최신 1Y0-341 무료덤프 - Citrix ADC Advanced Topics - Security, Management and Optimization
Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
정답: C
In PCRE, the only characters assumed to be literals are ___________ (Choose the correct option to complete the sentence.)
정답: B
A Citrix Engineer is notified that no traffic is reaching the protected web application. While investigating, the engineer notices that the Citrix Web App Firewall policy has 516,72 hits. What should the engineer check next?
정답: A
A Citrix Engineer needs to prevent an attack against insecure operating-system or web-server software. The attack can cause the system to crash or behave unpredictably when it receives a data string that is larger than it can handle.
Which security check on the Application Firewall can the engineer enable to prevent such attacks?
Which security check on the Application Firewall can the engineer enable to prevent such attacks?
정답: C
Which Citrix Application Delivery Management (ADM) Analytics page allows an engineer to measure the ICA Round Trip Time for user connections?
정답: E
설명: (DumpTOP 회원만 볼 수 있음)
A Citrix Engineer needs to set the rate at which connections are proxied from the NetScaler to the server. Which values should the engineer configure for Surge Protection?
정답: C
What can a Citrix Engineer do to aggregate Citrix Web App Firewall log messages to a central location?
정답: B
A Citrix Engineer needs to deploy the NetScaler Management and Analytics System (NMAS) in their company environment to ensure that NMAS provides uninterrupted operation in all situations.
Which deployment type can meet this requirement?
Which deployment type can meet this requirement?
정답: C
Scenario: A Citrix Engineer must enable a cookie consistency security check and ensure that all the session cookies get encrypted during the transaction. The engineer needs to ensure that none of the persistent coolies are encrypted and decrypted and decrypt any encrypted cookies during the transaction. Which cookie consistency security feature will the engineer configure in the following configuration to achieve the desired results?
add appfw profile Test123 startURLAction none- denyURLAction none- cookieConsistencyAction log - cookieTransforms ON cookieEncryptionecryptSessionOnly addCookieFlagshttpOnly - crossSiteScriptingAction none- SQLInjectionAction log stats SQLInjectionTransfrormSpecialChars ON- SQLInjectionCheckSQLWildChars ON fieldFormatAction none bufferOverflowAction none - responseContentType "application/octet- stream"- XMLSQLInjectionAction none XMLXSSAction none- XMLWSIAction none- XMLValidationAction none
add appfw profile Test123 startURLAction none- denyURLAction none- cookieConsistencyAction log - cookieTransforms ON cookieEncryptionecryptSessionOnly addCookieFlagshttpOnly - crossSiteScriptingAction none- SQLInjectionAction log stats SQLInjectionTransfrormSpecialChars ON- SQLInjectionCheckSQLWildChars ON fieldFormatAction none bufferOverflowAction none - responseContentType "application/octet- stream"- XMLSQLInjectionAction none XMLXSSAction none- XMLWSIAction none- XMLValidationAction none
정답: D
A website hosts highly dynamic content that is frequently requested in bursts of high user access.
Which configuration will reduce traffic to the origin server while optimizing client performance?
Which configuration will reduce traffic to the origin server while optimizing client performance?
정답: D
The NetScaler logging client server can be installed and configured to store the log for
___________.
(Choose the correct option to complete the sentence.)
___________.
(Choose the correct option to complete the sentence.)
정답: C
Which reason can cause fail over in a NetScaler Management and Analytics System (NMAS) High Availability pair?
정답: B
A Citrix Engineer needs to ensure that all traffic to the virtual server is blocked if NONE of the bound Application Firewall policies are matched.
Which setting can the engineer configure to meet this requirement?
Which setting can the engineer configure to meet this requirement?
정답: C
Which is a single-digit rating system that indicates the criticalness of attacks on the application, regardless of whether or NOT the application is protected by a NetScaler appliance?
정답: B
A company has experienced an outage of their mission-critical website. Upon investigation, the Citrix Engineer determines that the following command was executed on the website:
DROP TABLE table_name
Which security check would have prevented this issue?
DROP TABLE table_name
Which security check would have prevented this issue?
정답: A
A Citrix Engineer needs to ensure that clients always receive a fresh answer from the integrated cache for positive responses (response of 200).
Which two settings can the engineer configure to make sure that clients receive a fresh response when it is needed? (Choose two.)
Which two settings can the engineer configure to make sure that clients receive a fresh response when it is needed? (Choose two.)
정답: A,B
Scenario: A Citrix Engineer created the policies in the attached exhibit.
Click the Exhibit button to view the list of policies.
HTTP Request:
GET /resetpassword.htm HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1: WOW64; Trident/7.0; AS; rv:11.0) like Gecko Host: www.citrix.com Accept-Language: en-us Accept-Encoding: gzip, deflate Connection: Keep-Alive Which two profiles will be applied to the above HTTP request? (Choose two.)
Click the Exhibit button to view the list of policies.
HTTP Request:
GET /resetpassword.htm HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1: WOW64; Trident/7.0; AS; rv:11.0) like Gecko Host: www.citrix.com Accept-Language: en-us Accept-Encoding: gzip, deflate Connection: Keep-Alive Which two profiles will be applied to the above HTTP request? (Choose two.)
정답: C,D