MIP: 10.165.30.60 VIP: 12.15.30.62 3 / 8

Which two configuration options could be configured on the Access Gateway 8.0 Enterprise Edition appliance in order to communicate with the Citrix Presentation Server? (Choose two.) A. Subnet IP in the 192.168.100.x subnet B. Intranet IP in the 192.168.100.x subnet C. Static Route to the 192.168.100.x subnet D. Virtual Server in the 192.168.100.x subnet Answer: AC 8. When creating the server certificate for an Access Gateway 8.0 Enterprise Edition virtual server in ICA Proxy mode, the Common Name (CN) should match that of the FQDN of the. (Choose the correct option to complete the sentence.) A. VPN virtual server B. Presentation Server C. Web Interface server D. Secure Ticket Authority server Answer: A 9. Scenario: An administrator wants users to be able to access back-end resources running on file servers and application servers in an environment. The administrator has Access Gateway 8.0 Enterprise Edition deployed, and the Secure Access client is used to establish VPN tunnels to the corporate network. There are no intranet applications configured in this environment, and split tunneling is turned off. Which two statements are true regarding why users in this environment will be able to access applications on file and application servers? (Choose two.) A. Users will be able to access file and application servers as long as they can authenticate through the VPN. B. Users will be able to access file and application servers because the back-end resources have been assigned specific intranet IP addresses. C. Users will be able to access file and application servers because the back-end resources in this environment have been configured as published applications. D. Users will be able to access file and application servers as long as an authorization policy is configured to allow them access to resources on the file and application servers. Answer: AD 10. Scenario: An administrator needs to configure Access Gateway in order to replace the current Secure Gateway implementation in an environment. The administrator decides to configure the 4 / 8

initial IP settings through a command line interface. Which command should the administrator use to configure the mapped IP address for this environment? A. add ns ip <mappedip> <IPSubnet> -type ip B. add ns ip <mappedip> <SubnetIP> -type snip C. add ns ip <mappedip> <mappedipsubnet> -type nsip D. add ns ip <mappedip> <mappedipsubnet> -type mip Answer: D 11. Which three pieces of information are logged by the Access Gateway 8.0 Enterprise Edition appliance in its audit logs? (Choose three.) A. Individual user's HTTP request, TCP connection and UDP flow statistics B. Individual user's ICMP flow statistics and Authorization failure log records C. Individual group's Login/Logout statistics and Authentication failure log records D. Individual user's Login/Logout, Group membership and Authentication failure log records E. System status events (for example: device up/down) and Configuration events log records Answer: ADE 12. An administrator created a new VPN virtual server without binding any session policies to it. What is the default authorization action for users logging in to this VPN virtual server? A. DENY. This is the default behavior. B. ALLOW. This is the default behavior. C. DENY. No session policy is bound to the virtual server. D. ALLOW. No session policy is bound to the virtual server. 13. Scenario: An administrator configuring authorization rules wants to simplify the process by leveraging Access Gateway 8.0 Enterprise Edition. The administrator wants to extract groups to which a user belongs to, as part of the authentication process from the external authentication servers in the environment. Which two external authentication servers can be leveraged when configuring authorization for users in an Access Gateway 8.0 Enterprise Edition deployment? (Choose two.) A. NT4 5 / 8

B. LDAP C. RADIUS D. TACACS C 14. Scenario: A consultant is in charge of a new Access Gateway 8.0 Enterprise Edition deployment at a large customer site. The customer requires that the time zone on the appliance be set to Eastern Standard Time (EST). Which statement is true about the time zone on the Access Gateway 8.0 Enterprise Edition appliance? A. The time zone setting updates automatically. B. The time zone setting on the appliance can be changed using the nsconfig utility. C. The time zone configured on the appliance is inherited automatically by any policies set on the appliance. D. The time zone of the appliance must match the time zone of the Web Interface server, if the virtual server is in ICAProxy mode. 15. An administrator needs to configure Access Gateway 8.0 Enterprise Edition to send the Access Gateway IP address tothe RADIUS server as part of the RADIUS protocol. Which RADIUS parameter should the administrator configure onthe Access Gateway 8.0 Enterprise Edition appliance to meet this requirement? A. Server Identifier B. Server Loop Back IP Address C. Network Access Server (NAS) Identifier D. Network Access Server (NAS) IP Address Answer: D 16. Scenario: Dual authentication is configured on the Access Gateway 8.0 Enterprise Edition appliance. The appropriategroup extraction configuration is configured on both the primary and secondary authentication servers, and a VPN user named "jdoe" exists on both authentication servers. How will groups be extracted for VPN user "jdoe"? A. The groups to be extracted will be chosen by the administrator. 6 / 8

B. Only the groups in the secondary authentication server will be extracted and matched to the group names configuredon the primary authentication server. C. Only the groups from the primary authentication server will be extracted and matched to the group names configured on the secondary authentication server. D. The applicable groups from both the primary and secondary authentication servers will be extracted and matched tothe group names configured on the appliance. Answer: D 17. Scenario: For security reasons, the administrator wants to automatically delete, without prompting users, the VPN users' browser cache, cookies and history (because it might have sensitive intranet corporate data) when users log off theaccess Gateway 8.0 Enterprise Edition VPN. Where can the administrator configure this so that ALL VPN users benefit from this setting? Click the Exhibit button to view a screenshot of the Configuration Utility. A. Select SSL VPN > SSL VPN global settings > Client Experience > Client Cleanup Prompt then Advanced > General tab B. Select SSL VPN > SSL VPN global settings > Client Experience > Client Cleanup Prompt then Advanced > ClientOptions tab C. Select SSL VPN > SSL VPN global settings > Client Experience > Client Cleanup Prompt then Advanced > ClientCleanup tab D. Select SSL VPN > SSL VPN global settings > Client Experience > Client Cleanup Prompt then Security Settings > Advanced > Client Security tab Answer: C 18. Which Access Gateway 8.0 Enterprise Edition policy would an administrator use to configure split tunneling? A. Traffic B. Session C. Authorization D. Authentication 7 / 8

19. Which command should an administrator use when setting up the network configurations on an individual appliancethat will be used in a HA pair? A. config t B. config ag C. config ns D. config BSD Answer: C 20. Which feature or option must be configured when split tunneling is set to "ON"? A.Bookmark B.Intranet application C.Authorization policy D.Authentication policy Which feature or option must be configured when split tunneling is set to "ON"? A. Bookmark B. Intranet application C. Authorization policy D. Authentication policy 8 / 8

This document was created with Win2PDF available at http://www.win2pdf.com. The unregistered version of Win2PDF is for evaluation or non-commercial use only. This page will not be added after purchasing Win2PDF.