REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 

Dalton

 
 

 

Braindumps of 1Y0-613
Citrix Access Suite 4.0:Analysis

Exam Questions, Answers, Braindumps (1Y0-613)

Hi, I got the names of some sites form here like www.exams.ws . I followed the suggestions and I got all the questions. Here are some of my questions as brain dumps..

QUESTION 1
Scenario: In an environment in which you are assessing the Citrix Access Suite implementation, all the Citrix servers are assigned static IP addresses, and on more than one occasion, administrators have accidentally re-assigned an IP address, causing duplicate IP assignments. What should you recommend to avoid this problem in the future?
A. A centralized repository should be created to track IP addresses. Alternatively, DHCP reserved addresses could be used.
B. Dynamic DHCP addresses should be used to ensure that servers always have a valid IP address.
C. Administrators should first release the IP address to be used before re-assigning it.
D. Administrators should ping the new IP address before assigning it to a server.
Answer: A


QUESTION 2
Scenario: A mobile phone company Abc .com has Citrix Presentation Server 4.0 implemented in its environment. The CIO has mandated that no single points of failure exist within the environment. Abc .com has hired you to assess their Citrix environment. Which two statements explain why the installation of another license server, which will not be clustered, is not necessary? (Choose two.)
A. The addition of another license server will increase IT workload.
B. The addition of another license server will provide for load balancing. Presentation Servers will have the option to connect to the least busy license server or the license server closest to them.
C. The addition of another license server will reduce current network bandwidth.
D. The addition of another license server does not address the requirement because two license servers cannot share the same license file.
E. The addition of another license server will not help Abc .com because Presentation Server users will still be able to connect for up to 30 days after connection is lost to the license server.
Answer: D,E


QUESTION 3
Scenario: An airline company has been using Citrix products for approximately six years. Recently, Abc .com upgraded their environment from Citrix Access Suite 3.0 to Citrix Access Suite 4.0. The IT staff is not certified on Access Gateway Advanced Edition. They recently implemented Access Gateway Advanced Edition in Access Gateway stand-alone mode. The CIO has been mounting pressure on the IT Team to implement a lot of new security measure offered by their competitors in the aviation industry. The CIO wants two-factor authentication implemented, which requires users to login using their Active Directory accounts; he has also asked for some other form of advanced authentication tools. The single point of entry to the Citrix environment must be through Access Gateway Advanced Edition. Browser only access, file type association and download should be allowed to users based on their access scenario. The IT staff also wants to implement more services that will enhance productivity for both IT member and other employees. Based on the current setup of this environment, what would you recommend a better implementation to the CIO of this airline?
A. Implement Access Gateway Advanced Edition in VPN mode by integrating the Access Gateway appliance with Advanced Access Control servers.
B. Implement Active Directory policies for users connecting through the Access Gateway appliance
C. Implement Access Gateway Advanced Edition in Proxy mode by integrating the Access Gateway appliance with Web Interface.
D. Implement more lenient policies in the Gateway mode for clients connecting through the Access Gateway appliance.
Answer: A


QUESTION 4
Scenario: A marketing firm has Access Gateway Advanced Edition implemented as the single point of entry into its Citrix farm. A federal auditing team fined the firm for not complying with security requirements to protect customers' privacy. A partner of this firm, in charge of their billing and collection, was discovered printing personal data belonging to the firm's customers. This partner needs access to the database to bill customers but has apparently been using the data for improper purposes. To resolve the issue, the state auditing team and the marketing firm reached an agreement stating that policies should be implemented that would prohibit external users from printing certain information. Based on the stated requirement, which two recommendations should you provide to the IT Manager? (Choose two.)
A. Implement Presentation Server policies that prevent printing, clipboard mapping and drive mapping.
B. Implement access to the database application as a network resource with the No Print action control for the resource.
C. Implement access to the database application as a web resource with File Type Association for external users.
D. Implement access to the database application as a network resource with the Live Edit action control for external users.
E. Implement access to the database application as a file share, but deny the partners.
Answer: A,C


QUESTION 5
Scenario: An enterprise company asked that you review their Presentation Server environment, which consists of three servers. In particular, the IT Manager has asked you to look into why the user experience is inconsistent. Users report that only some configuration changes made become permanent, which they find frustrating. Upon researching this issue, you learn that the servers in the Access Suite Console are consistent in terms of operating system version, Presentation Server version, service packs, rollup packs, and hotfixes. In reviewing the Terminal Services profile, you see that nothing has been configured. Also, you observe that Folder Redirection has been configured for the My Documents and Application Data folders, and that the file server configured appears to be accessible and working correctly. What explanation should you give to the IT Manager for implementing a Terminal Services profile type?
A. Because no Terminal Services profile has been configured, no profile is used. Configurations that get written to the Application Data folder persist, but all others cannot be retained because no file location is indicated.
B. Because no Terminal Services profile has been configured, a mandatory profile is used by default. Configurations that get written to the Application Data folder persist, but all others are discarded.
C. Because no Terminal Services profile has been configured, a local profile is used by default. Configurations that get written to the Application Data folder persist, but all others are retained on that local Presentation Server.
D. Because no Terminal Services profile has been configured, a roaming profile is used by default. Configurations that get written to the Application Data folder persist, but all others cannot be retained because no Terminal Services profile file location is indicated.
Answer: C

1Y0-613


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend