Multiple Choice Flashcards

1
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
A Citrix Architect is asked to design a cost-efficient environment for the Back Office end-user group. Which FlexCast model should the architect recommend?
A. Host Shared
B. Hosted VDI
C. Streamed VHD
D. Local VM

(Case Study)

A

A. Hosted Shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scenario: The company is considering replacing the WIndows XP computers with new devices as part of the new solution. The new devices should require minimal support and administration, while providing a centrally managed desktop solution.
Which two methods should an architect consider to meet these requirements? (Choose two.)

A. Client OS desktop delivery group accessed from thin-client devices by using Citrix Receiver.
B. Server OS desktop delivery group accessed from thin-client devices by using Citrix Receiver
C. Client OS desktop delivery group accessed from Windows-based physical desktops by using Citrix Receiver
D. Server OS application delivery group accessed from Windows-based physical desktops by using Citrix Receiver

A

A. Client OS desktop delivery group accessed from thin-client devices by using Citrix Receiver.
B. Server OS desktop delivery group accessed from thin-client devices by using Citrix Receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What is the benefit of using Streamed VHD?

A. It leverages local client hardware
B. It provides the greatest level of end-user personalization.
C. It supports a variety of hardware configurations from a single image.
D. It allows remote access to applications.

(Case Study)

A

C. It supports a variety of hardware configurations from a single image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
Only block storage is available on the shared storage of the hypervisor.
How should the architect recommend that Hosted VDI be provisioned to fulfill the virtualization requirements for the call center?

A. By using Machine Creation Services
B. By using Provisioning Services
C. By manually installing the operating system
D. By using cloned VM templates

A

A. By using Machine Creation Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is the database high availability an essential component of a production environment?

A. Because the Delivery Controller is stateless
B. Because server maintenence can be performed online
C. Because it prevents local host cache corruption
D. Because user data loss is prevented if a session is disconnected

A

A. Because the Delivery Controller is stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Why does using Windows Deployment Services and deploying a standard base image to virtual desktops help manage the image versioning process?

A. It enables rapid rollback
B. It automates deployment of current and legacy OS versions.
C. It leverages Hyper-V snapshots
D. It automatically deploys the latest drivers and patches.

(Case Study)

A

C. It leverages Hyper-V snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why does installing Windows applications into an image help manage the image release process?

A. Because it reduces application deployment time
B. Because it standardizes the application deployment process
C. Because it facilitates the use of App-V packages
D. Because it automatically deploys the latest drivers and patches

A

A. Because it reduces application deployment time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and , if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling ‘Active write back’ when configuring group profiles benefit CGE’s Sales end-user group?

A. It improves application performance
B. It simplifies home drive cleanup
C. It minimizes the required storage needed for folder redirection
D. It improves data accuracy in volatile environments

(Case Study)

A

D. It improves data accuracy in volatile environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

A. CDFControl utiliity
B. Citrix EdgeSight console
C. Citrix AppCenter console
D. Group Policy Management console

(Case Study)

A

C. Citrix AppCenter Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.
How should the architect deploy MGMT in a Hosted Shared environment?

A. On Windows Server 2008 R2 with Machine Creation Services
B. On Windows Server 2012 R2 with Machine Creation Services
C. On Windows Server 2008 R2 with Provisioning Services
D. On Windows Server 2012 R2 with Provisioning Services

(Case Study)

A

On Windows Server 2012 R2 With Provisioning Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scenario: CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using L2TP meet CGE’s compliance requirements?

A. It encrypts internal ICA traffic.
B. It encrypts ICA traffic from remote end users.
C. It enables the SSL Relay service.
D. It complies with industry-standard SSL encryption requirements

A

A. It encrypts internal ICA traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as Hosted VDI with SCCM the best solution?

A. It allows the installation of custom applications.
B. It is easy to manage.
C. It meets the high-performance application demands of the Executives/Management end-user group.
D. It allows the Executives/Managment end-user group to share desktops.

(Case Study)

A

D. It allows the Executives/Management end-user group to share desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits of using Streamed VHD?

A. It retains the single image management function
B. It provides a high level of security
C. It has a low storage performance requirement
D. It allows users to install application

A

A. It retains the single image management function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Why does using Provisioning Services with WAIK help manage the image versioning process?

A. It enables rollbacks.
B. It manages version control.
C. It leverages storage array features to offload host processing.
D. It automatically deploys the latest drivers and patches.

(Case Study)

A

B. It manages version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. Whey does using Provisioning Services and enabling vDisk Update Management help manage the image versioning process?

A. It automatically upgrades virtual desktops to the latest OS version.
B. It provides centralized, single-image management with rollback
C. It is compatible with the Microsoft VHD specification.
D. It automatically deploys the latest target device drivers.

(Case Study)

A

C. It is compatible with the Microsoft VHD specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does centralizing volume activation help manage the image release process?

A. Because it reduces licensing administration
B. Because it helps manage version control
C. Because it automates the license download process
D. Because it enables the use of Multiple Activation Keys

A

A. Because it reduces licensing administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Citrix Architect reviewed CGE’s antivirus policy and found that it does NOT comply with the posted Citrix antivirus recommendations. What should the architects recommend b added to CGE’s antivirus policy?

A. Enable scanning of network drives
B. Disable real-time scanning on Citrix XenApp servers.
C. Scan all excluded files during the scheduled periodic scan
D. Exclude the user profile storage location from antivirus scanning

A

C. Scan all excluded files during the scheduled periiodic scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why should memory and network utilization be used to identify bottlenecks?

A. Excessive memory and network utilization will slow the creation of new sessions.
B. Excessive memory and network utilization on the data collector will slow down Web Interface authentication.
C. Excessive memory and network utilization on the data collector will slow down application enumeration.
D. Excessive memory and network utilization on the XenApp server will affect the local host cache.

A

B. Excessive memory and network utilization on the data collector will slow down Web Interface authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Scenario: StoreFront is installed on dedicated servers.  A Citrix Architect needs to supply CGE's corporate IT team with the critical Citrix services to be monitored.  Which two Citrix services on the StoreFront servers should the architect recommend be monitored? (Choose Two)
A. Monitor Service
B. StoreFront Service
C. Peer Resolution Service
D. Credential Wallet Service

(Case Study)

A

C. Peer Resolution Service

D. Credential Wallet Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why should CPU consumption above 85% be used to identify bottlenecks?

A. At least 20% of resources should be available at all times
B. XenServer host CPU utilization above 85% causes excessive content switching
C. XenServer host reserves 20% of all CPU for context switching
D. Running XenCenter will consume 20% of all CPU resources

A

A. At least 20% of resources should be available at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The company needs to define its management process for desktop image releases.

Which tool should the architect recommend for the image management process?

A. Provisioning Services
B. Hypervisor templates and snapshots
C. Windows Deployment Services
D. XenConvert

A

A. Provisioning Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How should the architect specify that the Configuration Logging database be queried?

A. By using the Citrix Director console
B. By using SQL Management Studio
C. By using SQL Reporting Services
D. By using PowerShell

A

B. By using SQL Management Studio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

What are the benefits of using Streamed VHD?

A. The ability to use local client hardware
B. Highest level of user personalization
C. Supports a variety of hardware configurations from a single image
D. Remote access to applications

A

D. Remote access to applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which aspect of the new storage system’s performance requirements is critical to the success of the project and should be determined before any purchase takes place?

A. Whether it supports automatic tiering
B. The number of SSD drives it will hold
C. Whether 8Gb/s Fibre Channel or 10Gb/s Ethernet technology provides more storage bandwidth
D. The number of IOPS it must support to host the required amount of pooled and dedicated virtual desktops

A

A. Whether it supports automatic tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by Client Name, ensure full control over which GPOs are applied?

A. It provides central management and control
B. It ensures that only policies with the correct filter in Active Directory are applied
C. It ensures that only settings located in the root OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

B. It ensures that only policies with the correct filter in Active Directory are applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Scenario: CGE wants to use NetScaler Insight to capture network metrics for connections to the Citrix environment. Specifically, CGE wants to capture internal and external end users connecting to XenDesktop.
Where in the design should a Citrix Architect place NetScalers to capture the required metrics for internal end users without using ICA Proxy?

A. In front of the StoreFront server group
B. In-line beween the clients and the Delivery COntrollers
C. In the network DMZ for NetScaler Gateway connections
D. In-line between the clients and the XenDesktop virtual desktops

A

D. In-line between the clients and the XenDesktop virtual desktops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Scenario: Personnel are being trained using a test XenDesktop site. They must be restricted to accessing this site only while on company premises.
Which StoreFront configuration should the architect recommend?

A. Enable the Domain pass-through authentication method on the store.
B. Disable the Pass-through from NetScaler authentication method on the store
C. Configure the StoreFront servers with a separate store for this site, NOT enabled for remote access.
D. Install a certificate issued by the internal Windows Certificate Services server on the StoreFront servers.

A

C. Configure the StoreFront servers with a separate store for this site, NOT enabled for remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why does using SQL Reporting Services help the company comply with its security policy?

A. Because it is a centralized, industry-standard log that is easily queried
B. Because it password-protects the audit logs for added security
C. Because it uses a standard TCP port
D. Because it collects logs from multiple devices

A

D. Because it collects logs from multiple devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Scenario: CGE’s security officer states that , for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using SSL meet CGE’s compliance requirements?
A. It eliminates the need to distribute an internal root certificate
B. It encrypts end-to-end traffic from remote end users
C. It enable s the SSL relay service
D. It encrypts network traffic between XenDesktop, StoreFront, and NetScaler

A

D. It encrypts network traffic between XenDesktop, StoreFront, and NetScaler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why does using a shared VLAN with a Provisioning Services server in both the primary and secondary datacenters help segment streaming traffic?

A. It separates disk and end-user data traffic
B. It enables disk data traffic to be encrypted with IPsec
C. It allows the necessary TCP offload settings to be configured on the streaming NIC
D. It provides multiple IP addresses that can be dedicated to streaming traffic

A

C. It allows the necessary TCP offload settings to be configured on the streaming NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers and Microsoft SQL Servers for Databases.
Why is creating a resource pool comprising a maximum of 32 XenServer hosts, using a virtual disk storage repository for XenMotion and high availability, and replicating and performing backups for the meta information the best design solution?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes
B. It ensures simple setup with a built-in failover design
C. It allows virtual workloads to fail over to a failover site for disaster recovery purposes
D. It optimizes performance and provides centralized management

(Case Study)

A

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
How should the architect use Provisioning Services to design a release management scheme that facilitates rollbacks?

A. By enabling vDisk Update Management
B. By using vDisk versions
C. By using snapshots
D. By using the Windows Utomatic Install Kit

(Case Study)

A

B. By using vDisk versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling ‘Offline profile support’ when configuring group profiles benefit CGE’s Sales end-user group?

A. It allows faster logons and logoffs.
B. It minimizes the required storage needed for folder redirection.
C. It simplifies home drive cleanup
D. It improves data accuracy in volatile environments

(Case Study)

A

A. It allows faster logons and logoffs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Why would having one farm with three configured sites, with one Provisioning Services server in each datacenter, meet the requirements of a regional, single image management strategy with minimal WAN traffic across datacenters?

A. It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability within each region
B. It ensures that Provisioning Services targets will NOT load balance across regions, and reduces management overhead.
C. It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability between regions
D. It ensures Provisioning Services targets will NOT load b alance acreoss regions, guarantees high availability within each region, and reduces management overhead

(Case Study)

A

A. It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability within each region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Scenario: A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency. How should the architect configure the storage on the DFS namespace server for fault tolerance and high performance?

A. By implementing RAID 0
B. By implementing RAID 1
C. By implementing high-speed local storage with deduplication
D. By implementing RAID 10

(Case Study)

A

B. By implementing RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Why does using PowerShell help manage the image release process?

A. Because it can script automatic upgrades of the deployment template
B. Because it provides centralized, automated single image management
C. Because it facilitates consistent deployment of base images
D. Because PowerShell scripts can be executed from the same network share as the deployment template

A

C. Because it facilitates consistent deployment of base images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is separation workloads by roles, creating a resource pool comprising of a maximum of 32 XenServer hosts, and implementing multiple store repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery the best design solution?

A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.
B. It provides workload flexibility to more efficiently leverage available resources within a storage pool, and facilitates expansion options. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

(Case Study)

A

D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Contractors need a consistent environment to perform quality assurance testing of applications.

Which two types of solutions should the architect recommend? (Choose two)

A. Random server OS machines
B. Pooled desktop OS machines
C. Dedicated desktop OS machines
D. Pooled desktop OS machines with Personal vDisk

A

A. Random server OS machines

B. Pooled desktop OS machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling ‘Profile streaming’ when configuring Citrix Profile management without folder redirection benefit CGE’s Sales end-user group?

A. It allows faster logons
B. It simplifies home drive cleanup
C. It minimizes the required storage needed for folder redirection
D. It improves application performance

(Case Study)

A

D. It improves application performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Scenario: An architect is designing a NetScaler solution that implements GSLB. The solution must provide StoreFront access through a single URL worldwide and maintain a hightly available configuration globally as well as locally.
How many StoreFront servers are recommended to implement this configuration?

A. Six, one site for each store
B. Six, two in each datacenter
C. Three, one in each datacenter
D. Four, two in the primary and two in the backup datacenter

A

B. Six, two in each datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Why would the architect choose active-active bonding when configuring network interfaces for storage networks?

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.
B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load
C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond
D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond

(Case Study)

A

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which two business drivers are critical for the Contractors user group? (Choose two. )

A. Printing security
B. Secure remote access
C. Granular security policies
D. Support for mobile devices

A

B. Secure remote access

C. Granular security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
What are the benefits of using Hosted VDI with Provisioning Services?

A. Highest user density and lowest cost
B. Highest level of user personalization
C. Rapid provisioning and highest user density
D. Lowest cost and highest application compatibility

A

C. Rapid provisioning and highest user density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as Hosted VDI Static the best solution?

A. It allows the installation of custom applications
B. It is easy to manage
C. It meets the high-perfomance application demands of the Executives/Management end-user group.
D. It allows the Executives/Management end-user group to share desktops

(Case Study)

A

D. It allows the Executives/Managemtent end-user group to share desktops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which tool should the architect use in preparation for migration to WIndows Server 2012 to determine application compatibility and suitability for virtualization?

A. AppDNA
B. App-V Sequencer
C. EdgeSight for End Points
D. Windows Upgrade Advisor

A

A. AppDNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Which design recommendation should the architect make when designing the new Active Directory structure?

A. Create one OU as a root for the new environment and move Citrix policies from Citrix Studio to a GPO
B. Create one OU for each region and use a set of Group Policies for each regional OU.
C. Create one OU for each region and only use Citrix policies
D. Create on OU as a root for the new environment and enable loopback processing.

A

D. Create on OU as a root for the new environment and enable loopback processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Why does using SQL Reporting Services help the company comply with its security policy?

A. Because it enables automated report delivery
B. Because it enables PDF-based reports
C. Because it uses a standard TCP port
D. Because it provides security alerts by using SQL Mail

A

A. Because it enables automated report delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is separating workloads by roles, creating a resource pool comprising a maximum of 16 XenServer hosts, and implementing multiple storage repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery purposes the best design solution?

A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicting situations. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

(Case Study)

A

A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Why should the network utilization rising above 50% be used to identify bottlenecks?

A. This indicates insufficient bandwidth for virtual machines delivered by Provisioning Services
B. This indicates a saturated network segment
C. This indicates a failed network switch
D. This indicates an incorrectly configured router

A

B. This indicates a saturated network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the benefits of using a hosted shared environment?

A. It retains the single image management function while allowing users to install applications
B. It provides a high level of security while allowing user customization
C. It has a low storage performance requirement and high user density
D. It delivers low-cost and high application compatibility

A

C. It has a low storage performance requirement and high user density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How should the architect design the optimal write cache storage?

A. By implementing RAID 5 on XenServer local storage
B. By implementing RAID 10 on XenServer shared storage
C. By implementing RAID 3 on a NAS device
D. By implementing RAID 6 on a server hosting the CIFS share

A

B. By implementing RAID 10 on XenServer shared storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT in a Remote PC environment on Windows 8 with Provisioning Services the best solution?

A. It offers a faster change process
B. End users are already comfortable working in a shared environment
C. It prevents XenApp server crashes
D. It enables faster rollbacks

(Case Study)

A

C. It prevents XenApp server crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the benefits of using Streamed VHD?

A. It retains the single image management function while allowing users to install applications
B. It provides a high level of security while allowing user customization
C. It has a low storage performance requirement and high user density
D. It delivers low-cost and high application compatibility

A

B. It provides a high level of security while allowing user customization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will b e connected to a 10 Gbps network.

How should the architect implement a highly available Provisioning Services server on dedicated VLANS?

A. By installing multiple NICs in one Provisioning Services server in each datacenter
B. By deploying one Provisioning Services server in the primary and one in the secondary datacenter
C. By deploying two Provisioning Services servers in each datacenter
D. By using NetScaler with GSLB to load balance the Provisioning Services servers in each datacenter

A

C. By deploying two Provisioning Services servers in each datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Why does using Provisioning Services and leveraging vDisk versions help manage the image versioning process?

A. It automatically upgrades virtual desktops to the latest OS version
B. It provides centralized, single-image management with rollback
C. It is compatible with the Microsoft VHD specification
D. It automatically deploys the latest drivers and patches

(Case Study)

A

A. It automatically upgrades virtual desktops to the latest OS version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How should the architect configure high availability (HA) on a NAS device share so that Provisioning Services has constant access to Provisioning Services images?

A. By using storage replication between multiple NAS devices
B. By using Distributed File Services Replication (DFSR) between multiple NAS devices
C. By using DNS Round Robin
D. By using XenServer with HA enabled

(Case Study)

A

D. By using XenServer with HA enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Why is configuring regional shared storage locations on a CIFS server using DNS Round Robin the best design choice for vDisk storage?

