• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
Before launching the Application Publishing Wizard, what must be done to publish a package?

A. The package deployment schedule must be set.
B. The location of the package must be identified.
C. The target servers must be specified.
D. The package must be added to the Presentation Server Console.
Answer: D
Which two Health Monitoring and Recovery tests are enabled by default? (Choose two.)

A. Citrix SMA Service
B. Citrix XML Service
C. Citrix IMA Service
D. Citrix XTE Server Service
Answer: B,C
The administrator who installs the ADF packages on the target servers must have ______ and
______. (Choose the two phrases that complete the sentence correctly.)

A. administrative access to the network share point server
B. read access to the target servers
C. read access to the network share point server
D. administrative access to the target servers
E. read access to the packager server
F. administrative access to the packager server
Answer: C,D
A large medical research company Certpaper.com wants to reduce the high CPU usage on their
servers in order to improve the user experience. Most users work with a web-based tool that is
graphic-intensive. They work with files that need to be accessed from multiple locations and by
multiple users so that researchers can access the files as they make their rounds through clinics.
Citrix 1Y0-259: Practice Exam

What should the administrator implement to meet the company's requirements?

A. Application limits
B. Published desktops
C. Server-to-client content redirection
D. Client-to-server content redirection
Answer: C
The Citrix Administrator at a Certpaper.com plans on deploying a web-based cataloging
application consisting of new items under development. The application includes JPEG images of
product prototypes alongside detailed descriptions.

This application will be accessed by a group of engineers from remote field sites with limited
network bandwidth. This application will only be provided by means of a single set of servers
running Presentation Server that will be deployed within the new server farm. Access to the data
source is controlled so that data queries may originate only from the servers running Presentation
Server. The JPEG images are large files and users require graphical detail even when using dialup,
wireless WAN, or other slow connections.

Which three SpeedScreen Browser Acceleration options should be configured at the server farm
level? (Choose three.)

A. Determine when to compress
B. Enable SpeedScreen Browser Acceleration
C. Compress JPEG images to improve bandwidth and set the compression level to high
D. Compress JPEG images to improve bandwidth and set the compression level to low
E. Use farm settings for SpeedScreen Browser Acceleration
Answer: A,B,D
Certpaper.com recently implemented Citrix Presentation Server. The company plans to use the
shadowing feature to improve their help desk activities. Specifically, the company wants the help
desk personnel to be able to shadow all users in the company's domain and manipulate their work
stations remotely. For security and privacy reasons, the company wants to ensure that users must
accept shadowing before help desk personnel can shadow them. During the Presentation Server
installation, the administrator allowed shadowing but did not configure any settings for remote
control or shadow acceptance. The administrator has just created a policy titled "Shadowing."

Which two steps are required to accomplish this task? (Choose two.)

A. Enable shadowing in a policy and prohibit remote input when being shadowed.
B. Enable shadowing in a policy and prohibit being shadowed without notification.
C. Enable permissions for all help desk users and set status to allow.
D. Enable permissions for all users and set status to allow.
Answer: B,C
Which two statements are true when an administrator associates published applications with file
types and then assigns them to users? (Choose two.)

A. All files of an associated type encountered in locally running applications are opened with
applications running on the server when users run the Program Neighborhood Agent.
B. The client passes the name of the published content file to the local viewer application when
users run the Program Neighborhood Agent.
C. Content published on servers is opened with applications published on servers when users
connect using the Program Neighborhood Agent.
D. The file type associations in the published applications are copied to the registry of the client
device when users connect using the Web Interface.
Answer: A,C
When configuring Virtual Memory Optimization, it is best to configure an optimization time
______________. (Choose the appropriate option to complete the sentence.)

