An administrator needs to install a certificate from the NetScaler onto a Microsoft Windows IIS server. Which action should the administrator complete before the certificate can be imported on the IIS server?
A. SelectExportPKCS#12andcopythefiletoWindows.
B. Copy the certificate file from jnsconfigjssl to Windows.
C. Copy the certificate file and the key file from jnsconfigjssl to Windows.
D. Manage Certificates j Keys j CSRs and download the certificate file to Windows.
A company plans to deploy secure LDAP authentication to their existing NetScaler Gateway
implementation.
What should an administrator enable to support secure LDAP?
A. SSL security on the virtual server
B. Secure LDAP in a pre-authentication policy
C. SSL security type in an authentication policy
D. Secure LDAP in the NetScaler Gateway Global settings
Scenario: An administrator is planning to implement NetScaler Gateway. The administrator must ensure
that users are able to change their passwords when the passwords have expired.
To meet the needs of the scenario, the administrator must ensure that is included in the
plan.
A. LDAP authentication
B. RADIUS authentication
C. nested groups (enabled)
D. the nsroot username added to Active Directory
A company uses various pre-approved user devices in the environment, including mobile devices running
iOS and Android operating systems.
Which two types of policies could an administrator use on the NetScaler Gateway virtual server to allow
access to these mobile devices? (Choose two.)
A. Rewrite policies, including endpoint analysis scans
B. Session policies, excluding the endpoint analysis scans
C. Authorization policies, including the endpoint analysis scans
D. Pre-authentication policies, excluding the endpoint analysis scans
An administrator plans to configure a NetScaler Gateway virtual server to be able to provide SmartAccess,
endpoint analysis and network layer tunneling features.
Which client option should the administrator use for this scenario?
A. Offline plug-in
B. Online plug-in
C. Citrix Receiver
D. Access Gateway plug-in
Where should a Citrix Administrator implement an Endpoint Analysis expression?
A. Session profile
B. Authorization policy
C. Authentication policy
D. Preauthentication policy
What should a Citrix Administrator configure to optimize an internal NetScaler Gateway virtual server when more bandwidth is available for use and other websites are NOT affected?
A. Windows Scaling within TCP parameters.
B. Max Connections within HTTP parameters.
C. A Net Profile that is applied to the NetScaler Gateway virtual server.
D. Windows Scaling within a TCP Profile that is applied to the NetScaler Gateway virtual server.
Scenario: A Citrix Administrator added an Access Control List (ACL) to restrict access to the management
IP address of the NetScaler. The administrator is still able to connect from a disallowed subnet, even
though the ACL is enabled.
What is a possible reason why the administrator is still able to connect from a disallowed subnet?
A. No vLAN was specified.
B. ACLs are only applied to virtual IPs (vIPs).
C. The ACL needs to be activated.
D. An established connection was in place.
Which command is used to verify the authentication process?
A. show aaa user
B. show aaa stats
C. cat aaad.debug
D. set aaa ldapParams
Which protocol should be used to configure a secure LDAP virtual server for a NetScaler Gateway deployment?
A. SSL
B. DTLS
C. SSL TCP
D. SSL BRIDGE