Multiple Choice Flashcards

(418 cards)

1
Q

Scenario:
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
A Citrix Architect is asked to design a cost-efficient environment for the Back Office end-user group. Which FlexCast model should the architect recommend?
A. Host Shared
B. Hosted VDI
C. Streamed VHD
D. Local VM

(Case Study)

A

A. Hosted Shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scenario: The company is considering replacing the WIndows XP computers with new devices as part of the new solution. The new devices should require minimal support and administration, while providing a centrally managed desktop solution.
Which two methods should an architect consider to meet these requirements? (Choose two.)

A. Client OS desktop delivery group accessed from thin-client devices by using Citrix Receiver.
B. Server OS desktop delivery group accessed from thin-client devices by using Citrix Receiver
C. Client OS desktop delivery group accessed from Windows-based physical desktops by using Citrix Receiver
D. Server OS application delivery group accessed from Windows-based physical desktops by using Citrix Receiver

A

A. Client OS desktop delivery group accessed from thin-client devices by using Citrix Receiver.
B. Server OS desktop delivery group accessed from thin-client devices by using Citrix Receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.
What is the benefit of using Streamed VHD?

A. It leverages local client hardware
B. It provides the greatest level of end-user personalization.
C. It supports a variety of hardware configurations from a single image.
D. It allows remote access to applications.

(Case Study)

A

C. It supports a variety of hardware configurations from a single image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.
Only block storage is available on the shared storage of the hypervisor.
How should the architect recommend that Hosted VDI be provisioned to fulfill the virtualization requirements for the call center?

A. By using Machine Creation Services
B. By using Provisioning Services
C. By manually installing the operating system
D. By using cloned VM templates

A

A. By using Machine Creation Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is the database high availability an essential component of a production environment?

A. Because the Delivery Controller is stateless
B. Because server maintenence can be performed online
C. Because it prevents local host cache corruption
D. Because user data loss is prevented if a session is disconnected

A

A. Because the Delivery Controller is stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Why does using Windows Deployment Services and deploying a standard base image to virtual desktops help manage the image versioning process?

A. It enables rapid rollback
B. It automates deployment of current and legacy OS versions.
C. It leverages Hyper-V snapshots
D. It automatically deploys the latest drivers and patches.

(Case Study)

A

C. It leverages Hyper-V snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why does installing Windows applications into an image help manage the image release process?

A. Because it reduces application deployment time
B. Because it standardizes the application deployment process
C. Because it facilitates the use of App-V packages
D. Because it automatically deploys the latest drivers and patches

A

A. Because it reduces application deployment time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and , if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.
Why does enabling ‘Active write back’ when configuring group profiles benefit CGE’s Sales end-user group?

A. It improves application performance
B. It simplifies home drive cleanup
C. It minimizes the required storage needed for folder redirection
D. It improves data accuracy in volatile environments

(Case Study)

A

D. It improves data accuracy in volatile environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

A. CDFControl utiliity
B. Citrix EdgeSight console
C. Citrix AppCenter console
D. Group Policy Management console

(Case Study)

A

C. Citrix AppCenter Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.
How should the architect deploy MGMT in a Hosted Shared environment?

A. On Windows Server 2008 R2 with Machine Creation Services
B. On Windows Server 2012 R2 with Machine Creation Services
C. On Windows Server 2008 R2 with Provisioning Services
D. On Windows Server 2012 R2 with Provisioning Services

(Case Study)

A

On Windows Server 2012 R2 With Provisioning Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scenario: CGE’s security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using L2TP meet CGE’s compliance requirements?

A. It encrypts internal ICA traffic.
B. It encrypts ICA traffic from remote end users.
C. It enables the SSL Relay service.
D. It complies with industry-standard SSL encryption requirements

A

A. It encrypts internal ICA traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group’s existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as Hosted VDI with SCCM the best solution?

A. It allows the installation of custom applications.
B. It is easy to manage.
C. It meets the high-performance application demands of the Executives/Management end-user group.
D. It allows the Executives/Managment end-user group to share desktops.

(Case Study)

A

D. It allows the Executives/Management end-user group to share desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits of using Streamed VHD?

A. It retains the single image management function
B. It provides a high level of security
C. It has a low storage performance requirement
D. It allows users to install application

A

A. It retains the single image management function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.
Why does using Provisioning Services with WAIK help manage the image versioning process?

A. It enables rollbacks.
B. It manages version control.
C. It leverages storage array features to offload host processing.
D. It automatically deploys the latest drivers and patches.

(Case Study)

A

B. It manages version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. Whey does using Provisioning Services and enabling vDisk Update Management help manage the image versioning process?

A. It automatically upgrades virtual desktops to the latest OS version.
B. It provides centralized, single-image management with rollback
C. It is compatible with the Microsoft VHD specification.
D. It automatically deploys the latest target device drivers.

(Case Study)

A

C. It is compatible with the Microsoft VHD specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does centralizing volume activation help manage the image release process?

A. Because it reduces licensing administration
B. Because it helps manage version control
C. Because it automates the license download process
D. Because it enables the use of Multiple Activation Keys

A

A. Because it reduces licensing administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Citrix Architect reviewed CGE’s antivirus policy and found that it does NOT comply with the posted Citrix antivirus recommendations. What should the architects recommend b added to CGE’s antivirus policy?

A. Enable scanning of network drives
B. Disable real-time scanning on Citrix XenApp servers.
C. Scan all excluded files during the scheduled periodic scan
D. Exclude the user profile storage location from antivirus scanning

A

C. Scan all excluded files during the scheduled periiodic scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why should memory and network utilization be used to identify bottlenecks?

A. Excessive memory and network utilization will slow the creation of new sessions.
B. Excessive memory and network utilization on the data collector will slow down Web Interface authentication.
C. Excessive memory and network utilization on the data collector will slow down application enumeration.
D. Excessive memory and network utilization on the XenApp server will affect the local host cache.

A

B. Excessive memory and network utilization on the data collector will slow down Web Interface authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Scenario: StoreFront is installed on dedicated servers.  A Citrix Architect needs to supply CGE's corporate IT team with the critical Citrix services to be monitored.  Which two Citrix services on the StoreFront servers should the architect recommend be monitored? (Choose Two)
A. Monitor Service
B. StoreFront Service
C. Peer Resolution Service
D. Credential Wallet Service

(Case Study)

A

C. Peer Resolution Service

D. Credential Wallet Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why should CPU consumption above 85% be used to identify bottlenecks?

A. At least 20% of resources should be available at all times
B. XenServer host CPU utilization above 85% causes excessive content switching
C. XenServer host reserves 20% of all CPU for context switching
D. Running XenCenter will consume 20% of all CPU resources

A

A. At least 20% of resources should be available at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The company needs to define its management process for desktop image releases.

Which tool should the architect recommend for the image management process?

A. Provisioning Services
B. Hypervisor templates and snapshots
C. Windows Deployment Services
D. XenConvert

A

A. Provisioning Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How should the architect specify that the Configuration Logging database be queried?

A. By using the Citrix Director console
B. By using SQL Management Studio
C. By using SQL Reporting Services
D. By using PowerShell

A

B. By using SQL Management Studio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

What are the benefits of using Streamed VHD?

A. The ability to use local client hardware
B. Highest level of user personalization
C. Supports a variety of hardware configurations from a single image
D. Remote access to applications

A

D. Remote access to applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which aspect of the new storage system’s performance requirements is critical to the success of the project and should be determined before any purchase takes place?

A. Whether it supports automatic tiering
B. The number of SSD drives it will hold
C. Whether 8Gb/s Fibre Channel or 10Gb/s Ethernet technology provides more storage bandwidth
D. The number of IOPS it must support to host the required amount of pooled and dedicated virtual desktops

A

A. Whether it supports automatic tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would creating Citrix policies within a GPO, filtered by Client Name, ensure full control over which GPOs are applied? A. It provides central management and control B. It ensures that only policies with the correct filter in Active Directory are applied C. It ensures that only settings located in the root OU are applied. D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
B. It ensures that only policies with the correct filter in Active Directory are applied
26
Scenario: CGE wants to use NetScaler Insight to capture network metrics for connections to the Citrix environment. Specifically, CGE wants to capture internal and external end users connecting to XenDesktop. Where in the design should a Citrix Architect place NetScalers to capture the required metrics for internal end users without using ICA Proxy? A. In front of the StoreFront server group B. In-line beween the clients and the Delivery COntrollers C. In the network DMZ for NetScaler Gateway connections D. In-line between the clients and the XenDesktop virtual desktops
D. In-line between the clients and the XenDesktop virtual desktops
27
Scenario: Personnel are being trained using a test XenDesktop site. They must be restricted to accessing this site only while on company premises. Which StoreFront configuration should the architect recommend? A. Enable the Domain pass-through authentication method on the store. B. Disable the Pass-through from NetScaler authentication method on the store C. Configure the StoreFront servers with a separate store for this site, NOT enabled for remote access. D. Install a certificate issued by the internal Windows Certificate Services server on the StoreFront servers.
C. Configure the StoreFront servers with a separate store for this site, NOT enabled for remote access.
28
Why does using SQL Reporting Services help the company comply with its security policy? A. Because it is a centralized, industry-standard log that is easily queried B. Because it password-protects the audit logs for added security C. Because it uses a standard TCP port D. Because it collects logs from multiple devices
D. Because it collects logs from multiple devices
29
Scenario: CGE's security officer states that , for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using SSL meet CGE's compliance requirements? A. It eliminates the need to distribute an internal root certificate B. It encrypts end-to-end traffic from remote end users C. It enable s the SSL relay service D. It encrypts network traffic between XenDesktop, StoreFront, and NetScaler
D. It encrypts network traffic between XenDesktop, StoreFront, and NetScaler
30
Why does using a shared VLAN with a Provisioning Services server in both the primary and secondary datacenters help segment streaming traffic? A. It separates disk and end-user data traffic B. It enables disk data traffic to be encrypted with IPsec C. It allows the necessary TCP offload settings to be configured on the streaming NIC D. It provides multiple IP addresses that can be dedicated to streaming traffic
C. It allows the necessary TCP offload settings to be configured on the streaming NIC
31
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers and Microsoft SQL Servers for Databases. Why is creating a resource pool comprising a maximum of 32 XenServer hosts, using a virtual disk storage repository for XenMotion and high availability, and replicating and performing backups for the meta information the best design solution? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes B. It ensures simple setup with a built-in failover design C. It allows virtual workloads to fail over to a failover site for disaster recovery purposes D. It optimizes performance and provides centralized management (Case Study)
A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes
32
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. How should the architect use Provisioning Services to design a release management scheme that facilitates rollbacks? A. By enabling vDisk Update Management B. By using vDisk versions C. By using snapshots D. By using the Windows Utomatic Install Kit (Case Study)
B. By using vDisk versions
33
Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. Why does enabling 'Offline profile support' when configuring group profiles benefit CGE's Sales end-user group? A. It allows faster logons and logoffs. B. It minimizes the required storage needed for folder redirection. C. It simplifies home drive cleanup D. It improves data accuracy in volatile environments (Case Study)
A. It allows faster logons and logoffs.
34
Why would having one farm with three configured sites, with one Provisioning Services server in each datacenter, meet the requirements of a regional, single image management strategy with minimal WAN traffic across datacenters? A. It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability within each region B. It ensures that Provisioning Services targets will NOT load balance across regions, and reduces management overhead. C. It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability between regions D. It ensures Provisioning Services targets will NOT load b alance acreoss regions, guarantees high availability within each region, and reduces management overhead (Case Study)
A. It ensures that Provisioning Services targets will NOT load balance between hosts and ensures high availability within each region
35
Scenario: A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency. How should the architect configure the storage on the DFS namespace server for fault tolerance and high performance? A. By implementing RAID 0 B. By implementing RAID 1 C. By implementing high-speed local storage with deduplication D. By implementing RAID 10 (Case Study)
B. By implementing RAID 1
36
Why does using PowerShell help manage the image release process? A. Because it can script automatic upgrades of the deployment template B. Because it provides centralized, automated single image management C. Because it facilitates consistent deployment of base images D. Because PowerShell scripts can be executed from the same network share as the deployment template
C. Because it facilitates consistent deployment of base images
37
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is separation workloads by roles, creating a resource pool comprising of a maximum of 32 XenServer hosts, and implementing multiple store repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery the best design solution? A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities. B. It provides workload flexibility to more efficiently leverage available resources within a storage pool, and facilitates expansion options. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities. D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. (Case Study)
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.
38
Contractors need a consistent environment to perform quality assurance testing of applications. Which two types of solutions should the architect recommend? (Choose two) A. Random server OS machines B. Pooled desktop OS machines C. Dedicated desktop OS machines D. Pooled desktop OS machines with Personal vDisk
A. Random server OS machines | B. Pooled desktop OS machines
39
Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. Why does enabling 'Profile streaming' when configuring Citrix Profile management without folder redirection benefit CGE's Sales end-user group? A. It allows faster logons B. It simplifies home drive cleanup C. It minimizes the required storage needed for folder redirection D. It improves application performance (Case Study)
D. It improves application performance
40
Scenario: An architect is designing a NetScaler solution that implements GSLB. The solution must provide StoreFront access through a single URL worldwide and maintain a hightly available configuration globally as well as locally. How many StoreFront servers are recommended to implement this configuration? A. Six, one site for each store B. Six, two in each datacenter C. Three, one in each datacenter D. Four, two in the primary and two in the backup datacenter
B. Six, two in each datacenter
41
Why would the architect choose active-active bonding when configuring network interfaces for storage networks? A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond (Case Study)
A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.
42
Which two business drivers are critical for the Contractors user group? (Choose two. ) A. Printing security B. Secure remote access C. Granular security policies D. Support for mobile devices
B. Secure remote access | C. Granular security policies
43
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. What are the benefits of using Hosted VDI with Provisioning Services? A. Highest user density and lowest cost B. Highest level of user personalization C. Rapid provisioning and highest user density D. Lowest cost and highest application compatibility
C. Rapid provisioning and highest user density
44
Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as Hosted VDI Static the best solution? A. It allows the installation of custom applications B. It is easy to manage C. It meets the high-perfomance application demands of the Executives/Management end-user group. D. It allows the Executives/Management end-user group to share desktops (Case Study)
D. It allows the Executives/Managemtent end-user group to share desktops
45
Which tool should the architect use in preparation for migration to WIndows Server 2012 to determine application compatibility and suitability for virtualization? A. AppDNA B. App-V Sequencer C. EdgeSight for End Points D. Windows Upgrade Advisor
A. AppDNA
46
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Which design recommendation should the architect make when designing the new Active Directory structure? A. Create one OU as a root for the new environment and move Citrix policies from Citrix Studio to a GPO B. Create one OU for each region and use a set of Group Policies for each regional OU. C. Create one OU for each region and only use Citrix policies D. Create on OU as a root for the new environment and enable loopback processing.
D. Create on OU as a root for the new environment and enable loopback processing.
47
Why does using SQL Reporting Services help the company comply with its security policy? A. Because it enables automated report delivery B. Because it enables PDF-based reports C. Because it uses a standard TCP port D. Because it provides security alerts by using SQL Mail
A. Because it enables automated report delivery
48
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is separating workloads by roles, creating a resource pool comprising a maximum of 16 XenServer hosts, and implementing multiple storage repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery purposes the best design solution? A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicting situations. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities. D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. (Case Study)
A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities
49
Why should the network utilization rising above 50% be used to identify bottlenecks? A. This indicates insufficient bandwidth for virtual machines delivered by Provisioning Services B. This indicates a saturated network segment C. This indicates a failed network switch D. This indicates an incorrectly configured router
B. This indicates a saturated network segment
50
What are the benefits of using a hosted shared environment? A. It retains the single image management function while allowing users to install applications B. It provides a high level of security while allowing user customization C. It has a low storage performance requirement and high user density D. It delivers low-cost and high application compatibility
C. It has a low storage performance requirement and high user density
51
How should the architect design the optimal write cache storage? A. By implementing RAID 5 on XenServer local storage B. By implementing RAID 10 on XenServer shared storage C. By implementing RAID 3 on a NAS device D. By implementing RAID 6 on a server hosting the CIFS share
B. By implementing RAID 10 on XenServer shared storage
52
Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT in a Remote PC environment on Windows 8 with Provisioning Services the best solution? A. It offers a faster change process B. End users are already comfortable working in a shared environment C. It prevents XenApp server crashes D. It enables faster rollbacks (Case Study)
C. It prevents XenApp server crashes
53
What are the benefits of using Streamed VHD? A. It retains the single image management function while allowing users to install applications B. It provides a high level of security while allowing user customization C. It has a low storage performance requirement and high user density D. It delivers low-cost and high application compatibility
B. It provides a high level of security while allowing user customization
54
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will b e connected to a 10 Gbps network. How should the architect implement a highly available Provisioning Services server on dedicated VLANS? A. By installing multiple NICs in one Provisioning Services server in each datacenter B. By deploying one Provisioning Services server in the primary and one in the secondary datacenter C. By deploying two Provisioning Services servers in each datacenter D. By using NetScaler with GSLB to load balance the Provisioning Services servers in each datacenter
C. By deploying two Provisioning Services servers in each datacenter
55
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. Why does using Provisioning Services and leveraging vDisk versions help manage the image versioning process? A. It automatically upgrades virtual desktops to the latest OS version B. It provides centralized, single-image management with rollback C. It is compatible with the Microsoft VHD specification D. It automatically deploys the latest drivers and patches (Case Study)
A. It automatically upgrades virtual desktops to the latest OS version
56
How should the architect configure high availability (HA) on a NAS device share so that Provisioning Services has constant access to Provisioning Services images? A. By using storage replication between multiple NAS devices B. By using Distributed File Services Replication (DFSR) between multiple NAS devices C. By using DNS Round Robin D. By using XenServer with HA enabled (Case Study)
D. By using XenServer with HA enabled
57
Why is configuring regional shared storage locations on a CIFS server using DNS Round Robin the best design choice for vDisk storage? A. It is the least expensive solution B. It is a highly scalable and resilient solution C. It creates the least amount of administrative overhead D. It reduces the system footprint (Case Study)
C. It creates the least amount of administrative overhead
58
How can the architect identify if the server OS machines are the source of a bottleneck? A. Identify excessive CPU and memory consumption B. Identify excessive memory and network utilization C. Identify excessive disk and network I/O D. Identify excessive disk I/O and page file utilization
D. Identify excessive disk I/O and page file utilization
59
Which three user groups require remote access? (Choose three) ``` A. IT B. Call Center C. Human Resources D. Emergency Response Team E. Nurses, Imaging and Radiology ```
A. IT C. Human Resources D. Emergency Response Team
60
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is creating a resource pool comprising a maximum of eight XenServer hosts, backing up virtual workloads on a daily basis, and using third-party backups for the desktops the best design solution? A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates easier management and expansion capabilities. B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads. C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. (Case Study)
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.
61
How should a Local VM environment be implemented to allow user-installed application? A. By adding users to the local administrators group B. By using Personal vDisk C. By giving users access to the Synchronizer console D. By providing access to the network share that contains the App-V packages
A. By adding users to the local administrators group
62
Why does using StoreFront logs help the company comply with its security policy? A. Because they are centralized, industry-standard logs that are easily queried B. Because they use password-protection for added security C. Because they contain detailed records of user authentication activity D. Because they collect data from multiple devices
C. Because they contain detailed records of user authentication activity
63
Scenario: CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions. Which solution could reduce the read IPS requirements on a shared storage array? A. IntelliCache B. Personal vDisk C. Provisioning Services D. Machine Creation Services (Case Study)
C. Provisioning Services
64
What should the architect recommend for designing the PvD storage for scalability? A. XenServer local storage B. XenServer shared storage C. CIFS share D. ShareFile StorageZones
B. XenServer shared storage
65
Why does persistent cache enable the Radiology group to maintain their changes? A. Because it is maintained across restarts B. Because it is backed up C. Because it is stored in the cloud D. Because it is encrypted with EFS
A. Because it is maintained across restarts
66
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is separating the workloads by roles to reflect the OU structure of Active Directroy, creating a resource pool comprising a maximum of 24 XenServerhosts, and implementing a storage repository for virtual disks, XenMotion, high availability, and disaster recovery backups the best design solution? A. It ensures the logical separation of infrastrucutre and virtual desktop workloads, and facilitates managemtnt and expansion capabilities B. It provides workload flexibility to more efficiently leverage available resources with in a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads. C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities. D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. (Case Study)
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.
67
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process of version control that includes thorough testing prior to production. Why does using Windows Deployment Services and centralizing the volume-activation process help manage the image versioning process? A. It reduces licensing administration B. It helps manage version control C. It automates the license download process D. It enables the use of Multiple Activation Keys (MAKs) (Case Study).
D. It enables the use of Multiple Activation Keys (MAKs)
68
CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. How can Citrix Profile Management be configured to allow Sales end-user group profiles to be standardized with the rest of CGE? A. Enable 'Active write back' B. Enable file and folder exclusions C. Enable 'Offline profile support' D. Enable 'Profile streaming' (Case Study).
C. Enable 'Offline profile support'
69
``` Individual users in the Radiology group want to install a variety of third-party tools to analyze the images they use. They also need to be able to analyze a centrally stored image database that they access remotely. Which XenDesktop (FlexCast) model should the architect recommend to achieve this goal? ``` A. Hosted shared B. Hosted VDI C. Streamed VHD D. Local VM
B. Hosted VDI
70
Scenario: Each XenServer host is configured with two bonded 10GB NICs for storage, management, and guest VM networking. THe CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3 ad and adaptive load balancing. How should the architect configure XenServer? A. Using active-active bonding B. Using active-passive bonding C. Using XenServer MPIO redundancy D. Using LACP bonding (Case Study)
D. Using LACP bonding
71
Scenario: A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency. Why does implementing RAID 1 satisfy the requirements? A. It provides striping B. It provides the highest performance C. It provides fault tolerance D. It provides minimal disk usage (Case Study)
C. It provides fault tolerance
72
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions. What are the benefits of using a Hosted VDI FlexCast model with personal vDisks? A. It retains the single-image management function while allowing end users to install applications B. It provides a high level of security while allowing end-user customization C. It has low storage performance requirements and high end-user density D. It retains the single-image management function and reduces application compatibility issues
D. It retains the single-image management function and reduces application compatibility issues
73
CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is creating resource pools comprising of 24 XenServer hosts, using a virtual disk storage repository to provide XenMotion and high availability, and performing daily backups of infrastructure workloads the best design solution? A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates easier management and expansion capabilities B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and fail-over capabilities D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime (Case Study)
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime
74
Which endpoint devices must be replaced to support the Streamed VHD method of desktop delivery A. Windows 7 B. Windows XP C. Linux thin clients D. PCs running Internet Explorer 7
C. Linux thin clients
75
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OU's across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would Implementing one Citrix policy for each region ensure full control over which Group Policies are applied? A. It provides central management and control. B. It ensures that only settings with the correct filtering in Active Directory are applied. C. It ensures that only settings located in the root Citrix OU are applied. D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
C. It ensures that only settings located in the root Citrix OU are applied.
76
Scenario: A Citrix Architect is designing a multi-server Provisioning Sewices solution for CGE. The solution must be highly available and minimize the risk of vDlsk inconsistency. What should the architect recommend? A. Configure a separate local vDisk store on each Provisioning Services server and a dally robocopy script across the two stores. B. Configure a separate local vDlsk store on each Provisioning Services server and configure the two stores in a DFS-R group. C. Configure a vDlsk store on a CIFS share on a NAS for each Provisioning Services server D. Create the Provisioning Services vDlsk store on a configured, single DFS namespace.
B. Configure a separate local vDlsk store on each Provisioning Services server and configure the two stores in a DFS-R group. C. Configure a vDlsk store on a CIFS share on a NAS for each Provisioning Services server
77
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OU's across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing with replace at the root level ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on. B. It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on. C. It ensures that only Citrix policies are applied below the root level when end users log on. D. It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies
C. It ensures that only Citrix policies are applied below the root level when end users log on.
78
The company plans to reduce their storage requirement by using thin provisioning with XenServer hosts. Which storage option should the architect verify for capability in the current environment? A. NFS B. CIFS C. iSCSI D. Fibre Channel
A. NFS
79
What are the benefits of using SSL to meet the company's compliance requirements? A. It consumes lower CPU resources than other encryption technologies B. It is supported on industry-standard devices C. It is required to enable the SSL Relay service D. It enables two-factor authentication
B. It is supported on industry-standard devices
80
Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured With the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design? A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. B. It provides redundancy, while optimizing external WAN traffc. C. It segments the Gateway and load-balancing features of the NetScaler appliances. D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.
C. It segments the Gateway and load-balancing features of the NetScaler appliances.
81
Scenario: CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. How should the architect design the image management process using Provisioning Services? A,. Deploy two Provisioning Services servers in each datacenter, install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and include the Virtual Delivery Agent (VDA) and the target device software. B. Deploy two Provisioning Services servers in each datacenter, Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and install the target device software and Citrix Receiver. C. Deploy one Provisioning Services server in each datacenter, install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and convert the Virtual machine image to a template. D. Deploy one Provisioning Services server in each datacenter, install a new Windows mage utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and copy the virtual machine image using Fast Clone. (Case Study)
C. Deploy one Provisioning Services server in each datacenter, install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and convert the Virtual machine image to a template.
82
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as a VM hosted app on Windows 7 x86 with Machine Creation Services the best solution? A. It supports 16-bit applications. B. It meets the high-performance application demands of the Executives/Management end-user group. C. It allows the installation of custom applications. D. It offers faster change and rollback procedures. (Case Study)
C. It allows the installation of custom applications.
83