A. when the administrator can manually monitor the process
B. that precedes a scheduled reboot
C. of high or maximum usage
D. of low or no usage
Answer: D
A network administrator at Certpaper.com created a policy for the Human Resources group called
"HR standard" which restricts the users in that group from accessing their local drives. Human Resources has recently added five new recruiters to the team who will travel to universities throughout the country to recruit candidates. While on these trips, the recruiters will need to save data on their laptops and upload information nightly. The administrator creates a new policy for the recruiters called "HR recruitment" and disables the rule which restricts access to the local drives.
Which two steps are required to ensure that the recruiters are able to access their local drives?
(Choose two.)

A. Filter the HR recruitment policy by users, specify the five recruiter accounts and allow access
B. Filter the HR standard policy by users, specify the five recruiter accounts and allow access
C. Rank the HR recruitment policy higher than the HR standard policy
D. Rank the HR standard policy higher than the HR recruitment policy
Answer: A,C
A newly published web-based application calls a Java applet to support audio interaction with other users. The application requires Virtual IP in order to function properly. Users launched the published web browser successfully; however, only the first user on the server could initialize the
audio portion. Other Java-based applications on the same servers functioned correctly. Which option will best address this problem?

A. Remove the servers from the Virtual Loopback list and re-add them to read the new
configuration.
B. Increase the IP range for Virtual IP addresses to allow for the added users.
C. Configure the correct Java runtime path for Virtual IP loopback.
D. Add the entries directly to the registry instead of the Management Console to implement the
new Virtual IP configuration.
Answer: C
A newly published web-based application calls a Java applet to support audio interaction with other users. The application requires Virtual IP in order to function properly. Users launched the
published web browser successfully; however, only the first user on the server could initialize the audio portion. Other Java-based applications on the same servers functioned correctly. Which option will best address this problem?

A. Remove the servers from the Virtual Loopback list and re-add them to read the new
configuration.
B. Increase the IP range for Virtual IP addresses to allow for the added users.
C. Configure the correct Java runtime path for Virtual IP loopback.
D. Add the entries directly to the registry instead of the Management Console to implement the
new Virtual IP configuration.
Answer: C
Which two statements are true regarding associating published applications with application
isolation environments? (Choose two.)

A. Applications can be associated with an application isolation environment during the application
publishing process.
B. Running application discovery allows an administrator to view and associate an application with
an application isolation environment.
C. Applications can be associated with an application isolation environment using the APPUTIL command line utility.
D. After an application is associated with an application isolation environment, it can only be
disassociated by uninstalling the application.
E. When an application is associated with an application isolation environment, it is configured to
start within the isolation environment but can also be accessed outside of the isolation environment.
Answer: A,E
Workspace control allows the administrator to configure which three options? (Choose three.)

A. Automatic reconnection during logon
B. Disconnect specific users that an administrator defines
C. Enable reconnect button after the user logs in
D. Customize the appearance of the user's workspace
E. Log off all or none of the sessions
Answer: A,C,E
A network administrator at Certpaper.com at Certpaper.com enables CPU Optimization for the
entire farm. After installing a CPU-intensive Computer Aided Drawing and Design (CADD)
application, several power users ask how additional CPU may be allocated specifically to them.
Which statement is correct?

A. CPU allocation is defined by network bandwidth.
B. The administrator can configure CPU allocation in the farm properties.
C. The administrator cannot configure CPU allocation.
D. CPU allocation can be configured in the registry.
Answer: D
Accounting users need to be able to access a critical application in order to process payroll
information every Friday. One of the servers in the farm has been experiencing problems lately
and is currently down. Every time this happens, some Accounting users cannot access this
application. Which two steps should an administrator take to ensure that this application remains
accessible to all Accounting users despite the state of this particular server? (Choose two.)

A. Run health monitoring and recovery tests on this server.
B. Use health monitoring tests with the recovery action to shutdown IMA.
C. Use health monitoring tests with the recovery action to remove the server from load balancing.
D. Copy the health check tests used in the server farm to this server.
Answer: A,C
A published application requires an explicit IP address for each of its 200 concurrent clients for
licensing purposes. The administrator decided to achieve this by using Virtual IP addresses. What
should be added to maintain the licensing requirements?