A. It is the least expensive solution
B. It is a highly scalable and resilient solution
C. It creates the least amount of administrative overhead
D. It reduces the system footprint

(Case Study)

A

C. It creates the least amount of administrative overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How can the architect identify if the server OS machines are the source of a bottleneck?

A. Identify excessive CPU and memory consumption
B. Identify excessive memory and network utilization
C. Identify excessive disk and network I/O
D. Identify excessive disk I/O and page file utilization

A

D. Identify excessive disk I/O and page file utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which three user groups require remote access? (Choose three)

A. IT
B. Call Center
C. Human Resources
D. Emergency Response Team
E. Nurses, Imaging and Radiology
A

A. IT

C. Human Resources
D. Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is creating a resource pool comprising a maximum of eight XenServer hosts, backing up virtual workloads on a daily basis, and using third-party backups for the desktops the best design solution?

A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates easier management and expansion capabilities.
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

(Case Study)

A

B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How should a Local VM environment be implemented to allow user-installed application?

A. By adding users to the local administrators group
B. By using Personal vDisk
C. By giving users access to the Synchronizer console
D. By providing access to the network share that contains the App-V packages

A

A. By adding users to the local administrators group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Why does using StoreFront logs help the company comply with its security policy?

A. Because they are centralized, industry-standard logs that are easily queried
B. Because they use password-protection for added security
C. Because they contain detailed records of user authentication activity
D. Because they collect data from multiple devices

A

C. Because they contain detailed records of user authentication activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Scenario: CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.
Which solution could reduce the read IPS requirements on a shared storage array?

A. IntelliCache
B. Personal vDisk
C. Provisioning Services
D. Machine Creation Services

(Case Study)

A

C. Provisioning Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What should the architect recommend for designing the PvD storage for scalability?

A. XenServer local storage
B. XenServer shared storage
C. CIFS share
D. ShareFile StorageZones

A

B. XenServer shared storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Why does persistent cache enable the Radiology group to maintain their changes?

A. Because it is maintained across restarts
B. Because it is backed up
C. Because it is stored in the cloud
D. Because it is encrypted with EFS

A

A. Because it is maintained across restarts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is separating the workloads by roles to reflect the OU structure of Active Directroy, creating a resource pool comprising a maximum of 24 XenServerhosts, and implementing a storage repository for virtual disks, XenMotion, high availability, and disaster recovery backups the best design solution?

A. It ensures the logical separation of infrastrucutre and virtual desktop workloads, and facilitates managemtnt and expansion capabilities
B. It provides workload flexibility to more efficiently leverage available resources with in a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

(Case Study)

A

D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process of version control that includes thorough testing prior to production.
Why does using Windows Deployment Services and centralizing the volume-activation process help manage the image versioning process?

A. It reduces licensing administration
B. It helps manage version control
C. It automates the license download process
D. It enables the use of Multiple Activation Keys (MAKs)

(Case Study).

A

D. It enables the use of Multiple Activation Keys (MAKs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
How can Citrix Profile Management be configured to allow Sales end-user group profiles to be standardized with the rest of CGE?

A. Enable ‘Active write back’
B. Enable file and folder exclusions
C. Enable ‘Offline profile support’
D. Enable ‘Profile streaming’

(Case Study).

A

C. Enable ‘Offline profile support’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
Individual users in the Radiology group want to install a variety of third-party tools to analyze the images they use.   They also need to be able to analyze a centrally stored image database that they access remotely.
Which XenDesktop (FlexCast) model should the architect recommend to achieve this goal?

A. Hosted shared
B. Hosted VDI
C. Streamed VHD
D. Local VM

A

B. Hosted VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Scenario: Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. THe CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3 ad and adaptive load balancing.
How should the architect configure XenServer?

A. Using active-active bonding
B. Using active-passive bonding
C. Using XenServer MPIO redundancy
D. Using LACP bonding

(Case Study)

A

D. Using LACP bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Scenario: A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency. Why does implementing RAID 1 satisfy the requirements?

A. It provides striping
B. It provides the highest performance
C. It provides fault tolerance
D. It provides minimal disk usage

(Case Study)

A

C. It provides fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.
What are the benefits of using a Hosted VDI FlexCast model with personal vDisks?

A. It retains the single-image management function while allowing end users to install applications
B. It provides a high level of security while allowing end-user customization
C. It has low storage performance requirements and high end-user density
D. It retains the single-image management function and reduces application compatibility issues

A

D. It retains the single-image management function and reduces application compatibility issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is creating resource pools comprising of 24 XenServer hosts, using a virtual disk storage repository to provide XenMotion and high availability, and performing daily backups of infrastructure workloads the best design solution?

A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates easier management and expansion capabilities
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and fail-over capabilities
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime

(Case Study)

A

D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which endpoint devices must be replaced to support the Streamed VHD method of desktop delivery

A. Windows 7
B. Windows XP
C. Linux thin clients
D. PCs running Internet Explorer 7

A

C. Linux thin clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OU’s across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would Implementing one Citrix policy for each region ensure full control over which Group Policies are applied?

A. It provides central management and control.
B. It ensures that only settings with the correct filtering in Active Directory are applied.
C. It ensures that only settings located in the root Citrix OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

C. It ensures that only settings located in the root Citrix OU are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Scenario:
A Citrix Architect is designing a multi-server Provisioning Sewices solution for CGE. The solution must be highly available and minimize the risk of vDlsk inconsistency.
What should the architect recommend?

A. Configure a separate local vDisk store on each Provisioning Services server and a dally robocopy script across the two stores.
B. Configure a separate local vDlsk store on each Provisioning Services server and configure the two stores in a DFS-R group.
C. Configure a vDlsk store on a CIFS share on a NAS for each Provisioning Services server
D. Create the Provisioning Services vDlsk store on a configured, single DFS namespace.

A

B. Configure a separate local vDlsk store on each Provisioning Services server and configure the two stores in a DFS-R group.
C. Configure a vDlsk store on a CIFS share on a NAS for each Provisioning Services server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OU’s across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing with replace at the root level ensure full control over which Group Policies are applied?

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.
B. It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.
C. It ensures that only Citrix policies are applied below the root level when end users log on.
D. It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies

A

C. It ensures that only Citrix policies are applied below the root level when end users log on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

The company plans to reduce their storage requirement by using thin provisioning with XenServer hosts. Which storage option should the architect verify for capability in the current environment?

A. NFS
B. CIFS
C. iSCSI
D. Fibre Channel

A

A. NFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What are the benefits of using SSL to meet the company’s compliance requirements?

A. It consumes lower CPU resources than other encryption technologies
B. It is supported on industry-standard devices
C. It is required to enable the SSL Relay service
D. It enables two-factor authentication

A

B. It is supported on industry-standard devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured With the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design?

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
B. It provides redundancy, while optimizing external WAN traffc.
C. It segments the Gateway and load-balancing features of the NetScaler appliances.
D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

A

C. It segments the Gateway and load-balancing features of the NetScaler appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
How should the architect design the image management process using Provisioning Services?

A,. Deploy two Provisioning Services servers in each datacenter, install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and include the Virtual Delivery Agent (VDA) and the target device software.
B. Deploy two Provisioning Services servers in each datacenter, Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and install the target device software and Citrix Receiver.
C. Deploy one Provisioning Services server in each datacenter, install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and convert the Virtual machine image to a template.
D. Deploy one Provisioning Services server in each datacenter, install a new Windows mage utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and copy the virtual machine image using Fast Clone.

(Case Study)

A

C. Deploy one Provisioning Services server in each datacenter, install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and convert the Virtual machine image to a template.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as a VM hosted app on Windows 7 x86 with Machine Creation Services the best solution?

A. It supports 16-bit applications.
B. It meets the high-performance application demands of the Executives/Management end-user group.
C. It allows the installation of custom applications.
D. It offers faster change and rollback procedures.

(Case Study)

A

C. It allows the installation of custom applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Scenario:
CGE is experiencing numerous Issues with Its existing profile management solution. The Citrix Architect managing the project IS tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity.
Why does enabling file and folder exclusions when configuring group profiles benefit CGE’s Sales end-user group?

A. It minimizes the required storage needed for folder redirection.
B. It simplifies home drive cleanup.
C. It improves application performance.
D. It allows faster logons and logoffs.

(Case study)

A

A. It minimizes the required storage needed for folder redirection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

After careful review of the end users and applications in CGE’s environment, a Citrix Architect has chosen several different FlexCast models for application and desktop
delivery.
What are two reasons why the architect would recommend ‘VDI: pooled with PvD’ as an appropriate delivery model for the Desktop - Research application? (Choose two.)

A. It allows the end users to install custom software.
B. It gives the end users full rights over the system drive.
C. It requires less storage space than dedicated desktops.
D. It allows for high availability in a disaster recovery scenario.

A

A. It allows the end users to install custom software.

C. It requires less storage space than dedicated desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Why would having one farm with three configured sites, with two Provisioning Services servers in the primary datacenter, two in the secondary datacenter, and one in the remaining datacenter, meet the requirements of a regional single-image management strategy with minimal WAN traffic across datacenters?

A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region.
B. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability between regions.
C. It ensures that Provisioning Servicws targets will NOT load balance between hosts, and guarantees high availability between regions.
D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region.

(Case Study)

A

D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Scenario:
CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcocess. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
How should the architect deploy MGMT using Remote PC?

A. On Windows 7 With Machine Creation Services
B. On Windows 8 With Machine Creation Services
C. On Windows 7 With Provisioning Services
D. On Windows 8 With Provisioning Services

A

C. On Windows 7 With Provisioning Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which component should a Citrix Architect recommend to centrally audit any failed logon attempts to NetScaler Gateway? A Citrix Architect is asked to design a new
external access architecture for CGE

A. Citrix Studio
B. Citrix Director
C. Citrix Command Center
D. Citrix NetScaler AppFlow

A

C. Citrix Command Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which tool should a Citrix Architect use to document CGE’s existing printer models?

A. Print Migrator
B. Stress Printer
C. Print Detective
D. Print Management

(Case Study)

A

C. Print Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted Shared servers and manually installing the operating system?

A. It provides the highest end-user density at the lowest cost.
B. It provides the greatest level of end-user personalization and control.
C. It offers the lowest storage performance requirement and the highest end-user density.
D. It offers the lowest cost and the greatest application compatibility.

(Case study)

A

B. It provides the greatest level of end-user personalization and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What are the benefits of using a Hosted VDI environment with statically assigned virtual desktops?

A. It retains the single image management function while allowing users to install applications
B. It provides a high level of security while allowing user customization
C. It has a low storage performance requirement and high user density
D. It allows users to Install application and access desktops remotely

A

D. It allows users to Install application and access desktops remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Scenario:
CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
How can Citrix Profile management without folder redirection be configured for Sales end-user group profiles?

A. Enable Profile streaming.
B. Enable ‘Offine profile support’.
C. Enable ‘Active write back’
D. Enable file and folder exclusions.

(Case Study)

A

A. Enable Profile streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which action would improve the end-user experience for Technicians and Engineers?

A. Apply a Citrix policy to enable lossless graphics
B. Apply a Citrix policy to disable Queuing and Tossing
C. Apply a Citrix policy to enable Desktop Composition Redirection
D. Apply a Citrix policy to limit graphics quality based on available bandwidth

(Case Study)

A

D. Apply a Citrix policy to limit graphics quality based on available bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which file should a Citrix Administrator edit to configure log settings on the StoreFront server?

A. web.config
B. global.aspx
C. logout.aspx
D. default.html

A

A. web.config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Why does using Windows Event Viewer help the company comply with its security policy?

A. Because it is a centralized, industry-standard log that is easily queried
B. Because it password-protects the audit logs for added security
C. Because It uses a standard TCP port
D. Because it collects logs from multiple devices

A

A. Because it is a centralized, industry-standard log that is easily queried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

An architect recommends full SSL VPN connections for remote users.
Which type of NetScaler license should be applied for these users?

A. User
B. Device
C. Platform
D. Universal

A

D. Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is creating a resource pool comprising a maximum of 16 XenServer hosts, using a shared storage repository to provide XenMotion and high availability, and replicating meta information to the disaster recovery site the best design solution?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes.
B. It ensures Simple setup with a built-in failover design.
C. It allows virtual workloads to fall over to a failover site for disaster recovery purposes.
D. It optimizes performance and provides centralized management.

(Case Study)

A

C. It allows virtual workloads to fall over to a failover site for disaster recovery purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted Shared servers with Machine Creation Services, when only block storage is available on the shared storage of the Hypervisor?

A. It provides the highest end-user density at the lowest cost.
B. It provides the greatest level of end-user personalization and control.
C. It offers the lowest storage performance requirement and the highest end-user density.
D. It offers the lowest cost and the greatest application compatibility.

A

A. It provides the highest end-user density at the lowest cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A Citrix Administrator is unable to create desktop OS machines using Machine Creation Services. What is a possible cause of the issue?

A. Citrix Director is unreachable
B. DHCP IS NOT working correctly
C. The Machine Identity Service IS NOT running
D. Antivirus software on the Delivery Controller IS blocking the creation

A

C. The Machine Identity Service IS NOT running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Why does using PowerShell help the company comply with its security policy?

A. Because PowerShell has a commandlet for running queries from Citrix Director
B. Because it enables automated report delivery
C. Because it enables PDF-based reports
D. Because it collects logs from multiple devices

A

A. Because PowerShell has a commandlet for running queries from Citrix Director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which risk could lead to a lengthy farm outage in the event of a corrupt SQL data store?

A. SQL server backups are encrypted
B. An untested SQL backup and restoration process
C. SQL servers that are NOT running on the same service packs
D. The use of SQL Mirroring instead of SQL AlwaysOn Availability Groups

(Case Study)

A

B. An untested SQL backup and restoration process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

How should the architect implement database protection in Access?

A. By making copes of the .MDB file
B. By hosting the .MDB file on a network share
C. By enabling Volume Shadow Copy
D. By taking hypervisor snapshots of the VM running Access

A

C. By enabling Volume Shadow Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network.
How does using a dedicated VLAN help the company secure streaming traffic?

A. Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter.
B. Dedicated VLANs enable streaming traffic to be encrypted With IPsec_
C. Dedicated VLANs allow the necessary TCP offoad settings to be configured on the streaming NIC.
D. Dedicated VLANs provide multiple IP addresses that can be dedicated to streaming traffc_

A

A. Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

An architect is assessing the existing backup strategy and recommending changes to suit the new virtual desktop environment.
Which two critical components should the architect recommend for nightly backup, as they cannot be easily recreated in the event of a disaster? (Choose two.)
A. User’s Personal vDlsks
B. Pooled desktop master mage
C. Servers hosting StoreFront roles
D. Servers hosting Delivery Controller roles
E. SQL Server hosting the XenDesktop database

A

A. User’s Personal vDlsks

E. SQL Server hosting the XenDesktop database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Why would having three farms, each with one configured site, and one Provisioning Services server in each farm, meet the requirements of a regional, single-image management strategy with minimal WAN traffic across datacenters?

A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region.
B. It ensures a reduced control layer, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability between regions.
C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.
D. It ensures a reduced control layer, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability within each region.

(Case Study)

A

C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q
Which two manually performed tasks can be streamlined by implementing a Citrix environment? (Choose two.) 
A.  Database backup 
B.  Application patching 
C.  Security assessment 
D.  Certificate management 
E.  Operating system Installation
A

B. Application patching

E. Operating system Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Scenario:
CGE decided to vitualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
How should the architect design the image management process using Windows Deployment Services?

A. Prepare an existing machine as the master image.
B. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and run SysPrep on the
virtual machine.
C. Use a XenServer virtual machine to install a new Windows image with MAK prepared as the master image, and ensure the image has two network cards.
D. Run the Capture Image Wizard on an existing machine.

(Case Study)

A

B. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and run SysPrep on the
virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
How should the architect implement loopback processing to ensure full control over the Group Policies that are applied?

A. Configure loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents.
B. Configure loopback processing with merge on a GPO linked to all OUs containing Virtual Desktop Agents.
C. Configure loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers.
D. Configure loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers.

A

A. Configure loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is using a maximum of 24 XenServer hosts, using a virtual disk storage repository for XenMotion and high availability, and daily backups of the infrastructure workloads the best design for the resource pools?

A. It ensures the logical separation of infrastructure and virtual desktop workloads to prevent interference, and facilitates management and expansion capabilities.
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, dally backups
create minimal downtime for critical workloads.
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and fail-over capabilities.
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

(Case Study)

A

B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, dally backups
create minimal downtime for critical workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

How should the architect configure the NetScaler virtual servers on the four appliances?

A. Create one NetScaler virtual server for each appliance, and on each appliance bind a session policy to the NetScaler virtual server configured in ICA Proxy mode using the StoreFront server.
B. Create one NetScaler virtual server for each appliance and on each appliance bind a redirection policy to the NetScaler virtual server configured in ICA redirection mode using the StoreFront server.
C. Create two NetScaler virtual servers for each appliance, and bind a redirection policy to them that is configured in ICA Redirection mode using the StoreFront server.
D. Create four NetScaler virtual servers for each appliance, and bind a session policy to them that is configured In ICA Redirection mode using the StoreFront server.

(Case Study)

A

A. Create one NetScaler virtual server for each appliance, and on each appliance bind a session policy to the NetScaler virtual server configured in ICA Proxy mode using the StoreFront server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Why is configuring regional shared storage locations on a CIFS server using Distributed File Services the best design choice for vDisk storage?

A. It is the least expensive solution.
B. It is a highly scalable and resilient solution.
C. It creates the least amount of administrative overhead.
D. It reduces the system footprint.

(Case Study)

A

A. It is the least expensive solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Scenario:
CGE decided to virtualize Its Infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What is the benefit of using the Local VM FlexCast model?

A. It is compatible with tablet devices.
B. It offers the greatest level of end-user personalization.
C. It supports a variety of hardware configurations from a single image.
D. It allows remote access to applications.

