Which protection can a Citrix Engineer implement to prevent a hacker from extracting a customer list from the company website?
Which font end Optimization technique overcomes the parallel download limitation of web browsers?
Which protection is applied on a server response from a protected application?
Scenario: A Citrix Engineer configures Citrix Web App Firewall to protect an application. Users report that they are NOT able to log on. The engineer enables a Start URL relaxation for the path //login.aspx.
What is the effect of the Start URL relaxation on the application?
A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.
Which action should the engineer enable to achieve this?
Statistics for which three types of violations are presented on the App Security Dashboard? (Choose three.)
Scenario: A Citrix Engineer configures Citrix Web App Firewall to protect an application. Upon reviewing the log files, the engineer notices a pattern of forceful browsing toward the configuration page for the application. To protect against this, the engineer enforces Start URL and enables Enforce URL Closure.
What is the effect of enforcing Start URL and enabling Enforce URL Closure on the application?
Scenario: A Citrix Engineer implements Application-level Quality of Experience (AppQoE) to protect a web application. The engineer configures the AppQoE action to deliver a custom response from a backup server once the maximum number of concurrent connection is reached.
To achieve this, the engineer should set the Acton Type to________and specify the_______. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Engineer is reviewing the Citrix Web App Firewall log files using the GUI. Upon further analysis, the engineer notices that legitimate application traffic is being blocked.
What can the engineer do to allow the traffic to pass through while maintaining security?
Scenario: A Web Application Developer asked a Citrix Engineer to implement Citrix Web App Firewall protections. To provide consistency in branding, the developer asked that the web server provide a custom message when a violation occurs. Which profile setting does the engineer need to configure to provide the custom message?
Scenario: A Citrix Engineer notices that a web page takes a long time to display. Upon further investigation,
the engineer determines that the requested page consists of a table of high-resolution pictures which are being displayed in table cells measuring 320 by 180 pixels.
Which Front End Optimization technique can the engineer enable on the Citrix ADC to improve time-to-display?
Scenario: A Citrix Engineer is using Citrix Application Delivery Management (ADM) to manage SSL certificates across all Citrix ADC instances. The engineer wants to distribute a new certificate to the devices. What, in addition to the certificate file, must the engineer provide when uploading the new certificate?
Which three items does Citrix Application Delivery Management (ADM) require when adding an instances? (Choose three.)
A Citrix Engineer needs to create a configuration job to clone a configuration from an existing Citrix ADC to a new Citrix ADC.
Which configuration source can the engineer use to accomplish this?
Scenario: A Citrix Engineer reviewed the log files of a web application and found the error message below: "Unable to complete request Unrecognized field cext2_price>" Which protection can the engineer implement to prevent this error from happening?