Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Citrix 1Y0-341 Dumps Questions Answers

Page: 1 / 4
Total 107 questions

Citrix ADC Advanced Topics - Security. Management and Optimization (CCP-N) Questions and Answers

Question 1

Which syntax is used to write a StyleBook?

Options:

A.

JSON

B.

LISP

C.

YAML

D.

XML

Buy Now
Question 2

Which protection can a Citrix Engineer implement to prevent a hacker from extracting a customer list from the company website?

Options:

A.

Cross-Site Request Forgeries (CSRF)

B.

Form Field Consistency

C.

HTML Cross-Site Scripting (XSS)

D.

HTML SQL Injection

Question 3

Which font end Optimization technique overcomes the parallel download limitation of web browsers?

Options:

A.

Domain Sharing

B.

Minify

C.

Extend Page Cache

D.

Lazy Load

Question 4

Which protection is applied on a server response from a protected application?

Options:

A.

Cross-Site Request Forgeries (CSRF)

B.

Form Field Consistency

C.

HTML Cross-Site Scripting (XSS)

D.

Safe Object

Question 5

Scenario: A Citrix Engineer configures Citrix Web App Firewall to protect an application. Users report that they are NOT able to log on. The engineer enables a Start URL relaxation for the path //login.aspx.

What is the effect of the Start URL relaxation on the application?

Options:

A.

Access to the path /login.aspx is unblocked.

B.

Access to the path /login.aspx is blocked.

C.

External users are blocked from the path /login.aspx.

Internal users are permitted to the path /login.aspx.

D.

Non-administrative users are blocked from the path /login.aspx Administrative users are permitted to the path /login.aspx.

Question 6

A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.

Which action should the engineer enable to achieve this?

Options:

A.

Stats

B.

Block

C.

Log

D.

Learn

Question 7

Statistics for which three types of violations are presented on the App Security Dashboard? (Choose three.)

Options:

A.

Web App Firewall protection

B.

IP Reputation

C.

SSL Enterprise Policy

D.

Signature

E.

AAA

Question 8

Scenario: A Citrix Engineer configures Citrix Web App Firewall to protect an application. Upon reviewing the log files, the engineer notices a pattern of forceful browsing toward the configuration page for the application. To protect against this, the engineer enforces Start URL and enables Enforce URL Closure.

What is the effect of enforcing Start URL and enabling Enforce URL Closure on the application?

Options:

A.

Access to the path /config.aspx is unblocked when a user clicks a referring link elsewhere on the website.

B.

Non-administrative users are blocked from the path /config.aspx.

Administrative users are permitted to the path /config.aspx.

C.

External users are blocked from the path /config.aspx.

Internal users are permitted to the path /config.aspx.

D.

Access to the path /config.aspx is blocked.

Question 9

Scenario: A Citrix Engineer implements Application-level Quality of Experience (AppQoE) to protect a web application. The engineer configures the AppQoE action to deliver a custom response from a backup server once the maximum number of concurrent connection is reached.

To achieve this, the engineer should set the Acton Type to________and specify the_______. (Choose the correct option to complete the sentence.)

Options:

A.

NS; Alternate Content Server Name

B.

ACS; Custom File

C.

ACS; Alternate Content Server Name

D.

NS; Custom File

Question 10

Scenario: A Citrix Engineer is reviewing the Citrix Web App Firewall log files using the GUI. Upon further analysis, the engineer notices that legitimate application traffic is being blocked.

What can the engineer do to allow the traffic to pass through while maintaining security?

Options:

A.

Note the protection blocking the traffic in the log entry. Edit the profile and deselect the Block action for the protection.

B.

Select the check box in the log entry. Choose Dismiss to allow the traffic to pass through from the Action menu.

C.

Note the protection blocking the traffic in the log entry. Create a new profile and policy and bind it with a larger priority number.

D.

Select the check box in the log entry. Choose Edit & Deploy to create a relaxation rule from the Action menu.

Question 11

Scenario: A Web Application Developer asked a Citrix Engineer to implement Citrix Web App Firewall protections. To provide consistency in branding, the developer asked that the web server provide a custom message when a violation occurs. Which profile setting does the engineer need to configure to provide the custom message?

Options:

A.

Redirect URL

B.

HTML Error Object

C.

RFC Profile

D.

Content Type Default Response

Question 12

Scenario: A Citrix Engineer notices that a web page takes a long time to display. Upon further investigation,

the engineer determines that the requested page consists of a table of high-resolution pictures which are being displayed in table cells measuring 320 by 180 pixels.

Which Front End Optimization technique can the engineer enable on the Citrix ADC to improve time-to-display?

Options:

A.

Shrink to Attributes

B.

Make Inline

C.

Extend Page Cache

D.

Minify

Question 13

Scenario: A Citrix Engineer is using Citrix Application Delivery Management (ADM) to manage SSL certificates across all Citrix ADC instances. The engineer wants to distribute a new certificate to the devices. What, in addition to the certificate file, must the engineer provide when uploading the new certificate?

Options:

A.

Serial Number File

B.

Certificate Signing Request (CSR)

C.

Root Certificate

D.

Key File

Question 14

Which three items does Citrix Application Delivery Management (ADM) require when adding an instances? (Choose three.)

Options:

A.

Site

B.

Tags

C.

IP address

D.

Agent

E.

Profile

Question 15

A Citrix Engineer needs to create a configuration job to clone a configuration from an existing Citrix ADC to a new Citrix ADC.

Which configuration source can the engineer use to accomplish this?

Options:

A.

Master Configuration

B.

Inbuilt Template

C.

Instance

D.

Configuration Template

Question 16

Scenario: A Citrix Engineer reviewed the log files of a web application and found the error message below: "Unable to complete request Unrecognized field cext2_price>" Which protection can the engineer implement to prevent this error from happening?

Options:

A.

Form Field Consistency

B.

Cross-Site Request Forgeries (CSRF)

C.

HTML SQL Injection

D.

HTML Cross-Site Scripting (XSS)

Page: 1 / 4
Total 107 questions