(Case Study)

A

D. It allows remote access to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Scenario:
CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT in a Hosted Shared environment on Windows Server 2012 R2 with Provisioning Sewices the best solution?

A. It offers a faster change process.
B. End users are already comfortable working in a shared environment.
C. It prevents XenApp server crashes.
D. It enables faster rollbacks.

(Case Study)

A

A. It offers a faster change process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Why does deploying a base image from an XVA file help manage the image release process?

A. Because it supports hypervisors supported by XenDesktop
B. Because it helps manage version control
C. Because it uses storage array features to offload host processing
D. Because It automatically deploys the latest drivers and patches

A

B. Because it helps manage version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by IP address, ensure full control over which GPOs are applied?

A. It provides central management and control.
B. It ensures that only policies With the correct filter in Active Directory are applied.
C. It ensures that only settings located In the root OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

C. It ensures that only settings located In the root OU are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which action should an architect avoid recommending when designing a monitoring solution?

A. Installing vendor-supplied tools to monitor physical hardware
B. Installing Command Center to monitor NetScaler appliances
C. Installing agents onto NetScaler appliances to monitor utilization
D. Installing Citrix Director to monitor the XenDesktop environment

A

C. Installing agents onto NetScaler appliances to monitor utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Why should disk I/O and page file utilization be used to identify’ bottlenecks?

A. Excessive disk I/O and page file utilization will slow the creation of new sessions.
B. Excessive disk I/O and page file utilization on the data collector Will slow down Web Interface authentication.
C. Excessive disk I/O and page file utilization on the data collector Will slow down application enumeration.
D. Excessive disk I/O and page file utilization on the XenApp server Will affect the local host cache.

A

D. Excessive disk I/O and page file utilization on the XenApp server Will affect the local host cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Why should memory and network utilization be used to identify bottlenecks?

A. High memory and network utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load.
B. High memory and network utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDlsks
C. High memory and network utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual
desktop users.
D. High memory and network utilization of the Delivery Controller can indicate the presence of a virus or malware.

A

A. High memory and network utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production.
Why does using Machine Creation Services facilitate image management?

A. It reduces image deployment time.
B. It reduces the storage requirement for images.
C. It allows for testing updates prior to updating the production machine catalog.
D. It allows for testing updates prior to updating the production Delivery Group.

(Case Study)

A

D. It allows for testing updates prior to updating the production Delivery Group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

The Radiology group requires that changes on the virtual desktops be retained.
Which configuration should the architect specify for the XenDesktop infrastructure?

A. Provisioning Services with cache on server persistent
B. Provisioning Services with cache on server
C. Provisioning Services with Personal vDisk (PvD)
D. Provisioning Services with standard image mode

A

C. Provisioning Services with Personal vDisk (PvD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront
servers, License Servers, and Microsoft SQL Servers for databases.
Why is creating a resource pool comprising a maximum of 32 XenServer hosts, using a virtual disk shared storage repository to provide XenMotion and high availability, and
performing replication and backups of meta information the best design solution?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a disaster recovery process that leverages a backup solution.
B. It ensures Simple setup with redundancy and meets the requirement of separating the OS types.
C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery.
D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability.

(Case Study)

A

B. It ensures Simple setup with redundancy and meets the requirement of separating the OS types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

The company’s security compliance policy requires that remote access is logged for auditing purposes.
Which data sources should be captured?

A. NetScaler logs, StoreFront logs
and Citrix Director database

B. Configuration Logging database, NetScaler logs, and Citrix Director database

C. StoreFront logs, System Event logs, and firewall logs

D. Configuration Logging database, firewall logs, and Application Event log

A

A. NetScaler logs, StoreFront logs

and Citrix Director database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Why would the architect choose active-passive bonding when configuring network interfaces for storage networks?

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
Interfaces in the bond.
B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
C. It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond.
D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

(Case Study)

A

B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q
Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.) 
A.  Remote PC Access 
B.  Hosted Shared 
C.  Streamed VHD 
D.  On-Demand Apps 
E.  Hosted VDI: Static Persistent
A

A. Remote PC Access

E. Hosted VDI: Static Persistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server binded to a redirection policy, the best
remote access design7

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
B. It provides redundancy, wh le optimizing external WAN traffc_
C. It segments the Gateway and load-balancing features of the NetScaler appliances.
D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

A

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcu:ess_ The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as Hosted VDI Random the best solution?

A. It allows the installation of custom applications.
B. It is easy to manage.
C. It meets the high-performance application demands of the Executives/Management end-user group.
D. It allows the Executives/Management end-user group to share desktops.

A

C. It meets the high-performance application demands of the Executives/Management end-user group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

The company is implementing XenDesktop globally for desktop virtualization.
What is the minimum number of Delivery Controllers that an architect should recommend for high availability?

A. Two
B. Four
C. Six
D. Nine

A

A. Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Why is deploying two NetScaler appliances in each regional datacenter, with one in the internal network for Gateway traffic and the other in the DMZ for load balancing, the
best design solution?

A. It provides intrasite redundancy in case of appliance failures.
B. It provides redundancy in case of site failures, while optimizing external WAN traffic_
C. It protects against WAN failures and connects end users to their home datacenter.
D. It allows for the expected expansion of remote access usage and provides functionality for future needs.

(Case Study)

A

B. It provides redundancy in case of site failures, while optimizing external WAN traffic_

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Why should disk and network I/O be used to identify’ bottlenecks?

A. Excessive disk and network I/O will slow the creation of new sessions.
B. Excessive disk and network I/O on the data collector will slow down Web Interface authentication.
C. Excessive disk and network I/O on the data collector will slow down application enumeration.
D. Excessive disk and network I/O on the XenApp server will affect the local host cache.

A

C. Excessive disk and network I/O on the data collector will slow down application enumeration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Why would the architect choose LACP bonding when configuring bonded network interfaces for guest VM networks?

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
Interfaces in the bond.
B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.
D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

(Case Study)

A

B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

How should the architect implement database high availability in SQL Server?

A. By using SQL Server Mirroring
B. By using SQL Server replication
C. By Implementing SQL Server log shipping
D. By using hypervisor high availability

A

A. By using SQL Server Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What are the benefits of using a Hosted VDI environment With Citrix Profile Management?

It retains the single image management function while allowing users to install applications
It provides a high level of security while allowing user customization
It has a low storage performance requirement and high user density
It delivers low-cost and high application compatibility

A

It retains the single image management function while allowing users to install applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Why does using the IIS Manager console help the company comply with its security policy?

Because it enables you to view IIS logs to extract data
Because it enables you to configure StoreFront
Because it uses a standard TCP port
Because it is a Microsoft Management Console snap-in

A

Because it enables you to view IIS logs to extract data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured With GSl_a, the best design solution?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffc_
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSI_ VPN functionality for future needs.

A

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What are the benefits of using SecurelCA to meet the company’s compliance requirements?

It encrypts internal ICA traffic
It encrypts ICA traffic from remote users
It is required to enable the SSI_ Relay semce
It complies with industry-standard SSI_ encryption requirements

A

It encrypts ICA traffic from remote users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

An architect is explaining options for profile management.
What is one issue that the architect must address in the current environment?

Folder redirection is implemented
Roaming users have local profiles
Startup scripts are used In the environment
PositivelyFinance does NOT work With roaming profiles

A

PositivelyFinance does NOT work With roaming profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

Two StoreFront servers in a single StoreFront server group.
Two NetScalers In a high availability pair, With load balancing pointing to a single StoreFront server _
Three NetScalers In a cluster, With load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.
Two NetScalers In a high availability par, With load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Case Study

A

Two NetScalers In a high availability pair, With load balancing pointing to a single StoreFront server _

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Scenario:
A Citrix Architect is asked to design a new external access architecture for CGE_ The regional datacenters have NetScaler appliances delivering load-balancing semces_
Security policy mandates that these internal appliances CANNOT connect to the DMZ.
Why is the configuration of a callback URL needed7

It authenticates end users to Active Directory.
It allows for pass-through authentication to StoreFront_
It validates the SSI_ certificate on the client device.
It allows for STA communication to the NetScaler_

A

It authenticates end users to Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcu:ess_ The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as a published application on Windows Server 2012 R2 With Provisioning Sewices the best solution?

It offers a faster change process.
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

It offers a faster change process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Why is creating six NetScaler virtual servers in HA pairs, configured With the subnets of the three sites and binded to redirection policies, the best design solution?

It provides intraslte redundancy in case of appliance failures, while enhancing performance through an active/active configuration.
It provides redundancy In case of site failures, while optimizing external WAN traffc_
It protects against WAN failures and connects end users to their home datacenter.
It allows for the expected expansion of remote access usage and provides functionality for future needs.

Case Study

A

It allows for the expected expansion of remote access usage and provides functionality for future needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Scenario:
A Citrix Architect is designing a multi-server Provisioning Semces solution for CGE_ The solution must be highly available and minimize the risk ofvDlsk inconsistency.
Why does implementing RAID 10 satisfy’ the requirements?

It provides striping and the highest performance.
It minimizes d sk space and provides the highest performance.
It minimizes disk space and provides fault tolerance.
It provides fault tolerance and the highest performance.

Case Study

A

It provides fault tolerance and the highest performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Scenario:
CGE needs to define its management prcu:ess for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production _
Why does using Provisioning Semces and leveraging snapshots help manage the image versioning process?

It enables rollbacks.
It manages version control.
It leverages storage array features to offoad host processing.
It automatically deploys the latest drivers and patches.

Case Study

A

It automatically deploys the latest drivers and patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Scenario:
CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect IS tasked with deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
How should the architect deploy MGMT in a Hosted VDI environment?

As Hosted VDI Static Persistent
As Hosted VDI Static
As Hosted VDI Random
Hosted VDI with SCCM

Case Study

A

Hosted VDI with SCCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Scenario:
A Citrix Architect is asked to design a new external access architecture for CGE_ The regional datacenters have NetScaler appliances delivering load-balancing sewices_
Security policy mandates that these internal appliances CANNOT connect to the DMZ.
Which configuration should the architect recommend for the new external access architecture?

One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure_cge_com_
Configure the NetScaler Gateway within StoreFront With the SNIP of each NetScaler device.
A high availability par of NetScalers located In all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.
A high availability par of NetScalers located In all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) Site.
One NetScaler located In all three regional datacenters. A Single public DNS server record should be configured, Including all three NetScaler pars.

A

A high availability par of NetScalers located In all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) Site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Scenario:
CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that
alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal
complexity.
Why does enabling ‘Active write back’ when configuring Citrix Profile management to allow standardization of profiles benefit CGE’s Sales end-user group?

It improves application performance.
It simplifies home drive cleanup.
It minimizes the required storage needed for folder redirection.
It improves data accuracy in volatile environments

Case Study

A

It improves data accuracy in volatile environments _

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Why would the architect choose LACP bonding when configuring network interfaces for storage networks?

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
interfaces in the bond.
It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
It uses a hashing algorithm, which provides better distribution of traffic across the interfaces In the bond.
It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

Case Study

A

It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
What are the benefits of using hosted shared servers and manually installing the operating system?

Highest user density and lowest cost
Highest level of user personalization
Lowest storage performance requirement and highest user density
Lowest cost and highest application compatibility

A

Highest user density and lowest cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
What are the benefits of using Hosted VD by using cloned VM templates?

Highest user density and lowest cost
Highest level of user personalization
Lowest storage performance requirement and highest user density
Rapid provisioning

A

Rapid provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
How should the resource pools be designed to host the infrastructure workloads and virtual desktops to ensure high availability?
A. Resource pools comprising a maximum of eight XenServer hosts should be created for the virtual solution. The virtual disks of the infrastructure workloads should be backed up dally, and third-party backup solutions should be implemented for the desktops.
B. Resource pools comprising a maximum of 24 XenServer hosts should be created for the virtual solution. The virtual disks of the Infrastructure workloads should be on a storage repository to provide XenMotion and high availability capabilities. The virtual disks of the infrastructure workloads should be backed up dally.
C. Resource pools comprising a maximum of 16 XenServer hosts should be created for the virtual solution. The virtual disks of all workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Virtual machine meta information and data should be replicated to the failover Site by the new storage solution.
D. Resource pools comprising a maximum of 32 XenServer hosts should be created for the virtual solution. The virtual disks of the Infrastructure workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Virtual machine meta information and data should be replicated and backed up_

Case Study

A

C. Resource pools comprising a maximum of 16 XenServer hosts should be created for the virtual solution. The virtual disks of all workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Virtual machine meta information and data should be replicated to the failover Site by the new storage solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Semces servers will be connected
toa 10 Gbps network.
How does using NetScaler App Firewall help the company secure streaming traffic?

NetScaler App Firewall detects network-based threats at the application layer.
NetScaler App Firewall enables streaming traffic to be encrypted With IPsec_
NetScaler App Firewall removes the need for Access Control Lists on switches.
NetScaler App Firewall enables Isolation of streaming traffic from other VLANs_

A

NetScaler App Firewall enables Isolation of streaming traffic from other VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Scenario: HR staff have a requirement to print confidential Information to USB-attached printers in their offces_ Any printer model may be used for this purpose.
Wh ch two recommended options should the architect consider for this solution? (Choose two.)

Configuring Client printer names’
Configuring ‘Auto-create client printers’
Configuring ‘Universal print driver usage’
Enabling ‘Automatic installation of in-box printer drivers’

A

Configuring ‘Auto-create client printers’

Configuring ‘Universal print driver usage’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Why is configuring regional shared storage locations on a CIFS server using XenServer with HA enabled the best design choice for vDlsk storage?

It is the least expensive solution.
It is a highly scalable and resilient solution.
It creates the least amount of administrative overhead.
It reduces the system footprint.

Case Study

A

It reduces the system footprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

The company’s HDX policies must apply to a pooled virtual desktop environment without affecting any virtual applications. How should an architect apply the HDX policies?

By using a SmartAccess filter
By using a client name policy filter
By using a delivery group type policy filter
By giving the virtual desktop policy a higher priority than the virtual application policy

A

By using a delivery group type policy filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

How should the architect deploy the NetScaler appliances to increase site resiliency?

Configure Global Server Load Balancing (GSLB) for end-user connectivity.
Configure a Gateway vServer_
Configure a backup vServer_
Configure failover sites within the NetScaler Gateway.

Case Study

A

Configure failover sites within the NetScaler Gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Scenario: Legacy GPO policies should NOT be applied to users in the new environment. New GPOs should be configured to ensure maximum performance across all virtual applications and desktops.
Which two actions should the architect recommend to meet these requirements? (Choose two.)

Enable loopback processing in Merge mode.
Enable loopback processing In Replace mode.
Apply the policy to the OUS containing the user accounts.
Apply the policy to the domain root With a WMI filter excluding the Windows XP OS type.
Apply the policy to the domain root With a deny ACL on the OU containing legacy machines.
Apply the policy to the OUS containing the desktop OS machines’ and server OS machines’ computer accounts.

A

Enable loopback processing In Replace mode.

Apply the policy to the OUS containing the desktop OS machines’ and server OS machines’ computer accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production _
Why does using Windows Deployment Semces and installing Windows applications into an image help manage the image versioning process?

It reduces application deployment time.
It standardizes the application deployment process.
It facilitates the use of App-V packages.
It automatically deploys the latest drivers and patches

Case Study

A

It standardizes the application deployment process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Some management staff print large documents over WAN connections.
What must the architect consider to optimize printing to a local printer from laptops?

Configure session printers
Configure Universal Print Server
Disable ‘Direct connection to print servers’
Allow mapping to all client printers to session

A

Allow mapping to all client printers to session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

An architect recommends using the monitoring function of Citrix Director to determine if users can connect to applications. Which Windows sewice should the architect also
include in the monitoring solution?

Citrix Configuration Sewice on the Delivery Controller
Citrix Configuration Replication on the StoreFront server
World Wide Web Publishing Service on the StoreFront server
World Wide Web Publishing Service on the server OS machine

A

World Wide Web Publishing Service on the StoreFront server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront
servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted VDI with Machine Creation Sewices?

It provides the highest end-user density at the lowest cost.
It provides the greatest level of end-user personalization and control.
It offers the lowest storage performance requirement and the highest end-user density.
It offers the greatest application compatibility.

Case Study

A

It offers the lowest storage performance requirement and the highest end-user density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

The architect needs to evaluate the options for replicating user profiles across all sites.
Wh ch two pieces of Information should the architect collect to analyze the options? (Choose two.)

WAN traffic
License requirements
Storage infrastructure
Database configuration

A

License requirements

Database configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Why does using snapshots help manage the image release process?

Because they enable rollbacks
Because they help manage version control
Because they use storage array features to offoad host process ng
Because they automatically deploy the latest drivers and patches

A

Because they help manage version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases _
How should the resource pools be designed to host the infrastructure workloads and virtual desktops to ensure high availability?

A. Separate the workloads by roles and group them as a XenServer resource pool to ensure easier management, fewer workload conflicts, and support for disaster recovery. Each XenServ•er resource pool should comprise a maximum of eight XenServ•er hosts. A storage repository needs to be implemented for central storage of virtual disks, as well as for XenMotion high availability, and backup for disaster recovery purposes.
B. Separate the workloads by roles and group them as a XenServ•er resource pool to reflect the OU structure of Active Directory. Each XenServer resource pool should comprise a maximum of 24 XenServer hosts. A storage repository needs to be implemented for central storage of vitual disks, as well as for XenMotion high
availability, and backup for disaster recovery purposes.
C. Separate the workloads by roles and group them as a XenServer resource pool. Each XenServer resource pool should comprise a maximum of 16 XenServer hosts.
Multiple storage repositories need to be implemented for central storage of virtual disks, as well as for XenMotion and high availability between resource pools and backup for disaster recovery purposes.
D. Separate the workloads by roles and group them as a XenServer resource pool to ensure that the workloads can be streamed by Provisioning Sewices, Including
XenServ•er_ Each XenServ•er resource pool should comprise a maximum of 32 XenServ•er hosts. Multiple storage repositories need to be implemented for central
storage of vitual disks, as well as for XenMotion high availability between resource pools, and backup for disaster recovery purposes.

