New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Passed Exam Today 1Y0-401

Page: 15 / 15
Total 449 questions

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Question 57

Why should CPU and memory consumption be used to identify bottlenecks?

Options:

A.

Excessive CPU and memory consumption will slow the loading of vDisks and cache files by Provisioning Services

B.

Excessive CPU and memory consumption on the vDisk store will slow down the PXE boot process.

C.

Excessive CPU and memory consumption can increase fragmentation of the TFTP boot strap file.

D.

Excessive CPU and memory consumption can increase fragmentation of the vDisks.

Question 58

Why is this the best design for the XenServer resource pools?

Options:

A.

This design ensures that all server workloads and virtual desktop workloads are logically separated and do NOT interfere with each other. Furthermore, it ensures easier management and expansion capabilities.

B.

This design provides flexibility for all workloads to use available resources within a resource pool more efficiently and ensures expansion options if the environment should grow. Furthermore, performing a backup on a daily basis provides availability of critical workloads with some downtime.

C.

This design separates server workloads from virtual desktops according to the different resource usage characteristics and avoids conflicting situations. Also, critical database services have sufficient resources within their workload-specific resource pool and failover capabilities.

D.

This design ensures logical separation of all workloads and virtual desktops. Also, providing a backup solution reduces the risk of data loss and minimizes downtime.

Question 59

What are the benefits of using L2TP to meet the company’s compliance requirements?

Options:

A.

It encrypts internal ICA traffic

B.

It encrypts ICA traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It complies with industry-standard SSL encryption requirements.

Question 60

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

Only block storage is available on the shared storage of the hypervisor.

How should the architect recommend that Hosted VDI be provisioned to fulfill the virtualization requirements for the call center?

Options:

A.

By using Machine Creation Services

B.

By using Provisioning Services

C.

By manually installing the operating system

D.

By using cloned VM templates

Page: 15 / 15
Total 449 questions