Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Note! Following 1Y0-401 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Question 1

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

Why is separating workloads by roles, creating a resource pool comprising a maximum of 16 XenServer hosts, and implementing multiple storage repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery purposes the best design solution?

Options:

A.

It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.

B.

It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.

C.

It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicting situations. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.

D.

It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Buy Now
Question 2

What are the benefits of using L2TP to meet the company’s compliance requirements?

Options:

A.

It encrypts internal ICA traffic

B.

It encrypts ICA traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It complies with industry-standard SSL encryption requirements.

Question 3

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Which design recommendation should the architect make when designing the new Active Directory structure?

Options:

A.

Create one OU as a root for the new environment and move Citrix policies from Citrix Studio to a GPO.

B.

Create one OU for each region and use a set of Group Policies for each regional OU.

C.

Create one OU for each region and only use Citrix policies.

D.

Create one OU as a root for the new environment and enable loopback processing.