Citrix 1Y0-312 Citrix Virtual Apps and Desktops 7 Advanced Administration Online Training
Citrix 1Y0-312 Online Training
The questions for 1Y0-312 were last updated at Nov 23,2024.
- Exam Code: 1Y0-312
- Exam Name: Citrix Virtual Apps and Desktops 7 Advanced Administration
- Certification Provider: Citrix
- Latest update: Nov 23,2024
Which two statements are valid for Enterprise Layer Manager (ELM) storage? (Choose two.)
- A . The appliance local storage size is fixed.
- B . When installing the appliance, it comes equipped with an additional 300GB data disk.
- C . This storage also stores Elastic Layers and their .JSON files.
- D . This storage is used to store all OS, Platform and App Layers, and versions.
A Citrix Engineer is looking for ways to secure the Virtual Delivery Agent (VDA) in the Citrix Virtual Apps and Desktops environment.
Which three steps should the engineer follow to secure the VDA? (Choose three.)
- A . Add the certificate on Citrix Gateway
- B . Enable TLS on the Delivery Controllers
- C . Add the certificate to the VDA
- D . Enable TLS on the VDA
- E . Add the certificate on the StoreFront server
What is the first step in the migration process of an on-premises Workspace Environment Management (WEM) environment that is currently in production to a WEM Citrix Cloud service?
- A . Reinstall the WEM service agent on managed machines.
- B . Export the data within the database to a SQL file.
- C . Download the migration tool from the WEM service Downloads tab.
- D . Modify permissions on the infrastructure service.
Which three pre-requisites should a Citrix Engineer take into consideration when configuring Smart Card authentication in the Citrix Virtual Apps and Desktops environment? (Choose three.)
- A . Install the vendor’s Smart Card middleware on the virtual or physical machines running the Virtual Delivery Agent (VDA) that provide user’s desktops and applications.
- B . Enable pass-through with Smart Card authentication to ensure Smart Card readers type, middleware type and configuration, and middleware PIN caching policy permit this.
- C . Enable a two-way trust relationship with the StoreFront server and the domain.
- D . Ensure that the public-key infrastructure (PKI) is configured appropriately.
- E . Ensure that Domain Passthrough authentication for the Store is on the StoreFront server.
A Citrix Engineer wants to enable the "Log Off Web Portal When Session is Launched" feature within Workspace Environment Management (WEM) transformer settings.
What does the engineer need to do prior to enabling this feature?
- A . Set Workspace control to NOT automatically reconnect to the sessions when users log onto StoreFront.
- B . Set Workspace control settings to log off from session when users log off from StoreFront.
- C . Set Workspace control to automatically reconnect to the sessions when users log onto StoreFront.
- D . Set Workspace control settings to NOT log off a session when users log off from StoreFront.
Scenario: A Citrix Engineer is working on ICA policies to restrict sharing of client clipboard data to user sessions. However, the engineer wants to allow some specific formats to be shared.
Which two policies should the engineer configure to allow this? (Choose two.)
- A . Client clipboard write allowed formats
- B . Restrict session clipboard write
- C . Restrict client clipboard write
- D . Session clipboard write allowed formats
Scenario: A Citrix Engineer has implemented a multi-zone Citrix Virtual Apps and Desktops site.
The setup is as follows:
The Primary zone has been implemented in Sweden.
The Satellite zones have been implemented in Finland, Norway and Denmark.
The Application named ‘Sys-QA’ is hosted on Virtual Delivery Agent (VDA) machines which are available in all the Satellite zones only.
The Application home zone for Sys-CA has been configured as Finland.
A user with user ID ‘test1’ has a disconnected session for Sys-QA in Norway.
Where will the session launch, if user test1 tries to reconnect to application Sys-QA?
- A . Denmark
- B . Finland
- C . Norway
- D . Sweden
A Citrix Engineer is taking over the management of an environment in which non-persistent machines were deployed with Workspace Environment Management (WEM) Agent.
Which two statements are true for this environment? (Choose two.)
- A . The Agent would need to contact the Infrastructure Service after restart to gather cache data again
- B . The cache is lost at each restart without a persistent disk
- C . The environment is NOT supported because the usage of a persistent disk is mandatory when using WEM
- D . The WEM Agent applies real time updates only when the persistent disk is used
Which two statements are true regarding the creation of OS Layers with Citrix App Layering? (Choose two.)
- A . When there is a need to update the OS of a layered image, it is ideal to create a new OS Layer.
- B . Virtual machines built as the OS Layer should be joined to a functional Active Directory domain within the infrastructure that will be utilized.
- C . The Windows Updates feature should be left enabled within the OS Layer in case any new updates occur once the OS Layer is deployed.
- D . Any Microsoft products that are updated by the Windows Updates feature should be included in the OS Layer.
- E . For best performance, complete a clean installation of the Windows operating system when building an OS Layer.
Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps environment. The engineer has recently noticed two single-threaded applications consistently consuming 25% of the CPU resources, causing substantial performance issues for users of these servers. The engineer has deployed Workspace Environment Management (WEM) within the infrastructure and enabled CPU Spikes Protection.
What else can the engineer enable within WEM to address this issue?
- A . Exclude Specified Processes and add the two problem applications
- B . Process Affinity and add the two problem applications
- C . CPU Clamping and set it to 10% for the two problem applications
- D . Limit Sample Time and set it to 10% for the two problem applications