Scenario: CGE is experiencing numerous Issues with Its existing profile management solution. The Citrix Architect managing the project IS tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity. Why does enabling file and folder exclusions when configuring group profiles benefit CGE's Sales end-user group? A. It minimizes the required storage needed for folder redirection. B. It simplifies home drive cleanup. C. It improves application performance. D. It allows faster logons and logoffs. (Case study)
A. It minimizes the required storage needed for folder redirection.
84
After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery. What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.) A. It allows the end users to install custom software. B. It gives the end users full rights over the system drive. C. It requires less storage space than dedicated desktops. D. It allows for high availability in a disaster recovery scenario.
A. It allows the end users to install custom software. C. It requires less storage space than dedicated desktops.
85
Why would having one farm with three configured sites, with two Provisioning Services servers in the primary datacenter, two in the secondary datacenter, and one in the remaining datacenter, meet the requirements of a regional single-image management strategy with minimal WAN traffic across datacenters? A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region. B. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability between regions. C. It ensures that Provisioning Servicws targets will NOT load balance between hosts, and guarantees high availability between regions. D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region. (Case Study)
D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region.
86
Scenario: CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcocess. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. How should the architect deploy MGMT using Remote PC? A. On Windows 7 With Machine Creation Services B. On Windows 8 With Machine Creation Services C. On Windows 7 With Provisioning Services D. On Windows 8 With Provisioning Services
C. On Windows 7 With Provisioning Services
87
Which component should a Citrix Architect recommend to centrally audit any failed logon attempts to NetScaler Gateway? A Citrix Architect is asked to design a new external access architecture for CGE A. Citrix Studio B. Citrix Director C. Citrix Command Center D. Citrix NetScaler AppFlow
C. Citrix Command Center
88
Which tool should a Citrix Architect use to document CGE's existing printer models? A. Print Migrator B. Stress Printer C. Print Detective D. Print Management (Case Study)
C. Print Detective
89
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted Shared servers and manually installing the operating system? A. It provides the highest end-user density at the lowest cost. B. It provides the greatest level of end-user personalization and control. C. It offers the lowest storage performance requirement and the highest end-user density. D. It offers the lowest cost and the greatest application compatibility. (Case study)
B. It provides the greatest level of end-user personalization and control.
90
What are the benefits of using a Hosted VDI environment with statically assigned virtual desktops? A. It retains the single image management function while allowing users to install applications B. It provides a high level of security while allowing user customization C. It has a low storage performance requirement and high user density D. It allows users to Install application and access desktops remotely
D. It allows users to Install application and access desktops remotely
91
Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. How can Citrix Profile management without folder redirection be configured for Sales end-user group profiles? A. Enable Profile streaming. B. Enable 'Offine profile support'. C. Enable 'Active write back' D. Enable file and folder exclusions. (Case Study)
A. Enable Profile streaming.
92
Which action would improve the end-user experience for Technicians and Engineers? A. Apply a Citrix policy to enable lossless graphics B. Apply a Citrix policy to disable Queuing and Tossing C. Apply a Citrix policy to enable Desktop Composition Redirection D. Apply a Citrix policy to limit graphics quality based on available bandwidth (Case Study)
D. Apply a Citrix policy to limit graphics quality based on available bandwidth
93
Which file should a Citrix Administrator edit to configure log settings on the StoreFront server? A. web.config B. global.aspx C. logout.aspx D. default.html
A. web.config
94
Why does using Windows Event Viewer help the company comply with its security policy? A. Because it is a centralized, industry-standard log that is easily queried B. Because it password-protects the audit logs for added security C. Because It uses a standard TCP port D. Because it collects logs from multiple devices
A. Because it is a centralized, industry-standard log that is easily queried
95
An architect recommends full SSL VPN connections for remote users. Which type of NetScaler license should be applied for these users? A. User B. Device C. Platform D. Universal
D. Universal
96
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is creating a resource pool comprising a maximum of 16 XenServer hosts, using a shared storage repository to provide XenMotion and high availability, and replicating meta information to the disaster recovery site the best design solution? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes. B. It ensures Simple setup with a built-in failover design. C. It allows virtual workloads to fall over to a failover site for disaster recovery purposes. D. It optimizes performance and provides centralized management. (Case Study)
C. It allows virtual workloads to fall over to a failover site for disaster recovery purposes.
97
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted Shared servers with Machine Creation Services, when only block storage is available on the shared storage of the Hypervisor? A. It provides the highest end-user density at the lowest cost. B. It provides the greatest level of end-user personalization and control. C. It offers the lowest storage performance requirement and the highest end-user density. D. It offers the lowest cost and the greatest application compatibility.
A. It provides the highest end-user density at the lowest cost.
98
A Citrix Administrator is unable to create desktop OS machines using Machine Creation Services. What is a possible cause of the issue? A. Citrix Director is unreachable B. DHCP IS NOT working correctly C. The Machine Identity Service IS NOT running D. Antivirus software on the Delivery Controller IS blocking the creation
C. The Machine Identity Service IS NOT running
99
Why does using PowerShell help the company comply with its security policy? A. Because PowerShell has a commandlet for running queries from Citrix Director B. Because it enables automated report delivery C. Because it enables PDF-based reports D. Because it collects logs from multiple devices
A. Because PowerShell has a commandlet for running queries from Citrix Director
100
Which risk could lead to a lengthy farm outage in the event of a corrupt SQL data store? A. SQL server backups are encrypted B. An untested SQL backup and restoration process C. SQL servers that are NOT running on the same service packs D. The use of SQL Mirroring instead of SQL AlwaysOn Availability Groups (Case Study)
B. An untested SQL backup and restoration process
101
How should the architect implement database protection in Access? A. By making copes of the .MDB file B. By hosting the .MDB file on a network share C. By enabling Volume Shadow Copy D. By taking hypervisor snapshots of the VM running Access
C. By enabling Volume Shadow Copy
102
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network. How does using a dedicated VLAN help the company secure streaming traffic? A. Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter. B. Dedicated VLANs enable streaming traffic to be encrypted With IPsec_ C. Dedicated VLANs allow the necessary TCP offoad settings to be configured on the streaming NIC. D. Dedicated VLANs provide multiple IP addresses that can be dedicated to streaming traffc_
A. Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter.
103
An architect is assessing the existing backup strategy and recommending changes to suit the new virtual desktop environment. Which two critical components should the architect recommend for nightly backup, as they cannot be easily recreated in the event of a disaster? (Choose two.) A. User's Personal vDlsks B. Pooled desktop master mage C. Servers hosting StoreFront roles D. Servers hosting Delivery Controller roles E. SQL Server hosting the XenDesktop database
A. User's Personal vDlsks E. SQL Server hosting the XenDesktop database
104
Why would having three farms, each with one configured site, and one Provisioning Services server in each farm, meet the requirements of a regional, single-image management strategy with minimal WAN traffic across datacenters? A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region. B. It ensures a reduced control layer, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability between regions. C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions. D. It ensures a reduced control layer, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability within each region. (Case Study)
C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.
105
``` Which two manually performed tasks can be streamlined by implementing a Citrix environment? (Choose two.) A. Database backup B. Application patching C. Security assessment D. Certificate management E. Operating system Installation ```
B. Application patching E. Operating system Installation
106
Scenario: CGE decided to vitualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. How should the architect design the image management process using Windows Deployment Services? A. Prepare an existing machine as the master image. B. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and run SysPrep on the virtual machine. C. Use a XenServer virtual machine to install a new Windows image with MAK prepared as the master image, and ensure the image has two network cards. D. Run the Capture Image Wizard on an existing machine. (Case Study)
B. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and run SysPrep on the virtual machine.
107
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. How should the architect implement loopback processing to ensure full control over the Group Policies that are applied? A. Configure loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents. B. Configure loopback processing with merge on a GPO linked to all OUs containing Virtual Desktop Agents. C. Configure loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers. D. Configure loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers.
A. Configure loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents.
108
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is using a maximum of 24 XenServer hosts, using a virtual disk storage repository for XenMotion and high availability, and daily backups of the infrastructure workloads the best design for the resource pools? A. It ensures the logical separation of infrastructure and virtual desktop workloads to prevent interference, and facilitates management and expansion capabilities. B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, dally backups create minimal downtime for critical workloads. C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and fail-over capabilities. D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. (Case Study)
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, dally backups create minimal downtime for critical workloads.
109
How should the architect configure the NetScaler virtual servers on the four appliances? A. Create one NetScaler virtual server for each appliance, and on each appliance bind a session policy to the NetScaler virtual server configured in ICA Proxy mode using the StoreFront server. B. Create one NetScaler virtual server for each appliance and on each appliance bind a redirection policy to the NetScaler virtual server configured in ICA redirection mode using the StoreFront server. C. Create two NetScaler virtual servers for each appliance, and bind a redirection policy to them that is configured in ICA Redirection mode using the StoreFront server. D. Create four NetScaler virtual servers for each appliance, and bind a session policy to them that is configured In ICA Redirection mode using the StoreFront server. (Case Study)
A. Create one NetScaler virtual server for each appliance, and on each appliance bind a session policy to the NetScaler virtual server configured in ICA Proxy mode using the StoreFront server.
110
Why is configuring regional shared storage locations on a CIFS server using Distributed File Services the best design choice for vDisk storage? A. It is the least expensive solution. B. It is a highly scalable and resilient solution. C. It creates the least amount of administrative overhead. D. It reduces the system footprint. (Case Study)
A. It is the least expensive solution.
111
Scenario: CGE decided to virtualize Its Infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What is the benefit of using the Local VM FlexCast model? A. It is compatible with tablet devices. B. It offers the greatest level of end-user personalization. C. It supports a variety of hardware configurations from a single image. D. It allows remote access to applications. (Case Study)
D. It allows remote access to applications.
112
Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT in a Hosted Shared environment on Windows Server 2012 R2 with Provisioning Sewices the best solution? A. It offers a faster change process. B. End users are already comfortable working in a shared environment. C. It prevents XenApp server crashes. D. It enables faster rollbacks. (Case Study)
A. It offers a faster change process.
113
Why does deploying a base image from an XVA file help manage the image release process? A. Because it supports hypervisors supported by XenDesktop B. Because it helps manage version control C. Because it uses storage array features to offload host processing D. Because It automatically deploys the latest drivers and patches
B. Because it helps manage version control
114
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would creating Citrix policies within a GPO, filtered by IP address, ensure full control over which GPOs are applied? A. It provides central management and control. B. It ensures that only policies With the correct filter in Active Directory are applied. C. It ensures that only settings located In the root OU are applied. D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
C. It ensures that only settings located In the root OU are applied.
115
Which action should an architect avoid recommending when designing a monitoring solution? A. Installing vendor-supplied tools to monitor physical hardware B. Installing Command Center to monitor NetScaler appliances C. Installing agents onto NetScaler appliances to monitor utilization D. Installing Citrix Director to monitor the XenDesktop environment
C. Installing agents onto NetScaler appliances to monitor utilization
116
Why should disk I/O and page file utilization be used to identify' bottlenecks? A. Excessive disk I/O and page file utilization will slow the creation of new sessions. B. Excessive disk I/O and page file utilization on the data collector Will slow down Web Interface authentication. C. Excessive disk I/O and page file utilization on the data collector Will slow down application enumeration. D. Excessive disk I/O and page file utilization on the XenApp server Will affect the local host cache.
D. Excessive disk I/O and page file utilization on the XenApp server Will affect the local host cache.
117
Why should memory and network utilization be used to identify bottlenecks? A. High memory and network utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load. B. High memory and network utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDlsks C. High memory and network utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users. D. High memory and network utilization of the Delivery Controller can indicate the presence of a virus or malware.
A. High memory and network utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load.
118
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. Why does using Machine Creation Services facilitate image management? A. It reduces image deployment time. B. It reduces the storage requirement for images. C. It allows for testing updates prior to updating the production machine catalog. D. It allows for testing updates prior to updating the production Delivery Group. (Case Study)
D. It allows for testing updates prior to updating the production Delivery Group.
119
The Radiology group requires that changes on the virtual desktops be retained. Which configuration should the architect specify for the XenDesktop infrastructure? A. Provisioning Services with cache on server persistent B. Provisioning Services with cache on server C. Provisioning Services with Personal vDisk (PvD) D. Provisioning Services with standard image mode
C. Provisioning Services with Personal vDisk (PvD)
120
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is creating a resource pool comprising a maximum of 32 XenServer hosts, using a virtual disk shared storage repository to provide XenMotion and high availability, and performing replication and backups of meta information the best design solution? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a disaster recovery process that leverages a backup solution. B. It ensures Simple setup with redundancy and meets the requirement of separating the OS types. C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery. D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability. (Case Study)
B. It ensures Simple setup with redundancy and meets the requirement of separating the OS types.
121
The company's security compliance policy requires that remote access is logged for auditing purposes. Which data sources should be captured? A. NetScaler logs, StoreFront logs and Citrix Director database B. Configuration Logging database, NetScaler logs, and Citrix Director database C. StoreFront logs, System Event logs, and firewall logs D. Configuration Logging database, firewall logs, and Application Event log
A. NetScaler logs, StoreFront logs | and Citrix Director database
122
Why would the architect choose active-passive bonding when configuring network interfaces for storage networks? A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical Interfaces in the bond. B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. C. It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond. D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond. (Case Study)
B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
123
``` Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.) A. Remote PC Access B. Hosted Shared C. Streamed VHD D. On-Demand Apps E. Hosted VDI: Static Persistent ```
A. Remote PC Access E. Hosted VDI: Static Persistent
124
Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server binded to a redirection policy, the best remote access design7 A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. B. It provides redundancy, wh le optimizing external WAN traffc_ C. It segments the Gateway and load-balancing features of the NetScaler appliances. D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.
A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
125
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcu:ess_ The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as Hosted VDI Random the best solution? A. It allows the installation of custom applications. B. It is easy to manage. C. It meets the high-performance application demands of the Executives/Management end-user group. D. It allows the Executives/Management end-user group to share desktops.
C. It meets the high-performance application demands of the Executives/Management end-user group.
126
The company is implementing XenDesktop globally for desktop virtualization. What is the minimum number of Delivery Controllers that an architect should recommend for high availability? A. Two B. Four C. Six D. Nine
A. Two
127
Why is deploying two NetScaler appliances in each regional datacenter, with one in the internal network for Gateway traffic and the other in the DMZ for load balancing, the best design solution? A. It provides intrasite redundancy in case of appliance failures. B. It provides redundancy in case of site failures, while optimizing external WAN traffic_ C. It protects against WAN failures and connects end users to their home datacenter. D. It allows for the expected expansion of remote access usage and provides functionality for future needs. (Case Study)
B. It provides redundancy in case of site failures, while optimizing external WAN traffic_
128
Why should disk and network I/O be used to identify' bottlenecks? A. Excessive disk and network I/O will slow the creation of new sessions. B. Excessive disk and network I/O on the data collector will slow down Web Interface authentication. C. Excessive disk and network I/O on the data collector will slow down application enumeration. D. Excessive disk and network I/O on the XenApp server will affect the local host cache.
C. Excessive disk and network I/O on the data collector will slow down application enumeration.
129
Why would the architect choose LACP bonding when configuring bonded network interfaces for guest VM networks? A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical Interfaces in the bond. B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond. D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond. (Case Study)
B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
130
How should the architect implement database high availability in SQL Server? A. By using SQL Server Mirroring B. By using SQL Server replication C. By Implementing SQL Server log shipping D. By using hypervisor high availability
A. By using SQL Server Mirroring
131
What are the benefits of using a Hosted VDI environment With Citrix Profile Management? It retains the single image management function while allowing users to install applications It provides a high level of security while allowing user customization It has a low storage performance requirement and high user density It delivers low-cost and high application compatibility
It retains the single image management function while allowing users to install applications
132
Why does using the IIS Manager console help the company comply with its security policy? Because it enables you to view IIS logs to extract data Because it enables you to configure StoreFront Because it uses a standard TCP port Because it is a Microsoft Management Console snap-in
Because it enables you to view IIS logs to extract data
133
Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured With GSl_a, the best design solution? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffc_ It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSI_ VPN functionality for future needs.
It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
134
What are the benefits of using SecurelCA to meet the company's compliance requirements? It encrypts internal ICA traffic It encrypts ICA traffic from remote users It is required to enable the SSI_ Relay semce It complies with industry-standard SSI_ encryption requirements
It encrypts ICA traffic from remote users
135
An architect is explaining options for profile management. What is one issue that the architect must address in the current environment? Folder redirection is implemented Roaming users have local profiles Startup scripts are used In the environment PositivelyFinance does NOT work With roaming profiles
PositivelyFinance does NOT work With roaming profiles
136
Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter? Two StoreFront servers in a single StoreFront server group. Two NetScalers In a high availability pair, With load balancing pointing to a single StoreFront server _ Three NetScalers In a cluster, With load balancing pointing to two StoreFront servers belonging to the same StoreFront server group. Two NetScalers In a high availability par, With load balancing pointing to two StoreFront servers belonging to the same StoreFront server group. Case Study
Two NetScalers In a high availability pair, With load balancing pointing to a single StoreFront server _
137
Scenario: A Citrix Architect is asked to design a new external access architecture for CGE_ The regional datacenters have NetScaler appliances delivering load-balancing semces_ Security policy mandates that these internal appliances CANNOT connect to the DMZ. Why is the configuration of a callback URL needed7 It authenticates end users to Active Directory. It allows for pass-through authentication to StoreFront_ It validates the SSI_ certificate on the client device. It allows for STA communication to the NetScaler_
It authenticates end users to Active Directory.
138
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcu:ess_ The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as a published application on Windows Server 2012 R2 With Provisioning Sewices the best solution? It offers a faster change process. End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
It offers a faster change process.
139
Why is creating six NetScaler virtual servers in HA pairs, configured With the subnets of the three sites and binded to redirection policies, the best design solution? It provides intraslte redundancy in case of appliance failures, while enhancing performance through an active/active configuration. It provides redundancy In case of site failures, while optimizing external WAN traffc_ It protects against WAN failures and connects end users to their home datacenter. It allows for the expected expansion of remote access usage and provides functionality for future needs. Case Study
It allows for the expected expansion of remote access usage and provides functionality for future needs.
140
Scenario: A Citrix Architect is designing a multi-server Provisioning Semces solution for CGE_ The solution must be highly available and minimize the risk ofvDlsk inconsistency. Why does implementing RAID 10 satisfy' the requirements? It provides striping and the highest performance. It minimizes d sk space and provides the highest performance. It minimizes disk space and provides fault tolerance. It provides fault tolerance and the highest performance. Case Study
