Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1Y0-241 Questions and Answers

Question # 6

How can a Citrix Administrator configure a rewrite policy to change the version of HTTP from 1.1 to 1.0 in every request?

A.

>add rewrite action RW_ACT replace http.res.version “\”HTTPS/1.0\””

> add rewrite policy RW_POL true RW_ACT

B.

>add rewrite action RW_ACT replace http.req.version “\”HTTPS/1.1\””

> add rewrite policy RW_POL true RW_ACT

C.

>add rewrite action RW_ACT replace http.res.version “\”HTTPS/1.1\””

> add rewrite policy RW_POL true RW_ACT

D.

>add rewrite action RW_ACT replace http.req.version “\”HTTPS/1.0\””

> add rewrite policy RW_POL true RW_ACT

Full Access
Question # 7

What is the effect of the “set cs vServer-CS-1 –redirectURL http://www.newdomain.com/mysite/” command?

A.

If the vServer-CS-1 encounters a high connection rate, then users will be redirected to http://www.newdomain.com/mysite/.

B.

If the status of vServer-CS-1 is DOWN, then users will be redirected to http://www.newdomain .com/mysite/.

C.

All the requests to vServer-CS-1 will be redirected to http://www.newdomain.com/mysite/.

D.

All the requests without URL path/mysite/ will be redirected to http://www.newdomain.com/mysite/.

Full Access
Question # 8

Scenario: A Citrix ADC receives packets destined for a MAC address owned by the Citrix ADC. The destination IP address of the packets does NOT belong to the Citrix ADC. Layer 3 mode is enabled by default on the Citrix ADC.

The Citrix ADC will __________ the packets in this scenario. (Choose the correct option to complete the

sentence.)

A.

route

B.

process

C.

bridge

D.

drop

Full Access
Question # 9

Scenario: A Citrix Administrator installed the compression feature on the web servers. To offload the compression on the Citrix ADC, the administrator configured the Citrix ADC appliance to remove the ‘Accept Encoding’ header from all HTTP client requests. However, the administrator observes that data is NOT being compressed by the Citrix ADC, even though the ‘Accept Encoding’ header is being removed from all requests.

What could be the cause of this issue?

A.

The rewrite policy is bound at an incorrect bind point

B.

The servers are automatically compressing all responses

C.

The compression policy needs to be reconfigured

D.

Servercmp is disabled on the Citrix ADC

Full Access
Question # 10

A Citrix Administrator needs to configure a Citrix ADC high availability (HA) pair with each Citrix ADC in a different subnet.

What does the administrator need to do for HA to work in different subnets?

A.

Configure SyncVlan

B.

Turn on fail-safe mode.

C.

Turn on HA monitoring on all interfaces

D.

Turn on Independent Network Configuration (INC) mode.

Full Access
Question # 11

Scenario: A Citrix Administrator is configuring load balancing on a Citrix ADC appliance for company web servers. The administrator needs to create a custom monitor that will look for a specific keyword response from the website, which will be used to keep services in an UP state.

Which monitor can the administrator create to meet this requirement?

A.

An HTTP-ECV monitor with the keyword in the Special Parameters - Receive String field

B.

An HTTP-ECV monitor with the keyword in the Basic Parameters - Receive String field

C.

An HTTP-ECV monitor with the keyword in the Special Parameters - Receive String field, and the Reverse option enabled

D.

An HTTP-ECV monitor with the keyword in the Basic Parameters - Send String field

Full Access
Question # 12

Scenario: While using the GUI, a Citrix ADC MPX appliance becomes unresponsive. A Citrix Administrator needs to restart the appliance and force a core dump for analysis.

What can the administrator do to accomplish this?

A.

Turn off the appliance using the power button.

B.

Use the reset button on the front of the appliance.

C.

Use the NMI button on the back of the appliance.

D.

Connect to a USB port to issue a restart command.