A. The process to the "Virtual Loopback Processes"
B. A set of IP addresses from a different subnet than the Virtual IP addresses
C. A new IP address to the Virtual IP Address Configuration
D. The process executable to the Virtual IP Process monitored list
Answer: D
A network administrator at Certpaper.com is setting up an environment for Presentation Server so
that connection limits in the server farm only allow each user to launch a maximum of two
sessions while simultaneously allowing users in the Technical Support Department the ability to launch five sessions each.

How can the administrator accomplish both goals?

A. Create a policy, set the Overall Session rule to five sessions and assign it to the Technical
Support Department users.
B. Configure all applications used by the Technical Support Department to run on one server and
change the connection limit to five in the properties of that server.
C. Create a policy to limit the total concurrent sessions to five and assign it to the Technical
Support Department users. Change the connection limit to two in the properties of the server farm.
D. Set the connection limits for all users and the Technical Support Department users in the properties of the server farm.
Answer: C
Which three steps are required to deploy clients using Microsoft Active Directory? (Choose three.)

A. Browse to the installation files on the network share and assign them to the Organizational Unit which includes the client devices.
B. Create a new package in the Software Installation object for an Active Directory group policy object.
C. Create a network share.
D. Add users to an Organizational Unit designated for Presentation Server environment.
E. Configure a policy in Presentation Server for Client deployment.
Answer: A,B,C
A network administrator at Certpaper.com wants to create and deploy a client package that includes the Web Client using the Client Packager.

The administrator wants:
To be able to make modifications to the file
The client name to be different from the computer name
Users to specify a username and password to log on to a session Clients to be deployed from a web page using Web Interface

Based on these requirements, which two steps must be completed when creating and deploying
the client package? (Choose two.)

A. Accept the default value for the client name option.
B. Select the manage client deployment task.
C. Enable users to choose how their applications are launched.
D. Create a network share.
E. Select UNCOMPRESSED in the "Create a Windows Installer" option.
F. Select use of Kerberos Authentication in combination with Security Support Provider Interface.
Answer: B,E
At headquarters, where Presentation Server is implemented, there are five printers installed and
configured by IT staff. In remote offices, users are required to install and manage local printers on
their own. Which option should be enabled to ensure that remote users can print from published applications to the five printers and to their local printers?

A. Auto-install the universal printer driver.
B. Auto-install native printer drivers.
C. Use only printer model-specific drivers.
D. Use the universal printer driver only if the requested driver is unavailable.
Answer: D
A Citrix Administrator needs to enable the synchronization of PDA devices for users on the local
area network (LAN). Local users will connect from the LAN to Web Interface. In which two ways
can the administrator accomplish these tasks? (Choose two.)

A. Create a policy and enable the rule "Turn on automatic virtual COM port mapping" in the Presentation Server Console.
B. Enable the automatic sharing of PDA devices in the Access Management Console.
C. Create an Access Platform site, select the "Manage client connection settings," and enable
PDA settings in the Access Management Console.
D. Add the Device Manager snap-in and configure PDA synchronization in the Microsoft Management Console.
Answer: A,C
The administrator created a policy for the Human Resources group named "HR standard" which
restricts the users in that group from accessing their local drives. Human Resources has recently
added five new recruiters to the team who will travel to universities throughout the country to recruit candidates. While on these trips the recruiters will need to save data on their laptops and upload information nightly. The administrator creates a new policy for the recruiters called "HR recruitment" and disables the rule which restricts access to the local drives. How can the administrator ensure that the exception to the policy is applied appropriately?