It provides fault tolerance and the highest performance.
141
Scenario: CGE needs to define its management prcu:ess for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production _ Why does using Provisioning Semces and leveraging snapshots help manage the image versioning process? It enables rollbacks. It manages version control. It leverages storage array features to offoad host processing. It automatically deploys the latest drivers and patches. Case Study
It automatically deploys the latest drivers and patches.
142
Scenario: CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect IS tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. How should the architect deploy MGMT in a Hosted VDI environment? As Hosted VDI Static Persistent As Hosted VDI Static As Hosted VDI Random Hosted VDI with SCCM Case Study
Hosted VDI with SCCM
143
Scenario: A Citrix Architect is asked to design a new external access architecture for CGE_ The regional datacenters have NetScaler appliances delivering load-balancing sewices_ Security policy mandates that these internal appliances CANNOT connect to the DMZ. Which configuration should the architect recommend for the new external access architecture? One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure_cge_com_ Configure the NetScaler Gateway within StoreFront With the SNIP of each NetScaler device. A high availability par of NetScalers located In all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs. A high availability par of NetScalers located In all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) Site. One NetScaler located In all three regional datacenters. A Single public DNS server record should be configured, Including all three NetScaler pars.
A high availability par of NetScalers located In all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) Site.
144
Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity. Why does enabling 'Active write back' when configuring Citrix Profile management to allow standardization of profiles benefit CGE's Sales end-user group? It improves application performance. It simplifies home drive cleanup. It minimizes the required storage needed for folder redirection. It improves data accuracy in volatile environments Case Study
It improves data accuracy in volatile environments _
145
Why would the architect choose LACP bonding when configuring network interfaces for storage networks? It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces In the bond. It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond. Case Study
It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.
146
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. What are the benefits of using hosted shared servers and manually installing the operating system? Highest user density and lowest cost Highest level of user personalization Lowest storage performance requirement and highest user density Lowest cost and highest application compatibility
Highest user density and lowest cost
147
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. What are the benefits of using Hosted VD by using cloned VM templates? Highest user density and lowest cost Highest level of user personalization Lowest storage performance requirement and highest user density Rapid provisioning
Rapid provisioning
148
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. How should the resource pools be designed to host the infrastructure workloads and virtual desktops to ensure high availability? A. Resource pools comprising a maximum of eight XenServer hosts should be created for the virtual solution. The virtual disks of the infrastructure workloads should be backed up dally, and third-party backup solutions should be implemented for the desktops. B. Resource pools comprising a maximum of 24 XenServer hosts should be created for the virtual solution. The virtual disks of the Infrastructure workloads should be on a storage repository to provide XenMotion and high availability capabilities. The virtual disks of the infrastructure workloads should be backed up dally. C. Resource pools comprising a maximum of 16 XenServer hosts should be created for the virtual solution. The virtual disks of all workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Virtual machine meta information and data should be replicated to the failover Site by the new storage solution. D. Resource pools comprising a maximum of 32 XenServer hosts should be created for the virtual solution. The virtual disks of the Infrastructure workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Virtual machine meta information and data should be replicated and backed up_ Case Study
C. Resource pools comprising a maximum of 16 XenServer hosts should be created for the virtual solution. The virtual disks of all workloads should be on a shared storage repository to provide XenMotion and high availability capabilities. Virtual machine meta information and data should be replicated to the failover Site by the new storage solution.
149
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Semces servers will be connected toa 10 Gbps network. How does using NetScaler App Firewall help the company secure streaming traffic? NetScaler App Firewall detects network-based threats at the application layer. NetScaler App Firewall enables streaming traffic to be encrypted With IPsec_ NetScaler App Firewall removes the need for Access Control Lists on switches. NetScaler App Firewall enables Isolation of streaming traffic from other VLANs_
NetScaler App Firewall enables Isolation of streaming traffic from other VLANs
150
Scenario: HR staff have a requirement to print confidential Information to USB-attached printers in their offces_ Any printer model may be used for this purpose. Wh ch two recommended options should the architect consider for this solution? (Choose two.) Configuring Client printer names' Configuring 'Auto-create client printers' Configuring 'Universal print driver usage' Enabling 'Automatic installation of in-box printer drivers'
Configuring 'Auto-create client printers' | Configuring 'Universal print driver usage'
151
Why is configuring regional shared storage locations on a CIFS server using XenServer with HA enabled the best design choice for vDlsk storage? It is the least expensive solution. It is a highly scalable and resilient solution. It creates the least amount of administrative overhead. It reduces the system footprint. Case Study
It reduces the system footprint.
152
The company's HDX policies must apply to a pooled virtual desktop environment without affecting any virtual applications. How should an architect apply the HDX policies? By using a SmartAccess filter By using a client name policy filter By using a delivery group type policy filter By giving the virtual desktop policy a higher priority than the virtual application policy
By using a delivery group type policy filter
153
How should the architect deploy the NetScaler appliances to increase site resiliency? Configure Global Server Load Balancing (GSLB) for end-user connectivity. Configure a Gateway vServer_ Configure a backup vServer_ Configure failover sites within the NetScaler Gateway. Case Study
Configure failover sites within the NetScaler Gateway.
154
Scenario: Legacy GPO policies should NOT be applied to users in the new environment. New GPOs should be configured to ensure maximum performance across all virtual applications and desktops. Which two actions should the architect recommend to meet these requirements? (Choose two.) Enable loopback processing in Merge mode. Enable loopback processing In Replace mode. Apply the policy to the OUS containing the user accounts. Apply the policy to the domain root With a WMI filter excluding the Windows XP OS type. Apply the policy to the domain root With a deny ACL on the OU containing legacy machines. Apply the policy to the OUS containing the desktop OS machines' and server OS machines' computer accounts.
Enable loopback processing In Replace mode. Apply the policy to the OUS containing the desktop OS machines' and server OS machines' computer accounts.
155
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production _ Why does using Windows Deployment Semces and installing Windows applications into an image help manage the image versioning process? It reduces application deployment time. It standardizes the application deployment process. It facilitates the use of App-V packages. It automatically deploys the latest drivers and patches Case Study
It standardizes the application deployment process.
156
Some management staff print large documents over WAN connections. What must the architect consider to optimize printing to a local printer from laptops? Configure session printers Configure Universal Print Server Disable 'Direct connection to print servers' Allow mapping to all client printers to session
Allow mapping to all client printers to session
157
An architect recommends using the monitoring function of Citrix Director to determine if users can connect to applications. Which Windows sewice should the architect also include in the monitoring solution? Citrix Configuration Sewice on the Delivery Controller Citrix Configuration Replication on the StoreFront server World Wide Web Publishing Service on the StoreFront server World Wide Web Publishing Service on the server OS machine
World Wide Web Publishing Service on the StoreFront server
158
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted VDI with Machine Creation Sewices? It provides the highest end-user density at the lowest cost. It provides the greatest level of end-user personalization and control. It offers the lowest storage performance requirement and the highest end-user density. It offers the greatest application compatibility. Case Study
It offers the lowest storage performance requirement and the highest end-user density.
159
The architect needs to evaluate the options for replicating user profiles across all sites. Wh ch two pieces of Information should the architect collect to analyze the options? (Choose two.) WAN traffic License requirements Storage infrastructure Database configuration
License requirements Database configuration
160
Why does using snapshots help manage the image release process? Because they enable rollbacks Because they help manage version control Because they use storage array features to offoad host process ng Because they automatically deploy the latest drivers and patches
Because they help manage version control
161
Scenario: CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases _ How should the resource pools be designed to host the infrastructure workloads and virtual desktops to ensure high availability? A. Separate the workloads by roles and group them as a XenServer resource pool to ensure easier management, fewer workload conflicts, and support for disaster recovery. Each XenServ•er resource pool should comprise a maximum of eight XenServ•er hosts. A storage repository needs to be implemented for central storage of virtual disks, as well as for XenMotion high availability, and backup for disaster recovery purposes. B. Separate the workloads by roles and group them as a XenServ•er resource pool to reflect the OU structure of Active Directory. Each XenServer resource pool should comprise a maximum of 24 XenServer hosts. A storage repository needs to be implemented for central storage of vitual disks, as well as for XenMotion high availability, and backup for disaster recovery purposes. C. Separate the workloads by roles and group them as a XenServer resource pool. Each XenServer resource pool should comprise a maximum of 16 XenServer hosts. Multiple storage repositories need to be implemented for central storage of virtual disks, as well as for XenMotion and high availability between resource pools and backup for disaster recovery purposes. D. Separate the workloads by roles and group them as a XenServer resource pool to ensure that the workloads can be streamed by Provisioning Sewices, Including XenServ•er_ Each XenServ•er resource pool should comprise a maximum of 32 XenServ•er hosts. Multiple storage repositories need to be implemented for central storage of vitual disks, as well as for XenMotion high availability between resource pools, and backup for disaster recovery purposes. Case Study
A. Separate the workloads by roles and group them as a XenServer resource pool to ensure easier management, fewer workload conflicts, and support for disaster recovery. Each XenServ•er resource pool should comprise a maximum of eight XenServ•er hosts. A storage repository needs to be implemented for central storage of virtual disks, as well as for XenMotion high availability, and backup for disaster recovery purposes.
162
Scenario: CGE decided to virtualize its server workloads and provide a vitual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. Why is XenServer Fast Clone the best image management method for this environment? It provides centralized image management. It reduces machine-provisioning time. It minimizes network traffc_ It Improves image deployment consistency. Case Study
It reduces machine-provisioning time.
163
Why should disk queue length above zero be used to identify' bottlenecks? This indicates excessive I/O and a disk bottleneck This indicates excessive swap file utilization This indicates insufficient RAM This indicates a failed disk
This indicates excessive I/O and a disk bottleneck
164
Scenario: A Citrix Architect in CGE's Jurong office has configured a NetScaler high availability ( A) pair to support end users in the Southeast Asia region. The office has NOT mplemented StoreFront and is using the existing Web Interface environment for internal access. External access is provided by Secure Gateway. The architect plans to configure the NetScaler Gateway with ICA Proxy to allow remote access. Which NetScaler license type IS required to support this solution? User Device Platform Universal Case Study
Platform
165
Scenario: The architect for the company has identified that virtualizing the entire server infrastructure Will provide the best return on investment (ROI) and lowest maintenance costs for the new infrastructure. In order to proceed with this recommendation, a monitoring strategy must be put In place to ensure that the virtualization platform does NOT become overloaded. Wh ch virtualization component should an architect monitor to identify' virtual desktop bottlenecks? XenServer hosts Delivery Controllers Provisioning Sewices servers Server OS machines
XenServer hosts
166
Scenario: CGE is experiencing numerous Issues with Its existing profile management solution. The Citrix Architect managing the project IS tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity. Why does enabling Profile streaming' when configuring group profiles benefit CGE's Sales end-user group? It allows faster logons. It simplifies home drive cleanup. It minimizes the required storage needed for folder redirection. It improves application performance. Case Study
It improves application performance.
167
Why does using SQL Management Studio help the company comply with its security policy? Because it enables you to execute SQL queries to extract data Because it enables you to create a database to store logs Because it uses a standard TCP port Because it provides security alerts by using SQL Mail
Because it enables you to create a database to store logs
168
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production _ Why does using ypemsor templates and leveraging PowerShell scripts help manage the image versioning process? It allows for automatic, scripted upgrades of the deployment template. It provides centralized, automated, single-image management. It facilitates consistent deployment of base Images. It allows for scripts to be executed from the same network share as the deployment template. Case Study
It facilitates consistent deployment of base Images.
169
Scenario: CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect IS tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT in a Remote PC environment on Windows 8 With Machine Creation Sewices the best solution? It offers a faster change process. End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
End users are already comfortable working in a shared environment.
170
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. Only block storage is available on the shared storage of the hypemsor_ How should the architect recommend that the hosted shared servers be provisioned to fulfill the virtualization requirements for the call center while keeping the impact to storage as low as possible? By using Machine Creation Services By using Provisioning Services By manually Installing the operating system By using cloned VM templates
By using Provisioning Services
171
The company is implementing XenDesktop globally for desktop virtualization. Why should an architect recommend multiple controllers in each datacenter? To protect against controller database failure To enable users to maintain uninterrupted connection to their desktops To protect users from WAN link failure To ensure that new desktop and application sessions can be launched
To ensure that new desktop and application sessions can be launched
172
Why would the architect choose XenServer MPIO when configuring bonded network interfaces for guest VM networks? It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical Interfaces in the bond. It sends all guest VM traffic in the bond to an active interface, wh ch provides the best distribution of network load. It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond. It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond. Case Study
It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond.
173
Scenario: CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions. Individuals in the Research end-user group need to be able to remotely access a centrally stored database. Which FlexCast model should the Citrix architect recommend for this group? Hosted Shared Hosted VDI Streamed VHD Local VM
Hosted VDI
174
Why would having one farm with three configured sites, with two Provisioning Semces servers in each datacenter, meet the requirements of a regional, single-image management strategy with minimal WAN traffic across datacenters? It ensures that Provisioning Sewices targets will NOT load balance between hosts, and guarantees high availability within each region. It ensures that Provisioning Sewices targets will NOT load balance across regions, and reduces management overhead. It ensures that Provisioning Sewices targets will NOT load balance between hosts, and guarantees high availability between regions. It ensures that Provisioning Sewices targets will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead. Case Study
It ensures that Provisioning Sewices targets will NOT load balance across regions, and reduces management overhead.
175
Why would having one farm with one configured site, with three Provisioning Sewices servers in each datacenter, meet the requirements of a regional, single-image management strategy With minimal WAN traffic across datacenters? A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region. B. It reduces management overhead, ensures that Provisioning Sewices targets will NOT load balance across regions, and guarantees high availability between regions. C. It ensures that Provisioning Sewices targets will NOT load balance between hosts, and guarantees high availability between regions. D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region
D. It reduces management overhead, ensures that Provisioning Services targets will NOT load balance across regions, and guarantees high availability within each region.
176
CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session. Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session? Research Engineers Back Office Executives/Management Case Study
Back Office
177
What are two potential risks in the existing environment that the architect must address in the proposed virtual solution? (Choose two.) Local profiles are used and administrators manually delete them when necessary. Installation of PositivelyPeople is performed manually based on a thoroughly documented process. No logon scripts are enabled for users because the company abandoned logon scripts last year in favor of GPOs_ Users log on to the company environment based on Active Directory credentials, but the PositivelyFinance application requires secondary credentials.
Local profiles are used and administrators manually delete them when necessary. Installation of PositivelyPeople is performed manually based on a thoroughly documented process.
178
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is using a maximum of eight XenServer hosts, With daily backups for the infrastructure workloads and third-party backups for the desktop solution, the best design for the resource pools? A. It ensures the logical separation of infrastructure and virtual desktop workloads to prevent interference, and facilitates management and expansion capabilities. B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, da ly backups create downtime for critical workloads. C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services With sufficient workload-specific resources and failover capabilities. D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. Case Study
D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.
179
Scenario: CGE's security administrator mandates that only Gateway services can reside in the DMZ and that all StoreFront traffic must be load balanced. The network administrator requires a resilient solution. How should the architect deploy the six NetScaler appliances in each regional datacenter? A. Deploy a NetScaler appliance in each datacenter's internal network for load balancing, and a NetScaler appliance in each datacenter's DMZ for Gateway traffc_ B. Deploy a NetScaler appliance in each regional datacenter's internal network for Gateway traffic, and another in each datacenter's DMZ for load balancing. C. Create three NetScaler virtual servers configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _ D. Create six NetScaler virtual servers In high-availability pairs configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _ Case Study
B. Deploy a NetScaler appliance in each regional datacenter's internal network for Gateway traffic, and another in each datacenter's DMZ for load balancing.
180
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Sewices servers will be connected to a 10 Gbps network. How does using a dedicated switch help the company secure streaming traffic? Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter. Dedicated switches enable streaming traffic to be encrypted with IPsec_ Dedicated switches allow the necessary TCP offoad settings to be configured on the streaming NIC. Dedicated switches enable isolation of Spanning Tree instances.
Dedicated switches allow the necessary TCP offoad settings to be configured on the streaming NIC.
181
Given the current desktop build process, what should an architect recommend on the new virtual platform for this environment wh le minimizing the number of required management servers? Continue With current proocess Use Ghost to clone a master image Use Machine Creation Services to clone a master image Use Provisioning Services servers to create a master target device
Use Machine Creation Services to clone a master image
182
What should CGE do to all corporate-owned and non-corporate-owned Windows client devices to ensure an optimal end-user experience? Upgrade all clients to Receiver 4.2 Install native printer drivers on all clients. Install the Cloudaridge Plug-in on all clients. Install Citrix Profile management on all clients. Case Study
Upgrade all clients to Receiver 4.2
183
Why does Provisioning Semces with cache on server help the Rad ology group maintain changes in their desktops? Because it is stored centrally Because it reduces XenServer shared storage consumption Because Profile Manager provides a consistent user experience Because it reduces storage 10 on the XenServer local storage
Because it is stored centrally
184
The company is implementing XenDesktop globally for desktop virtualization. How should the architect recommend installment of controllers for high availability? Install three controllers in each datacenter Install three controllers in New York, three in London, and three in Singapore Install three controllers in Hong Kong, three in New York, and three in Berli Install four controllers in New York, four in Sydney, and one in London
Install three controllers in each datacenter
185
Why does Provisioning Sewices with private image mode enable users in the Rad ology group to maintain the changes to their desktops? Because it enables use of cache on server persistence Because It retains user changes In a dedicated vDisk mage Because it stores user changes separate from the base image Because It provides efficient centralization of dedicated user mages
Because it stores user changes separate from the base image
186
What should a Citrix Architect identify' as a potential security risk that should be resolved in the next design, based on the current provision for external access? Web Interface is used Online Plug-in 12.1 is used NetScaler Gateway is used to load balance StoreFront Single-factor authentication is used for external access Case Study
Single-factor authentication is used for external access
187
Why should memory and network utilization be used to identify' bottlenecks? Excessive memory and network utilization will slow the loading ofvDlsks and cache files by Provisioning Sewices Excessive memory and network utilization on the vDlsk store will slow down the PXE boot process. Excessive memory and network utilization can increase fragmentation of the TFTP boot strap file. Excessive memory and network utilization can increase fragmentation of the vDlsks_
Excessive memory and network utilization on the vDlsk store will slow down the PXE boot process.
188
Why is deploying two NetScaler appliances in each regional datacenter, with one in the internal network for load balancing and the other in the DMZ for Gateway traffic, the best design solution? It provides intraslte redundancy in case of appliance failures. It provides redundancy In case of site failures, while optimizing external WAN traffc_ It protects against WAN failures and connects end users to their home datacenter. It allows for the expected expansion of remote access usage and provides functionality for future needs. Case Study
