Which feature should the engineer use to configure policies centrally only once and avoid configuring them on each site?
Scenario: A Citrix Engineer is managing a large Citrix Virtual Apps and Desktops environment with three sites. Users connecting to applications and VDI machines in these sites are using a common Citrix ADC Gateway. The engineer wants to configure peripheral federation and port redirection policies for secure access to the...
Which PowerShell cmdlet is used to check the connection string, which connects the Citrix Delivery Controller to communicate to the site database?
Which PowerShell cmdlet is used to check the connection string, which connects the Citrix Delivery Controller to communicate to the site database?A . Get-BrokerServiceInstanceB . Get-BrokerDbconnectionC . Get-BrokerConnectionLogD . Get-BrokerInstalledDbVersionView AnswerAnswer: B Explanation: Reference: https://support.citrix.com/article/CTX238581
What does the engineer need to do prior to enabling this feature?
A Citrix Engineer wants to enable the "Log Off Web Portal When Session is Launched" feature within Workspace Environment Management (WEM) transformer settings. What does the engineer need to do prior to enabling this feature?A . Set Workspace control to NOT automatically reconnect to the sessions when users log onto...
Which file is used to store a subscription on the Storefront server?
Which file is used to store a subscription on the Storefront server?A . PersistentDictionary.edbB . Web.configC . Subscription.txtD . Style.csvView AnswerAnswer: B Explanation: Reference: https://www.carlstalhood.com/storefront-subscriptions/
What should the engineer do to minimize the impact of the SQL outage?
Scenario: A Citrix Engineer noticed that a Citrix Virtual Apps and Desktops environment lost connection to the SQL servers where the Citrix databases are running. Due to this, the Site has become unmanaged and first-time users CANNOT connect to their Citrix Virtual Apps & Desktops resources. The setup was recently...
Which database high availability option does Citrix recommend for Workspace Environment Management (WEM)?
Which database high availability option does Citrix recommend for Workspace Environment Management (WEM)?A . Always OnB . MirroringC . ReplicationD . ClusteringView AnswerAnswer: B Explanation: Reference: https://christiaanbrinkhoff.com/2017/06/09/how-to-configure-citrix-workspace-environmentÂmanagement43-for-xenapp-or-xendesktop/
Which command should a Citrix Engineer use to review recent connections and brokering attempts within a Citrix Virtual Apps and Desktops site?
Which command should a Citrix Engineer use to review recent connections and brokering attempts within a Citrix Virtual Apps and Desktops site?A . Get-BrokerConnectionB . Get-BrokerSessionC . Get-BrokerConnectionLogD . Get-BrokerSessionLogView AnswerAnswer: C Explanation: Reference: https://developer-docs.citrix.com/projects/citrix-virtual-apps-desktops-sdk/en/latest/Broker/Get-BrokerConnectionLog/
Which two statements are true for a Workspace Environment Management (WEM) configuration set? (Choose two.)
Which two statements are true for a Workspace Environment Management (WEM) configuration set? (Choose two.)A . A WEM Agent can point to more than one WEM configuration set.B . The Environmental Settings within the WEM Administration Console are per machine, NOT per user.C . Multiple configuration sets are needed in...
Which three considerations are accurate regarding the Enterprise Layer Manager (ELM) server? (Choose three.)
Which three considerations are accurate regarding the Enterprise Layer Manager (ELM) server? (Choose three.)A . It hosts the SMB file share for the Elastic Layers data.B . It manages and maintains copies of all layers and layered images.C . It is a Windows-based virtual appliance maintained on the hypervisor.D ....
Which two steps can the engineer take to minimize attacks without interfering with user productivity?
Scenario: A newly created Citrix Virtual Apps and Desktops site has sensitive information. The users consistently use different browsers for their daily tasks. A Citrix Engineer is looking for ways to minimize attacks like ransomware, phishing, and session hijacking. Which two steps can the engineer take to minimize attacks without...