Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1Y0-312 Exam Dumps - Citrix Virtual Apps and Desktops 7 Advanced Administration

Question # 4

Within Workspace Environment Management (WEM), the engineer needs to increase the default Active Directory search timeout value ofunder theoption of Active Directory Objects to correct this issue.

A.

1000; Advanced

B.

1000; Rules

C.

500; Advanced

D.

500; Rules

Full Access
Question # 5

Which three minimum permissions should a Citrix Engineer configure for a user or group in the security settings of the User Layer folder? (Choose three.)

A.

Modify Folder

B.

Create Folder/Append Data

C.

Write Attributes

D.

Read Attributes

E.

List Folder/Read Data

Full Access
Question # 6

Which three layers can a Citrix Engineer include in an image template? (Choose three.)

A.

Platform

B.

OS

C.

User

D.

Application

E.

Elastic

Full Access
Question # 7

Which two statements are true for Workspace Environment Management (WEM) Memory Management? (Choose two.)

A.

WEM will NOT release the process's excess RAM to the page file when the process becomes idle.

B.

WEM can exclude specific processes from being optimized.

C.

WEM calculates how much RAM a process is using and the minimum amount of RAM a process needs.

D.

WEM optimizes specific applications during a desktop session based on priority.

Full Access
Question # 8

Scenario: A Citrix Engineer is maintaining a Citrix Virtual Apps and Desktops environment. The engineer has recently deployed a new Workspace Environment Management (WEM) configuration to help improve the performance of published applications and desktops.

In which two ways can the new WEM deployment benefit the user experience? (Choose two.)

A.

Improved overall logon performance for both applications and desktops.

B.

Optimized application availability through advanced traffic management.

C.

Pro-active monitoring of system resources to provide optimal performance.

D.

Enhanced network compression capabilities for both applications and desktops.

E.

Improved Single Sign-on capabilities for both applications and desktops.

Full Access
Question # 9

What is the first step in the migration process of an on-premises Workspace Environment Management (WEM) environment that is currently in production to a WEM Citrix Cloud service?

A.

Reinstall the WEM service agent on managed machines.

B.

Export the data within the database to a SQL file.

C.

Download the migration tool from the WEM service Downloads tab.

D.

Modify permissions on the infrastructure service.

Full Access
Question # 10

Which database high availability option does Citrix recommend for Workspace Environment Management (WEM)?

A.

Always On

B.

Mirroring

C.

Replication

D.

Clustering

Full Access
Question # 11

Which PowerShell cmdlet is used to check the connection string, which connects the Citrix Delivery Controller to communicate to the site database?

A.

Get-BrokerServiceInstance

B.

Get-BrokerDbconnection

C.

Get-BrokerConnectionLog

D.

Get-BrokerInstalledDbVersion

Full Access
Question # 12

Scenario: A Citrix Engineer configured two Sites: Production and Disaster Recovery. During an outage in the Production Site, the Virtual Delivery Agent (VDA) registration in the Disaster Recovery Site has failed.

What are two possible causes for this issue? (Choose two.)

A.

TCP port 443 is NOT open between the VDA and Delivery Controllers on the Disaster Recovery Site

B.

The VDA is configured with a GPO to register with the Delivery Controllers from the Production Site

C.

The Delivery Controllers were set manually during VDA configuration and point to the Production Site

D.

The Delivery Controllers in the Disaster Recovery Site were NOT able to contact the Delivery Controllers in the Production Site to complete the registration process

Full Access
Question # 13

Scenario: A Citrix Engineer is managing a large Citrix Virtual Apps and Desktops environment with three sites. Users connecting to applications and VDI machines in these sites are using a common Citrix ADC

Gateway. The engineer wants to configure peripheral federation and port redirection policies for secure access to the site resources.

Which feature should the engineer use to configure policies centrally only once and avoid configuring them on each site?

A.

SmartAccess

B.

SmartCheck

C.

SmartTools

D.

SmartControl

Full Access
Question # 14

What are two valid options to manage antivirus definition updates in a Citrix App Layering deployment? (Choose two.)

A.

Enable auto-updates and store updates in the Elastic Layer assigned to each user.

B.

Disable auto-updates and redeploy the layer for each update on a schedule approved by the security team.

C.

Enable auto-updates and store updates in the user’s User Layer.

D.

Disable auto-updates and clear the checkbox for "Reinstall the layer" when redeploying the layers.

Full Access
Question # 15

Which three layers are stored in the storage repository of the Enterprise Layer Manager (ELM) Appliance? (Choose three.)

A.

Application

B.

User

C.

Platform

D.

OS

E.

Elastic

Full Access
Question # 16

Which three pre-requisites should a Citrix Engineer take into consideration when configuring Smart Card authentication in the Citrix Virtual Apps and Desktops environment? (Choose three.)

A.

Install the vendor's Smart Card middleware on the virtual or physical machines running the Virtual Delivery Agent (VDA) that provide user's desktops and applications.

B.

Enable pass-through with Smart Card authentication to ensure Smart Card readers type, middleware type and configuration, and middleware PIN caching policy permit this.

C.

Enable a two-way trust relationship with the StoreFront server and the domain.

D.

Ensure that the public-key infrastructure (PKI) is configured appropriately.

E.

Ensure that Domain Passthrough authentication for the Store is on the StoreFront server.

Full Access
Question # 17

Scenario: A Citrix Engineer is working on ICA policies to restrict sharing of client clipboard data to user sessions. However, the engineer wants to allow some specific formats to be shared.

Which two policies should the engineer configure to allow this? (Choose two.)

A.

Client clipboard write allowed formats

B.

Restrict session clipboard write

C.

Restrict client clipboard write

D.

Session clipboard write allowed formats

Full Access