It provides intraslte redundancy in case of appliance failures.
189
Why is configuring an iSCSl LUN on a NAS the best design choice for vDlsk storage? It is the least expensive solution. It is a highly scalable and resilient solution. It creates the least amount of administrative overhead. It reduces the system footprint. Case Study
It reduces the system footprint.
190
How should a Hosted VDI environment be implemented to allow user-installed applications? By using Citrix Profile management By using Personal vDlsk By using statically assigned virtual desktops By using a network share that contains the App-V packages
By using Personal vDlsk
191
Scenario: CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions. Which high availability solution should a Citrix Architect recommend? Fast Recovery Database Mirroring Database Snapshots AlwaysOn Failover Cluster Instances Case Study
AlwaysOn Failover Cluster Instances
192
Wh ch two options should the architect recommend to enable two-factor authentication for remote users? (Choose two.) Configure Citrix Single Sign-On Configure LDAP authentication on NetScaler Configure RADIUS authentication on NetScaler Configure Username and Password' in StoreFront
Configure LDAP authentication on NetScaler | Configure RADIUS authentication on NetScaler
193
Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types In use? A physical token carried by the end user X509 certificates stored on a Smart Card A complex Active Directory password enforced by Group Policy RADIUS authentication with an Employee ID Number Case Study
A physical token carried by the end user
194
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients With newer models. What are the benefits of using hosted shared servers with Provisioning Semces? Highest user density and lowest cost Highest level of user personalization Rapid provisioning and highest user density with the lowest storage requirement Lowest cost and highest application compatibility
Rapid provisioning and highest user density with the lowest storage requirement
195
Why does using Citrix Director help the company comply With its security policy? Because it provides a centralized data repository Because it provides controlled access to monitoring functions Because it uses a standard TCP port Because it collects data from NetScaler
Because it collects data from NetScaler
196
Scenario: Each XenServer host has four 10Ga network cards - two bonded for storage and management separated by separate VLAN, and the two bonded for guest VM networks. The CIO would like to see network traffic distributed across all links to maximize their utilization. Switches to which the Hypemsors will connect to support 802_3ad_ How should the architect configure the guest VM network? Using active-active bonding Using active-passive bonding Using XenSever MPIO redundancy Using LACP bonding Case Study
Using active-active bonding
197
Why should disk I/O and page file utilization be used to identify' bottlenecks? A. High disk I/O and page file utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load. B. High disk I/O and page file utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDlsks_ C. High disk I/O and page file utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users. D. High disk I/O and page file utilization of the Delivery Controller can indicate the presence of a virus or malware.
C. High disk I/O and page file utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users.
198
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Sewices servers will be connected to a 10 Gbps network. How do multi-homed Provisioning Sewices servers help the company secure streaming traffic? Multiple NICs separate disk and user data traffic Multiple NICs enable disk data traffic to be encrypted with IPsec Multiple NICs allow the necessary TCP offoad settings to be configured on the streaming NIC. Multiple NICs provide multiple IP addresses that can be dedicated to streaming traffc_
Multiple NICs separate disk and user data traffic
199
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is using a maximum of 16 XenServ•er hosts, using a shared Virtual disk storage repository for XenMotion, high availability, and replication to the failover site the best design for the resource pools? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics. B. It ensures Simple setup With redundancy and meets the requirement of separating OS types. C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery. D. It ensures the separation of Infrastructure and vitual desktop workloads and optimizes performance and high availability. Case Study
A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.
200
``` Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. Which XenDesktop (Flexcast) model should the architect recommend? ``` Hosted shared Hosted VDI Streamed VHD Local VM
Hosted shared
201
How should the architect implement high availability (HA) With 12 NetScaler appliances? A. In each datacenter, deploy an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffc_ B. In each datacenter, deploy an HA pair in the internal network for Gateway traffic and an HA pair in the DMZ for load balancing. C. Create three NetScaler virtual servers configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _ D. Create six NetScaler virtual servers in HA pairs configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server Case Study
C. Create three NetScaler virtual servers configured With the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server _
202
The company's security officer has stated that for compliance reasons, all internal and external network traffic must be encrypted. Which additional type of encryption should the architect recommend? SecurelCA IPsec SSL and SecurelCA L2TP
SSL and SecurelCA
203
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcocess. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT in a Hosted Shared environment on Windows Server 2008 R2 With Machine Creation Semces the best solution? It offers a faster change process. End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
It offers a faster change process.
204
Why should CPU and network I/O be used to identify' bottlenecks? Excessive consumption of CPU or network I/O indicates there are too many target devices _ Excessive consumption of CPU or network I/O indicates a network misconfiguration_ Excessive consumption of CPU or network I/O indicates that the anti-virus configuration could be causing a bottleneck. Excessive consumption of CPU or network I/O indicates that the system is low on virtual memory.
Excessive consumption of CPU or network I/O indicates there are too many target devices _
205
The company is implementing XenDesktop globally for desktop virtualization. How should the architect recommend installment of controllers for high availability? Install two controllers in London and two in Paris Install two controllers In New York and two In Hong Kong Install two controllers In Hong Kong and two In Tokyo Install two controllers In New York and two In London
Install two controllers In New York and two In London
206
An architect is designing a solution that minimizes the storage footprint by utilizing thin provisioning in the datacenter. Which solution should the architect recommend for XenServer shared storage? NFS CIFS iSCSI Fibre Channel
NFS
207
Scenario: The architect for the company has identified that virtualizing the entire server infrastructure will provide the best return on investment (ROI) and lowest maintenance costs for the new infrastructure. In order to proceed with this recommendation, a monitoring strategy must be put in place to ensure that the virtualization platform does NOT become overloaded. How can the architect identify' if the XenServer hosts are the source of a bottleneck? Identify' of the CPU consumption is above 85% Identify' If memory consumption IS above Identify' If disk queue length increases above zero Identify' If network utilization rises above 60%
Identify' of the CPU consumption is above 85%
208
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted Shared servers provisioned from cloned VM templates? It provides the highest end-user density at the lowest cost. It provides the greatest level of end-user personalization and control. It offers the lowest storage performance requirement and the highest end-user density. It facilitates rapid provisioning. Case Study
It facilitates rapid provisioning.
209
Why deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured With a backup vServer the best design solution? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSI_ VPN functionality for future needs. Case Study
It provides redundancy, while optimizing external WAN traffic
210
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network. How should the architect implement a highly available Provisioning Services server by using NetScaler App Firewall? By implementing NetScaler App Firewall policies By deploying GSl_a on NetScaler By deploying TFTP load balancing using NetScaler By load balancing Provisioning Semces streaming services using NetScaler
By implementing NetScaler App Firewall policies
211
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. How should the architect recommend that IPsec be implemented? By using NetScaler By Implementing secure Delivery Groups By Implementing an Active Directory Group Policy By configuring a local IPsec policy in the master image
By Implementing an Active Directory Group Policy
212
``` Which two issues could CGE's current home directory storage strategy cause? (Choose two.) Slow logons Unverified data backups High IOPS on the storage appliance High CPU usage on the XenApp servers ``` Case Study
Slow logons | Unverified data backups
213
Scenario: A Citrix Architect Identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. How should the architect implement GPOs to ensure full control over which Citrix policies are applied? Create one GPO for each region _ Create Citrix policies within a GPO and filter the policies based on end users and Delivery Groups. Create Citrix policies within a GPO and filter the policies based on Client Name. Create Citrix policies within a GPO and filter the Citrix policies based on IP address.
Create Citrix policies within a GPO and filter the policies based on end users and Delivery Groups.
214
Why does enabling the Windows Automatic Install Kit help manage the image release process? Because it automates the Windows domain join process Because it can be configured by DHCP options Because it performs a scripted Windows installation Because it automatically deploys the latest drivers and patches
Because it performs a scripted Windows installation
215
Why is creating three NetScaler virtual servers configured With the subnets of the three sites and binded to redirection policies the best design solution? It provides intraslte redundancy in case of appliance failures, while enhancing performance through an active/active configuration. It provides redundancy in case of site failures, while optimizing external WAN traffc_ It protects against WAN failures and connects end users to their home datacenter. It allows for the expected expansion of remote access usage and provides functionality for future needs _ Case Study
It protects against WAN failures and connects end users to their home datacenter.
216
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. How should the architect recommend that the Synchronizer be deployed? By deploying a Hyper-V virtual appliance By installing the Synchronizer software on a Hyper-V server By installing a Synchronizer virtual appliance on XenServer By booting from the Synchronizer ISO image
By installing a Synchronizer virtual appliance on XenServer
217
A Citrix Architect decides that implementation of a regional, single-image management strategy is required, and that WAN traffic should be minimized across the datacenters _ Which Provisioning Sewices design should the architect choose to meet these criteria? One farm With three configured sites. Three farms, each with one configured site. One farm With one configured site. One farm in the primary datacenter and one farm in the secondary datacenter, each with three configured sites. Case Study
Three farms, each with one configured site.
218
Why is configuring an iSCSl LUN on a SAN the best design choice for vDisk storage? It is the least expensive solution. It is a highly scalable and resilient solution. It creates the least amount of administrative overhead. It reduces the system footprint. Case Study
It is a highly scalable and resilient solution.
219
A Citrix Architect decides that pooled desktops is the appropriate delivery model for CGE's Engineers end-user group. Which two reasons explain the architect's delivery model decision? (Choose two.) The CAD application is updated frequently. It allows engineers to Install their own applications. It isolates CPU and memory resources to Single instances. The Instability of the CAD application Impacts several end users. Case Study
It isolates CPU and memory resources to Single instances. The Instability of the CAD application Impacts several end users.
220
What are the benefits of using a Hosted VDI environment With App-V packages? It retains the single image management function wh le allowing users to install applications It provides a high level of security while allowing user customization It has a low storage performance requirement and high user density It delivers low-cost and high application compatibility
It delivers low-cost and high application compatibility
221
Scenario: CGE is experiencing numerous Issues With Its existing profile management solution. The Citrix Architect managing the project IS tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity. Why does enabling 'Offine profile support' benefit CGE's Sales end-user group? It allows faster logons and logoffs It minimizes the required storage needed for folder redirection. It simplifies home drive cleanup. It Improves data accuracy In volatile environments. Case Study
It allows faster logons and logoffs
222
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production _ How should the architect use Hypemsor templates and snapshots to facilitate image management and rollback? By using the Hypervisor API to deploy desktops from templates By using PowerShell to script desktop deployment from templates By using Workfow Studio to deploy desktops from templates By using the Windows Automatic Install Kit (WAIK) Case Study
By using the Hypervisor API to deploy desktops from templates
223
Why is a design With 12 NetScaler appliances, in which each datacenter deploys three NetScaler virtual servers configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront server, the best remote access design? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
It provides redundancy, while optimizing external WAN traffic
224
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would Citrix policies, filtered by end user and Delivery Group, ensure full control over which Group Policies are applied? It provides central management and control. It ensures that only settings With the correct filtering in Active Directory are applied. It ensures that only settings located in the root Citrix OU are applied. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
It ensures that only settings located in the root Citrix OU are applied.
225
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients With newer models. What are the benefits of using hosted shared servers by using cloned VM templates? Highest user density and lowest cost Highest level of user personalization Lowest storage performance requirement and highest user density Rapid provisioning
Rapid provisioning
226
Why wou d the architect choose XenServer MPIO when configuring network interfaces for storage networks? It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond. It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond. Case Study
It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond.
227
Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications? VM Hosted applications Streamed server OS machines Dedicated desktop OS machines Pooled desktop OS machine with Personal vDlsk
Streamed server OS machines
228
Scenario: CGE's CIO asks a Citrix Architect to design a new Provisioning Semces environment. Management asks about best practices for storing master images to ensure scalability, performance, and high availability. Which solution should the architect recommend? A. Configure a shared storage location (CIFS) on a Windows File Server for each regional datacenter. B. Configure an SCSI LUN on a Storage Area Network (SAN) for each Provisioning Services server. C. Configure an SCSI LUN on a Network Attached Storage (NAS) device for each Provisioning Semces server. D. Configure a shared storage location (CIFS) on a Network Attached Storage (NAS) device. Case Study
C. Configure an SCSI LUN on a Network Attached Storage (NAS) device for each Provisioning Semces server.
229
Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update prcocess. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as Hosted VDI Static Persistent the best solution? It allows the installation of custom applications. It is easy to manage. It meets the high-performance application demands of the Executives/Management end-user group. It allows the Executives/Management end-user group to share desktops. Case Study
It meets the high-performance application demands of the Executives/Management end-user group.
230
How should a hosted shared environment be implemented to allow user-installed applications? By adding users to the Local Administrators group By using Personal vDlsk By adding users to the Remote Desktop Users Group By providing access to the network share that contains the App-V packages
By providing access to the network share that contains the App-V packages
231
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted Shared servers With Provisioning Sewices? It provides the highest end-user density at the lowest cost. It provides the greatest level of end-user personalization and control. It facilitates rapid provisioning and offers the highest end-user density. It offers the lowest cost and the greatest application compatibility. Case Study
It facilitates rapid provisioning and offers the highest end-user density.
232
Scenario: CGE has a new XenApp mage for hosting office applications and will use Provisioning Semces to deploy the servers hosting these applications. However, CGE is concerned that their current strategy for deploying antivirus definition updates will reduce the performance of the provisioned servers. Additionally, the Security team IS concerned about the frequency of the antivirus definition updates and would like to have as many updates as possible without reducing performance of the provisioned disk. Which change should a Citrix Architect recommend to CGE's current strategy for deploying antivirus definitions? Configure the antivirus client to store definition updates on a CIFS share. Restart the servers each day to clear the Provisioning Services write cache. Configure the antivirus client to store definition updates on a locally, non-provisioned disk. Disable automatic antivirus definition updates and update the definitions manually during each Provisioning Services image update.
Configure the antivirus client to store definition updates on a locally, non-provisioned disk.
233
Scenario: Each XenServer host has six 10Ga network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic_ All switches in the environment support 802_3ad and adaptive load balancing. How should the architect configure the storage network interfaces? Using active-active bonding Using active-passive bonding Using XenSever MPIO redundancy Using LACP bonding Case Study
Using active-active bonding
234
Why would the architect choose active-active bonding when configuring network interfaces for guest VM networks? It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond. Case study
It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical Interfaces in the bond.
235
What are the benefits of using hosted shared environment with Personal vDlsk? It retains the single image management function wh le allowing users to install applications It provides a high level of security while allowing user customization It has a low storage performance requirement and high user density It delivers low-cost and high application compatibility
It provides a high level of security while allowing user customization
236
Which licensing changes should a Citrix Architect recommend to enable the HDX Mobile feature in CGE's Jurong and Makassar offices? Purchase XenMobile licenses. Convert existing XenApp licenses to per device licenses. Purchase NetScaler Universal Licenses for each mobile device. Upgrade existing XenApp licenses to XenApp Enterprise licenses. Case Study
Upgrade existing XenApp licenses to XenApp Enterprise licenses.
237
Why does using Workfow Studio help manage the image release process? Because it can script automatic upgrades of the deployment template Because It provides centralized, automated single mage management Because It facilitates consistent deployment of base images Because Workfow Studio scripts can be executed from the same network share as the deployment template
Because It provides centralized, automated single mage management
238
How many Provisioning Semces servers should the architect install in each of the three farms? Two servers in the primary farm, one server the the remaining farms One server in each farm Two servers in each farm Two servers in the primary farm, two servers in the secondary farm, and one server in the remaining farm Case Study
One server in each farm
239
Scenario: The Executives/Management end-user group accesses the Citrix environment while in the office using tablets and mobile devices. These end users have requested the ability to print documents from their Citrix session. Which recommendation should a Citrix Architect make to fulfill this request while using the minimum number of printer drivers? Use client printing and the Universal Printer Dnver_ Use network printers connected with Citrix Policies. Use the Universal Print Server and Universal Printer Driver. Use network printers connected with Group Policy Preferences _ Case study
Use the Universal Print Server and Universal Printer Driver.
240
Why should memory consumption above be used to identify' bottlenecks? At least 20% of resources should be available at all times XenServer host CPU utilization above causes excessive paging XenServer host reserves 20% of all memory for paging Running XenCenter will consume 20% of all memory resources
At least 20% of resources should be available at all times
241
Scenario: Some contractors require access to various corporate applications. They must also be able to install their own application within the environment for testing purposes. Which two delivery methods fulfill these requirements? (Choose two.) Hosted server OS With Profile Management enabled Pooled hosted desktop OS With Personal vDlsk enabled Hosted server OS With persistent server operating system Assigned hosted desktop OS With persistent desktop operating system
Pooled hosted desktop OS With Personal vDlsk enabled Assigned hosted desktop OS With persistent desktop operating system
242
Why should disk I/O and page file uti Ization be used to identify' bottlenecks? Excessive disk I/O and page file utilization will slow the loading of vDlsks and cache files by Provisioning Semces Excessive disk I/O and page file utilization on the vDlsk store will slow down the PXE boot process. Excessive disk I/O and page file utilization can increase fragmentation of the TFTP boot strap file. Excessive disk I/O and page file utilization can increase fragmentation of the vDlsks_
Excessive disk I/O and page file utilization can increase fragmentation of the vDlsks_
243
In the new environment, the PositivelyFinance application will be deployed as a server OS-hosted application. Which two policy settings should an architect recommend to prevent data leakage from the PositivelyFinance application? (Choose two.) A. HDX policy setting With Client drive mapping set to Prohibited' B. HDX policy setting With Client Clipboard Redirection set too Prohibited' C. HDX policy setting With File redirection on Client Network drives to Prohibited' D. Active Directory group policy With the Do not allow clipboard redirection setting set to 'Disabled' E. Active Directory group policy With the Prevent access to drives setting set to Restrict all drives'
A. HDX policy setting With Client drive mapping set to Prohibited' B. HDX policy setting With Client Clipboard Redirection set too Prohibited'
244
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing With merge on a GPO linked to all OUS containing Delivery Controllers ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on. B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on. C. It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on. D. It ensures that GPOs located in the root Citrix OU are replaced With Citrix policies.
It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.
245
Scenario: A Citrix Architect is designing a multi-server Provisioning Sewices solution for CGE_ The solution must be highly available and minimize the risk of vDlsk inconsistency. How should the architect configure the NAS storage for fault tolerance and high performance? By implementing RAID 0 By implementing RAID 1 By implementing high-speed local storage with deduplication By implementing RAID 10 Case Study
By implementing RAID 10
246
Scenario: CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted VDI by using cloned VM templates? It provides the highest end-user density at the lowest cost. It offers the greatest level of end-user personalization and control. It offers the lowest storage performance requirement and the highest end-user density. It facilitates rapid provisioning. Case Study
It facilitates rapid provisioning.
247
Which change to the corporate Windows 7 client wou d prevent single sign-on to the infrastructure using the end user's Active Directory account? A Smart Card reader is installed to allow the end user to log on with an XS0g certificate issued by the Active Directory Certificate Authority. The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO). The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser. The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest. Case Study
