Which policy expression will accomplish this requirement?
Scenario: A Citrix Engineer needs to configure an Application Firewall policy for an online shopping website called “mycompany.com”. As a security measure, the shopping cart application is hosted on a separate directory “/mycart” on the backend server. The engineer configured a profile to secure the connections to this shopping cart...
An attacker inserting a malicious code that compromises the trust relationship between users and a web application is an example of a (n) _____ attack. (Choose the correct option to complete the sentence.)
An attacker inserting a malicious code that compromises the trust relationship between users and a web application is an example of a (n) _____ attack. (Choose the correct option to complete the sentence.)A . Cookie TamperingB . SQL InjectionC . Form Field ConsistencyD . Cross-site ScriptingView AnswerAnswer: D
Which cookie consistency security feature will the engineer configure in the following configuration to achieve the desired results?
Scenario: A Citrix Engineer must enable a cookie consistency security check and ensure that all the session cookies get encrypted during the transaction. The engineer needs to ensure that none of the persistent coolies are encrypted and decrypted and decrypt any encrypted cookies during the transaction. Which cookie consistency security...
Which action can be used to place the rule on the relaxation list without being deployed and ensuring that the rule is NOT learned again?
Which action can be used to place the rule on the relaxation list without being deployed and ensuring that the rule is NOT learned again?A . SkipB . DeployC . DeleteD . Edit& DeployView AnswerAnswer: A
Which mechanism does the NetScaler use to enable a safe and speedy data exchange between a client/server initial TCP handshake?
Which mechanism does the NetScaler use to enable a safe and speedy data exchange between a client/server initial TCP handshake?A . TCP Fast Open (TFO)B . TCP Burst Rate ControlC . TCP HystartD . TCP Time StampView AnswerAnswer: A
Which two settings can be used when creating a Cache Content group? (Choose two.)
Which two settings can be used when creating a Cache Content group? (Choose two.)A . Remove response cookiesB . Set Lazy DNS resolutionC . Expire cookiesD . Use DNS QueryE . Use browser settingsView AnswerAnswer: A,B
Which logs on the NetScaler can the engineer check to verify that the issues are NOT caused by Application Firewall?
A Citrix Engineer has found issues in the websites after enabling Application Firewall. Which logs on the NetScaler can the engineer check to verify that the issues are NOT caused by Application Firewall?A . newnslogB . ns.logC . nslogD . aaad.debugView AnswerAnswer: B
Which aspect of NetScaler Management and Analytics System (NMAS) can be used to monitor end-to-end ICA traffic flowing through a NetScaler ADC?
Which aspect of NetScaler Management and Analytics System (NMAS) can be used to monitor end-to-end ICA traffic flowing through a NetScaler ADC?A . Gateway InsightB . HDX InsightC . Security InsightD . Web InsightView AnswerAnswer: B
Which settings can the engineer configure to meet the requirement?
A Citrix Engineer needs to configure NetScaler Management and Analytics System (NMAS) in their network to retain network reporting data, events, audit logs, and task logs for 20 days. Which settings can the engineer configure to meet the requirement?A . System Prune SettingsB . System Backup SettingsC . Instance Backup...
The NetScaler logging client server can be installed and configured to store the log for ___________. (Choose the correct option to complete the sentence.)
The NetScaler logging client server can be installed and configured to store the log for ___________. (Choose the correct option to complete the sentence.)A . HTTP and HTTPS active connections on the NetScalerB . HTTP and HTTPS requests processed by the NetScalerC . statistics of the HTTP and HTTPS web...