Case Study

A

A. Separate the workloads by roles and group them as a XenServer resource pool to ensure easier management, fewer workload conflicts, and support for disaster recovery. Each XenServ•er resource pool should comprise a maximum of eight XenServ•er hosts. A storage repository needs to be implemented for central storage of virtual disks, as well as for XenMotion high availability, and backup for disaster recovery purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Scenario:
CGE decided to virtualize its server workloads and provide a vitual solution to all of its end users. CGE is looking for an image management process that is scalable, but
would like to limit infrastructure requirements.
Why is XenServer Fast Clone the best image management method for this environment?

It provides centralized image management.
It reduces machine-provisioning time.
It minimizes network traffc_
It Improves image deployment consistency.

Case Study

A

It reduces machine-provisioning time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Why should disk queue length above zero be used to identify’ bottlenecks?

This indicates excessive I/O and a disk bottleneck
This indicates excessive swap file utilization
This indicates insufficient RAM
This indicates a failed disk

A

This indicates excessive I/O and a disk bottleneck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Scenario:
A Citrix Architect in CGE’s Jurong office has configured a NetScaler high availability ( A) pair to support end users in the Southeast Asia region. The office has NOT
mplemented StoreFront and is using the existing Web Interface environment for internal access. External access is provided by Secure Gateway. The architect plans to
configure the NetScaler Gateway with ICA Proxy to allow remote access.
Which NetScaler license type IS required to support this solution?

User
Device
Platform
Universal

Case Study

A

Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Scenario: The architect for the company has identified that virtualizing the entire server infrastructure Will provide the best return on investment (ROI) and lowest maintenance
costs for the new infrastructure. In order to proceed with this recommendation, a monitoring strategy must be put In place to ensure that the virtualization platform does NOT
become overloaded.
Wh ch virtualization component should an architect monitor to identify’ virtual desktop bottlenecks?

XenServer hosts
Delivery Controllers
Provisioning Sewices servers
Server OS machines

A

XenServer hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Scenario:
CGE is experiencing numerous Issues with Its existing profile management solution. The Citrix Architect managing the project IS tasked With designing a solution that
alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal
complexity.
Why does enabling Profile streaming’ when configuring group profiles benefit CGE’s Sales end-user group?

It allows faster logons.
It simplifies home drive cleanup.
It minimizes the required storage needed for folder redirection.
It improves application performance.

Case Study

A

It improves application performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Why does using SQL Management Studio help the company comply with its security policy?

Because it enables you to execute SQL queries to extract data
Because it enables you to create a database to store logs
Because it uses a standard TCP port
Because it provides security alerts by using SQL Mail

A

Because it enables you to create a database to store logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production _
Why does using ypemsor templates and leveraging PowerShell scripts help manage the image versioning process?

It allows for automatic, scripted upgrades of the deployment template.
It provides centralized, automated, single-image management.
It facilitates consistent deployment of base Images.
It allows for scripts to be executed from the same network share as the deployment template.

Case Study

A

It facilitates consistent deployment of base Images.

169
Q

Scenario:
CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect IS tasked with deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT in a Remote PC environment on Windows 8 With Machine Creation Sewices the best solution?

It offers a faster change process.
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

End users are already comfortable working in a shared environment.

170
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
Only block storage is available on the shared storage of the hypemsor_
How should the architect recommend that the hosted shared servers be provisioned to fulfill the virtualization requirements for the call center while keeping the impact to
storage as low as possible?

By using Machine Creation Services
By using Provisioning Services
By manually Installing the operating system
By using cloned VM templates

A

By using Provisioning Services

171
Q

The company is implementing XenDesktop globally for desktop virtualization.
Why should an architect recommend multiple controllers in each datacenter?

To protect against controller database failure
To enable users to maintain uninterrupted connection to their desktops
To protect users from WAN link failure
To ensure that new desktop and application sessions can be launched

A

To ensure that new desktop and application sessions can be launched

172
Q

Why would the architect choose XenServer MPIO when configuring bonded network interfaces for guest VM networks?

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
Interfaces in the bond.
It sends all guest VM traffic in the bond to an active interface, wh ch provides the best distribution of network load.
It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond.
It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

Case Study

A

It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

173
Q

Scenario:
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability
for all nodes in the different geographical regions.
Individuals in the Research end-user group need to be able to remotely access a centrally stored database.
Which FlexCast model should the Citrix architect recommend for this group?

Hosted Shared
Hosted VDI
Streamed VHD
Local VM

A

Hosted VDI

174
Q

Why would having one farm with three configured sites, with two Provisioning Semces servers in each datacenter, meet the requirements of a regional, single-image
management strategy with minimal WAN traffic across datacenters?

It ensures that Provisioning Sewices targets will NOT load balance between hosts, and guarantees high availability within each region.
It ensures that Provisioning Sewices targets will NOT load balance across regions, and reduces management overhead.
It ensures that Provisioning Sewices targets will NOT load balance between hosts, and guarantees high availability between regions.
It ensures that Provisioning Sewices targets will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead.

Case Study

A

It ensures that Provisioning Sewices targets will NOT load balance across regions, and reduces management overhead.

175
Q

Why would having one farm with one configured site, with three Provisioning Sewices servers in each datacenter, meet the requirements of a regional, single-image
management strategy With minimal WAN traffic across datacenters?

A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region.
B. It reduces management overhead, ensures that Provisioning Sewices targets will NOT load balance across regions, and guarantees high availability between regions.
C. It ensures that Provisioning Sewices targets will NOT load balance between hosts, and guarantees high availability between regions.
D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region

A

D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region.

176
Q

CGE has a baseline policy that allows only the client’s default printer to be available in the Citrix session.
Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

Research
Engineers
Back Office
Executives/Management

Case Study

A

Back Office

177
Q

What are two potential risks in the existing environment that the architect must address in the proposed virtual solution? (Choose two.)

Local profiles are used and administrators manually delete them when necessary.
Installation of PositivelyPeople is performed manually based on a thoroughly documented process.
No logon scripts are enabled for users because the company abandoned logon scripts last year in favor of GPOs_
Users log on to the company environment based on Active Directory credentials, but the PositivelyFinance application requires secondary credentials.

A

Local profiles are used and administrators manually delete them when necessary.
Installation of PositivelyPeople is performed manually based on a thoroughly documented process.

178
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is using a maximum of eight XenServer hosts, With daily backups for the infrastructure workloads and third-party backups for the desktop solution, the best design for the resource pools?

A. It ensures the logical separation of infrastructure and virtual desktop workloads to prevent interference, and facilitates management and expansion capabilities.
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, da ly backups
create downtime for critical workloads.
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services With sufficient workload-specific resources and failover capabilities.
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Case Study

A

D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

179
Q

Scenario:
CGE’s security administrator mandates that only Gateway services can reside in the DMZ and that all StoreFront traffic must be load balanced. The network administrator requires a resilient solution.
How should the architect deploy the six NetScaler appliances in each regional datacenter?

A. Deploy a NetScaler appliance in each datacenter’s internal network for load balancing, and a NetScaler appliance in each datacenter’s DMZ for Gateway traffc_
B. Deploy a NetScaler appliance in each regional datacenter’s internal network for Gateway traffic, and another in each datacenter’s DMZ for load balancing.
C. Create three NetScaler virtual servers configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _
D. Create six NetScaler virtual servers In high-availability pairs configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _

Case Study

A

B. Deploy a NetScaler appliance in each regional datacenter’s internal network for Gateway traffic, and another in each datacenter’s DMZ for load balancing.

180
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Sewices servers will be connected
to a 10 Gbps network.
How does using a dedicated switch help the company secure streaming traffic?

Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter.
Dedicated switches enable streaming traffic to be encrypted with IPsec_
Dedicated switches allow the necessary TCP offoad settings to be configured on the streaming NIC.
Dedicated switches enable isolation of Spanning Tree instances.

A

Dedicated switches allow the necessary TCP offoad settings to be configured on the streaming NIC.

181
Q

Given the current desktop build process, what should an architect recommend on the new virtual platform for this environment wh le minimizing the number of required
management servers?

Continue With current proocess
Use Ghost to clone a master image
Use Machine Creation Services to clone a master image
Use Provisioning Services servers to create a master target device

A

Use Machine Creation Services to clone a master image

182
Q

What should CGE do to all corporate-owned and non-corporate-owned Windows client devices to ensure an optimal end-user experience?

Upgrade all clients to Receiver 4.2
Install native printer drivers on all clients.
Install the Cloudaridge Plug-in on all clients.
Install Citrix Profile management on all clients.

Case Study

A

Upgrade all clients to Receiver 4.2

183
Q

Why does Provisioning Semces with cache on server help the Rad ology group maintain changes in their desktops?

Because it is stored centrally
Because it reduces XenServer shared storage consumption
Because Profile Manager provides a consistent user experience
Because it reduces storage 10 on the XenServer local storage

A

Because it is stored centrally

184
Q

The company is implementing XenDesktop globally for desktop virtualization.
How should the architect recommend installment of controllers for high availability?

Install three controllers in each datacenter
Install three controllers in New York, three in London, and three in Singapore
Install three controllers in Hong Kong, three in New York, and three in Berli
Install four controllers in New York, four in Sydney, and one in London

A

Install three controllers in each datacenter

185
Q

Why does Provisioning Sewices with private image mode enable users in the Rad ology group to maintain the changes to their desktops?

Because it enables use of cache on server persistence
Because It retains user changes In a dedicated vDisk mage
Because it stores user changes separate from the base image
Because It provides efficient centralization of dedicated user mages

A

Because it stores user changes separate from the base image

186
Q

What should a Citrix Architect identify’ as a potential security risk that should be resolved in the next design, based on the current provision for external access?

Web Interface is used
Online Plug-in 12.1 is used
NetScaler Gateway is used to load balance StoreFront
Single-factor authentication is used for external access

Case Study

A

Single-factor authentication is used for external access

187
Q

Why should memory and network utilization be used to identify’ bottlenecks?

Excessive memory and network utilization will slow the loading ofvDlsks and cache files by Provisioning Sewices
Excessive memory and network utilization on the vDlsk store will slow down the PXE boot process.
Excessive memory and network utilization can increase fragmentation of the TFTP boot strap file.
Excessive memory and network utilization can increase fragmentation of the vDlsks_

A

Excessive memory and network utilization on the vDlsk store will slow down the PXE boot process.

188
Q

Why is deploying two NetScaler appliances in each regional datacenter, with one in the internal network for load balancing and the other in the DMZ for Gateway traffic, the
best design solution?

It provides intraslte redundancy in case of appliance failures.
It provides redundancy In case of site failures, while optimizing external WAN traffc_
It protects against WAN failures and connects end users to their home datacenter.
It allows for the expected expansion of remote access usage and provides functionality for future needs.

Case Study

A

It provides intraslte redundancy in case of appliance failures.

189
Q

Why is configuring an iSCSl LUN on a NAS the best design choice for vDlsk storage?

It is the least expensive solution.
It is a highly scalable and resilient solution.
It creates the least amount of administrative overhead.
It reduces the system footprint.

Case Study

A

It reduces the system footprint.

190
Q

How should a Hosted VDI environment be implemented to allow user-installed applications?

By using Citrix Profile management
By using Personal vDlsk
By using statically assigned virtual desktops
By using a network share that contains the App-V packages

A

By using Personal vDlsk

191
Q

Scenario:
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability
for all nodes in the different geographical regions.
Which high availability solution should a Citrix Architect recommend?

Fast Recovery
Database Mirroring
Database Snapshots
AlwaysOn Failover Cluster Instances

Case Study

A

AlwaysOn Failover Cluster Instances

192
Q

Wh ch two options should the architect recommend to enable two-factor authentication for remote users? (Choose two.)

Configure Citrix Single Sign-On
Configure LDAP authentication on NetScaler
Configure RADIUS authentication on NetScaler
Configure Username and Password’ in StoreFront

A

Configure LDAP authentication on NetScaler

Configure RADIUS authentication on NetScaler

193
Q

Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types In use?

A physical token carried by the end user
X509 certificates stored on a Smart Card
A complex Active Directory password enforced by Group Policy
RADIUS authentication with an Employee ID Number

Case Study

A

A physical token carried by the end user

194
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients With newer models.
What are the benefits of using hosted shared servers with Provisioning Semces?

Highest user density and lowest cost
Highest level of user personalization
Rapid provisioning and highest user density with the lowest storage requirement
Lowest cost and highest application compatibility

A

Rapid provisioning and highest user density with the lowest storage requirement

195
Q

Why does using Citrix Director help the company comply With its security policy?

Because it provides a centralized data repository
Because it provides controlled access to monitoring functions
Because it uses a standard TCP port
Because it collects data from NetScaler

A

Because it collects data from NetScaler

196
Q

Scenario:
Each XenServer host has four 10Ga network cards - two bonded for storage and management separated by separate VLAN, and the two bonded for guest VM networks. The
CIO would like to see network traffic distributed across all links to maximize their utilization. Switches to which the Hypemsors will connect to support 8023ad
How should the architect configure the guest VM network?

Using active-active bonding
Using active-passive bonding
Using XenSever MPIO redundancy
Using LACP bonding

Case Study

A

Using active-active bonding

197
Q

Why should disk I/O and page file utilization be used to identify’ bottlenecks?

A. High disk I/O and page file utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources
to handle the load.
B. High disk I/O and page file utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDlsks_
C. High disk I/O and page file utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual
desktop users.
D. High disk I/O and page file utilization of the Delivery Controller can indicate the presence of a virus or malware.

A

C. High disk I/O and page file utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual
desktop users.

198
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Sewices servers will be connected
to a 10 Gbps network.
How do multi-homed Provisioning Sewices servers help the company secure streaming traffic?

Multiple NICs separate disk and user data traffic
Multiple NICs enable disk data traffic to be encrypted with IPsec
Multiple NICs allow the necessary TCP offoad settings to be configured on the streaming NIC.
Multiple NICs provide multiple IP addresses that can be dedicated to streaming traffc_

A

Multiple NICs separate disk and user data traffic

199
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is using a maximum of 16 XenServ•er hosts, using a shared Virtual disk storage repository for XenMotion, high availability, and replication to the failover site the best design for the resource pools?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for
disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.
B. It ensures Simple setup With redundancy and meets the requirement of separating OS types.
C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery.
D. It ensures the separation of Infrastructure and vitual desktop workloads and optimizes performance and high availability.

Case Study

A

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for
disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.

200
Q
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. 
Which XenDesktop (Flexcast) model should the architect recommend? 

Hosted shared
Hosted VDI
Streamed VHD
Local VM

A

Hosted shared

201
Q

How should the architect implement high availability (HA) With 12 NetScaler appliances?

A. In each datacenter, deploy an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffc_
B. In each datacenter, deploy an HA pair in the internal network for Gateway traffic and an HA pair in the DMZ for load balancing.
C. Create three NetScaler virtual servers configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _
D. Create six NetScaler virtual servers in HA pairs configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server

Case Study

A

C. Create three NetScaler virtual servers configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _

202
Q

The company’s security officer has stated that for compliance reasons, all internal and external network traffic must be encrypted.
Which additional type of encryption should the architect recommend?

SecurelCA
IPsec
SSL and SecurelCA
L2TP

A

SSL and SecurelCA

203
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcocess. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT in a Hosted Shared environment on Windows Server 2008 R2 With Machine Creation Semces the best solution?

It offers a faster change process.
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

It offers a faster change process.

204
Q

Why should CPU and network I/O be used to identify’ bottlenecks?

Excessive consumption of CPU or network I/O indicates there are too many target devices _
Excessive consumption of CPU or network I/O indicates a network misconfiguration_
Excessive consumption of CPU or network I/O indicates that the anti-virus configuration could be causing a bottleneck.
Excessive consumption of CPU or network I/O indicates that the system is low on virtual memory.

A

Excessive consumption of CPU or network I/O indicates there are too many target devices _

205
Q

The company is implementing XenDesktop globally for desktop virtualization.
How should the architect recommend installment of controllers for high availability?

Install two controllers in London and two in Paris
Install two controllers In New York and two In Hong Kong
Install two controllers In Hong Kong and two In Tokyo
Install two controllers In New York and two In London

A

Install two controllers In New York and two In London

206
Q

An architect is designing a solution that minimizes the storage footprint by utilizing thin provisioning in the datacenter. Which solution should the architect recommend for XenServer shared storage?

NFS
CIFS
iSCSI
Fibre Channel

A

NFS

207
Q

Scenario: The architect for the company has identified that virtualizing the entire server infrastructure will provide the best return on investment (ROI) and lowest maintenance costs for the new infrastructure. In order to proceed with this recommendation, a monitoring strategy must be put in place to ensure that the virtualization platform does NOT become overloaded.
How can the architect identify’ if the XenServer hosts are the source of a bottleneck?

Identify’ of the CPU consumption is above 85%
Identify’ If memory consumption IS above
Identify’ If disk queue length increases above zero
Identify’ If network utilization rises above 60%

A

Identify’ of the CPU consumption is above 85%

208
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted Shared servers provisioned from cloned VM templates?

It provides the highest end-user density at the lowest cost.
It provides the greatest level of end-user personalization and control.
It offers the lowest storage performance requirement and the highest end-user density.
It facilitates rapid provisioning.

Case Study

A

It facilitates rapid provisioning.

209
Q

Why deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured With a backup vServer the best design solution?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffic
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSI_ VPN functionality for future needs.

Case Study

A

It provides redundancy, while optimizing external WAN traffic

210
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network.
How should the architect implement a highly available Provisioning Services server by using NetScaler App Firewall?

By implementing NetScaler App Firewall policies
By deploying GSl_a on NetScaler
By deploying TFTP load balancing using NetScaler
By load balancing Provisioning Semces streaming services using NetScaler

A

By implementing NetScaler App Firewall policies

211
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that IPsec be implemented?

By using NetScaler
By Implementing secure Delivery Groups
By Implementing an Active Directory Group Policy
By configuring a local IPsec policy in the master image

A

By Implementing an Active Directory Group Policy

212
Q
Which two issues could CGE's current home directory storage strategy cause? (Choose two.) 
Slow logons 
Unverified data backups 
High IOPS on the storage appliance 
High CPU usage on the XenApp servers 

Case Study

A

Slow logons

Unverified data backups

213
Q

Scenario:
A Citrix Architect Identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
How should the architect implement GPOs to ensure full control over which Citrix policies are applied?

Create one GPO for each region _
Create Citrix policies within a GPO and filter the policies based on end users and Delivery Groups.
Create Citrix policies within a GPO and filter the policies based on Client Name.
Create Citrix policies within a GPO and filter the Citrix policies based on IP address.

A

Create Citrix policies within a GPO and filter the policies based on end users and Delivery Groups.

214
Q

Why does enabling the Windows Automatic Install Kit help manage the image release process?

Because it automates the Windows domain join process
Because it can be configured by DHCP options
Because it performs a scripted Windows installation
Because it automatically deploys the latest drivers and patches

A

Because it performs a scripted Windows installation

215
Q

Why is creating three NetScaler virtual servers configured With the subnets of the three sites and binded to redirection policies the best design solution?

It provides intraslte redundancy in case of appliance failures, while enhancing performance through an active/active configuration.
It provides redundancy in case of site failures, while optimizing external WAN traffc_
It protects against WAN failures and connects end users to their home datacenter.
It allows for the expected expansion of remote access usage and provides functionality for future needs _

Case Study

A

It protects against WAN failures and connects end users to their home datacenter.

216
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
How should the architect recommend that the Synchronizer be deployed?

By deploying a Hyper-V virtual appliance
By installing the Synchronizer software on a Hyper-V server
By installing a Synchronizer virtual appliance on XenServer
By booting from the Synchronizer ISO image

A

By installing a Synchronizer virtual appliance on XenServer

217
Q

A Citrix Architect decides that implementation of a regional, single-image management strategy is required, and that WAN traffic should be minimized across the
datacenters _
Which Provisioning Sewices design should the architect choose to meet these criteria?

One farm With three configured sites.
Three farms, each with one configured site.
One farm With one configured site.
One farm in the primary datacenter and one farm in the secondary datacenter, each with three configured sites.

Case Study

A

Three farms, each with one configured site.

218
Q

Why is configuring an iSCSl LUN on a SAN the best design choice for vDisk storage?

It is the least expensive solution.
It is a highly scalable and resilient solution.
It creates the least amount of administrative overhead.
It reduces the system footprint.

Case Study

A

It is a highly scalable and resilient solution.

219
Q

A Citrix Architect decides that pooled desktops is the appropriate delivery model for CGE’s Engineers end-user group.
Which two reasons explain the architect’s delivery model decision? (Choose two.)

The CAD application is updated frequently.
It allows engineers to Install their own applications.
It isolates CPU and memory resources to Single instances.
The Instability of the CAD application Impacts several end users.

Case Study

A

It isolates CPU and memory resources to Single instances.

The Instability of the CAD application Impacts several end users.

220
Q

What are the benefits of using a Hosted VDI environment With App-V packages?

It retains the single image management function wh le allowing users to install applications
It provides a high level of security while allowing user customization
It has a low storage performance requirement and high user density
It delivers low-cost and high application compatibility

A

It delivers low-cost and high application compatibility

221
Q

Scenario:
CGE is experiencing numerous Issues With Its existing profile management solution. The Citrix Architect managing the project IS tasked with designing a solution that
alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal
complexity.
Why does enabling ‘Offine profile support’ benefit CGE’s Sales end-user group?

It allows faster logons and logoffs
It minimizes the required storage needed for folder redirection.
It simplifies home drive cleanup.
It Improves data accuracy In volatile environments.

Case Study

A

It allows faster logons and logoffs

222
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production _
How should the architect use Hypemsor templates and snapshots to facilitate image management and rollback?

By using the Hypervisor API to deploy desktops from templates
By using PowerShell to script desktop deployment from templates
By using Workfow Studio to deploy desktops from templates
By using the Windows Automatic Install Kit (WAIK)

Case Study

A

By using the Hypervisor API to deploy desktops from templates

223
Q

Why is a design With 12 NetScaler appliances, in which each datacenter deploys three NetScaler virtual servers configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront server, the best remote access design?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffic
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

It provides redundancy, while optimizing external WAN traffic

224
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which
GPOs apply in the new environment.
Why would Citrix policies, filtered by end user and Delivery Group, ensure full control over which Group Policies are applied?

It provides central management and control.
It ensures that only settings With the correct filtering in Active Directory are applied.
It ensures that only settings located in the root Citrix OU are applied.
It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

It ensures that only settings located in the root Citrix OU are applied.

225
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients With newer models.
What are the benefits of using hosted shared servers by using cloned VM templates?

Highest user density and lowest cost
Highest level of user personalization
Lowest storage performance requirement and highest user density
Rapid provisioning

A

Rapid provisioning

226
Q

Why wou d the architect choose XenServer MPIO when configuring network interfaces for storage networks?

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
interfaces in the bond.
It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond.
It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

Case Study

A

It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond.

227
Q

Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications?

VM Hosted applications
Streamed server OS machines
Dedicated desktop OS machines
Pooled desktop OS machine with Personal vDlsk

A

Streamed server OS machines

228
Q

Scenario:
CGE’s CIO asks a Citrix Architect to design a new Provisioning Semces environment. Management asks about best practices for storing master images to ensure
scalability, performance, and high availability.
Which solution should the architect recommend?

A. Configure a shared storage location (CIFS) on a Windows File Server for each regional datacenter.
B. Configure an SCSI LUN on a Storage Area Network (SAN) for each Provisioning Services server.
C. Configure an SCSI LUN on a Network Attached Storage (NAS) device for each Provisioning Semces server.
D. Configure a shared storage location (CIFS) on a Network Attached Storage (NAS) device.

Case Study

A

C. Configure an SCSI LUN on a Network Attached Storage (NAS) device for each Provisioning Semces server.

229
Q

Scenario:
CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcocess. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as Hosted VDI Static Persistent the best solution?

It allows the installation of custom applications.
It is easy to manage.
It meets the high-performance application demands of the Executives/Management end-user group.
It allows the Executives/Management end-user group to share desktops.

Case Study

A

It meets the high-performance application demands of the Executives/Management end-user group.

230
Q

How should a hosted shared environment be implemented to allow user-installed applications?

By adding users to the Local Administrators group
By using Personal vDlsk
By adding users to the Remote Desktop Users Group
By providing access to the network share that contains the App-V packages

A

By providing access to the network share that contains the App-V packages

231
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront
servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted Shared servers With Provisioning Sewices?

It provides the highest end-user density at the lowest cost.
It provides the greatest level of end-user personalization and control.
It facilitates rapid provisioning and offers the highest end-user density.
It offers the lowest cost and the greatest application compatibility.

Case Study

A

It facilitates rapid provisioning and offers the highest end-user density.

232
Q

Scenario:
CGE has a new XenApp mage for hosting office applications and will use Provisioning Semces to deploy the servers hosting these applications. However, CGE is
concerned that their current strategy for deploying antivirus definition updates will reduce the performance of the provisioned servers.
Additionally, the Security team IS concerned about the frequency of the antivirus definition updates and would like to have as many updates as possible without reducing performance of the provisioned disk.
Which change should a Citrix Architect recommend to CGE’s current strategy for deploying antivirus definitions?

Configure the antivirus client to store definition updates on a CIFS share.
Restart the servers each day to clear the Provisioning Services write cache.
Configure the antivirus client to store definition updates on a locally, non-provisioned disk.
Disable automatic antivirus definition updates and update the definitions manually during each Provisioning Services image update.

A

Configure the antivirus client to store definition updates on a locally, non-provisioned disk.

233
Q

Scenario:
Each XenServer host has six 10Ga network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic_
All switches in the environment support 802_3ad and adaptive load balancing.
How should the architect configure the storage network interfaces?

Using active-active bonding
Using active-passive bonding
Using XenSever MPIO redundancy
Using LACP bonding

Case Study

A

Using active-active bonding

234
Q

Why would the architect choose active-active bonding when configuring network interfaces for guest VM networks?

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.
It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.
It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Case study

A

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
Interfaces in the bond.

235
Q

What are the benefits of using hosted shared environment with Personal vDlsk?

It retains the single image management function wh le allowing users to install applications
It provides a high level of security while allowing user customization
It has a low storage performance requirement and high user density
It delivers low-cost and high application compatibility

A

It provides a high level of security while allowing user customization

236
Q

Which licensing changes should a Citrix Architect recommend to enable the HDX Mobile feature in CGE’s Jurong and Makassar offices?
Purchase XenMobile licenses.
Convert existing XenApp licenses to per device licenses.
Purchase NetScaler Universal Licenses for each mobile device.
Upgrade existing XenApp licenses to XenApp Enterprise licenses.

Case Study

A

Upgrade existing XenApp licenses to XenApp Enterprise licenses.

237
Q

Why does using Workfow Studio help manage the image release process?

Because it can script automatic upgrades of the deployment template
Because It provides centralized, automated single mage management
Because It facilitates consistent deployment of base images
Because Workfow Studio scripts can be executed from the same network share as the deployment template

A

Because It provides centralized, automated single mage management

238
Q

How many Provisioning Semces servers should the architect install in each of the three farms?

Two servers in the primary farm, one server the the remaining farms
One server in each farm
Two servers in each farm
Two servers in the primary farm, two servers in the secondary farm, and one server in the remaining farm

Case Study

A

One server in each farm

239
Q

Scenario:
The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session.
Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers?

Use client printing and the Universal Printer Dnver_
Use network printers connected with Citrix Policies.
Use the Universal Print Server and Universal Printer Driver.
Use network printers connected with Group Policy Preferences _

Case study

A

Use the Universal Print Server and Universal Printer Driver.

240
Q

Why should memory consumption above be used to identify’ bottlenecks?

At least 20% of resources should be available at all times
XenServer host CPU utilization above causes excessive paging
XenServer host reserves 20% of all memory for paging
Running XenCenter will consume 20% of all memory resources

A

At least 20% of resources should be available at all times

241
Q

Scenario: Some contractors require access to various corporate applications. They must also be able to install their own application within the environment for testing
purposes.
Which two delivery methods fulfill these requirements? (Choose two.)

Hosted server OS With Profile Management enabled
Pooled hosted desktop OS With Personal vDlsk enabled
Hosted server OS With persistent server operating system
Assigned hosted desktop OS With persistent desktop operating system

A

Pooled hosted desktop OS With Personal vDlsk enabled

Assigned hosted desktop OS With persistent desktop operating system

242
Q

Why should disk I/O and page file uti Ization be used to identify’ bottlenecks?

Excessive disk I/O and page file utilization will slow the loading of vDlsks and cache files by Provisioning Semces
Excessive disk I/O and page file utilization on the vDlsk store will slow down the PXE boot process.
Excessive disk I/O and page file utilization can increase fragmentation of the TFTP boot strap file.
Excessive disk I/O and page file utilization can increase fragmentation of the vDlsks_

A

Excessive disk I/O and page file utilization can increase fragmentation of the vDlsks_

243
Q

In the new environment, the PositivelyFinance application will be deployed as a server OS-hosted application. Which two policy settings should an architect recommend to prevent data leakage from the PositivelyFinance application? (Choose two.)

A. HDX policy setting With Client drive mapping set to Prohibited’
B. HDX policy setting With Client Clipboard Redirection set too Prohibited’
C. HDX policy setting With File redirection on Client Network drives to Prohibited’
D. Active Directory group policy With the Do not allow clipboard redirection setting set to ‘Disabled’
E. Active Directory group policy With the Prevent access to drives setting set to Restrict all drives’

A

A. HDX policy setting With Client drive mapping set to Prohibited’
B. HDX policy setting With Client Clipboard Redirection set too Prohibited’

244
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing With merge on a GPO linked to all OUS containing Delivery Controllers ensure full control over which Group Policies are applied?

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.
B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.
C. It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.
D. It ensures that GPOs located in the root Citrix OU are replaced With Citrix policies.

A

It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.

245
Q

Scenario:
A Citrix Architect is designing a multi-server Provisioning Sewices solution for CGE_ The solution must be highly available and minimize the risk of vDlsk inconsistency.
How should the architect configure the NAS storage for fault tolerance and high performance?

By implementing RAID 0
By implementing RAID 1
By implementing high-speed local storage with deduplication
By implementing RAID 10

Case Study

A

By implementing RAID 10

246
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted VDI by using cloned VM templates?

It provides the highest end-user density at the lowest cost.
It offers the greatest level of end-user personalization and control.
It offers the lowest storage performance requirement and the highest end-user density.
It facilitates rapid provisioning.

Case Study

A

It facilitates rapid provisioning.

247
Q

Which change to the corporate Windows 7 client wou d prevent single sign-on to the infrastructure using the end user’s Active Directory account?

A Smart Card reader is installed to allow the end user to log on with an XS0g certificate issued by the Active Directory Certificate Authority.

The workstation has the ‘Interactive login: Do not display last user name’ policy applied and enforced by Group Policy Object (GPO).

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Case Study

A

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

248
Q

Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
Why is Windows Deployment Semces the best image management method for this environment?

It allows for user-installed applications.
It reduces machine provisioning time.
It allows for the use of local user profiles.
It supports the use of customized language packs.

Case Study

A

It allows for the use of local user profiles.

249
Q

How should the architect specify’ that the Citrix Director database be queried?

By using the Citrix Director console
By using SQL Management Studio
By using SQL Reporting Semces
By using PowerShell

A

By using the Citrix Director console

250
Q

How many Provisioning Sewices servers should the architect install in each of the three configured sites?

One server in each datacenter
Two servers In each datacenter
Three servers In each datacenter
Two servers In the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter

Case Study

A

Two servers In the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter

251
Q

nano:
A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing serviices.
Security policy mandates that these internal appliances CANNOT connect to the DMZ.
How should the architect configure the callback URL with one NetScaler located in all three regional datacenters?

A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

C. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery
Controllers.

D. Configure the callback URL to point to the external beacon address.

A

B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

252
Q

Which two current licensing issues should a Citrix Architect resolve in CGE’s new virtualization design? (Choose two.)
A. There are more RDS CALs than Citrix licenses _
B. The Citrix and RDS licenses share the same server _
C. There are many different license servers In the environment.
D. There IS a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.

Case Study

A

C. There are many different license servers In the environment.
D. There IS a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.

253
Q

Why would having one farm with three configured sites, with three Provisioning Services servers in each datacenter, meet the requirements of a regional, single-image management strategy With minimal WAN traffic across datacenters?

A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region.
B. It ensures that Provisioning Services targets Will NOT load balance across regions, and reduces management overhead.
C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.
D. It ensures that Provisioning Services targets Will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead.

Case Study

A

C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.

254
Q

Why does using vDlsk Update Management help manage the image release process?

Because it automatically upgrades virtual desktops to the latest operating system version
Because it provides centralized, automated single image management
Because it is compatible with the Microsoft VHD specification
Because it automatically deploys the latest target device drivers

A

Because it provides centralized, automated single image management

255
Q

Why should CPU and memory consumption be used to identify’ bottlenecks?

Excessive CPU and memory consumption will slow the creation of new sessions.
Excessive CPU and memory consumption on the data collector will slow down Web Interface authentication.
Excessive CPU and memory consumption on the data collector will slow down application enumeration.
Excessive CPU and memory consumption on the XenApp server will affect the local host cache.

A

Excessive CPU and memory consumption will slow the creation of new sessions.

256
Q

Scenario:
A Citrix Architect IS designing a multi-server Provisioning Semces solution for CGE_ The solution must be highly available and minimize the risk of vDlsk inconsistency.
Why does implementing RAID 0 satisfy the requirements?

It provides striping.
It provides the highest performance.
It provides fault tolerance.
It provides minimal disk usage.

Case Study

A

It provides striping.

257
Q

How should the architect implement database high availability in an Oracle database?

By using Oracle RAC
By using Oracle DataGuard
By using Oracle FailSafe
By using Oracle Automatic Storage Management

A

By using Oracle FailSafe

258
Q

Which FlexCast model should a Citrix Architect use to deploy desktops to the Research end-user group?

Hosted Shared
Streamed VHD
Hosted VDI Random
Hosted VDI Static with Personal vDisk

Case Study

A

Hosted VDI Random

259
Q

Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
How should the architect design the image management process using Machine Creation Services?

A. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and clone the virtual machine.
B. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and change the Windows and Office product keys to use MAK_
C. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and convert the virtual machine to a template.
D. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and take a snapshot of the image.

Case Study

A

D. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and take a snapshot of the image.

260
Q

Why should CPU consumption be used to identify’ bottlenecks?

High CPU utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load
High CPU utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDlsks.
High CPU utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users.
High CPU utilization of the Delivery Controller can Indicate the presence of a virus or malware.

A

High CPU utilization of the Delivery Controller can Indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load

261
Q

What are the benefits of using IPsec to meet the company’s compliance requirements?

It encrypts internal network traffic
It encrypts ICA traffic from remote users
It is required to enable the SSI_ Relay sewice
It complies with industry-standard IPsec encryption requirements

A

It encrypts internal network traffic

262
Q

Scenario:
CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling ‘Active write back’ when configuring Citrix Profile management without folder redirection benefit CGE’s Sales end-user group?

It improves application performance.
It simplifies home drive cleanup.
It minimizes the required storage needed for folder redirection.
It Improves data accuracy In volatile environments

Case Study

A

It Improves data accuracy In volatile environments

Explanation.
Enable Active Write-Back to allow Citrix UPM to synchronize profile data during the user session, instead of waiting to synchronize the entire profile upon user logout_ This prevents profiles from not synchronizing all data and from being corrupted. Active Write-Back prevents this by synchronizing files during the entire user session, so when the user logs off there will be minimal profile data (if any) that must be synchronized. A direct benefit of this setting is that if a Virtual desktop crashes or gets reset instead of properly shutdown, users need not have to worry about files not being synchronized.

263
Q

CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment.
Which two sites Will be able to support this requirement for Citrix Receiver for IOS and Android? (Choose two.)

Tulsa 
Jurong 
London 
Odessa 
Houston 
Aberdeen 
Makassar  

Case Study

A

Tulsa

Aberdeen

264
Q

How should the architect segment streaming traffic using Provisioning Semces servers on a shared VLAN?

By installing multiple NICs on each datacenter’s Provisioning Services server.
By deploying one Provisioning Services server In the primary datacenter and one in the secondary datacenter.
By deploying two Provisioning Services servers In the same datacenter.
By using NetScaler With Global Server Load Balancing (GSLB) to load balance the Provisioning Services servers in each datacenter.

A

By deploying one Provisioning Services server In the primary datacenter and one in the secondary datacenter.

265
Q

What should a Citrix Architect do to simplify’ printer driver management for CGE’s Back Office end-user group?

A. Use the Citrix Universal Print Server.
B. Enforce the use of the Citrix Universal Printer Driver
C. Manually install printer drivers on the XenApp servers.
D. Modify’ the printer driver format of the Citrix Universal Printer Driver.

Case Study

A

Enforce the use of the Citrix Universal Printer Driver

266
Q

Why does using Windows Deployment Semces help manage the image release process?

Because it enables rapid rollback
Because it automates deployment of current and legacy operating system versions
Because it uses Hyper-V snapshots
Because it automatically deploys the latest drivers and patches

A

Because it automatically deploys the latest drivers and patches

267
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a prcu:ess for version control that includes thorough testing prior to
production.
Which tool should a Citrix Architect recommend for those groups?

Provisioning Services
Hypemsor templates and snapshots
Windows Deployment Services
Machine Creation Services

Case Study

A

Provisioning Services

268
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
How should the architect ensure full control over which Citrix policies are applied?

Configure the Citrix policies in the GPOs.
Create one Citrix Policy for each region.
Create Citrix policies filtered by end users and Delivery Groups.
Create Citrix policies and filter settings based on Client name.

A

Configure the Citrix policies in the GPOs.

269
Q

Why should the two NetScalers be located at the London datacenter?

Because it allows New York and Hong Kong to fail over to the London datacenter
Because It provides secure remote access
Because two components allow for Increased user performance
Because It allows for centralized management

A

Because it allows New York and Hong Kong to fail over to the London datacenter

270
Q

Why does using XenServerStorageLink help manage the image release process?

Because it enables rollbacks
Because It helps manage version control
Because It uses storage array features to offoad host processing
Because It automatically deploys the latest drivers and patches

A

Because It uses storage array features to offoad host processing

271
Q

How many Provisioning Services servers should the architect install in the configured site?

Two servers in the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter
Three servers in each datacenter
Two servers in each datacenter
One server in each datacenter

Case Study

A

One server in each datacenter

272
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT in a Remote PC environment on Windows 7 With Provisioning Sewices the best solution?

It offers a faster change process.
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

It offers a faster change process.

273
Q

Scenario:
CGE needs to define its management prcu:ess for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production.
How should the architect use Windows Deployment Services to facilitate image management?

By deploying a standard base image to virtual desktops
By deploying a base mage from an WA file
By centralizing the volume-activation process
By Installing Windows applications into an image

Case Study

A

By deploying a standard base image to virtual desktops

274
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing With replace on a GPO linked to all OU’S containing Virtual Desktop Agents ensure full control over which Group Policies are applied?

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on.
B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on.
C. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

A

B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on.

275
Q

Which components should an architect recommend be used to meet the secure remote access requirements while ensuring high availability?

A. Three NetScalers, three StoreFront servers, and three Delivery Controllers: one at each datacenter

B. Two NetScalers, two StoreFront servers, and two Delivery Controllers in the London datacenter

C. Six NetScalers, six StoreFront servers, and six Delivery Controllers: two at each datacenter

D. Two NetScalers in the London datacenter and two StoreFront servers and Delivery Controllers in each datacenter

A

C. Six NetScalers, six StoreFront servers, and six Delivery Controllers: two at each datacenter

276
Q

Why does using vDisk Versions help manage the image release process?

Because it automatically upgrades virtual desktops to the latest operating system version
Because It provides centralized, automated single image management With rollback
Because It IS compatible With the Microsoft VHD specification
Because It automatically deploys the latest drivers and patches

A

Because It provides centralized, automated single image management With rollback

277
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
Why does using SecurelCA meet CGE’s compliance requirements?

It encrypts internal ICA traffc.
It encrypts ICA traffic from remote end users.
It enables the SSL Relay service.
It complies With industry-standard SSL encryption requirements.

A

It complies With industry-standard SSL encryption requirements.

278
Q

Scenario:
CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity.
Why does enabling Profile streaming’ when configuring Citrix Profile management to allow standardization of profiles benefit CGE’s Sales end-user group?

It allows for faster logons.
It simplifies home drive cleanup.
It minimizes the required storage needed for folder redirection.
It improves application performance.

Case Study

A

It allows for faster logons.

279
Q

Scenario:
CGE acquires a small energy company that IS running MGMT, a proprietary 16-bit application. A Citrix Architect IS tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Which FlexCast model should the architect recommend to deploy the MGMT application to the Executives/Management end-user group?

Hosted Shared
Remote PC
On-Demand Apps
Hosted VDI

Case Study

A

On-Demand Apps

280
Q

Why is database protection an essential component of a production environment?

Because the Delivery Controller is stateless
Because server maintenance can be performed online
Because it prevents local host cache corruption
Because user data loss is prevented if a session is disconnected

A

Because it prevents local host cache corruption

281
Q

Why is configuring regional shared storage locations on a CIFS server using Clustered File Sewices the best design choice for vDlsk storage?

It is the least expensive solution.
It is a highly scalable and resilient solution.
It creates the least amount of administrative overhead.
It reduces the system footprint.

Case study

A

It is a highly scalable and resilient solution.

282
Q

Which IOPS figures must an architect take into account when determining the IOPS requirements for a user group?

logical, logon, and raw
functional, logoff and boot
steady state, boot, and raw
steady state, logon, and boot

A

steady state, logon, and boot

283
Q

Which reason explains why a Citrix Architect would identify’ the SQL environment as a cause of potential issues in CGE’s current deployment?

Use of SQL authentication
Lack of backup and restoration procedures
Lack of identical servers in different datacenters
Network bandwidth between congested datacenters

Case Study

A

Lack of backup and restoration procedures

284
Q

Scenario: Users from a remote research lab have very Iimited WAN bandwidth to their nearest datacenter. The users need to print over the WAN.
What should an architect recommend to optimize printer bandwidth?

Optimize WAN traffic through CloudBridge.
Increase the WAN bandwidth through a WAN link upgrade.
Restrict overall session bandwidth through a HDX bandwidth policy.
Restrict printer redirection bandwidth through a HDX bandwidth policy.

A

Optimize WAN traffic through CloudBridge.

285
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
How should the Hosted Shared servers be provisioned to meet the needs of the Back Office end-user group when only block storage is available on the shared storage of the Hypervisor?

By using Machine Creation Services (MCS))
By using Provisioning Services
By manually installing the OS
By using cloned virtual machine (VM) templates

Case Study

A

By using Provisioning Services

286
Q

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with failover sites within the NetScaler Gateway the best design solution?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffic
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

It segments the Gateway and load-balancing features of the NetScaler appliances.

287
Q

Which database product should the architect recommend for production deployment?

SQL Server
Access
SQL Server Express
Oracle database

A

SQL Server

288
Q

Which consideration is unnecessary for the PositivelyPeople application in the new environment?

File security
Secure remote access
Access to legacy mainframe
Support for secured print jobs

A

Access to legacy mainframe

289
Q

Which two issues should a Citrix Architect address for end users? (Choose two.)

Profile corruption
Slow logon and logoff times
Connections from non-corporate-owned devices
Single-factor authentication for internal end users

Case Study

A

Profile corruption

Slow logon and logoff times

290
Q

Which end-user group does a Citrix Architect need to consider when designing a remote access solution for CGE?

Sales
Back Office
Technicians
Executives/Management

Case Study

A

Technicians

291
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients With newer models.
What are the benefits of using hosted shared servers with Machine Creation Sewices?

Highest user density and lowest cost
Highest level of user personalization
Lowest storage requirement and highest user density
Lowest cost and highest application compatibility

A

Highest user density and lowest cost

292
Q

How should the architect configure high availability (HA) on a XenServer VM to support an iSCSl NAS?

A. Connect a minimum of two network interface cards from the XenServer to the iSCSl storage network and create a NIC bond.
B. Connect a minimum of two network interface cards from the XenServer to the SCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).
C. Connect a minimum of two network interface cards to the SCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify’ that
both can access the iSCSl storage array.
D. Connect a minimum of two network interface cards to the iSCSl storage network, each on a separate Layer 3 network, and enable XenServer Multipathing

Case Study

A

B. Connect a minimum of two network interface cards from the XenServer to the SCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

293
Q

Scenario:
CGE’s CIO asks a Citrix Architect to design its Hypervlsor networking solution. The storage team informs the architect that they have purchased a new 10GB iSCSl SAN array that the XenServer hosts will use for SAN storage. They would like the solution to meet all outlined requirements.
What should the architect recommend?

A. Each XenServer host should be configured With six 10Ga network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic
B. Each XenServer host should be configured With four 10Ga network cards - two bonded for storage and management separated by separate VLAN, and two bonded for
guest VM networks.
C. Each XenServer host should be configured With two bonded 10Ga NICs for storage, management, and guest VM networking.
D. Each XenServer host should be configured With four 10GB NICS - two dedicated for storage, and two bonded for guest VM networks and management separated by
VLAN

Case study

A

D. Each XenServer host should be configured With four 10GB NICS - two dedicated for storage, and two bonded for guest VM networks and management separated by
VLAN

294
Q

Why is a design with 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic, the best remote access design?

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
B. It provides redundancy, while optimizing external WAN traffic
C. It segments the Gateway and load-balancing features of the NetScaler appliances.
D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

295
Q

Why does using Windows Event logs help the company comply With its security policy?

Because they are centralized, industry-standard logs that are easily queried
Because they use password-protection for added security
Because they contain detailed records of user authentication activity
Because they col ect data from multiple devices

A

Because they are centralized, industry-standard logs that are easily queried

296
Q

How should the architect configure high availability (HA) on a XenServer host to support an SCSI SAN?

A. Connect a minimum of two network interface cards from the XenServer to the iSCSl storage network and create a NIC bond.
B. Connect a minimum of two network Interface cards from the XenServer to the SCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA)_
C. Connect a minimum of two network interface cards to the SCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify’ that
both can access the iSCSl storage array.
D. Connect a minimum of two network interface cards to the iSCSl storage network, each on a separate Layer 3 network, and enable XenServer Multipathing

Case Study

A

D. Connect a minimum of two network interface cards to the iSCSl storage network, each on a separate Layer 3 network, and enable XenServer Multipathing

297
Q

Users must be able to connect remotely from their own mobile devices.
What should the architect consider to increase the security of the current authentication solution?

Adding a second authentication factor
Placing domain controllers in the DMZ for remote users
Shortening the Active Directory password expiration period
Populating the RDS user profile in the Active Directory user accounts

A

Adding a second authentication factor

298
Q

The architect recommended pooled desktop OS machines With Personal vDlsks for the Nurses, Imaging and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines?

Install the antivirus software into the base image.
Deploy the antivirus package as an App-V application.
Deploy the antivirus software through a Group Policy startup script.
Install the antivirus software in the master Personal vDlsk as a user-installed application.

A

Install the antivirus software into the base image.

299
Q

Why would the architect choose active-passive bonding when configuring bonded network interfaces for guest VM networks?

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical
interfaces in the bond.
It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond.
It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.

Case Study

A

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

300
Q

Which two design decisions should the architect recommend to improve the user experience? (Choose two.)

Configure Clipboard policy
Configure Drive encryption
Configure Flash redirection
Configure Media redirection

A

Configure Flash redirection

Configure Media redirection

301
Q

Scenario:
CGE wants to deploy a new StoreFront 2.6 infrastructure. End users will need to access both the legacy XenApp environment and the new XenApp and XenDesktop environment before they are fully migrated. The legacy and new environments have published applications and desktops With conflicting names, so only one should be accessible at a time.
CGE does NOT want to reconfigure the client during the migration, so any changes must be centrally managed.
How should a Citrix Architect recommend that the StoreFront infrastructure be configured to achieve the desired result?

A. Configure two stores with one Delivery Controller each, and configure the client using a configuration file.
B. Configure two separate StoreFront server groups, one for each environment. Use NetScaler load balancing to manage connections between the server groups.
C. Create one store, configured with Delivery Controllers from both environments. Use Active Directory Groups to associate end users to the appropriate environment.
D. Create one store, configured with Delivery Controllers from both environments. Configure an Application Filter using PowerShell to only show applications from the legacy environment.

Case Study

A

C. Create one store, configured with Delivery Controllers from both environments. Use Active Directory Groups to associate end users to the appropriate environment.

302
Q

What are the benefits of using a Hosted VDI environment with Personal vDlsk?

It retains the single image management function while allowing users to install applications
It provides a high level of security while allowing user customization
It has a low storage performance requirement and high user density
It retains the single mage management function yet allows application compatibility

A

It retains the single image management function while allowing users to install applications

303
Q

Why does using SmartAuditor help the company comply with its security policy?

Because it is a centralized, industry-standard log that is easily queried
Because It password-protects the audit logs for added security
Because It uses a standard TCP port
Because it collects logs from multiple devices

A

Because It password-protects the audit logs for added security

304
Q

Scenario:
CGE’s security administrator mandates that only Gateway sewices can reside in the DMZ and that all StoreFront traffic must be load balanced. The network administrator
requires a resilient solution.
Which design recommendation should a Citrix Architect make to meet these requirements?

Deploy six NetScaler appliances: two in each regional datacenter.
Deploy two NetScaler appliances: one In the primary and one In the secondary datacenter.
Deploy four NetScaler appliances: two In the primary and two In the secondary datacenter.
Deploy 12 NetScaler appliances: four In the primary and four In each regional datacenter.

Case Study

A

Deploy 12 NetScaler appliances: four In the primary and four In each regional datacenter.

305
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is creating a resource pool comprising a maximum of 16 XenServer hosts, using a shared virtual disk storage repository to provide XenMotion and high availability capabilities, and replicating meta Information to a failover Site the best design solution?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for
disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.
B. It ensures Simple setup With redundancy and meets the requirement of separating the OS types.
C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery.
D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability.

Case Study

A

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for
disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.

306
Q

Scenario:
A Citrix Architect Identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
How should the architect implement a set of Group Policies for each 0U?

Configure loopback processing with merge at the root level.
Configure loopback processing with replace at the root level.
Configure loopback processing with merge at the regional level.
Configure loopback processing with replace at the regional level.

A

Configure loopback processing with replace at the root level.

307
Q

Scenario:
CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect IS tasked With deploying this application to the Executives/
Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as a VM hosted app on Windows 7 x86 With Provisioning Services the best solution?

It supports 16-bit applications in an environment in which end users are already comfortable.
It meets the high-performance application demands of the Executives/Management end-user group.
It supports 16-bit applications and allows the Installation of custom applications.
It supports 16-bit applications, and offers faster change and rollback procedures.

Case Study

A

It supports 16-bit applications, and offers faster change and rollback procedures.

308
Q

Scenario:
CGE decided to virtualize Its Infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is creating resource pools comprising a maximum of eight XenServer hosts, performing dally backups of the infrastructure workloads, and using third-party backups for the desktops the best design solution?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for
disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.
B. It ensures simple setup With redundancy and meets the requirement of separating OS types.
C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery.
D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability.

Case Study

A

D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability.

309
Q

Which two budgetary items should the architect consider to meet the needs of remote users in the new environment? (Choose two.)

Microsoft licenses
NetScaler infrastructure
Additional mobile devices
Two-factor authentication solution

A

NetScaler infrastructure

Two-factor authentication solution

310
Q

Why is configuring CIFS on a NAS the best design solution for vDisk storage?

It is the least expensive solution.
It is a highly scalable and resilient solution.
It creates the least amount of administrative overhead.
It reduces the system footprint.

Case Study

A

It creates the least amount of administrative overhead.

311
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production.
Why does using Hypervisor templates and leveraging Workfow Studio to deploy desktops from templates help manage the image versioning process?

It allows for automatic, scripted upgrades of the deployment template.
It provides centralized, automated, single-image management.
It facilitates consistent deployment of base images.
It allows for scripts to be executed from the same network share as the deployment template.

Case study

A

It provides centralized, automated, single-image management.

312
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Sewices servers will be connected to a 10 Gbps network.
How should the architect implement a highly available Provisioning Sewices server on dedicated physical switches?

By installing multiple NICs in one Provisioning Services server in each datacenter
By deploying one Provisioning Services server on a dedicated switch in the primary and secondary datacenters
By deploying two Provisioning Services servers on dedicated switches in each datacenter
By using NetScaler With GSLBa to load balance the Provisioning Services servers on dedicated switches in each datacenter

A

By deploying one Provisioning Services server on a dedicated switch in the primary and secondary datacenters

313
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a prcu:ess for version control that includes thorough testing prior to production.
Why do using Hypervisor templates and WAIK help manage the image versioning process?

It reduces image deployment time.
It reduces the storage requirement for images.
It allows for testing updates prior to updating the production machine catalog.
It allows for testing updates prior to updating the production Delivery Group.

Case Study

A

It reduces image deployment time.

314
Q

Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?

HDX Monitor
Citrix Director
Citrix EdgeSight
Citrix AppCenter Console

Case Study

A

HDX Monitor

315
Q

Scenario:
A Citrix Architect Identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would Citrix policies, filtered by Client Name, ensure full control over which Group Policies are applied?