Full Access
Question # 13

Scenario: A Citrix Administrator manages an environment that has an externally accessible website. The administrator would like to provide end-to-end encryption and use features such as caching and compression on the Citrix ADC.

Which setting should the administrator configure to meet this requirement?

A.

SSL front-end, HTTP backend

B.

SSL_TCP front-end, SSL_TCP backend

C.

SSL front-end, SSL backend

D.

SSL_TCP front-end, TCP backend

Full Access
Question # 14

A Citrix Administrator deploys a new Citrix ADC MPX appliance in the demilitarized zone (DMZ), with one interface in the DMZ and the other on the internal network.

In which mode should the administrator deploy the Citrix ADC?

A.

One-arm

B.

Two-arm

C.

Transparent

D.

Forward proxy

Full Access
Question # 15

Scenario: In general, it is recommended to do the following:

Use _________ if you want the Citrix ADC to reset or drop a connection based on a client or request-based parameter.

Use _________ to redirect traffic or respond with custom messages.

Use _________ for manipulating data on HTTP requests and responses.

A.

rewrite, rewrite, responder

B.

responder, responder, rewrite

C.

rewrite, responder, rewrite

D.

responder, redirect, rewrite

Full Access
Question # 16

Which two protocols would provide end-to-end data encryption, while allowing a Citrix ADC to optimize the responses? (Choose two.)

A.

HTTP protocol for the services

B.

SSL bridge protocol for the vServer

C.

SSL bridge protocol for the services

D.

SSL protocol for the services

E.

HTTP protocol for the vServer

F.

SSL protocol for the vServer

Full Access
Question # 17

Scenario: A Citrix Administrator executed the following command in a global server load balancing (GSLB) environment:

set gslb site SiteB –triggerMonitor MEPDOWN

What will be the effect of this command on the default service monitoring behavior on a remote site?

A.

The service monitor is invoked only when Metric Exchange Protocol (MEP) has marked the service as DOWN.

B.

The service monitor is invoked only when Metric Exchange Protocol (MEP) connectivity has been lost between Site A and Site B.

C.

The service monitor will take precedence over Metric Exchange Protocol (MEP).

D.

The state of the GSLB service will always be controlled by Metric Exchange Protocol (MEP).

Full Access
Question # 18

When a Citrix ADC high availability (HA) pair failover occurs, by what method does the Citrix ADC communicate to the network switches and routers that IP-to-MAC address bindings have changed?

A.

Reverse ARP (RARP) to update the network devices

B.

MAC-based forwarding (MBF) to update the routers

C.

Proxy ARP to update the network devices

D.

Gratuitous ARPs (GARPs) to update the network devices

Full Access
Question # 19

Scenario: A Citrix Administrator configured the rewrite policies below:

bind lb vServer VIP1_http -policyName POL_14 -priority 120 -gotoPriorityExpression END -type REQUEST

bind lb vServer VIP1_http -policyName POL_12 -priority 90 -gotoPriorityExpression NEXT -type REQUEST

bind lb vServer VIP1_http -policyName POL_15 -priority 100 -gotoPriorityExpression END -type REQUEST

bind lb vServer VIP1_http -policyName POL_13 -priority 101 -gotoPriorityExpression NEXT -type REQUEST

Which policy will be evaluated last considering POL_12 is hit first?

A.

POL_12

B.

POL_13

C.

POL_14

D.

POL_15

Full Access
Question # 20

Scenario: While performing a disaster recovery test, a Citrix Administrator decides to failover the Citrix ADC high availability (HA) pair appliances. The administrator notices that the failover is NOT working as expected, and the secondary Citrix ADC is NOT taking over as primary. The administrator suspects that networking issues may be causing the failure.

What could be the cause of this issue?

A.

HA monitoring is enabled on an interface of the secondary node that shows as ENABLED, DOWN.

B.

The Independent Network Configuration (INC) mode is enabled on the primary node.

C.

HA monitoring is enabled on a disabled interface of the primary node.

D.

HA heartbeats are only seen on some enabled interfaces of the secondary node.

