Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Note! Following 1Y0-401 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Question 1

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.

B.

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.

C.

It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.

D.

It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

Buy Now
Question 2

Which consideration is unnecessary for the PositivelyPeople application in the new environment?

Options:

A.

File security

B.

Secure remote access

C.

Access to legacy mainframe

D.

Support for secured print jobs

Question 3

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

How should the architect recommend that the target devices boot from the provisioning server?

Options:

A.

By configuring a Windows deployment server

B.

By using SFTP

C.

By using FTP

D.

By using DHCP