It provides central management and control.
It ensures that only settings With the correct filtering in Active Directory are applied.
It ensures that only settings located In the root Citrix OU are applied.
It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

It provides central management and control.

316
Q

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded to a
session policy, the best remote access design?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffic
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

It segments the Gateway and load-balancing features of the NetScaler appliances.

317
Q

How should the architect implement database high availability in SQL Server Express?

By using Always On Availabillty Groups
By using SQL Server mirroring
By Implementing SQL Server log shipping
By using the hypervisor high availability feature

A

By using the hypervisor high availability feature

318
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted VDI and manually installing the operating system?

It provides the highest end-user density at the lowest cost.
It provides the greatest level of end-user personalization and control.
It offers the lowest storage performance requirement and the highest end-user density.
It provides the lowest cost and the greatest application compatibility.

Case Study

A

It provides the greatest level of end-user personalization and control.

319
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront
servers, License Servers, and Microsoft SQL Servers for databases.
Why is using a maximum of 32 XenServ•er hosts, using a shared virtual disk storage repository for XenMotion, high availability, and the replication and backup of meta
information the best design for the resource pools?

A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a disaster recovery prcu:ess that leverages a backup solution.
B. It ensures Simple setup With redundancy.
C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery.
D. It ensures the separation of Infrastructure and virtual desktop workloads, which optimizes performance and high availability.

Case Study

A

D. It ensures the separation of Infrastructure and virtual desktop workloads, which optimizes performance and high availability.

320
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network.
How should the architect recommend that a highly available multi-homed Provisioning Semces server configuration be implemented?

By installing multiple NICs in the Provisioning Services server in each datacenter
By deploying one Provisioning Services server in the primary and one in the secondary datacenter
By deploying two Provisioning Services servers in the same datacenter
By using NetScaler with GSLB to load balance the Provisioning Services servers in each datacenter

A

By using NetScaler with GSLB to load balance the Provisioning Services servers in each datacenter

321
Q

How should the architect design the centralized log for NetScaler?

By Implementing SysLog
By monitoring the Windows Security Event logs
By sending NetScaler logging data to the SQL Reporting Sewices
By Implementing the SmartAuditor feature

A

By Implementing SysLog

322
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT as a published application on Windows Server 2008 R2 With Machine Creation Services the best solution?

It offers a faster change process.
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

It prevents XenApp server crashes.

323
Q

How many Provisioning Sewices servers should the architect install in the three configured sites?

One server in each datacenter
Two servers In each datacenter
Three servers In each datacenter
Two servers In the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter

Case Study

A

Two servers In each datacenter

324
Q

An architect needs to design a solution that optimizes resource usage for Call Center users.
How do server OS machines achieve this goal?

By offering optimal performance
By providing rapid application rollouts
By ensuring the greatest security level by design
By accommodating high user density on each server

A

By accommodating high user density on each server

325
Q

Scenario:
CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT in a Remote PC environment on Windows 7 with Machine Creation Semces the best solution?

It offers a faster change process.
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

It prevents XenApp server crashes.

326
Q

The company is implementing XenDesktop globally for desktop virtualization.
How should the architect recommend installment of controllers for high availability?

Install two controllers in each datacenter
Install three controllers In New York and three in London
Install three controllers In Hong Kong and three In New York
Install three controllers In New York and three In Oslo

A

Install two controllers in each datacenter

327
Q

A Citrix Architect plans to update the virtual environment in CGE’s Jurong datacenter.
Which constraint should the architect address to satisfy’ CGE’s stated business needs?

Lack of shared storage
1 Gb network infrastructure
Datacenter power and cooling
Mixed-server hardware landscape

Case Study

A

Lack of shared storage

328
Q

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with two NetScaler virtual servers for each appliance, each binded to a redirection policy, the best remote access design?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffic
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

It provides redundancy, while optimizing external WAN traffic

329
Q

Which profile type would NOT be suitable for the Back Office end-user group?

Local
Roaming
Mandatory
Citrix Profile management

Case Study

A

Mandatory

330
Q

How should the architect use XenConvert to facilitate image management?

To convert from a single server image to a hypemsor template
To convert from a single server image into a vitual disk in VHD format
To perform mass conversion ofvlftual machines to XenServer virtual machines
To perform an unattended conversion of a virtual machine to XenServer

A

To convert from a single server image into a vitual disk in VHD format

331
Q

Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
Which image management method should a Citrix Architect recommend to deploy server OS machines and desktop OS machines?

XenServer Fast Clone
Machine Creation Services
Provisioning Services
Windows Deployment Services

Case Study

A

Machine Creation Services

332
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing With replace at the regional level ensure full control over which Group Policies are applied?

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on.
B. It ensures that only Group Policies located in the regional OU are applied at the regional level when end users log on.
C. It ensures that only Citrix policies are applied at the regional level when end users log on.
D. It ensures that Group Policies located in the regional OU are replaced With Citrix policies.

A

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on.

333
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production.
Why does using Windows Deployment Sewices and deploying a base image from an WA file help manage the image versioning process?

It supports Hypervisors supported by XenDesktop
It helps manage version control.
It leverages storage array features to offload host processing
It automatically deploys the latest drivers and patches.

Case Study

A

It leverages storage array features to offload host processing

334
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
What are the benefits of using Hosted VDI and manually installing the operating system?

Highest user density and lowest cost
Highest level of user personalization
Lowest storage performance requirement and highest user density
Lowest cost and highest application compatibility

A

Highest level of user personalization

335
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
How should the architect recommend that the target devices boot from the provisioning server?

By configuring a Windows deployment server
By using SFTp
By using FTP
By using DHCP

A

By using DHCP

336
Q

Scenario:
CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity.
What should the architect recommend to alleviate existing issues and fulfill the requirements specified in the scenario?

A. Configure Citrix Profile management without folder redirection. Configure the Path to user store’ to the same location as the home drive. Configure the ‘Migration of
existing user profiles’ policy setting. Use group policy templates for configuration of Profile management policies.
B. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store’ to a central location different than the home drive.
Configure the ‘Migration of existing user profiles’ policy setting. Use _ini files for configuration of Profile management policies.
C. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store’ to a central location different than the home drive.
Configure the ‘Migration of existing user profiles’ policy setting. Use the group policy templates for configuration of Profile management policies.
D. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store’ to the same location as the home drive. Configure the
‘Migration of existing user profiles’ policy setting. Use .ini files for configuration of User Profile management policies.

Case Study

A

C. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store’ to a central location different than the home drive.
Configure the ‘Migration of existing user profiles’ policy setting. Use the group policy templates for configuration of Profile management policies.

337
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What are the benefits of using Hosted VDI With Provisioning Semces?

It provides the highest end-user density at the lowest cost.
It provides the greatest level of end-user personalization and control.
It facilitates rapid provisioning and provides the highest end-user density.
It provides the lowest cost and the greatest application compatibility.

Case Study

A

It provides the lowest cost and the greatest application compatibility.

338
Q

Scenario:
CGE decided to disable USB device redirection by default for all end users in the new environment using Citrix policies. The only exception is if there is a clear requirement for end users to have this functionality.
For which two end-user groups should a Citrix Architect configure an exception policy to enable USB device redirection? (Choose two.)

Research
Engineers
Back Office
Technicians

Case Study

A

Engineers

Technicians

339
Q

Which three statements are true regarding the Radiology group? (Choose three.)

A. Mobility is important to Rad ology users.
B. Mobility is unimportant to Radiology users.
C. Virtualization resource requirements are high.
D. Smooth Roaming IS important to Rad ology users.
E. Virtualization resource requirements are moderate.
F. Smooth Roaming IS unimportant to radiology users.

A

B. Mobility is unimportant to Radiology users.
C. Virtualization resource requirements are high.
D. Smooth Roaming IS important to Rad ology users.

340
Q

The IT Help Desk Administrator at CCH needs to shadow a user session for application troubleshooting purposes. Which two permissions need to be set in the
environment? (Choose two.)

Read-Only Administrator
Microsoft Group Policy settings for RDS
Microsoft Group Policy settings for Remote Assistance
Perform Remote Assistance on a machine role permission

A

Microsoft Group Policy settings for Remote Assistance

Perform Remote Assistance on a machine role permission

341
Q

Why should disk and network I/O be used to identify’ bottlenecks?

A. High disk and network I/O utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources
to handle the load.
B. High disk and network I/O utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks_
C. High disk and network I/O utilization of the Delivery Controller can Indicate that a high number of processor-intensive applications are being utilized by the virtual
desktop users.
D. High disk and network I/O utilization of the Delivery Controller can indicate the presence of a virus or malware.

A

B. High disk and network I/O utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks_

342
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
What are the benefits of using Hosted VDI with Machine Creation Semces?

Highest user density and lowest cost
Highest level of user personalization
Lowest storage performance requirement and highest user density
Lowest cost and highest application compatibility

A

Highest user density and lowest cost

343
Q

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.
What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

A. 50 Mb/s
B. 150 Mb/s
C. 300 Mb/s
D. 600 Mb/s

Case Study

A

B. 150 Mb/s

344
Q

What are the benefits of using SSL to meet the company’s compliance requirements?

It eliminates the need to distribute an internal root certificate
It encrypts end-to-end traffic from remote users
It is required to enable the SSI_ Relay semce
It provides secure Internal and external network communication

A

It provides secure Internal and external network communication

345
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that SecurelCA be implemented?

By using NetScaler
By enabling SecurelCA on delivery groups
By Implementing an Active Directory Group Policy to configure SecurelCA
By installing an SSI_ certificate in the master image

A

By enabling SecurelCA on delivery groups

346
Q

An architect is evaluating the user profile management solution for the desktop and application virtualization solution. Which two pieces of information should the architect collect? (Choose two.)

A.  User time zone 
B.  User profile size 
C.  Installed language pack 
D.  Client device CPU/RAM 
E.  Application compatibililty of profile type
A

B. User profile size

E. Application compatibililty of profile type

347
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would implementing one GPO in each region ensure full control over which GPOs are applied?

It provides central management and control.
It ensures that only policies With the correct filter in Active Directory are applied
It ensures that only settings located In the root OU are applied.
It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

It provides central management and control.

348
Q

Why is a design With 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for Gateway traffic and an HA pair in the DMZ for load balancing, the best remote access design?

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
B. It provides redundancy, while optimizing external WAN traffic
C. It segments the Gateway and load-balancing features of the NetScaler appliances.
D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

349
Q

Why does using PvD enable the Radiology group to maintain user changes?

Because it maintains user changes independent of the base image
Because it retains user registry information
Because it allows users to use local profiles
Because it retains computer policy settings from Active Directory GPO

A

Because it maintains user changes independent of the base image

350
Q

Why does using XenConvert help manage the image release process?

Because it reduces image deployment time
Because it reduces the storage requirement for images
Because it simplifies the prcu:ess of converting images
Because it provides a console to create and monitor the conversion process

A

Because it provides a console to create and monitor the conversion process

351
Q

How can the architect identify if the Provisioning Services servers are the source of a bottleneck?

Identify excessive CPU and memory consumption
Identify excessive memory and network utilization
Identify excessive CPU and network I/O
Identify excessive disk I/O and page file utilization

A

Identify excessive CPU and network I/O

352
Q

Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network.
What should the architect recommend?

Multi-homed Provisioning Services servers on existing server VLANs
Multi-homed Provisioning Services server on dedicated VLANs
Multi-homed Provisioning Services server on a dedicated physical switch
Multi-homed Provisioning Services server With NetScaler App Firewall

A

Multi-homed Provisioning Services server on dedicated VLANs

353
Q

Scenario:
To ensure the security of its new solution, CGE wants to limit end-user access to USB peripherals. Policies have been implemented to disable USB redirection for all end
users. As a company policy, only the Research end-user group will be allowed to access USB peripheral devices.
What could a Citrix Architect design to meet the stated requirements?

A GPO that allows USB redirection, linked to the CGE OU
A GPO that allows USB redirection, linked only to the Aberdeen and Houston OUs
A Citrix policy that allows USB redirection, With a filter on the IP range for CGE’s Aberdeen and Houston subnets.
A Citrix policy that allows USB redirection, With a filter on the Delivery Group for the Research end-user group desktop.

Case Study

A

A Citrix policy that allows USB redirection, With a filter on the Delivery Group for the Research end-user group desktop.

354
Q

Scenario:
CGE is experiencing numerous Issues With Its existing profile management solution. The Citrix Architect managing the project IS tasked with designing a solution that
alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal
complexity.
Why does enabling file and folder exclusions when configuring Citrix Profile management to allow standardization of profiles benefit CGE’s Sales end-user group?

It minimizes the required storage needed for folder redirection.
It simplifies home drive cleanup.
It Improves application performance.
It allows faster logons and logoffs

Case Study

A

It minimizes the required storage needed for folder redirection.

355
Q

What should a Citrix Architect recommend to ensure that streaming traffic is segmented and highly available?

Provisioning Services servers on a shared VLAN.
Provisioning Services servers using NetScaler.
Provisioning Services servers on dedicated physical switches.
Provisioning Services servers on dedicated VLANs.

A

Provisioning Services servers on a shared VLAN.

356
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
Why does using IPsec meet CGE’s compliance requirements?

It encrypts internal network traffcic
It encrypts ICA traffic from remote end users.
It enables the SSL Relay service.
It complies With Industry-standard SSL encryption requirements.

A

It encrypts ICA traffic from remote end users.

357
Q

Scenario:
CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity.
Why does enabling ‘Offine profile support’ when configuring Citrix Profile management to allow standardization of profiles benefit CGE’s Sales end-user group?

It allows faster logon/logoff.
It minimizes the required storage needed for folder redirection.
It simplifies home drive cleanup.
It improves data accuracy in volatile environments.

Case Study

A

It allows faster logon/logoff.

358
Q

Scenario: An analysis of CGE’s applications shows that are compatible with Windows 8 64-bit and Windows Server 2012. The remaining applications are incompatible with a 64-bit operating system.
Which solution should a Citrix Architect recommend to enable the delivery of the incompatible applications?

A. Use VM Hosted Apps to deliver the incompatible applications from a Windows 7 32-bit desktop.
B. Use an existing XenApp 6.6 farm to deliver the incompatible applications using a 64-bit desktop.
C. Stream the application with Microsoft App-V and deliver the incompatible applications using a 64-bit desktop.
D. Publish the applications from a XenApp 7.6 session host to deliver the incompatible applications to a 64-bit desktop.

Case Study

A

A. Use VM Hosted Apps to deliver the incompatible applications from a Windows 7 32-bit desktop.

359
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
What are the benefits of using local VMs?

Compatibility with tablet devices
Highest level of user personalization
Supports a variety of hardware configurations from a single image
Remote access to applications

A

Compatibility with tablet devices

360
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
How should the architect recommend that SSI_ be implemented?

By installing certificates on Citrix infrastructure components
By configuring an Active Directory Group Policy to distribute SSL certificates
By installing a certificate authority server in the DMZ
By installing an SSI_ certificate in the master image

A

By configuring an Active Directory Group Policy to distribute SSL certificates

361
Q

Which current infrastructure limitation prevents doctors in London from working remotely if the London datacenter shuts down unexpectedly?

There are no roaming user profiles
There is no failover datacenter for London
There are no backups of the SQL Server databases
There is no disaster recovery plan for the mobile workforce

A

There is no disaster recovery plan for the mobile workforce

362
Q

Scenario:
CGE decided to vitualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
How should the architect recommend that the Synchronizer be deployed?

By using a Hyper-V virtual appliance on Hyper-V
By installing the Synchronizer software on a Hyper-V server
By booting from the Synchronizer ISO image
By installing a Synchronizer virtual appliance on XenServer

Case Study

A

By installing a Synchronizer virtual appliance on XenServer

363
Q

Why is hypervisor high availability an essential component of a production database server?

Because the Delivery Controller is stateless
Because server maintenance can be performed online
Because It prevents local host cache corruption
Because user data loss is prevented If a session is disconnected

A

Because the Delivery Controller is stateless

364
Q

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.
How should a Hosted VDI FlexCast model be implemented to allow end-user-installed applications?

By using Citrix Profile management
By using Personal vDlsks
By using statically assigned virtual desktops
By using a network share that contains the App-V packages

A

By using Personal vDlsks

365
Q

How should the architect configure high availability (HA) on a Windows File Server so that Provisioning Sewices always has access to the Provisioning Sewices images7

By using Distributed File Services
By using Clustered File Services
By using DNS Round Robin
By using XenServer With HA enabled

Case Study

A

By using Clustered File Services

366
Q

Why does using hypervisor templates help manage the image release process?

Because they automat cally upgrade virtual desktops to the latest operating system version
Because they provide centralized, automated single mage management
Because they facilitate consistent deployment of base images
Because they can be stored on shared or local storage

A

Because they facilitate consistent deployment of base images

367
Q

Scenario:
A Citrix Architect Identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing with merge at the regional level ensure full control over which Group Policies are applied?

A. It ensures that only Group Policies With the correct filtering in Active Directory are applied at the regional level when end users log on.
B. It ensures that only Group Policies located In the regional Citrix OU are applied at the regional level when end users log on.
C. It ensures that only Citrix policies are applied at the regional level when end users log on.
D. It ensures that Group Policies located In the regional OU are merged With Citrix policies.

A

B. It ensures that only Group Policies located In the regional Citrix OU are applied at the regional level when end users log on.

368
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
Which type of encryption should a Citrix Architect recommend?

SecurelCA
IPsec
SSL
L2TP

A

SSL

369
Q

Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
Why is Provisioning Semces the best image management method for this environment?

It provides centralized image management.
It reduces the storage footprint.
It reduces network traffic
It reduces Infrastructure server requirements.

Case Study

A

It provides centralized image management.

370
Q

The company is implementing XenDesktop globally for desktop virtualization.
How should the architect recommend installment of controllers for high availability?