Full Access
Question # 21

Scenario: A Citrix Administrator executed the following commands on the Citrix ADC:

> add policy dataset Admin_group ipv4

> bind policy dataset Admin_group 192.168.149.10 –index 11

> bind policy dataset Admin_group 192.168.149.39 –index 12

> bind policy Admin_group 192.168.149.49 –index 13

> add responder policy POL_1 “!(CLIENT.IP.SRC.TYPECAST_TEXT_T.CONTAINS_ANY(\”Admin_group\”))”

RESET

> bind lb vServer lb_vsrv_www –policyName POL_1 –priority 100 –gotoPriorityExpression END –type

REQUEST

What will be the effect of these commands?

A.

Only users with a source IP address of 192.168.149.10, 192.168.149.39, or 192.168.149.49 will be allowed

to connect to vServer lb_vsrv_www.

B.

Only users with a source IP address of 192.168.149.10, 192.168.149.39, or 192.168.149.49 will be blocked

when attempting to connect to vServer lb_vsrv_www.

C.

Only users with a source IP address of 192.168.149.10 or 192.168.149.39 will be allowed to connect to

vServer lb_vsrv_www.

D.

All traffic from users with a source IP address of 192.168.149.10, 192.168.149.39, or 192.168.149.49 will be

blocked through the Citrix ADC.

Full Access
Question # 22

Scenario: A Citrix Administrator configured a load-balancing vServer. The URL for this vServer is vpn.citrix.com. The backend server has the host name configured as server1.citrix.com.

The administrator needs to implement the policy to change the host name from vpn.citrix.com to server1.citrix.com, and vice versa.

Which does the administrator need to configure to meet this requirement?

A.

set transform action “host change” –priority 10 –reqUrlFrom “https://vpn.citrix.com/*” –reqUrlInto “https://

server1.citrix.com/*” –resUrlFrom “https://server1.citrix.com/*” –resUrlInto “https://vpn.citrix.com/*”

B.

set transform action “host change” –priority 10 –reqUrlFrom “https://server1.citrix.com/*” –reqUrlInto “https://

vpn.citrix.com/*” –resUrlFrom “https://server1.citrix.com/*” –resUrlInto “https://vpn.citrix.com/*”

C.

set transform action “host change” –priority 10 –reqUrlFrom “https://server1.citrix.com/*” –reqUrlInto “https://

vpn.citrix.com/*” –resUrlFrom “https://vpn.citrix.com/*” –resUrlInto “https://server1.citrix.com/*”

D.

set transform action “host change” –priority 10 –reqUrlFrom “https://vpn.citrix.com/*” –reqUrlInto “https://

server1.citrix.com/*” –resUrlFrom “https://vpn.citrix.com/*” –resUrlInto “https://server1.citrix.com/*”

Full Access
Question # 23

Which two statements are true regarding a typical global server load balancing (GSLB) setup? (Choose two.)

A.

Restrict the selection of a GSLB service from a subset of GSLB services bound to a GSLB vServer for the given domain.

B.

An administrator CANNOT define a backup for a backup vServer in an active standby GSLB setup for a given GSLB domain.

C.

Apply spillover policies on a subset of GSLB services, and ensure that the user CANNOT have a backup for a subset of GSLB services.

D.

Any given GSLB vServer can load balance only one fully qualified domain name (FQDN).

Full Access
Question # 24

Scenario: To receive data alerts for failures, a Citrix Administrator is configuring SNMP on the Citrix ADC. The administrator is confident that the manager, alarms and SNMP traps are configured correctly. The following week, there is a Citrix ADC-related outage and the administrator does NOT receive any alerts.

What could be the reason for this alert failure?

A.

The Citrix Web App Firewall is blocking the alerts from going out.

B.

The community name was NOT configured in the Citrix ADC SNMP trap destination settings.

C.

The Citrix ADC only has standard licensing.

D.

The Citrix ADC is configured for SNMP version 1.

