Scenario: A Citrix Administrator configures an Access Control List (ACL) to block traffic from the IP address 10.102.29.5:
add simpleacl rule1 DENY -srcIP 10.102 29.5
A week later the administrator discovers that the ACL is no longer present on the Citrix ADC.
What could be the reason for this?
A. The administrator did NOT run the apply ACL command.
B. The simple ACLs remain active for only 600 seconds.
C. The simple ACLs remain active for only 60 seconds.
D. The Citrix ADC has been restarted without saving the configurations.
Scenario: A Citrix Administrator configured a responder policy as follows: > add responder action Picture10Action redirect "\"http://\" + http.req.hostname + http.req.url + \"/picture10.html\"" -bypassSafetyCheck YES > add responder policy Picture10Policy "http.req.url.eq(\"/mywebsite\")" Picture10Action > bind responder global Picture10Policy 1 END -type OVERRIDE What will be the effect of this configuration?
A. The URL http://www.mywebsite.com will be overwritten with /picture10.html.
B. Clients accessing http://www.mywebsite.com/ will have /picture10 html appended to the URL.
C. Clients accessing http://www.mywebsite.com/picture10.html will be overwritten with http://www.mywebsite com/.
D. The file Picture10 will be downloaded to a local drive when directly accessing http://www.mywebsite.com/picture10.html.
Scenario: A Citrix Administrator executed the command below in an active-active, global server load balancing (GSLB) setup.
set gslb parameter ç’´dnsprobeOrder DNS PING TCP
The order to calculate the _____ for dynamic proximity will be the DNS UDP query followed by the ping and then TCP. (Choose the correct option to complete the sentence.)
A. Time to live (TTL)
B. Empty Domain Service (EDS)
C. Multiple IP responses (MIR)
D. Round-trip time (RTT)
Which Citrix ADC Access Control List (ACL) command can a Citrix Administrator use to bridge traffic originating from the IP address 192.168.10.200?
A. add ns simpleacl6
B. add ns simpleacl
C. add ns acl
D. add ns acl6
Which two policies can a Citrix Administrator configure using only the advanced policy expression? (Choose two.)
A. DNS
B. Integrated caching
C. SSL
D. System
Which two options are only allowed when creating advanced policies? (Choose two.)
A. TCP
B. IP
C. CLIENT
D. DNS
E. SQL
Scenario: A Citrix Administrator configured the rewrite policies below: bind lb vServer VIP1_http -policyName POL_14 -priority 120 -gotoPriorityExpression END - type REQUEST bind lb vServer VIP1_http -policyName POL_12 -priority 90 -gotoPriorityExpression NEXT - type REQUEST bind lb vServer VIP1_http -policyName POL_15 -priority 100 -gotoPriorityExpression END - type REQUEST bind lb vServer VIP1_http -policyName POL_13 -priority 101 -gotoPriorityExpression NEXT -type REQUEST Which policy will be evaluated last considering POL_12 is hit first?
A. POL_12
B. POL_13
C. POL_14
D. POL_15
Scenario: A Citrix ADC receives packets destined for a MAC address owned by the Citrix ADC. The destination IP address of the packets does NOT belong to the Citrix ADC. Layer 3 mode is enabled by default on the Citrix ADC. The Citrix ADC will __________ the packets in this scenario. (Choose the correct option to complete the sentence.)
A. route
B. process
C. bridge
D. drop
Scenario: A Citrix Administrator configured an authentication, authorization, and auditing (AAA) policy to allow users access through the Citrix ADC. The administrator bound the policy to a specific vServer. Which policy expression will allow all users access through the vServer?
A. true
B. false
C. ns_true
D. ns_false
Scenario: A Citrix Administrator gives permissions to team members to access their own admin partition. This will allow them to add resources for different departments and manage them without making changes to the default Citrix ADC partition and configuration.
One team member typing to use the command line interface (CLI) to troubleshoot an authentication issue could NOT use aaad.debug. However, the team member has full permissions on the admin partition.
What can be the cause of this issue?
A. The team member is NOT using the CLI correctly.
B. The team member needs to troubleshoot the issue from the GUI.
C. The team member does NOT have permission to use the CLI.
D. The team member does NOT have shell access by design.