The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.
248
Scenario: CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. Why is Windows Deployment Semces the best image management method for this environment? It allows for user-installed applications. It reduces machine provisioning time. It allows for the use of local user profiles. It supports the use of customized language packs. Case Study
It allows for the use of local user profiles.
249
How should the architect specify' that the Citrix Director database be queried? By using the Citrix Director console By using SQL Management Studio By using SQL Reporting Semces By using PowerShell
By using the Citrix Director console
250
How many Provisioning Sewices servers should the architect install in each of the three configured sites? One server in each datacenter Two servers In each datacenter Three servers In each datacenter Two servers In the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter Case Study
Two servers In the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter
251
nano: A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing serviices. Security policy mandates that these internal appliances CANNOT connect to the DMZ. How should the architect configure the callback URL with one NetScaler located in all three regional datacenters? A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. C. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. D. Configure the callback URL to point to the external beacon address.
B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.
252
Which two current licensing issues should a Citrix Architect resolve in CGE's new virtualization design? (Choose two.) A. There are more RDS CALs than Citrix licenses _ B. The Citrix and RDS licenses share the same server _ C. There are many different license servers In the environment. D. There IS a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use. Case Study
C. There are many different license servers In the environment. D. There IS a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.
253
Why would having one farm with three configured sites, with three Provisioning Services servers in each datacenter, meet the requirements of a regional, single-image management strategy With minimal WAN traffic across datacenters? A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region. B. It ensures that Provisioning Services targets Will NOT load balance across regions, and reduces management overhead. C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions. D. It ensures that Provisioning Services targets Will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead. Case Study
C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions.
254
Why does using vDlsk Update Management help manage the image release process? Because it automatically upgrades virtual desktops to the latest operating system version Because it provides centralized, automated single image management Because it is compatible with the Microsoft VHD specification Because it automatically deploys the latest target device drivers
Because it provides centralized, automated single image management
255
Why should CPU and memory consumption be used to identify' bottlenecks? Excessive CPU and memory consumption will slow the creation of new sessions. Excessive CPU and memory consumption on the data collector will slow down Web Interface authentication. Excessive CPU and memory consumption on the data collector will slow down application enumeration. Excessive CPU and memory consumption on the XenApp server will affect the local host cache.
Excessive CPU and memory consumption will slow the creation of new sessions.
256
Scenario: A Citrix Architect IS designing a multi-server Provisioning Semces solution for CGE_ The solution must be highly available and minimize the risk of vDlsk inconsistency. Why does implementing RAID 0 satisfy the requirements? It provides striping. It provides the highest performance. It provides fault tolerance. It provides minimal disk usage. Case Study
It provides striping.
257
How should the architect implement database high availability in an Oracle database? By using Oracle RAC By using Oracle DataGuard By using Oracle FailSafe By using Oracle Automatic Storage Management
By using Oracle FailSafe
258
Which FlexCast model should a Citrix Architect use to deploy desktops to the Research end-user group? Hosted Shared Streamed VHD Hosted VDI Random Hosted VDI Static with Personal vDisk Case Study
Hosted VDI Random
259
Scenario: CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. How should the architect design the image management process using Machine Creation Services? A. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and clone the virtual machine. B. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and change the Windows and Office product keys to use MAK_ C. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and convert the virtual machine to a template. D. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and take a snapshot of the image. Case Study
D. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image that includes the Virtual Delivery Agent (VOA), and take a snapshot of the image.
260
Why should CPU consumption be used to identify' bottlenecks? High CPU utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load High CPU utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDlsks. High CPU utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users. High CPU utilization of the Delivery Controller can Indicate the presence of a virus or malware.
High CPU utilization of the Delivery Controller can Indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load
261
What are the benefits of using IPsec to meet the company's compliance requirements? It encrypts internal network traffic It encrypts ICA traffic from remote users It is required to enable the SSI_ Relay sewice It complies with industry-standard IPsec encryption requirements
It encrypts internal network traffic
262
Scenario: CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. Why does enabling 'Active write back' when configuring Citrix Profile management without folder redirection benefit CGE's Sales end-user group? It improves application performance. It simplifies home drive cleanup. It minimizes the required storage needed for folder redirection. It Improves data accuracy In volatile environments Case Study
It Improves data accuracy In volatile environments Explanation. Enable Active Write-Back to allow Citrix UPM to synchronize profile data during the user session, instead of waiting to synchronize the entire profile upon user logout_ This prevents profiles from not synchronizing all data and from being corrupted. Active Write-Back prevents this by synchronizing files during the entire user session, so when the user logs off there will be minimal profile data (if any) that must be synchronized. A direct benefit of this setting is that if a Virtual desktop crashes or gets reset instead of properly shutdown, users need not have to worry about files not being synchronized.
263
CGE decided that all end users must use two-factor authentication to connect remotely to the Citrix environment. Which two sites Will be able to support this requirement for Citrix Receiver for IOS and Android? (Choose two.) ``` Tulsa Jurong London Odessa Houston Aberdeen Makassar ``` Case Study
Tulsa Aberdeen
264
How should the architect segment streaming traffic using Provisioning Semces servers on a shared VLAN? By installing multiple NICs on each datacenter's Provisioning Services server. By deploying one Provisioning Services server In the primary datacenter and one in the secondary datacenter. By deploying two Provisioning Services servers In the same datacenter. By using NetScaler With Global Server Load Balancing (GSLB) to load balance the Provisioning Services servers in each datacenter.
By deploying one Provisioning Services server In the primary datacenter and one in the secondary datacenter.
265
What should a Citrix Architect do to simplify' printer driver management for CGE's Back Office end-user group? A. Use the Citrix Universal Print Server. B. Enforce the use of the Citrix Universal Printer Driver C. Manually install printer drivers on the XenApp servers. D. Modify' the printer driver format of the Citrix Universal Printer Driver. Case Study
Enforce the use of the Citrix Universal Printer Driver
266
Why does using Windows Deployment Semces help manage the image release process? Because it enables rapid rollback Because it automates deployment of current and legacy operating system versions Because it uses Hyper-V snapshots Because it automatically deploys the latest drivers and patches
Because it automatically deploys the latest drivers and patches
267
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a prcu:ess for version control that includes thorough testing prior to production. Which tool should a Citrix Architect recommend for those groups? Provisioning Services Hypemsor templates and snapshots Windows Deployment Services Machine Creation Services Case Study
Provisioning Services
268
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. How should the architect ensure full control over which Citrix policies are applied? Configure the Citrix policies in the GPOs. Create one Citrix Policy for each region. Create Citrix policies filtered by end users and Delivery Groups. Create Citrix policies and filter settings based on Client name.
Configure the Citrix policies in the GPOs.
269
Why should the two NetScalers be located at the London datacenter? Because it allows New York and Hong Kong to fail over to the London datacenter Because It provides secure remote access Because two components allow for Increased user performance Because It allows for centralized management
Because it allows New York and Hong Kong to fail over to the London datacenter
270
Why does using XenServerStorageLink help manage the image release process? Because it enables rollbacks Because It helps manage version control Because It uses storage array features to offoad host processing Because It automatically deploys the latest drivers and patches
Because It uses storage array features to offoad host processing
271
How many Provisioning Services servers should the architect install in the configured site? Two servers in the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter Three servers in each datacenter Two servers in each datacenter One server in each datacenter Case Study
One server in each datacenter
272
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT in a Remote PC environment on Windows 7 With Provisioning Sewices the best solution? It offers a faster change process. End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
It offers a faster change process.
273
Scenario: CGE needs to define its management prcu:ess for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. How should the architect use Windows Deployment Services to facilitate image management? By deploying a standard base image to virtual desktops By deploying a base mage from an WA file By centralizing the volume-activation process By Installing Windows applications into an image Case Study
By deploying a standard base image to virtual desktops
274
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing With replace on a GPO linked to all OU'S containing Virtual Desktop Agents ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on. B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on. C. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on. D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.
B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on.
275
Which components should an architect recommend be used to meet the secure remote access requirements while ensuring high availability? A. Three NetScalers, three StoreFront servers, and three Delivery Controllers: one at each datacenter B. Two NetScalers, two StoreFront servers, and two Delivery Controllers in the London datacenter C. Six NetScalers, six StoreFront servers, and six Delivery Controllers: two at each datacenter D. Two NetScalers in the London datacenter and two StoreFront servers and Delivery Controllers in each datacenter
C. Six NetScalers, six StoreFront servers, and six Delivery Controllers: two at each datacenter
276
Why does using vDisk Versions help manage the image release process? Because it automatically upgrades virtual desktops to the latest operating system version Because It provides centralized, automated single image management With rollback Because It IS compatible With the Microsoft VHD specification Because It automatically deploys the latest drivers and patches
Because It provides centralized, automated single image management With rollback
277
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using SecurelCA meet CGE's compliance requirements? It encrypts internal ICA traffc. It encrypts ICA traffic from remote end users. It enables the SSL Relay service. It complies With industry-standard SSL encryption requirements.
It complies With industry-standard SSL encryption requirements.
278
Scenario: CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity. Why does enabling Profile streaming' when configuring Citrix Profile management to allow standardization of profiles benefit CGE's Sales end-user group? It allows for faster logons. It simplifies home drive cleanup. It minimizes the required storage needed for folder redirection. It improves application performance. Case Study
It allows for faster logons.
279
Scenario: CGE acquires a small energy company that IS running MGMT, a proprietary 16-bit application. A Citrix Architect IS tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Which FlexCast model should the architect recommend to deploy the MGMT application to the Executives/Management end-user group? Hosted Shared Remote PC On-Demand Apps Hosted VDI Case Study
On-Demand Apps
280
Why is database protection an essential component of a production environment? Because the Delivery Controller is stateless Because server maintenance can be performed online Because it prevents local host cache corruption Because user data loss is prevented if a session is disconnected
Because it prevents local host cache corruption
281
Why is configuring regional shared storage locations on a CIFS server using Clustered File Sewices the best design choice for vDlsk storage? It is the least expensive solution. It is a highly scalable and resilient solution. It creates the least amount of administrative overhead. It reduces the system footprint. Case study
It is a highly scalable and resilient solution.
282
Which IOPS figures must an architect take into account when determining the IOPS requirements for a user group? logical, logon, and raw functional, logoff and boot steady state, boot, and raw steady state, logon, and boot
steady state, logon, and boot
283
Which reason explains why a Citrix Architect would identify' the SQL environment as a cause of potential issues in CGE's current deployment? Use of SQL authentication Lack of backup and restoration procedures Lack of identical servers in different datacenters Network bandwidth between congested datacenters Case Study
Lack of backup and restoration procedures
284
Scenario: Users from a remote research lab have very Iimited WAN bandwidth to their nearest datacenter. The users need to print over the WAN. What should an architect recommend to optimize printer bandwidth? Optimize WAN traffic through CloudBridge. Increase the WAN bandwidth through a WAN link upgrade. Restrict overall session bandwidth through a HDX bandwidth policy. Restrict printer redirection bandwidth through a HDX bandwidth policy.
Optimize WAN traffic through CloudBridge.
285
Scenario: CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. How should the Hosted Shared servers be provisioned to meet the needs of the Back Office end-user group when only block storage is available on the shared storage of the Hypervisor? By using Machine Creation Services (MCS)) By using Provisioning Services By manually installing the OS By using cloned virtual machine (VM) templates Case Study
By using Provisioning Services
286
Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with failover sites within the NetScaler Gateway the best design solution? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
It segments the Gateway and load-balancing features of the NetScaler appliances.
287
Which database product should the architect recommend for production deployment? SQL Server Access SQL Server Express Oracle database
SQL Server
288
Which consideration is unnecessary for the PositivelyPeople application in the new environment? File security Secure remote access Access to legacy mainframe Support for secured print jobs
Access to legacy mainframe
289
Which two issues should a Citrix Architect address for end users? (Choose two.) Profile corruption Slow logon and logoff times Connections from non-corporate-owned devices Single-factor authentication for internal end users Case Study
Profile corruption | Slow logon and logoff times
290
Which end-user group does a Citrix Architect need to consider when designing a remote access solution for CGE? Sales Back Office Technicians Executives/Management Case Study
Technicians
291
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients With newer models. What are the benefits of using hosted shared servers with Machine Creation Sewices? Highest user density and lowest cost Highest level of user personalization Lowest storage requirement and highest user density Lowest cost and highest application compatibility
Highest user density and lowest cost
292
How should the architect configure high availability (HA) on a XenServer VM to support an iSCSl NAS? A. Connect a minimum of two network interface cards from the XenServer to the iSCSl storage network and create a NIC bond. B. Connect a minimum of two network interface cards from the XenServer to the SCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA). C. Connect a minimum of two network interface cards to the SCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify' that both can access the iSCSl storage array. D. Connect a minimum of two network interface cards to the iSCSl storage network, each on a separate Layer 3 network, and enable XenServer Multipathing Case Study
B. Connect a minimum of two network interface cards from the XenServer to the SCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).
293
Scenario: CGE's CIO asks a Citrix Architect to design its Hypervlsor networking solution. The storage team informs the architect that they have purchased a new 10GB iSCSl SAN array that the XenServer hosts will use for SAN storage. They would like the solution to meet all outlined requirements. What should the architect recommend? A. Each XenServer host should be configured With six 10Ga network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic B. Each XenServer host should be configured With four 10Ga network cards - two bonded for storage and management separated by separate VLAN, and two bonded for guest VM networks. C. Each XenServer host should be configured With two bonded 10Ga NICs for storage, management, and guest VM networking. D. Each XenServer host should be configured With four 10GB NICS - two dedicated for storage, and two bonded for guest VM networks and management separated by VLAN Case study
D. Each XenServer host should be configured With four 10GB NICS - two dedicated for storage, and two bonded for guest VM networks and management separated by VLAN
294
Why is a design with 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic, the best remote access design? A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. B. It provides redundancy, while optimizing external WAN traffic C. It segments the Gateway and load-balancing features of the NetScaler appliances. D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.
295
Why does using Windows Event logs help the company comply With its security policy? Because they are centralized, industry-standard logs that are easily queried Because they use password-protection for added security Because they contain detailed records of user authentication activity Because they col ect data from multiple devices
Because they are centralized, industry-standard logs that are easily queried
296
How should the architect configure high availability (HA) on a XenServer host to support an SCSI SAN? A. Connect a minimum of two network interface cards from the XenServer to the iSCSl storage network and create a NIC bond. B. Connect a minimum of two network Interface cards from the XenServer to the SCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA)_ C. Connect a minimum of two network interface cards to the SCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify' that both can access the iSCSl storage array. D. Connect a minimum of two network interface cards to the iSCSl storage network, each on a separate Layer 3 network, and enable XenServer Multipathing Case Study
D. Connect a minimum of two network interface cards to the iSCSl storage network, each on a separate Layer 3 network, and enable XenServer Multipathing
297
Users must be able to connect remotely from their own mobile devices. What should the architect consider to increase the security of the current authentication solution? Adding a second authentication factor Placing domain controllers in the DMZ for remote users Shortening the Active Directory password expiration period Populating the RDS user profile in the Active Directory user accounts
Adding a second authentication factor
298
The architect recommended pooled desktop OS machines With Personal vDlsks for the Nurses, Imaging and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines? Install the antivirus software into the base image. Deploy the antivirus package as an App-V application. Deploy the antivirus software through a Group Policy startup script. Install the antivirus software in the master Personal vDlsk as a user-installed application.
Install the antivirus software into the base image.
299
Why would the architect choose active-passive bonding when configuring bonded network interfaces for guest VM networks? It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. It uses a hashing algorithm, which provides better distribution of traffic across the Interfaces In the bond. It uses a round robin load-balancing policy, which provides better distribution of traffic across the Interfaces in the bond. Case Study
It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.
300
Which two design decisions should the architect recommend to improve the user experience? (Choose two.) Configure Clipboard policy Configure Drive encryption Configure Flash redirection Configure Media redirection
Configure Flash redirection | Configure Media redirection
301
Scenario: CGE wants to deploy a new StoreFront 2.6 infrastructure. End users will need to access both the legacy XenApp environment and the new XenApp and XenDesktop environment before they are fully migrated. The legacy and new environments have published applications and desktops With conflicting names, so only one should be accessible at a time. CGE does NOT want to reconfigure the client during the migration, so any changes must be centrally managed. How should a Citrix Architect recommend that the StoreFront infrastructure be configured to achieve the desired result? A. Configure two stores with one Delivery Controller each, and configure the client using a configuration file. B. Configure two separate StoreFront server groups, one for each environment. Use NetScaler load balancing to manage connections between the server groups. C. Create one store, configured with Delivery Controllers from both environments. Use Active Directory Groups to associate end users to the appropriate environment. D. Create one store, configured with Delivery Controllers from both environments. Configure an Application Filter using PowerShell to only show applications from the legacy environment. Case Study
C. Create one store, configured with Delivery Controllers from both environments. Use Active Directory Groups to associate end users to the appropriate environment.
302
What are the benefits of using a Hosted VDI environment with Personal vDlsk? It retains the single image management function while allowing users to install applications It provides a high level of security while allowing user customization It has a low storage performance requirement and high user density It retains the single mage management function yet allows application compatibility
It retains the single image management function while allowing users to install applications
303
Why does using SmartAuditor help the company comply with its security policy? Because it is a centralized, industry-standard log that is easily queried Because It password-protects the audit logs for added security Because It uses a standard TCP port Because it collects logs from multiple devices
Because It password-protects the audit logs for added security
304
Scenario: CGE's security administrator mandates that only Gateway sewices can reside in the DMZ and that all StoreFront traffic must be load balanced. The network administrator requires a resilient solution. Which design recommendation should a Citrix Architect make to meet these requirements? Deploy six NetScaler appliances: two in each regional datacenter. Deploy two NetScaler appliances: one In the primary and one In the secondary datacenter. Deploy four NetScaler appliances: two In the primary and two In the secondary datacenter. Deploy 12 NetScaler appliances: four In the primary and four In each regional datacenter. Case Study
Deploy 12 NetScaler appliances: four In the primary and four In each regional datacenter.
305
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is creating a resource pool comprising a maximum of 16 XenServer hosts, using a shared virtual disk storage repository to provide XenMotion and high availability capabilities, and replicating meta Information to a failover Site the best design solution? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics. B. It ensures Simple setup With redundancy and meets the requirement of separating the OS types. C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery. D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability. Case Study
A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics.
306