Install one controller in London and one in Paris
Install one controller in New York and one in Hong Kong
Install one controller in Hong Kong and one in Tokyo
Install one controller in New York and one in London

A

Install one controller in New York and one in Hong Kong

371
Q

Scenario:
CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity.
How can Citrix Profile management be configured for Sales end-user group profiles?

Enable file and folder exclusions
Enable ‘Active write back’
Enable ‘Offine profile support’
Enable Profile streaming’

Case Study

A

Enable file and folder exclusions

372
Q

Scenario:
CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.
ow should the architect recommend that L2TP be implemented7

By using NetScaler
By Implementing secure Delivery Groups
By configuring an Active Directory Group Policy to configure L2TP
By Installing a Windows Server OS With Routing and Remote Access Service

A

By Installing a Windows Server OS With Routing and Remote Access Service

373
Q

How should the architect specify’ that StoreFront logs are collected?

By enabling tracing and automating collection of log files
By enabling tracing and monitoring Windows Event logs
By gathering data from the IIS Manager console and archiving it on a network share
By enabling the SmartAuditor feature and IIS logging

A

By enabling tracing and automating collection of log files

374
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing With replace on a GPO linked to all OU’s containing Delivery Controllers ensure full control over which Group Policies are applied?

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.
It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.
It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.
It ensures that GPOs located in the root Citrix OU are replaced With Citrix policies.

A

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.

375
Q

A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image.
Which two factors helped guide the architects recommendation? (Choose two.)

A reduction in Hotfix testing time
CGE’s planned upgrade to Microsoft Office 2013
The use of both applications by all CGE end users
End-user complaints about slow application launch times

Case Study

A

The use of both applications by all CGE end users

End-user complaints about slow application launch times

376
Q

Why would having one farm With one configured site, With two Provisioning Services servers in the primary datacenter, two in the secondary datacenter, and one in the remaining datacenter, meet the requirements of a regional single-image management strategy With minimal WAN traffic across datacenters?

A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region.
B. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability between regions.
C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.
D. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability within each region

Case Study

A

D. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability within each region

377
Q

Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.)

A. Single-factor authentication is used for external access.
B. There are Single Secure Gateway servers In some locations.
C. NetScaler Gateway IS being used to load balance StoreFront.
D. There IS no automatic failover between regions for end users.

Case Study

A

B. There are Single Secure Gateway servers In some locations.

D. There IS no automatic failover between regions for end users.

378
Q

Scenario:
A Citrix Architect is designing a multi-server Provisioning Semces solution for CGE_ The solution must be highly available and minimize the risk of vDlsk inconsistency.
Why does implementing high-speed local storage with deduplication satisfy’ the requirements?

It provides striping.
It provides the highest performance.
It provides fault tolerance.
It provides minimal disk usage.

Case Study

A

It provides the highest performance.

379
Q

What should a Citrix Engineer implement to allow users with pooled desktops to maintain persistent configurations, such as installation of new applications in their desktops?

Personal vDlsk 
Roaming profiles 
Folder redirection 
Personal network drives 
Citrix Profile Management
A

Folder redirection

380
Q

Scenario: The Engineers end-user group requires access to an application that automatically updates itself daily from an Internet source. The application is NOT multi-user aware.
Which FlexCast model would be most suitable for these end users?

Local VM
Remote PC Access
Hosted Shared Desktop - Non-Persistent
Hosted VDI - Static/Non-Persistent with Personal vDlsk

Case Study

A

Hosted VDI - Static/Non-Persistent with Personal vDlsk

381
Q

Scenario:
CGE decided to virtualize Its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Which XenServer resource pool design should a Citrix Architect recommend to host all required workloads?

A. Create two resource pools: one for the infrastructure workloads and one for the Server OS machine and Desktop OS machine workloads.
B. Create one dedicated resource pool for the Infrastructure, Server OS machine, and Desktop OS machine workloads.
C. Create three resource pools: one each for the Infrastructure, the Server OS machine, and the Desktop OS machine workloads.
D. Create three dedicated resource pools: one for the Delivery Controllers, one for vitual Server OS machine and Desktop OS machine workloads, and one for
Infrastructure workloads.

Case Study

A

C. Create three resource pools: one each for the Infrastructure, the Server OS machine, and the Desktop OS machine workloads.

382
Q

Scenario:
Each XenServer hypervisor host is configured with four 10Gb NICS - two dedicated for storage and two bonded for guest VM networks and management separated by VLAN.
The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing.
How should the architect configure the guest VM network?

Using active-active bonding
Using active-passive bonding
Using XenSever MPIO redundancy
Using LACP bonding

Case Study

A

Using LACP bonding

383
Q

Scenario:
A Citrix Architect is designing a multi-server Provisioning Semces solution for CGE The solution must be highly available and minimize the risk of vDlsk inconsistency.
How should the architect configure the local vDlsk storage for fault tolerance and high performance?

By implementing RAID 0
By implementing RAID 1
By implementing high-speed local storage with deduplication
By implementing RAID 10

Case Study

A

By implementing RAID 10

384
Q

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server for each appliance binded to a session policy, the best remote access design for the environment?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

It provides redundancy, while optimizing external WAN traffic

It segments the Gateway and load-balancing features of the NetScaler appliances.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Case Study

A

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

385
Q

Scenario: A Citrix Architect recommends upgrading CGE’s Provisioning Services 6.1 environment to Provisioning Services 7.6. Currently, VDisks in Provisioning Services 6.1 are configured with the write cache location on the target device hard drive.
Which two applications will show increased application performance due to the upgrade to Provisioning Services 7.6? (Choose two.)

SAP
Salesforce
OpenGL (CAD)
Proprietary Energy App

Case Study

A

OpenGL (CAD)

Proprietary Energy App

386
Q

What are the benefits of using L2TP to meet the company’s compliance requirements?

It encrypts internal ICA traffic
It encrypts ICA traffic from remote users
It is required to enable the SSL Relay sewice
It complies with industry-standard SSL encryption requirements.

A

It encrypts ICA traffic from remote users

387
Q

Which two factors should a Citrix Architect consider with regard to CGE’s Back Office end-user group? (Choose two.)
Their need for a special application set
Their need to access additional printers
Their need to Install their own applications
Their need to use non-corporate-owned devices

Case Study

A

Their need for a special application set

Their need to access additional printers

388
Q

The architect should recommend a Universal License because it is required for
(Choose the phrase that correctly completes the sentence.)

ICA Proxy
SmartAccess
Two-factor authentication
SSL access inside the network

A

SmartAccess

389
Q

How should a Streamed VHD environment be configured to allow user-installed applications?

By configuring Streamed VHD in Standard mode
By implementing Personal vDlsk
By configuring Streamed VHD in Private mode
By providing access to the network share that contains the App-V packages

A

By implementing Personal vDlsk

390
Q

Why should CPU and memory consumption be used to identify’ bottlenecks?

Excessive CPU and memory consumption will slow the loading of vDlsks and cache files by Provisioning Serviices
Excessive CPU and memory consumption on the vDlsk store will slow down the PXE boot process.
Excessive CPU and memory consumption can increase fragmentation of the TFTP boot strap file.
Excessive CPU and memory consumption can increase fragmentation of the vDlsks_

A

Excessive CPU and memory consumption will slow the loading of vDlsks and cache files by Provisioning Services

391
Q

Scenario:
CGE needs to define its management prcu:ess for desktop image releases. Some groups need a process for version control that includes thorough testing prior to
production.
How should the architect use Machine Creation Sewices to facilitate image management?

By using Fast Clones
By using Machine Creation Services policies
By using snapshots
By using the Windows Automatic Install Kit (WAIK)

Case Study

A

By using Fast Clones

392
Q

Scenario:
CGE needs to define its management process for desktop image releases. Some groups need a prcu:ess for version control that includes thorough testing prior to
production.
Why does using Hypemsor templates and leveraging the Hypemsor API to deploy desktops from templates help manage the image versioning process?

It allows for the automatic upgrade of the virtual desktops to the latest OS version.
It provides centralized, automated, single-mage management.
It facilitates consistent deployment of base Images.
It allows for templates to be stored on shared or local storage.

Case Study

A

It provides centralized, automated, single-mage management.

393
Q

Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter?

Server infrastructure
Network connectivity
Storage infrastructure
Power and cooling infrastructure

Case Study

A

Power and cooling infrastructure

394
Q

The company decided to virtualize their server workloads and provide a Virtual solution to all of their users. The server workloads include Delivery Controller, Citrix component servers (StoreFront, License Server), and Microsoft SQL Server for databases. How should the XenServer resource pools be designed to host all required workloads?

A. Create two resource pools, one for the server workloads and one for the server OS machine and desktop OS machine workloads.
B. Create one resource pool for the server, server OS machine, and desktop OS machine workloads.
C. Create three resource pools: one for the server workloads, one for the server OS machine workloads, and one for the desktop OS machine workloads.
D. Create three dedicated resource pools: one for the Delivery Controllers; one for virtual server OS machine and desktop OS machine workloads; and one for related Infrastructure (StoreFront, Provisioning Semces, backend database server, domain controller) workloads.

A

C. Create three resource pools: one for the server workloads, one for the server OS machine workloads, and one for the desktop OS machine workloads.

395
Q
Which two CGE end-user groups do NOT currently have their profile settings retained between sessions? (Choose two.) 
Sales 
Engineers 
Technicians 
Executives/Management 

Case Study

A

Engineers

Technicians

396
Q

All nurses currently use Windows XP workstations to access critical med cal applications and require different applications depending on their role. Which two delivery
models meet the nurses’ requirements? (Choose two.)

A. Local VM deployment with streamed applications
B. Streamed VHD deployment with streamed applications
C. Hosted server OS deployment with locally installed applications
D. Hosted desktop OS deployment With locally installed applications

A

C. Hosted server OS deployment with locally installed applications
D. Hosted desktop OS deployment With locally installed applications

397
Q

How should the architect design the image management process using Windows SysPrep?

A. Prepare an existing machine as the master image.
B. Install a new Windows mage utilizing a XenServer virtual machine and prepare it as the master image and install the delivery agent. Run SysPrep on the virtual
machine.
C. Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards.
D. Run XenConvert on an existing machine.

A

Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards.

398
Q

How should the architect design the image management process using Windows SysPrep?

A. Prepare an existing machine as the master image.
B. Install a new Windows mage utilizing a XenServer virtual machine and prepare it as the master image and install the delivery agent. Run SysPrep on the virtual
machine.
C. Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards.
D. Run XenConvert on an existing machine.

A

C. Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards.

399
Q

Scenario:
A Citrix Architect IS asked to design a new external access architecture for CGE The regional datacenters have NetScaler appliances delivering load-balancing sewices_
Security policy mandates that these internal appliances CANNOT connect to the DMZ.
How should the architect configure the callback URL With a high availability pair of NetScalers located in all three regional datacenters?

A. Configure the cal back URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
B. Configure the cal back URL to point to the external address, https://secure_cge_com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
C. Configure the cal back URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery
Controllers.
D. Configure the cal back URL to point to the external beacon address.

A

D. Configure the cal back URL to point to the external beacon address.

400
Q

Why does using SysLog help the company comply with its security policy?

Because it is a centralized, industry-standard log that is eas ly queried
Because It password-protects the audit logs for added security
Because It uses a standard TCP port
Because It collects logs from multiple devices

A

Because it is a centralized, industry-standard log that is eas ly queried

401
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring loopback processing With merge at the root level ensure full control over which Group Policies are applied?

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.
B. It ensures that only Group Policies located In the root Citrix OU are applied below the root level when end users log on.
C. It ensures that only Group Policies located In the root Citrix OU are applied below the root level when end users log on.
D. It ensures that Group Policies located In the root Citrix OU are merged With Citrix policies.

A

D. It ensures that Group Policies located In the root Citrix OU are merged With Citrix policies.

402
Q

Scenario:
CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but
would like to limit infrastructure requirements.
How should the architect design the image management process using XenServer Fast Clone?

A. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image.
B. Install a new Windows mage utilizing a XenServer vitual machine prepared as the master mage, Install the Virtual Delivery Agent (VOA), and convert the virtual
machine image to a template.
C. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VOA), and convert the virtual
machine image to a vDisk using XenConvert_
D. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and include XenTools_

Case Study

A

C. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VOA), and convert the virtual
machine image to a vDisk using XenConvert_

403
Q

Scenario:
CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system Instability.
How should the architect deploy MGMT as an On-Demand App?

A. As a VM hosted app on Windows 7 x86 deployed With Machine Creation Services
B. As a VM hosted app on Windows 7 x86 deployed With Provisioning Services
C. As a published application on Windows Server 2008 R2 deployed With Machine Creation Services
D. As a published application on Windows Server 2012 R2 deployed With Provisioning Services

Case Study

A

B. As a VM hosted app on Windows 7 x86 deployed With Provisioning Services

404
Q

Scenario:
CGE is experiencing numerous Issues with Its existing profile management solution. The Citrix Architect managing the project IS tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling file and folder exclusions when configuring Citrix Profile management without folder redirection benefit CGE’s Sales end-user group?

It minimizes the required storage needed for folder redirection.
It simplifies home drive cleanup.
It Improves application performance.
It allows faster logons and logoffs.

Case Study

A

It minimizes the required storage needed for folder redirection.

405
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would enabling loopback processing With merge on a GPO linked to all OUS containing Virtual Desktop Agents ensure full control over which Group Policies are
applied?

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on.
B. It ensures that only Group Policies located In or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on.
C. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
D. It ensures that GPOs located In the root Citrix OU are replaced With Citrix policies.

A

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on.

406
Q

Scenario:
CGE decided to vitualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.
Why is Machine Creation Services the best image management process for this environment?

It provides centralized image management and has fewer Infrastructure requirements.
It results in less network complexity.
It reduces network traffc_
It does NOT require TFTP and DHCP configuration.

Case Study

A

It provides centralized image management and has fewer Infrastructure requirements.

407
Q

Scenario:
CGE has two StoreFront server groups. End users need to be able to roam between regions but keep their individual application subscriptions.
What should a Citrix Architect recommend to fulfill this requirement and keep management overhead to a minimum?

Configure all regions to be part of the same server group.
Configure a mandatory store in StoreFront to keep consistent application sets.
Copy the end-user subscription database between the server groups manually.
Configure scheduled subscription replication between server groups using PowerShell

Case Study

A

Configure scheduled subscription replication between server groups using PowerShell

408
Q

Scenario:
CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy.
It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan
must also be available after upgrades, since it can often result in system instability.
Why is deploying MGMT In a Hosted Shared environment on Windows Server 2008 R2 with Provisioning Services the best solution?

It offers a faster change process
End users are already comfortable working in a shared environment.
It prevents XenApp server crashes.
It enables faster rollbacks.

Case Study

A

It enables faster rollbacks.

409
Q

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured With a Gateway vServer the best design solution?

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
It provides redundancy, while optimizing external WAN traffic
It segments the Gateway and load-balancing features of the NetScaler appliances.
It allows for the expected expansion of remote access usage and provides SSI_ VPN functionality for future needs.

Case study

A

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

410
Q

Scenario:
CGE decided to virtualize Its Infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
Why is separating workloads by roles, creating a resource pool comprising a maximum of eight XenServer hosts, and Implementing a storage repository for virtual disks, XenMotion, high availability, and disaster recovery backups the best design solution?

A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups
create minimal downtime for critical workloads.
C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Case Study

A

B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups
create minimal downtime for critical workloads.

411
Q

Why does using SmartAuditor help the company comply with its security policy?

Because it records ICA sessions
Because it uses proprietary codec
Because it enables sessions to be searched
Because it provides configuration changes for an audit trail

A

Because it records ICA sessions

412
Q

Which two operational risks exist in CGE’s current environment? (Choose two.)

Only one farm is running multiple zones.
A test environment is NOT in place.
Web Interface is NOT highly available in all regions.
The London datacenter uses SAN storage.

A

A test environment is NOT in place.

Web Interface is NOT highly available in all regions.

413
Q

How can the architect identify’ if the Delivery Controller is the source of a bottleneck?

Identify’ excessive memory and network utilization
Identify’ excessive CPU consumption
Identify’ excessive disk and network I/O
Identify’ excessive disk I/O and page file utiIization

A

Identify’ excessive CPU consumption

414
Q

Scenario:
A Citrix Architect identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would creating Citrix policies within a GPO, filtered by end user and Delivery Group, ensure full control over which GPOs are applied?

It provides central management and control.
It ensures that only policies with the correct filter in Active Directory are applied.
It ensures that only settings located in the root OU are applied.
It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

Virtual Desktop Agents where end users log on.

415
Q

Scenario:
A Citrix Architect Identifies a fault in the Active Directory design for CGE’s existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active
Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.
Why would configuring the Citrix policies in the GPOs ensure full control over which Group Policies are applied?

A. It provides central management and control.
B. It ensures that only settings With the correct filtering in Active Directory are applied.
C. It ensures that only settings located In the root Citrix OU are applied.
D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

A

A. It provides central management and control.

416
Q

Why should the each component be located at each datacenter?

This design allows for site failover and increases security for remote access
This design reduces component design complexity
This design simplifies administration of components
This design prevents user experience from being affected in the event of a site outage.

A

This design allows for site failover and increases security for remote access

417
Q

An architect is recommending an antivirus policy for Provisioning Sewices servers that are being used to provision pooled desktops. Which two options should the architect recommend for optimal performance? (Choose two.)

Enable scan on read
Prohibit write cache scanning
Increase scheduled scanning frequency
Exclude scanning of the target device drivers

A

Prohibit write cache scanning

Exclude scanning of the target device drivers

418
Q

Wh ch two risks exist in the access layer of the CGE environment? (Choose two.)

Secure Gateway is used by some sites.
Single-factor authentication IS In use for external end users.
Receiver for mobile devices IS Installed from third-paty stores.
End-user connections from non-corporate-owned devices are allowed.

Case Study

A

Secure Gateway is used by some sites.

Single-factor authentication IS In use for external end users.