Which policy expression will accomplish this requirement?

Scenario: A Citrix Engineer needs to configure an Application Firewall policy for an online shopping website called “mycompany.com”. As a security measure, the shopping cart application is hosted on a separate directory “/mycart” on the backend server. The engineer configured a profile to secure the connections to this shopping cart...

October 29, 2018 No Comments READ MORE +

An attacker inserting a malicious code that compromises the trust relationship between users and a web application is an example of a (n) _____ attack. (Choose the correct option to complete the sentence.)

An attacker inserting a malicious code that compromises the trust relationship between users and a web application is an example of a (n) _____ attack. (Choose the correct option to complete the sentence.)A . Cookie TamperingB . SQL InjectionC . Form Field ConsistencyD . Cross-site ScriptingView AnswerAnswer: D

October 22, 2018 No Comments READ MORE +

Which cookie consistency security feature will the engineer configure in the following configuration to achieve the desired results?

Scenario: A Citrix Engineer must enable a cookie consistency security check and ensure that all the session cookies get encrypted during the transaction. The engineer needs to ensure that none of the persistent coolies are encrypted and decrypted and decrypt any encrypted cookies during the transaction. Which cookie consistency security...

October 17, 2018 No Comments READ MORE +

Which action can be used to place the rule on the relaxation list without being deployed and ensuring that the rule is NOT learned again?

Which action can be used to place the rule on the relaxation list without being deployed and ensuring that the rule is NOT learned again?A . SkipB . DeployC . DeleteD . Edit& DeployView AnswerAnswer: A

October 15, 2018 No Comments READ MORE +

Which mechanism does the NetScaler use to enable a safe and speedy data exchange between a client/server initial TCP handshake?

Which mechanism does the NetScaler use to enable a safe and speedy data exchange between a client/server initial TCP handshake?A . TCP Fast Open (TFO)B . TCP Burst Rate ControlC . TCP HystartD . TCP Time StampView AnswerAnswer: A

October 7, 2018 No Comments READ MORE +

Which two settings can be used when creating a Cache Content group? (Choose two.)

Which two settings can be used when creating a Cache Content group? (Choose two.)A . Remove response cookiesB . Set Lazy DNS resolutionC . Expire cookiesD . Use DNS QueryE . Use browser settingsView AnswerAnswer: A,B

October 6, 2018 No Comments READ MORE +

Which logs on the NetScaler can the engineer check to verify that the issues are NOT caused by Application Firewall?

A Citrix Engineer has found issues in the websites after enabling Application Firewall. Which logs on the NetScaler can the engineer check to verify that the issues are NOT caused by Application Firewall?A . newnslogB . ns.logC . nslogD . aaad.debugView AnswerAnswer: B

October 1, 2018 No Comments READ MORE +

Which aspect of NetScaler Management and Analytics System (NMAS) can be used to monitor end-to-end ICA traffic flowing through a NetScaler ADC?

Which aspect of NetScaler Management and Analytics System (NMAS) can be used to monitor end-to-end ICA traffic flowing through a NetScaler ADC?A . Gateway InsightB . HDX InsightC . Security InsightD . Web InsightView AnswerAnswer: B

September 25, 2018 No Comments READ MORE +

Which settings can the engineer configure to meet the requirement?

A Citrix Engineer needs to configure NetScaler Management and Analytics System (NMAS) in their network to retain network reporting data, events, audit logs, and task logs for 20 days. Which settings can the engineer configure to meet the requirement?A . System Prune SettingsB . System Backup SettingsC . Instance Backup...

September 23, 2018 No Comments READ MORE +

The NetScaler logging client server can be installed and configured to store the log for ___________. (Choose the correct option to complete the sentence.)

The NetScaler logging client server can be installed and configured to store the log for ___________. (Choose the correct option to complete the sentence.)A . HTTP and HTTPS active connections on the NetScalerB . HTTP and HTTPS requests processed by the NetScalerC . statistics of the HTTP and HTTPS web...

September 22, 2018 No Comments READ MORE +