Scenario: An administrator notices that each time the secondary node of a high availability (HA) pair is restarted, the primary node shifts to a non-working state.
The administrator runs a command and collects the information displayed below:
1) Node ID. 0
Node StatE. NOT UP
Master StatE. Secondary
INC StatE. DISABLED
Sync StatE. DISABLED
Enabled Interfaces : 1/5 1/1 1/2 1/4 0/1
Disabled Interfaces : 1/3
HA MON ON Interfaces : 1/4 1/1 0/1
Interfaces on which heartbeats are not seen : 1/4 1/1 1/2 1/5 0/1
Interfaces causing Partial FailurE. 1/4
SSL Card Status: UP
Hello Interval: 200 msecs
Dead Interval: 3 secs
Node in this Master State for: 0:0:0:35 (days:hrs:min:sec)
2) Node ID. 1
Node StatE. UNKNOWN/DOWN
Master StatE. UNKNOWN
INC StatE. UNKNOWN
Sync StatE. UNKNOWN
Enabled Interfaces : UNKNOWN
Disabled Interfaces : UNKNOWN
HA MON ON Interfaces : UNKNOWN
SSL Card Status: UNKNOWN
What could be the cause of this issue?
A. Synchronization is disabled.
B. The Hello Interval is set too high.
C. One of the interfaces is disabled.
D. One of the HA Monitoring interfaces is failing.
Which two methods could an administrator use to ensure that all HTTP traffic will be redirected to the NetScaler Gateway virtual server after configuring a NetScaler Gateway virtual server? (Choose two.)
A. Configure a URL transformation policy, then bind it globally.
B. Configure a rewrite policy to change all the HTTP requests, then bind it to the NetScaler Gateway
C. Configure a responder policy based on the FQDN pointing to the NetScaler Gateway virtual server,
then bind it globally.
D. Configure an HTTP virtual server with the same NetScaler Gateway virtual server IP address, then
configure a redirect URL on it.
Scenario: An administrator is planning to implement NetScaler Gateway.
The administrator must ensure that users are able to change their passwords when the passwords have expired.
To meet the needs of the scenario, the administrator must ensure that __________ is included in the plan.
A. LDAP authentication
B. RADIUS authentication
C. nested groups (enabled)
D. the nsroot username added to Active Directory
A company uses various pre-approved user devices in the environment, including mobile devices running iOS and Android operating systems.
Which two types of policies could an administrator use on the NetScaler Gateway virtual server to allow access to these mobile devices? (Choose two.)
A. Rewrite policies, including endpoint analysis scans
B. Session policies, excluding the endpoint analysis scans
C. Authorization policies, including the endpoint analysis scans
D. Pre-authentication policies, excluding the endpoint analysis scans
An administrator plans to configure a NetScaler Gateway virtual server to be able to provide SmartAccess, endpoint analysis and network layer tunneling features.
Which client option should the administrator use for this scenario?
A. Offline plug-in
B. Online plug-in
C. Citrix Receiver
D. Access Gateway plug-in
An administrator is planning a NetScaler Gateway implementation and must ensure that users are only allowed to access the company resources if a specific file is present on the endpoint device they connect from.
Which component should the administrator include within the plan?
A. An SSL Offload virtual server
B. A double-hop NetScaler Gateway virtual server
C. A Basic mode NetScaler Gateway virtual server
D. A SmartAccess mode NetScaler Gateway virtual server
Which information is required to license a NetScaler VPX 1000?
B. MAC address
C. NetScaler host name
D. Citrix License Server host name
An administrator created a service for a Web Interface server that is encrypted by an SSL certificate.
Which command should the administrator run at the command-line interface to create a monitor that will check the Web Interface by logging on to it with a test user’s credentials?
A. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath “/Citrix/XenApp” – userName
user -domain DomainName -password [email protected] -encrypted
B. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath “/Citrix/XenApp” – userName
user -domain DomainName -password [email protected] -secure YES
C. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath “/Citrix/XenApp” – userName
user -domain DomainName -password [email protected] -destPort 443
D. add lb monitor mon-WebInterface CITRIX-WI-EXTENDED -sitePath “/Citrix/XenApp” – userName
user -domain DomainName -password [email protected] -encrypted -secure YES
Scenario: An administrator configured a NetScaler Gateway session policy named spol_ICAP. The administrator needs to bind the policy to ensure that it is evaluated only when users of the ICAP security group log on to the NetScaler Gateway virtual server named vsrv_AGEE.
Which command should the administrator run at the command-line interface to meet the needs of the scenario?
A. bind vpn vserver vsrv_AGEE ICAP
B. bind aaa group ICAP -policy spol_ICAP
C. bind aaa group ICAP -policy spol_ICAP -global OFF
D. bind vpn vserver vsrv_AGEE -policy spol_ICAP -priority 1
An administrator plans to use only Citrix Receiver for XenDesktop remote access through a NetScaler Gateway device.
Which type of policy should the administrator configure to meet this requirement?
C. Clientless access
If you want to pass Citrix 1Y0-250 exam successfully, donot missing to read latest lead2pass Citrix 1Y0-250 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.