Citrix 1Y0-312 Citrix Virtual Apps and Desktops 7 Advanced Administration Online Training
Citrix 1Y0-312 Online Training
The questions for 1Y0-312 were last updated at Nov 22,2024.
- Exam Code: 1Y0-312
- Exam Name: Citrix Virtual Apps and Desktops 7 Advanced Administration
- Certification Provider: Citrix
- Latest update: Nov 22,2024
Scenario: A Citrix Engineer needs to configure passthrough for user authentication on the Workspace front. The engineer confirmed that Single Sign-on process is running on the user machine and all the other settings are in place on the machine.
Which two steps should the engineer follow to make passthrough authentication work for the users? (Choose two.)
- A . Configure Any Domain setting under Trusted domains in StoreFront.
- B . Set the TrustManagedAnonymousXmlServiceRequests to true on the Delivery Controllers.
- C . Configure Optimal Gateway Routing on the StoreFront server.
- D . Set the TrustRequestsSentToTheXmlServicePort to true on the Delivery Controllers.
Which two considerations should a Citrix Engineer be aware of when building Platform Layers within a multi-hypervisor Citrix App Layering environment? (Choose two.)
- A . Platform Layers allow for publishing a Layered Image.
- B . Platform Layers are optional and are NOT required when publishing a Layered Image base.
- C . The Enterprise Layer Manager (ELM) Repository storage maintains a maximum limit of five Platform Layers that can be built and maintained on it at a given time.
- D . There needs to be one Platform Layer per targeted virtual environment considering the provisioning type and hypervisor destination.
Scenario: A large company recently acquired a smaller company. A Citrix Engineer needs to add more resources in the environment, so that all users can access the published resources.
The engineer has planned to add six more StoreFront servers to the existing StoreFront server group with four StoreFront servers.
The engineer found that the scalability declined after reaching the seventh StoreFront.
What should the engineer increase in the StoreFront server group to prevent issues in the scalability?
- A . The RAM for the initial StoreFront servers before adding more servers.
- B . The CPUs allocated to the initial StoreFront servers, before adding more servers.
- C . The RAM for the six new StoreFront servers.
- D . The CPUs allocated for the six new StoreFront servers.
Which two statements are true regarding Publishing Platform Layer? (Choose two.)
- A . It can be updated directly using the Citrix App Layering Management console.
- B . Its purpose is to create a template that outputs to a virtual machine (VM) or a virtual disk.
- C . It has limited use-case scenarios, such as making minor updates to an App Layer.
- D . It is used every time changes are made, and a Platform Layer is being published.
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps and Desktops environment. The engineer has recently deployed a new Workspace Environment Management (WEM) configuration to help improve the performance of published applications and desktops.
In which two ways can the new WEM deployment benefit the user experience? (Choose two.)
- A . Improved overall logon performance for both applications and desktops.
- B . Optimized application availability through advanced traffic management.
- C . Pro-active monitoring of system resources to provide optimal performance.
- D . Enhanced network compression capabilities for both applications and desktops.
- E . Improved Single Sign-on capabilities for both applications and desktops.
Which statement is true regarding Citrix Workspace Environment Management (WEM) Agent?
- A . WEM Agent synchronizes with the WEM Infrastructure Service on port TCP 8287.
- B . WEM Agent can be installed on the Citrix Workspace Environment Management Infrastructure Services server.
- C . WEM Agent can be installed on either a Windows Desktop OS or on a Windows Server OS.
- D . Norskale Agent Host Service manages WEM Agent and it runs under Network Service.
What is the first step that the Enterprise Layer Manager (ELM) server takes when creating application layers?
- A . Once the engineer manually creates the packaging machine, the ELM server initiates a connection to the packaging machine
- B . Once a packaging machine is created, the next step is to finalize the targeted installation, using the application layering finalization software
- C . Once the process to create a layer is initiated from the Layering Management Console, the ELM server then uses a connector to build a packaging machine
- D . Once the packaging machine is finalized, any application installation or configuration should be performed and completed
Scenario: A Citrix user is accessing a Windows 10 VDI machine using a personal laptop. The VDI is becoming unregistered frequently, which is making it difficult for the user to access it. In order to troubleshoot the issue, a Citrix Engineer is assigned to collect CDF logs.
On which two components should the engineer run Citrix Diagnostic Facility (CDF) control to capture the required logs? (Choose two.)
- A . Windows 10 VDI
- B . Delivery Controller
- C . StoreFront server
- D . User’s personal laptop
Scenario: A Citrix Engineer administering a Citrix Virtual Apps and Desktops environment is experiencing inconsistency with Virtual Delivery Agent (VDA) registration. After much investigation, the engineer determined the issue is resulting from intermittent problems with the Windows services on the VDA machine and the Delivery Controller.
Which set of Citrix services should the engineer troubleshoot to find the root cause?
- A . BrokerAgent.exe and BrokerService.exe
- B . BrokerAgent.exe and Citrix.Host.exe
- C . BrokerService.exe and Citrix.Host.exe
- D . PicaSvc2.exe and BrokerService.exe
Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking.
Which two steps can the engineer take to minimize attacks without interfering with user productivity? (Choose two.)
- A . Disable access to specific browsers.
- B . Disable all the user plugins.
- C . Implement HTTP Strict Transport Security (HSTS).
- D . Use HTTP response headers to send security policies to endpoint browsers.