Which rewrite action type can the administrator apply to the Citrix ADC configuration to accomplish this?

A Citrix Administrator needs to protect the HTTP backend server type without actually removing the header. Which rewrite action type can the administrator apply to the Citrix ADC configuration to accomplish this?A . REPLACE B. CORRUPT_HTTP_HEADER C. REPLACE_HTTP_REQ D. REPLACE_ALLView AnswerAnswer: A Explanation: https://docs.citrix.com/en-us/citrix-adc/current-release/appexpert/rewrite/rewrite-action-policy-examples/example-mask-http-server-type.html

January 11, 2023 No Comments READ MORE +

What will be the effect of this configuration?

Scenario: A Citrix Administrator configured a responder policy as follows: > add responder action Picture10Action redirect ""http://" + http.req.hostname + http.req.url + "/picture10.html"" -bypassSafetyCheck YES > add responder policy Picture10Policy "http.req.url.eq("/mywebsite")" Picture10Action > bind responder global Picture10Policy 1 END -type OVERRIDE What will be the effect of this configuration?A ....

January 11, 2023 No Comments READ MORE +

To what are these messages related?

Scenario: A Citrix Administrator configured SNMP to send traps to an external SNMP system. When reviewing the messages, the administrator notices several entity UP and entity DOWN messages. To what are these messages related?A . Load-balancing vServers B. Network interface C. High availability nodes D. SSL profileView AnswerAnswer: A

January 11, 2023 No Comments READ MORE +

To achieve these requirements, which parameter can the administrator configure while disabling the service?

Scenario: A Citrix Administrator needs to configure persistence on a global server load balancing (GSLB) vServer to which a service is bound. Service must continue to handle requests from the client even after it is disabled manually C accepting new requests or connections only to honor persistence. After a configured...

January 11, 2023 No Comments READ MORE +

What can the administrator do to increase bandwidth on the Citrix ADC?

Scenario: A Citrix ADC MPX is using one of four available 10G ports. A Citrix Administrator discovers a traffic bottleneck at the Citrix ADC. What can the administrator do to increase bandwidth on the Citrix ADC?A . Purchase another Citrix ADC MPX appliance. B. Plug another 10G Citrix ADC port...

January 10, 2023 No Comments READ MORE +

Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL vServers?

Which feature can a Citrix Administrator use to create a consistent set of front-end SSL parameters across multiple SSL vServers?A . SSL profile B. SSL multiplexing C. SSL bridge D. SSL policy E. SSL policyView AnswerAnswer: A Explanation: https://docs.citrix.com/en-us/citrix-adc/current-release/ssl/ssl-profiles.html

January 10, 2023 No Comments READ MORE +

Which four authentication types can a Citrix Administrator use for Citrix ADC authentication, authorization, and auditing (AAA) multifactor authentication? (Choose four.)

Which four authentication types can a Citrix Administrator use for Citrix ADC authentication, authorization, and auditing (AAA) multifactor authentication? (Choose four.)A . RADIUS B. OAuth C. FIDO2 D. NTLM E. ADFS F. LDAP G. TACACS+View AnswerAnswer: A,B,C,F

January 10, 2023 No Comments READ MORE +

What will the Citrix ADC appliance send when the above command is executed?

set gslb vServer-GSLB-1-MIR ENABLED What will the Citrix ADC appliance send when the above command is executed?A . The Remote GSLB service as the first record in the response and adds the remaining active services as additional records B. The Local GSLB service as the first record in the response...

January 10, 2023 No Comments READ MORE +

Which mode on a Citrix ADC can a Citrix Administrator utilize to avoid asymmetrical packet flows and multiple route/ARP lookups?

Which mode on a Citrix ADC can a Citrix Administrator utilize to avoid asymmetrical packet flows and multiple route/ARP lookups?A . MAC-based forwarding (MBF) B. Use Subnet IP (USNIP) C. Layer 3 D. Layer 2View AnswerAnswer: C

January 10, 2023 No Comments READ MORE +

To protect an environment against Hash DoS attacks, which two configurations can a Citrix Administrator use to block all post requests that are larger than 10,000 bytes? (Choose two.)

To protect an environment against Hash DoS attacks, which two configurations can a Citrix Administrator use to block all post requests that are larger than 10,000 bytes? (Choose two.)A . > add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(”POST”)&& http.REQ.CONTENT_LENGTH.GT(10000)” > add rewrite policy drop_rewrite expr_hashdos_prevention DROP > bind rewrite global drop_rewrite 100...

January 10, 2023 No Comments READ MORE +