Analyzing Citrix NetScaler Advanced Topics: Security, Management, and Optimization 試験
Question No : 1
Which two actions can a Citrix Engineer use to provide Denial of Service (DoS) protection with the AppQoE feature? (Choose two.)
Question No : 2
Scenario: A Citrix Engineer needs to configure an external SNMP server in a High Availability setup. The engineer configured the load-balancing virtual server to access the NetScaler Management and Analytics System (NMAS) HA pair.
Which IP address will be configured on the external SNMP Manager to add the NMAS devices?
Question No : 3
A Citrix Engineer executed the below commands on the NetScaler command-line interface (CLI):
add stream selector cacheStreamSelector http.req.url
add ns limitidentifier cacheRateLimitIdentifier Cthreshold 5 CtimeSlice 2000 CselectorName cacheStreamSelector
add cache policy cacheRateLimitPolicy Crule “http.req.method.eq(get) && sys.check_limit (\ “cacheRateLimitIdentifier\”)” Caction cache
bind cache global cacheRateLimitPolicy- priority 10
What will be the effect of executing these commands?
Question No : 4
Which is a single-digit rating system that indicates the criticalness of attacks on the application, regardless of whether or NOT the application is protected by a NetScaler appliance?
Question No : 5
Which three options can be used to specify the destination of an HTTP Callout? (Choose three.)
Question No : 6
A Citrix Engineer configures the integrated caching feature to cache both static and dynamic content, but the integrated cache feature does NOT work as expected.
Which two resources can the engineer use to troubleshoot this integrated cache issue? (Choose two.)
Question No : 7
Scenario: A Citrix Engineer has created a default admin user with username Admin1 and password ‘nsroot’ for the tenant example-online.
However, the tenant administrator is unable to log in as username Admin1 and password ‘nsroot’.
Which action resolves this problem?
Question No : 8
In PCRE, the only characters assumed to be literals are ___________ (Choose the correct option to complete the sentence.)
Question No : 9
Scenario: A Citrix Engineer uses one StyleBook on a NetScaler Management and Analytics System (NMAS) to create multiple load-balanced virtual server configurations for NetScaler instances. The configuration is saved in a config pack.
In which two locations is the StyleBook config pack saved? (Choose two.)
Question No : 10
A Citrix Engineer needs to ensure that clients always receive a fresh answer from the integrated cache for positive responses (response of 200).
Which two settings can the engineer configure to make sure that clients receive a fresh response when it is needed? (Choose two.)
Question No : 11
Which type of Application Profile type can be configured to protect the application which supports both HTML and XML data?
Question No : 12
Scenario: A Citrix Engineer discovers a security vulnerability in one of its websites. The engineer takes a header trace and checks the Application Firewall logs.
The following was found in part of the logs:
method=GET request = http://my.companysite.net/FFC/sc11.html msg=URL length (39) is greater than maximum allowed (20).cn1=707 cn2=402 cs1=owa_profile cs2=PPE0 cs3=kW49GcKbnwKByByi3+jeNzfgWa80000 cs4=ALERT cs5=2015
Which type of Application Firewall security check can the engineer configure to block this type of attack?
Question No : 13
A Citrix Engineer needs to optimize the Cascading Style Sheets (CSS) content sent from the backend server before being forwarded to the client.
Which option can the engineer use to accomplish CSS optimization?
Question No : 14
A Citrix Engineer needs to implement Application Firewall to prevent the following tampering and vulnerabilities:
-If web server does NOT send a field to the user, the check should NOT allow the user to add that field and return data in the field.
-If a field is a read-only or hidden field, the check verifies that data has NOT changed.
-If a field is a list box or radio button field, the check verifies that data in the response corresponds to one of the values in that field.
Which security check can the engineer enable to meet this requirement?
Question No : 15
A Citrix Engineer is considered that malicious users could exploit a web system by sending a large cookie.
Which security check can the engineer implement to address this concern?