New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Legit 1Y0-401 Exam Download

Page: 9 / 15
Total 449 questions

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Question 33

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect ensure full control over which Citrix policies are applied?

Options:

A.

Configure the Citrix policies in the GPOs.

B.

Create one Citrix Policy for each region.

C.

Create Citrix policies filtered by end users and Delivery Groups.

D.

Create Citrix policies and filter settings based on Client Name.

Question 34

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.

B.

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.

C.

It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.

D.

It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

Question 35

Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications?

Options:

A.

VM Hosted applications

B.

Streamed server OS machines

C.

Dedicated desktop OS machines

D.

Pooled desktop OS machine with Personal vDisk

Question 36

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that L2TP be implemented?

Options:

A.

By using NetScaler

B.

By implementing secure Delivery Groups

C.

By configuring an Active Directory Group Policy to configure L2TP

D.

By installing a Windows Server OS with Routing and Remote Access Service

Page: 9 / 15
Total 449 questions