REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Adam
 
 

Braindumps of 1Y0-456
Access Suite 4.0 : Build/Test

 

Submitting some questions, specially for you. These will help u a lot.

 

QUESTION 1
Users accessing Web Interface through a logon point are required to submit their credentials twice.
How should the administrator resolve this issue to avoid having the users submit credentials twice?
A. Set the application type for the Web Resource to Web Application (requires session cookies)
B. Install Web Interface 4.2
C. Set the application type for the Web Resource to Citrix Web Interface 4.2 or later.
D. Set the authentication type for the Web Resource to Integrated Windows authentication.
Answer: D
Explanation:
Enabling Pass-Through Authentication for Web Resources
You can pass user credentials to Web servers on the secured network configured for Basic, Digest, or Integrated Authentication. This feature avoids requiring users to enter their credentials multiple times to access Web resources. For example, if a team Web site in your organization is configured for Digest Authentication, you can pass the credentials with which users log on to the Access Gateway to that site. If you do not enable the URL for Digest Authentication, users may be required to log on to the Web site.
Note that the authentication required for a Web site is determined by the settings of the site's host Web server.
Important - When defining resources that bypass the Web proxy, you must specify entire servers, such as //server/. All URL addresses hosted on the specified server are bypassed by the Web proxy, even if those URL addresses appear in the properties of other Web resources that are supposed to be routed through the Web proxy.
When configuring a Web resource, you can enable each URL address to use one of the following methods of pass-through authentication:
Basic Authentication. Credentials are passed to the Web site in plain text.
Digest authentication. Hashed credentials are passed to the Web site using Digest Authentication.
Integrated Windows authentication. Hashes credentials are passed to the Web site using Integrated Authentication. NTLM or Kerberos authentication is used, depending on your Web server configuration.
To specify pass-through authentication for a Web site
1. In the console tree, select the Web resource and click Edit Web resource in Common Tasks.
2. On the URL Addresses page, select the Web site's URL and click Edit.
3. In the Application types supported area, select the authentication method being used by the Web site.
Resources / Web Resources / URL Address / Edit

QUESTION 2:
You work as a network administrator for Abc .com. You have installed Password Manager onto a Presentation Server. You only want a Password Manager to start some of the applications published on the Presentation Server server. Which two steps must be completed to allow Password Manager to start up for only some of the applications published on Citrix Presentation Server? Select two,
A. Create a Presentation Server policy that only allows Password Manager to launch for specific applications.
B. Remove the Reference to SSOLauncher from the "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\WindowsNT\\CurrentVersion\\Winlogon\\AppSetup" registry key.
C. Remove the SSOSHELL.EXE from the Startup directory of the Presentation Server.
D. Manually add a command-line parameter to each published application in Presentation Server to launch the agent background process.
E. Use the Password Manager Console "User Configuration Setting" to force the agent to launch only for specific applications.
Answer: B, D
Explanation:
Undocumented Registry Features in MetaFrame Password Manager -
http://support.citrix.com/article/CTX103190

QUESTION 3:
In which location in the Access Suite Console for Presentation Server can a Web Interface site be configured in order for the site to be accessed through Advanced Access Control Servers.
A. Under Manager client connection settings.
B. Under Manager secure client access
C. Under Manager workspace control
D. Under Manager access method
Answer: D

QUESTION 4:
You work as a network administrator for Abc .com. You have configured a logon point for use by offsite users. However, the offsite users are unable to access the logon point. How can the administrator provide the offsite users access to the logon point?
A. Configure an access policy to grant the offsite users logon access through the logon point.
B. Redeploy the login point and select "allow external users access"
C. Configure a connection policy to allow the offsite users to connect using the logon point.
D. Edit the login point and select the "allow external users access" check box.
Answer: D

QUESTION 5:
You work as a network Administrator at Abc .com. You have recently installed Access Gateway Advanced Edition. You have configured several login points in the Access Suite Console for internal and external access into the environment. Now you want to use the logon points to access specific Presentation Server farms. What can you edit to specify the Presentation Server farms?
A. The farm properties.
B. The Gateway Appliance node
C. The logon points
D. The Access Gateway node
E. The server properties
Answer: C

1Y0-456

 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend