최신 1Y0-341 무료덤프 - Citrix ADC Advanced Topics - Security, Management and Optimization

Scenario: A Citrix Engineer has deployed Front-end Optimization on NetScaler. Below is the snippet of the content before and after optimization.
Before Optimization:

After Optimization:

Which optimization technique has been applied to the content?

정답: C
An attacker inserting a malicious code that compromises the trust relationship between users and a web application is an example of a (n) _____ attack. (Choose the correct option to complete the sentence.)

정답: A
Which reason can cause fail over in a Citrix ADC Application Delivery Management High Availability pair?

정답: B
Scenario: A Citrix Engineer is implementing Citrix Web App Firewall to protect a new web application. The engineer has created a profile, configured the relaxation rules, and applied signature protections. Additionally, the engineer has assigned the profile to a policy and bound the policy to the application.
What is the next step for the engineer in protecting the web application?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?

정답: C
Which feature of Citrix Web App Firewall builds rules from known good traffic?

정답: C
Scenario: A Citrix Engineer has configured an IP Reputation policy and Profile in Application Firewall. However, the engineer is NOT able to see any hits on the policy during testing. Which logs can the engineer check to ensure that IP Reputation is configured correctly?

정답: B
Scenario: A Citrix Engineer has configured Citrix Application Delivery Management (ADM) to monitor applications presented by Citrix ADC appliances. When reviewing the App Security Dashboard, the engineer finds no data.
What must the engineer do to ensure data is being collected from the applications?

정답: B
A Citrix Engineer needs to configure an Application Firewall policy. According to company policies, the engineer needs to ensure that all the requests made to the website are originating from North America. Which policy expressions will help the engineer accomplish the requirement?

정답: D
Which reason can cause fail over in a NetScaler Management and Analytics System (NMAS) High Availability pair?

정답: B
When the NetScaler marks a client connection as "non-trackable", the default behavior of the NetScaler without making any change to the HTTP Profile is to ______. (Choose the correct option to complete the sentence.)

정답: C
The NetScaler logging client server can be installed and configured to store the log for
___________.
(Choose the correct option to complete the sentence.)

정답: C
Scenario: A Citrix Engineer created the policies in the attached exhibit.
Click the Exhibit button to view the list of policies.

HTTP Request:
GET /resetpassword.htm HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1: WOW64; Trident/7.0; AS; rv:11.0) like Gecko Host: www.citrix.com Accept-Language: en-us Accept-Encoding: gzip, deflate Connection: Keep-Alive Which two profiles will be applied to the above HTTP request? (Choose two.)

정답: C,D
Scenario: A Citrix Engineer configured signature protections for Citrix Web App Firewall.
Signature Auto- Update has been enabled. Upon reviewing the log files, the engineer notices that the auto update process has an error. In the settings for Signature Auto Update the engineer notices that the URL is blank.
Which URL should the engineer enter to restore the update process?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Scenario: A Citrix Engineer is implementing Integrated Caching to increase performance of a web application. The Application Engineer replaces a small logo on the main page with a new one.
Later on, when the engineer attempts to access the page, the old logo is displayed. Which enabled setting in the Content Group would cause this to happen?

정답: B
Which is a single-digit rating system that indicates the criticalness of attacks on the application, regardless of whether or NOT the application is protected by a NetScaler appliance?

정답: B
Which Front End Optimization technique can a Citrix Engineer enable on the Citrix ADC to remove all excess whitespace from a file?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기