CNS-226 : Implement Citrix ADC 13.x with Citrix Gateway Quiz Questions and Answers

Scenario: A Citrix Administrator configured the rewrite policies below. bind Ib vserver VPN_http policyName POL_1 priority 120 gotoPriorityExpression END type REQUEST bind Ib vserver VPN_http policyName POL_2 priority 90 gotoPriorityExpression NEXT type REQUEST bind Ib vserver VPN_http policyName POL_3 priority 100 gotoPriorityExpression NEXT type REQUEST bind Ib vserver VPN_http policyName POL_4 priority 110 gotoPriorityExpression NEXT type REQUEST In which order will the policies be evaluated?

Answer :
  • POL_2, POL_3, POL_4, POL_1

Which three services can the StoreFront monitor probe to determine the state of the StoreFront server? (Choose three.)

Answer :
  • Discovery
  • Authentication
  • Account

How can a Citrix Administrator provide two-factor authentication with tokens in a XenDesktop with NetScaler Gateway environment?

Answer :
  • Configure a RADIUS authentication policy and bind it to the existing virtual server.

Which option is needed to configure the NetScaler Gateway to provide users with multiple logon options after successful authentication, if the users are connected through clientless access?

Answer :
  • Client choices options with mandatory Endpoint Analysis

Which protocol is not supported by Classic Policies?

Answer :
  • SNMP

Which of the following is not the component of Classic/Default Policy ?

Answer :
  • Weight

Which one is not the type of default policy expression?

Answer :
  • Addressable

Classic Policies support the following protocols

Answer :
  • TCP, IP, SSL, HTTP

A Citrix Administrator receives user complaints about latency while accessing an application that is being load-balanced on the NetScaler. hich tool can the administrator use to gather information regarding Response time, Client latency and Server-side processing time?

Answer :
  • HDX Insight

Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the company’s security requirements?

Answer :
  • Authorization