Scenario: A Citrix Architect Identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. How should the architect implement a set of Group Policies for each 0U? Configure loopback processing with merge at the root level. Configure loopback processing with replace at the root level. Configure loopback processing with merge at the regional level. Configure loopback processing with replace at the regional level.
Configure loopback processing with replace at the root level.
307
Scenario: CGE acquires a small energy company that IS running MGMT a proprietary 16-bit application. A Citrix Architect IS tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as a VM hosted app on Windows 7 x86 With Provisioning Services the best solution? It supports 16-bit applications in an environment in which end users are already comfortable. It meets the high-performance application demands of the Executives/Management end-user group. It supports 16-bit applications and allows the Installation of custom applications. It supports 16-bit applications, and offers faster change and rollback procedures. Case Study
It supports 16-bit applications, and offers faster change and rollback procedures.
308
Scenario: CGE decided to virtualize Its Infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is creating resource pools comprising a maximum of eight XenServer hosts, performing dally backups of the infrastructure workloads, and using third-party backups for the desktops the best design solution? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes. In addition, it accounts for Server OS and Desktop OS machine characteristics. B. It ensures simple setup With redundancy and meets the requirement of separating OS types. C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery. D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability. Case Study
D. It ensures the separation of infrastructure and virtual desktop workloads and optimizes performance and high availability.
309
Which two budgetary items should the architect consider to meet the needs of remote users in the new environment? (Choose two.) Microsoft licenses NetScaler infrastructure Additional mobile devices Two-factor authentication solution
NetScaler infrastructure Two-factor authentication solution
310
Why is configuring CIFS on a NAS the best design solution for vDisk storage? It is the least expensive solution. It is a highly scalable and resilient solution. It creates the least amount of administrative overhead. It reduces the system footprint. Case Study
It creates the least amount of administrative overhead.
311
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. Why does using Hypervisor templates and leveraging Workfow Studio to deploy desktops from templates help manage the image versioning process? It allows for automatic, scripted upgrades of the deployment template. It provides centralized, automated, single-image management. It facilitates consistent deployment of base images. It allows for scripts to be executed from the same network share as the deployment template. Case study
It provides centralized, automated, single-image management.
312
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Sewices servers will be connected to a 10 Gbps network. How should the architect implement a highly available Provisioning Sewices server on dedicated physical switches? By installing multiple NICs in one Provisioning Services server in each datacenter By deploying one Provisioning Services server on a dedicated switch in the primary and secondary datacenters By deploying two Provisioning Services servers on dedicated switches in each datacenter By using NetScaler With GSLBa to load balance the Provisioning Services servers on dedicated switches in each datacenter
By deploying one Provisioning Services server on a dedicated switch in the primary and secondary datacenters
313
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a prcu:ess for version control that includes thorough testing prior to production. Why do using Hypervisor templates and WAIK help manage the image versioning process? It reduces image deployment time. It reduces the storage requirement for images. It allows for testing updates prior to updating the production machine catalog. It allows for testing updates prior to updating the production Delivery Group. Case Study
It reduces image deployment time.
314
Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office? HDX Monitor Citrix Director Citrix EdgeSight Citrix AppCenter Console Case Study
HDX Monitor
315
Scenario: A Citrix Architect Identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would Citrix policies, filtered by Client Name, ensure full control over which Group Policies are applied? It provides central management and control. It ensures that only settings With the correct filtering in Active Directory are applied. It ensures that only settings located In the root Citrix OU are applied. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
It provides central management and control.
316
Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded to a session policy, the best remote access design? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
It segments the Gateway and load-balancing features of the NetScaler appliances.
317
How should the architect implement database high availability in SQL Server Express? By using Always On Availabillty Groups By using SQL Server mirroring By Implementing SQL Server log shipping By using the hypervisor high availability feature
By using the hypervisor high availability feature
318
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted VDI and manually installing the operating system? It provides the highest end-user density at the lowest cost. It provides the greatest level of end-user personalization and control. It offers the lowest storage performance requirement and the highest end-user density. It provides the lowest cost and the greatest application compatibility. Case Study
It provides the greatest level of end-user personalization and control.
319
Scenario: CGE decided to virtualize its infrastructure workloads and provide a vitual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is using a maximum of 32 XenServ•er hosts, using a shared virtual disk storage repository for XenMotion, high availability, and the replication and backup of meta information the best design for the resource pools? A. It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a disaster recovery prcu:ess that leverages a backup solution. B. It ensures Simple setup With redundancy. C. It bases resource pools on roles, and facilitates the movement of workloads from one resource pool to another in the event of maintenance or disaster recovery. D. It ensures the separation of Infrastructure and virtual desktop workloads, which optimizes performance and high availability. Case Study
D. It ensures the separation of Infrastructure and virtual desktop workloads, which optimizes performance and high availability.
320
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network. How should the architect recommend that a highly available multi-homed Provisioning Semces server configuration be implemented? By installing multiple NICs in the Provisioning Services server in each datacenter By deploying one Provisioning Services server in the primary and one in the secondary datacenter By deploying two Provisioning Services servers in the same datacenter By using NetScaler with GSLB to load balance the Provisioning Services servers in each datacenter
By using NetScaler with GSLB to load balance the Provisioning Services servers in each datacenter
321
How should the architect design the centralized log for NetScaler? By Implementing SysLog By monitoring the Windows Security Event logs By sending NetScaler logging data to the SQL Reporting Sewices By Implementing the SmartAuditor feature
By Implementing SysLog
322
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT as a published application on Windows Server 2008 R2 With Machine Creation Services the best solution? It offers a faster change process. End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
It prevents XenApp server crashes.
323
How many Provisioning Sewices servers should the architect install in the three configured sites? One server in each datacenter Two servers In each datacenter Three servers In each datacenter Two servers In the primary datacenter, two servers in the secondary datacenter, and one server in the remaining datacenter Case Study
Two servers In each datacenter
324
An architect needs to design a solution that optimizes resource usage for Call Center users. How do server OS machines achieve this goal? By offering optimal performance By providing rapid application rollouts By ensuring the greatest security level by design By accommodating high user density on each server
By accommodating high user density on each server
325
Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked With deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT in a Remote PC environment on Windows 7 with Machine Creation Semces the best solution? It offers a faster change process. End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
It prevents XenApp server crashes.
326
The company is implementing XenDesktop globally for desktop virtualization. How should the architect recommend installment of controllers for high availability? Install two controllers in each datacenter Install three controllers In New York and three in London Install three controllers In Hong Kong and three In New York Install three controllers In New York and three In Oslo
Install two controllers in each datacenter
327
A Citrix Architect plans to update the virtual environment in CGE's Jurong datacenter. Which constraint should the architect address to satisfy' CGE's stated business needs? Lack of shared storage 1 Gb network infrastructure Datacenter power and cooling Mixed-server hardware landscape Case Study
Lack of shared storage
328
Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with two NetScaler virtual servers for each appliance, each binded to a redirection policy, the best remote access design? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
It provides redundancy, while optimizing external WAN traffic
329
Which profile type would NOT be suitable for the Back Office end-user group? Local Roaming Mandatory Citrix Profile management Case Study
Mandatory
330
How should the architect use XenConvert to facilitate image management? To convert from a single server image to a hypemsor template To convert from a single server image into a vitual disk in VHD format To perform mass conversion ofvlftual machines to XenServer virtual machines To perform an unattended conversion of a virtual machine to XenServer
To convert from a single server image into a vitual disk in VHD format
331
Scenario: CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. Which image management method should a Citrix Architect recommend to deploy server OS machines and desktop OS machines? XenServer Fast Clone Machine Creation Services Provisioning Services Windows Deployment Services Case Study
Machine Creation Services
332
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing With replace at the regional level ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on. B. It ensures that only Group Policies located in the regional OU are applied at the regional level when end users log on. C. It ensures that only Citrix policies are applied at the regional level when end users log on. D. It ensures that Group Policies located in the regional OU are replaced With Citrix policies.
A. It ensures that only Group Policies with the correct filtering in Active Directory are applied at the regional level when end users log on.
333
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. Why does using Windows Deployment Sewices and deploying a base image from an WA file help manage the image versioning process? It supports Hypervisors supported by XenDesktop It helps manage version control. It leverages storage array features to offload host processing It automatically deploys the latest drivers and patches. Case Study
It leverages storage array features to offload host processing
334
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. What are the benefits of using Hosted VDI and manually installing the operating system? Highest user density and lowest cost Highest level of user personalization Lowest storage performance requirement and highest user density Lowest cost and highest application compatibility
Highest level of user personalization
335
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. How should the architect recommend that the target devices boot from the provisioning server? By configuring a Windows deployment server By using SFTp By using FTP By using DHCP
By using DHCP
336
Scenario: CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity. What should the architect recommend to alleviate existing issues and fulfill the requirements specified in the scenario? A. Configure Citrix Profile management without folder redirection. Configure the Path to user store' to the same location as the home drive. Configure the 'Migration of existing user profiles' policy setting. Use group policy templates for configuration of Profile management policies. B. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store' to a central location different than the home drive. Configure the 'Migration of existing user profiles' policy setting. Use _ini files for configuration of Profile management policies. C. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store' to a central location different than the home drive. Configure the 'Migration of existing user profiles' policy setting. Use the group policy templates for configuration of Profile management policies. D. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store' to the same location as the home drive. Configure the 'Migration of existing user profiles' policy setting. Use .ini files for configuration of User Profile management policies. Case Study
C. Configure Citrix Profile management and continue to use folder redirection. Configure the Path to user store' to a central location different than the home drive. Configure the 'Migration of existing user profiles' policy setting. Use the group policy templates for configuration of Profile management policies.
337
Scenario: CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. What are the benefits of using Hosted VDI With Provisioning Semces? It provides the highest end-user density at the lowest cost. It provides the greatest level of end-user personalization and control. It facilitates rapid provisioning and provides the highest end-user density. It provides the lowest cost and the greatest application compatibility. Case Study
It provides the lowest cost and the greatest application compatibility.
338
Scenario: CGE decided to disable USB device redirection by default for all end users in the new environment using Citrix policies. The only exception is if there is a clear requirement for end users to have this functionality. For which two end-user groups should a Citrix Architect configure an exception policy to enable USB device redirection? (Choose two.) Research Engineers Back Office Technicians Case Study
Engineers Technicians
339
Which three statements are true regarding the Radiology group? (Choose three.) A. Mobility is important to Rad ology users. B. Mobility is unimportant to Radiology users. C. Virtualization resource requirements are high. D. Smooth Roaming IS important to Rad ology users. E. Virtualization resource requirements are moderate. F. Smooth Roaming IS unimportant to radiology users.
B. Mobility is unimportant to Radiology users. C. Virtualization resource requirements are high. D. Smooth Roaming IS important to Rad ology users.
340
The IT Help Desk Administrator at CCH needs to shadow a user session for application troubleshooting purposes. Which two permissions need to be set in the environment? (Choose two.) Read-Only Administrator Microsoft Group Policy settings for RDS Microsoft Group Policy settings for Remote Assistance Perform Remote Assistance on a machine role permission
Microsoft Group Policy settings for Remote Assistance | Perform Remote Assistance on a machine role permission
341
Why should disk and network I/O be used to identify' bottlenecks? A. High disk and network I/O utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load. B. High disk and network I/O utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks_ C. High disk and network I/O utilization of the Delivery Controller can Indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users. D. High disk and network I/O utilization of the Delivery Controller can indicate the presence of a virus or malware.
B. High disk and network I/O utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks_
342
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. What are the benefits of using Hosted VDI with Machine Creation Semces? Highest user density and lowest cost Highest level of user personalization Lowest storage performance requirement and highest user density Lowest cost and highest application compatibility
Highest user density and lowest cost
343
Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE's Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage. What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen? A. 50 Mb/s B. 150 Mb/s C. 300 Mb/s D. 600 Mb/s Case Study
B. 150 Mb/s
344
What are the benefits of using SSL to meet the company's compliance requirements? It eliminates the need to distribute an internal root certificate It encrypts end-to-end traffic from remote users It is required to enable the SSI_ Relay semce It provides secure Internal and external network communication
It provides secure Internal and external network communication
345
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. How should the architect recommend that SecurelCA be implemented? By using NetScaler By enabling SecurelCA on delivery groups By Implementing an Active Directory Group Policy to configure SecurelCA By installing an SSI_ certificate in the master image
By enabling SecurelCA on delivery groups
346
An architect is evaluating the user profile management solution for the desktop and application virtualization solution. Which two pieces of information should the architect collect? (Choose two.) ``` A. User time zone B. User profile size C. Installed language pack D. Client device CPU/RAM E. Application compatibililty of profile type ```
B. User profile size E. Application compatibililty of profile type
347
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would implementing one GPO in each region ensure full control over which GPOs are applied? It provides central management and control. It ensures that only policies With the correct filter in Active Directory are applied It ensures that only settings located In the root OU are applied. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
It provides central management and control.
348
Why is a design With 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for Gateway traffic and an HA pair in the DMZ for load balancing, the best remote access design? A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. B. It provides redundancy, while optimizing external WAN traffic C. It segments the Gateway and load-balancing features of the NetScaler appliances. D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
349
Why does using PvD enable the Radiology group to maintain user changes? Because it maintains user changes independent of the base image Because it retains user registry information Because it allows users to use local profiles Because it retains computer policy settings from Active Directory GPO
Because it maintains user changes independent of the base image
350
Why does using XenConvert help manage the image release process? Because it reduces image deployment time Because it reduces the storage requirement for images Because it simplifies the prcu:ess of converting images Because it provides a console to create and monitor the conversion process
Because it provides a console to create and monitor the conversion process
351
How can the architect identify if the Provisioning Services servers are the source of a bottleneck? Identify excessive CPU and memory consumption Identify excessive memory and network utilization Identify excessive CPU and network I/O Identify excessive disk I/O and page file utilization
Identify excessive CPU and network I/O
352
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the existing PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network. What should the architect recommend? Multi-homed Provisioning Services servers on existing server VLANs Multi-homed Provisioning Services server on dedicated VLANs Multi-homed Provisioning Services server on a dedicated physical switch Multi-homed Provisioning Services server With NetScaler App Firewall
Multi-homed Provisioning Services server on dedicated VLANs
353
Scenario: To ensure the security of its new solution, CGE wants to limit end-user access to USB peripherals. Policies have been implemented to disable USB redirection for all end users. As a company policy, only the Research end-user group will be allowed to access USB peripheral devices. What could a Citrix Architect design to meet the stated requirements? A GPO that allows USB redirection, linked to the CGE OU A GPO that allows USB redirection, linked only to the Aberdeen and Houston OUs A Citrix policy that allows USB redirection, With a filter on the IP range for CGE's Aberdeen and Houston subnets. A Citrix policy that allows USB redirection, With a filter on the Delivery Group for the Research end-user group desktop. Case Study
A Citrix policy that allows USB redirection, With a filter on the Delivery Group for the Research end-user group desktop.
354
Scenario: CGE is experiencing numerous Issues With Its existing profile management solution. The Citrix Architect managing the project IS tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and With minimal complexity. Why does enabling file and folder exclusions when configuring Citrix Profile management to allow standardization of profiles benefit CGE's Sales end-user group? It minimizes the required storage needed for folder redirection. It simplifies home drive cleanup. It Improves application performance. It allows faster logons and logoffs Case Study
It minimizes the required storage needed for folder redirection.
355
What should a Citrix Architect recommend to ensure that streaming traffic is segmented and highly available? Provisioning Services servers on a shared VLAN. Provisioning Services servers using NetScaler. Provisioning Services servers on dedicated physical switches. Provisioning Services servers on dedicated VLANs.
Provisioning Services servers on a shared VLAN.
356
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Why does using IPsec meet CGE's compliance requirements? It encrypts internal network traffcic It encrypts ICA traffic from remote end users. It enables the SSL Relay service. It complies With Industry-standard SSL encryption requirements.
It encrypts ICA traffic from remote end users.
357
Scenario: CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity. Why does enabling 'Offine profile support' when configuring Citrix Profile management to allow standardization of profiles benefit CGE's Sales end-user group? It allows faster logon/logoff. It minimizes the required storage needed for folder redirection. It simplifies home drive cleanup. It improves data accuracy in volatile environments. Case Study
It allows faster logon/logoff.
358
Scenario: An analysis of CGE's applications shows that are compatible with Windows 8 64-bit and Windows Server 2012. The remaining applications are incompatible with a 64-bit operating system. Which solution should a Citrix Architect recommend to enable the delivery of the incompatible applications? A. Use VM Hosted Apps to deliver the incompatible applications from a Windows 7 32-bit desktop. B. Use an existing XenApp 6.6 farm to deliver the incompatible applications using a 64-bit desktop. C. Stream the application with Microsoft App-V and deliver the incompatible applications using a 64-bit desktop. D. Publish the applications from a XenApp 7.6 session host to deliver the incompatible applications to a 64-bit desktop. Case Study
A. Use VM Hosted Apps to deliver the incompatible applications from a Windows 7 32-bit desktop.
359
Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models. What are the benefits of using local VMs? Compatibility with tablet devices Highest level of user personalization Supports a variety of hardware configurations from a single image Remote access to applications
Compatibility with tablet devices
360
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. How should the architect recommend that SSI_ be implemented? By installing certificates on Citrix infrastructure components By configuring an Active Directory Group Policy to distribute SSL certificates By installing a certificate authority server in the DMZ By installing an SSI_ certificate in the master image
By configuring an Active Directory Group Policy to distribute SSL certificates
361
Which current infrastructure limitation prevents doctors in London from working remotely if the London datacenter shuts down unexpectedly? There are no roaming user profiles There is no failover datacenter for London There are no backups of the SQL Server databases There is no disaster recovery plan for the mobile workforce
There is no disaster recovery plan for the mobile workforce
362
Scenario: CGE decided to vitualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. How should the architect recommend that the Synchronizer be deployed? By using a Hyper-V virtual appliance on Hyper-V By installing the Synchronizer software on a Hyper-V server By booting from the Synchronizer ISO image By installing a Synchronizer virtual appliance on XenServer Case Study
By installing a Synchronizer virtual appliance on XenServer
363
Why is hypervisor high availability an essential component of a production database server? Because the Delivery Controller is stateless Because server maintenance can be performed online Because It prevents local host cache corruption Because user data loss is prevented If a session is disconnected
Because the Delivery Controller is stateless
364
CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions. How should a Hosted VDI FlexCast model be implemented to allow end-user-installed applications? By using Citrix Profile management By using Personal vDlsks By using statically assigned virtual desktops By using a network share that contains the App-V packages
By using Personal vDlsks
365
How should the architect configure high availability (HA) on a Windows File Server so that Provisioning Sewices always has access to the Provisioning Sewices images7 By using Distributed File Services By using Clustered File Services By using DNS Round Robin By using XenServer With HA enabled Case Study
By using Clustered File Services
366
Why does using hypervisor templates help manage the image release process? Because they automat cally upgrade virtual desktops to the latest operating system version Because they provide centralized, automated single mage management Because they facilitate consistent deployment of base images Because they can be stored on shared or local storage
Because they facilitate consistent deployment of base images
367
Scenario: A Citrix Architect Identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing with merge at the regional level ensure full control over which Group Policies are applied? A. It ensures that only Group Policies With the correct filtering in Active Directory are applied at the regional level when end users log on. B. It ensures that only Group Policies located In the regional Citrix OU are applied at the regional level when end users log on. C. It ensures that only Citrix policies are applied at the regional level when end users log on. D. It ensures that Group Policies located In the regional OU are merged With Citrix policies.
B. It ensures that only Group Policies located In the regional Citrix OU are applied at the regional level when end users log on.
368
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. Which type of encryption should a Citrix Architect recommend? SecurelCA IPsec SSL L2TP
SSL
369
Scenario: CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. Why is Provisioning Semces the best image management method for this environment? It provides centralized image management. It reduces the storage footprint. It reduces network traffic It reduces Infrastructure server requirements. Case Study
It provides centralized image management.
370
The company is implementing XenDesktop globally for desktop virtualization. How should the architect recommend installment of controllers for high availability? Install one controller in London and one in Paris Install one controller in New York and one in Hong Kong Install one controller in Hong Kong and one in Tokyo Install one controller in New York and one in London
Install one controller in New York and one in Hong Kong
371
Scenario: CGE is experiencing numerous issues With its existing profile management solution. The Citrix Architect managing the project is tasked With designing a solution that alleviates existing issues and, If possible, minimizes the loss of existing customizations. Configuration changes need to be Implemented quickly and with minimal complexity. How can Citrix Profile management be configured for Sales end-user group profiles? Enable file and folder exclusions Enable 'Active write back' Enable 'Offine profile support' Enable Profile streaming' Case Study
Enable file and folder exclusions
372
Scenario: CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. ow should the architect recommend that L2TP be implemented7 By using NetScaler By Implementing secure Delivery Groups By configuring an Active Directory Group Policy to configure L2TP By Installing a Windows Server OS With Routing and Remote Access Service
By Installing a Windows Server OS With Routing and Remote Access Service
373
How should the architect specify' that StoreFront logs are collected? By enabling tracing and automating collection of log files By enabling tracing and monitoring Windows Event logs By gathering data from the IIS Manager console and archiving it on a network share By enabling the SmartAuditor feature and IIS logging
By enabling tracing and automating collection of log files
374
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing With replace on a GPO linked to all OU's containing Delivery Controllers ensure full control over which Group Policies are applied? It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on. It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on. It ensures that GPOs located in the root Citrix OU are replaced With Citrix policies.
It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.
375
A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image. Which two factors helped guide the architects recommendation? (Choose two.) A reduction in Hotfix testing time CGE's planned upgrade to Microsoft Office 2013 The use of both applications by all CGE end users End-user complaints about slow application launch times Case Study
The use of both applications by all CGE end users | End-user complaints about slow application launch times
376
Why would having one farm With one configured site, With two Provisioning Services servers in the primary datacenter, two in the secondary datacenter, and one in the remaining datacenter, meet the requirements of a regional single-image management strategy With minimal WAN traffic across datacenters? A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region. B. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability between regions. C. It ensures that Provisioning Services targets Will NOT load balance between hosts, and guarantees high availability between regions. D. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability within each region Case Study
D. It reduces management overhead, ensures that Provisioning Services targets Will NOT load balance across regions, and guarantees high availability within each region
377
Which two factors present a risk to the availability of the CGE environment based on the current provision for external access to it? (Choose two.) A. Single-factor authentication is used for external access. B. There are Single Secure Gateway servers In some locations. C. NetScaler Gateway IS being used to load balance StoreFront. D. There IS no automatic failover between regions for end users. Case Study
B. There are Single Secure Gateway servers In some locations. D. There IS no automatic failover between regions for end users.
378
Scenario: A Citrix Architect is designing a multi-server Provisioning Semces solution for CGE_ The solution must be highly available and minimize the risk of vDlsk inconsistency. Why does implementing high-speed local storage with deduplication satisfy' the requirements? It provides striping. It provides the highest performance. It provides fault tolerance. It provides minimal disk usage. Case Study
It provides the highest performance.
379
What should a Citrix Engineer implement to allow users with pooled desktops to maintain persistent configurations, such as installation of new applications in their desktops? ``` Personal vDlsk Roaming profiles Folder redirection Personal network drives Citrix Profile Management ```
Folder redirection
380
Scenario: The Engineers end-user group requires access to an application that automatically updates itself daily from an Internet source. The application is NOT multi-user aware. Which FlexCast model would be most suitable for these end users? Local VM Remote PC Access Hosted Shared Desktop - Non-Persistent Hosted VDI - Static/Non-Persistent with Personal vDlsk Case Study
Hosted VDI - Static/Non-Persistent with Personal vDlsk
381
Scenario: CGE decided to virtualize Its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Which XenServer resource pool design should a Citrix Architect recommend to host all required workloads? A. Create two resource pools: one for the infrastructure workloads and one for the Server OS machine and Desktop OS machine workloads. B. Create one dedicated resource pool for the Infrastructure, Server OS machine, and Desktop OS machine workloads. C. Create three resource pools: one each for the Infrastructure, the Server OS machine, and the Desktop OS machine workloads. D. Create three dedicated resource pools: one for the Delivery Controllers, one for vitual Server OS machine and Desktop OS machine workloads, and one for Infrastructure workloads. Case Study
C. Create three resource pools: one each for the Infrastructure, the Server OS machine, and the Desktop OS machine workloads.
382
Scenario: Each XenServer hypervisor host is configured with four 10Gb NICS - two dedicated for storage and two bonded for guest VM networks and management separated by VLAN. The CIO would like to see network traffic distributed across all links to maximize the utilization of each link. All switches support 802.3ad and adaptive load balancing. How should the architect configure the guest VM network? Using active-active bonding Using active-passive bonding Using XenSever MPIO redundancy Using LACP bonding Case Study
Using LACP bonding
383
Scenario: A Citrix Architect is designing a multi-server Provisioning Semces solution for CGE The solution must be highly available and minimize the risk of vDlsk inconsistency. How should the architect configure the local vDlsk storage for fault tolerance and high performance? By implementing RAID 0 By implementing RAID 1 By implementing high-speed local storage with deduplication By implementing RAID 10 Case Study
By implementing RAID 10
384
Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server for each appliance binded to a session policy, the best remote access design for the environment? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. Case Study
It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.
385
Scenario: A Citrix Architect recommends upgrading CGE's Provisioning Services 6.1 environment to Provisioning Services 7.6. Currently, VDisks in Provisioning Services 6.1 are configured with the write cache location on the target device hard drive. Which two applications will show increased application performance due to the upgrade to Provisioning Services 7.6? (Choose two.) SAP Salesforce OpenGL (CAD) Proprietary Energy App Case Study
OpenGL (CAD) | Proprietary Energy App
386
What are the benefits of using L2TP to meet the company's compliance requirements? It encrypts internal ICA traffic It encrypts ICA traffic from remote users It is required to enable the SSL Relay sewice It complies with industry-standard SSL encryption requirements.
It encrypts ICA traffic from remote users
387
Which two factors should a Citrix Architect consider with regard to CGE's Back Office end-user group? (Choose two.) Their need for a special application set Their need to access additional printers Their need to Install their own applications Their need to use non-corporate-owned devices Case Study
Their need for a special application set | Their need to access additional printers
388
The architect should recommend a Universal License because it is required for (Choose the phrase that correctly completes the sentence.) ICA Proxy SmartAccess Two-factor authentication SSL access inside the network
SmartAccess
389
How should a Streamed VHD environment be configured to allow user-installed applications? By configuring Streamed VHD in Standard mode By implementing Personal vDlsk By configuring Streamed VHD in Private mode By providing access to the network share that contains the App-V packages
By implementing Personal vDlsk
390
Why should CPU and memory consumption be used to identify' bottlenecks? Excessive CPU and memory consumption will slow the loading of vDlsks and cache files by Provisioning Serviices Excessive CPU and memory consumption on the vDlsk store will slow down the PXE boot process. Excessive CPU and memory consumption can increase fragmentation of the TFTP boot strap file. Excessive CPU and memory consumption can increase fragmentation of the vDlsks_
Excessive CPU and memory consumption will slow the loading of vDlsks and cache files by Provisioning Services
391
Scenario: CGE needs to define its management prcu:ess for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production. How should the architect use Machine Creation Sewices to facilitate image management? By using Fast Clones By using Machine Creation Services policies By using snapshots By using the Windows Automatic Install Kit (WAIK) Case Study
By using Fast Clones
392
Scenario: CGE needs to define its management process for desktop image releases. Some groups need a prcu:ess for version control that includes thorough testing prior to production. Why does using Hypemsor templates and leveraging the Hypemsor API to deploy desktops from templates help manage the image versioning process? It allows for the automatic upgrade of the virtual desktops to the latest OS version. It provides centralized, automated, single-mage management. It facilitates consistent deployment of base Images. It allows for templates to be stored on shared or local storage. Case Study
It provides centralized, automated, single-mage management.
393
Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter? Server infrastructure Network connectivity Storage infrastructure Power and cooling infrastructure Case Study
Power and cooling infrastructure
394
The company decided to virtualize their server workloads and provide a Virtual solution to all of their users. The server workloads include Delivery Controller, Citrix component servers (StoreFront, License Server), and Microsoft SQL Server for databases. How should the XenServer resource pools be designed to host all required workloads? A. Create two resource pools, one for the server workloads and one for the server OS machine and desktop OS machine workloads. B. Create one resource pool for the server, server OS machine, and desktop OS machine workloads. C. Create three resource pools: one for the server workloads, one for the server OS machine workloads, and one for the desktop OS machine workloads. D. Create three dedicated resource pools: one for the Delivery Controllers; one for virtual server OS machine and desktop OS machine workloads; and one for related Infrastructure (StoreFront, Provisioning Semces, backend database server, domain controller) workloads.
C. Create three resource pools: one for the server workloads, one for the server OS machine workloads, and one for the desktop OS machine workloads.
395
``` Which two CGE end-user groups do NOT currently have their profile settings retained between sessions? (Choose two.) Sales Engineers Technicians Executives/Management ``` Case Study
Engineers | Technicians
396
All nurses currently use Windows XP workstations to access critical med cal applications and require different applications depending on their role. Which two delivery models meet the nurses' requirements? (Choose two.) A. Local VM deployment with streamed applications B. Streamed VHD deployment with streamed applications C. Hosted server OS deployment with locally installed applications D. Hosted desktop OS deployment With locally installed applications
C. Hosted server OS deployment with locally installed applications D. Hosted desktop OS deployment With locally installed applications
397
How should the architect design the image management process using Windows SysPrep? A. Prepare an existing machine as the master image. B. Install a new Windows mage utilizing a XenServer virtual machine and prepare it as the master image and install the delivery agent. Run SysPrep on the virtual machine. C. Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards. D. Run XenConvert on an existing machine.
Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards.
398
How should the architect design the image management process using Windows SysPrep? A. Prepare an existing machine as the master image. B. Install a new Windows mage utilizing a XenServer virtual machine and prepare it as the master image and install the delivery agent. Run SysPrep on the virtual machine. C. Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards. D. Run XenConvert on an existing machine.
C. Use a XenServer virtual machine to install a new Windows image with MAK and prepare it as the master image. Ensure that the image has two network cards.
399
Scenario: A Citrix Architect IS asked to design a new external access architecture for CGE The regional datacenters have NetScaler appliances delivering load-balancing sewices_ Security policy mandates that these internal appliances CANNOT connect to the DMZ. How should the architect configure the callback URL With a high availability pair of NetScalers located in all three regional datacenters? A. Configure the cal back URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. B. Configure the cal back URL to point to the external address, https://secure_cge_com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. C. Configure the cal back URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. D. Configure the cal back URL to point to the external beacon address.
D. Configure the cal back URL to point to the external beacon address.
400
Why does using SysLog help the company comply with its security policy? Because it is a centralized, industry-standard log that is eas ly queried Because It password-protects the audit logs for added security Because It uses a standard TCP port Because It collects logs from multiple devices
Because it is a centralized, industry-standard log that is eas ly queried
401
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring loopback processing With merge at the root level ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on. B. It ensures that only Group Policies located In the root Citrix OU are applied below the root level when end users log on. C. It ensures that only Group Policies located In the root Citrix OU are applied below the root level when end users log on. D. It ensures that Group Policies located In the root Citrix OU are merged With Citrix policies.
D. It ensures that Group Policies located In the root Citrix OU are merged With Citrix policies.
402
Scenario: CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. How should the architect design the image management process using XenServer Fast Clone? A. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image. B. Install a new Windows mage utilizing a XenServer vitual machine prepared as the master mage, Install the Virtual Delivery Agent (VOA), and convert the virtual machine image to a template. C. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VOA), and convert the virtual machine image to a vDisk using XenConvert_ D. Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, and include XenTools_ Case Study
C. Install a new Windows mage utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VOA), and convert the virtual machine image to a vDisk using XenConvert_
403
Scenario: CGE acquires a small energy company that is running MGMT a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system Instability. How should the architect deploy MGMT as an On-Demand App? A. As a VM hosted app on Windows 7 x86 deployed With Machine Creation Services B. As a VM hosted app on Windows 7 x86 deployed With Provisioning Services C. As a published application on Windows Server 2008 R2 deployed With Machine Creation Services D. As a published application on Windows Server 2012 R2 deployed With Provisioning Services Case Study
B. As a VM hosted app on Windows 7 x86 deployed With Provisioning Services
404
Scenario: CGE is experiencing numerous Issues with Its existing profile management solution. The Citrix Architect managing the project IS tasked With designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. Why does enabling file and folder exclusions when configuring Citrix Profile management without folder redirection benefit CGE's Sales end-user group? It minimizes the required storage needed for folder redirection. It simplifies home drive cleanup. It Improves application performance. It allows faster logons and logoffs. Case Study
It minimizes the required storage needed for folder redirection.
405
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would enabling loopback processing With merge on a GPO linked to all OUS containing Virtual Desktop Agents ensure full control over which Group Policies are applied? A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on. B. It ensures that only Group Policies located In or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on. C. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on. D. It ensures that GPOs located In the root Citrix OU are replaced With Citrix policies.
A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on.
406
Scenario: CGE decided to vitualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements. Why is Machine Creation Services the best image management process for this environment? It provides centralized image management and has fewer Infrastructure requirements. It results in less network complexity. It reduces network traffc_ It does NOT require TFTP and DHCP configuration. Case Study
It provides centralized image management and has fewer Infrastructure requirements.
407
Scenario: CGE has two StoreFront server groups. End users need to be able to roam between regions but keep their individual application subscriptions. What should a Citrix Architect recommend to fulfill this requirement and keep management overhead to a minimum? Configure all regions to be part of the same server group. Configure a mandatory store in StoreFront to keep consistent application sets. Copy the end-user subscription database between the server groups manually. Configure scheduled subscription replication between server groups using PowerShell Case Study
Configure scheduled subscription replication between server groups using PowerShell
408
Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/ Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. Why is deploying MGMT In a Hosted Shared environment on Windows Server 2008 R2 with Provisioning Services the best solution? It offers a faster change process End users are already comfortable working in a shared environment. It prevents XenApp server crashes. It enables faster rollbacks. Case Study
It enables faster rollbacks.
409
Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured With a Gateway vServer the best design solution? It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. It provides redundancy, while optimizing external WAN traffic It segments the Gateway and load-balancing features of the NetScaler appliances. It allows for the expected expansion of remote access usage and provides SSI_ VPN functionality for future needs. Case study
It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.
410
Scenario: CGE decided to virtualize Its Infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. Why is separating workloads by roles, creating a resource pool comprising a maximum of eight XenServer hosts, and Implementing a storage repository for virtual disks, XenMotion, high availability, and disaster recovery backups the best design solution? A. It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities. B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads. C. It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities. D. It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime. Case Study
B. It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.
411
Why does using SmartAuditor help the company comply with its security policy? Because it records ICA sessions Because it uses proprietary codec Because it enables sessions to be searched Because it provides configuration changes for an audit trail
Because it records ICA sessions
412
Which two operational risks exist in CGE's current environment? (Choose two.) Only one farm is running multiple zones. A test environment is NOT in place. Web Interface is NOT highly available in all regions. The London datacenter uses SAN storage.
A test environment is NOT in place. | Web Interface is NOT highly available in all regions.
413
How can the architect identify' if the Delivery Controller is the source of a bottleneck? Identify' excessive memory and network utilization Identify' excessive CPU consumption Identify' excessive disk and network I/O Identify' excessive disk I/O and page file utiIization
Identify' excessive CPU consumption
414
Scenario: A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would creating Citrix policies within a GPO, filtered by end user and Delivery Group, ensure full control over which GPOs are applied? It provides central management and control. It ensures that only policies with the correct filter in Active Directory are applied. It ensures that only settings located in the root OU are applied. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
Virtual Desktop Agents where end users log on.
415
Scenario: A Citrix Architect Identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUS across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. Why would configuring the Citrix policies in the GPOs ensure full control over which Group Policies are applied? A. It provides central management and control. B. It ensures that only settings With the correct filtering in Active Directory are applied. C. It ensures that only settings located In the root Citrix OU are applied. D. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.
A. It provides central management and control.
416
Why should the each component be located at each datacenter? This design allows for site failover and increases security for remote access This design reduces component design complexity This design simplifies administration of components This design prevents user experience from being affected in the event of a site outage.
This design allows for site failover and increases security for remote access
417
An architect is recommending an antivirus policy for Provisioning Sewices servers that are being used to provision pooled desktops. Which two options should the architect recommend for optimal performance? (Choose two.) Enable scan on read Prohibit write cache scanning Increase scheduled scanning frequency Exclude scanning of the target device drivers
Prohibit write cache scanning Exclude scanning of the target device drivers
418
Wh ch two risks exist in the access layer of the CGE environment? (Choose two.) Secure Gateway is used by some sites. Single-factor authentication IS In use for external end users. Receiver for mobile devices IS Installed from third-paty stores. End-user connections from non-corporate-owned devices are allowed. Case Study
Secure Gateway is used by some sites. | Single-factor authentication IS In use for external end users.