Full Access
Question # 25

In a global server load balancing (GSLB) active-active environment, the connection proxy is used as the site persistence method.

What is used to source the traffic when the connection is proxied?

A.

Subnet IP (SNIP)

B.

LDNS IP Address

C.

Client source IP

D.

Virtual IP (VIP)

Full Access
Question # 26

Scenario: A Citrix Administrator configured a rewrite action as follows:

> add rewrite action sync_date replace http.res.date.sys.time

What is the correct way to interpret this rewrite action?

A.

It replaces the date header in the HTTP response with the Citrix ADC system time in a conventional date format.

B.

It replaces the date header in the HTTP response with the Greenwich Mean Time (GMT) time stamp.

C.

It replaces the Citrix ADC system time with the date header in a conventional date format.

D.

It is invalid, as system time CANNOT be referenced in the system policy.

Full Access
Question # 27

Scenario: A Citrix Administrator executed the command below:

> set httpcallout httpcallout1 –cacheForSecs 120

This command changes the cache duration of the HTTP ____________ to be set to 120 seconds. (Choose the

correct option to complete the sentence.)

A.

callout response

B.

request

C.

callout request

D.

response

Full Access
Question # 28

Which Citrix ADC monitor can a Citrix Administrator use to check the authentication service of the Active Directory (AD) domain controller?

A.

An LDAP monitor with the LDAP Script Name, Configured Base DN, Bind DN, Filter, Attribute and Password parameters in the basic parameters.

B.

A ping monitor with the IP address of the AD domain controller in the special parameters

C.

A MYSQL-ECV monitor with the Base DN, Bind DN, Filter, Attribute, and Password parameters configured in the basic parameters

D.

A TCP monitor with the LDAP Base DN configured in the basic parameters.

Full Access
Question # 29

Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL vServers?

A.

SSL profile

B.

SSL multiplexing

C.

SSL bridge

D.

SSL policy

E.

SSL policy

Full Access
Question # 30

Scenario: A Citrix Administrator manages an environment that has three SSL websites, all serving the same content.

www.company.com

www.company.net

www.company.org

The administrator would like to consolidate the websites into a single, load-balanced SSL vServer.

What can the administrator bind to use a single SSL vServer?

A.

A wildcard certificate to a single SSL vServer

B.

A wildcard certificate to a content-switching vServer

C.

The certificate of each website to a single SSL vServer

D.

A multiple SAN certificate to a single SSL vServer

Full Access
Question # 31

Which four authentication types can a Citrix Administrator use for Citrix ADC authentication, authorization, and auditing (AAA) multifactor authentication? (Choose four.)

A.

RADIUS

B.

OAuth

C.

FIDO2

D.

NTLM

E.

ADFS

F.

LDAP

G.

TACACS+

Full Access
Question # 32

Scenario: A Citrix Administrator configured a responder policy as follows:

> add responder action Picture10Action redirect "\"http://\ " + http.req.hostname + http.req.url + \"/picture10.html\"" -bypassSafetyCheck YES

> add responder policy Picture10Policy "http.req.url.eq(\"/mywebsite\")" Picture10Action

> bind responder global Picture10Policy 1 END -type OVERRIDE

What will be the effect of this configuration?

A.

The URL http://www.mywebsite.com will be overwritten with /picture10.html.

B.

Clients accessing http://www.mywebsite.com/ will have /picture10 html appended to the URL.

C.

Clients accessing http://www.mywebsite.com/picture10.html will be overwritten with http://www.mywebsite com/.

D.

The file Picture10 will be downloaded to a local drive when directly accessing http://www.mywebsite.com/picture10.html.

Full Access
Question # 33

A Citrix Administrator needs to protect the HTTP backend server type without actually removing the header.

Which rewrite action type can the administrator apply to the Citrix ADC configuration to accomplish this?

A.

REPLACE

B.

CORRUPT_HTTP_HEADER

C.

REPLACE_HTTP_REQ

D.

REPLACE_ALL

Full Access