A. Select "Exception to" and "HR standard policy" when creating the HR recruitment policy.
B. Rank the HR recruitment policy higher than the HR standard policy.
C. Select "Exception to" and "HR recruitment policy" when creating the HR standard policy.
D. Rank the HR standard policy higher than the HR recruitment policy.
Answer: B
What are three available application types when configuring an Access Platform site? (Choose
three.)

A. Dual Mode Streaming
B. Remote
C. Mixed Mode
D. Streaming
E. Silo
Answer: A,B,D
Certpaper.com has a farm consisting of servers running Presentation Server in three geographical data centers: Hong Kong, London and New York. New York users require a web-based cataloging
application that contains a large number of JPEG photos of the various hardware items that are sold only in the Americas.

Unlike users in the other regions, most employees in the Americas are remote sales and service people, and there are no minimum connection requirements. Some users access the environment
through wireless WANs and dial-up connections. The administrator decides that graphical detail is not a priority as long as the screen display appears quickly even when a slow connection is detected for the New York data center. The administrator also decides to optimize the SpeedScreen Browser Acceleration capability for the ten servers in the New York zone.

Which three SpeedScreen Browser Acceleration options should be selected within the server properties of each of these ten servers? (Choose three.)

A. Compress JPEG images to improve bandwidth and set the compression level to low
B. Determine when to compress
C. Use farm settings for SpeedScreen Browser Acceleration
D. Enable SpeedScreen Browser Acceleration
E. Compress JPEG images to improve bandwidth and set the compression level to high
Answer: B,D,E
Which two cipher suites are supported with Citrix SSL Relay? (Choose two.)

A. COM
B. ORG
C. GOV
D. NET
Answer: A,C
An environment consists of all expert-level computer users. Therefore, the administrator feels comfortable allowing users to access resources through an interface from their desktops, which they can use to configure options. Navigating through the interface should be easy, as users will be expected to not only be able to do this but also understand the implications of any changes
they make. Which client is most appropriate for this environment?

A. Access Gateway
B. Program Neighborhood
C. Program Neighborhood Agent
D. Client for Web
Answer: B
A network administrator at Certpaper.com wants to provide users with access to resources offered
by trusted partners across the Internet. The administrator wants to create Web Interface sites so
that users can have single sign-on access to published applications in the trusted partner's
domain. When creating the Web Interface sites, the administrator should configure them to use
____________ to meet the requirements of this scenario. (Choose the correct option to complete the sentence.)

A. Advanced Access Control
B. multiple methods of authentication
C. built-in authentication
D. Active Directory Federation Services
Answer: D
A network administrator at Certpaper.com wants to create and deploy a client package that includes Program Neighborhood using the Client Packager.

The administrator wants to:
Ensure that duplicate client names do not exist
Ensure that users can connect directly to servers without completing the ICA Connection Wizard
Use a newer client version
Deploy the client package to a network share point that users can access

Which two steps are required when creating and deploying a client package using the Client
Packager? (Choose two.)

A. Select Use Kerberos Only in the username and password option.
B. Choose the default setting in the client upgrade options.
C. Select Enable Quick Launch bar.
D. Deselect "let user specify a client name" in the client name options.
E. Assign the client package to users in an organizational unit.
F. Select the dialog boxes and options you want your users to see when they install the client
software.
Answer: C,D
How can an administrator reduce the number of print drivers that are manually installed in an environment?

A. Enable the native driver auto-install function.
B. Implement universal printing.
C. Implement a print server.
D. Use a trusted driver install path.
Answer: B
Which two steps are required when using Active Directory to deploy client packages to Windows 2000 Professional clients? (Choose two.)

A. Assign the package to a computer or to a group of computers.
B. Assign the package to a user or group of users.
C. Restart the client machine to allow the Active Directory Group Policy to automatically install the client.
D. Go to a command line on the client device and type GPUPDATE /FORCE.
Answer: A,C
Where is Load Throttling configured?

A. Farm properties
B. Load evaluator properties
C. Server properties
D. Load evaluator policy properties
Answer: B
A network administrator at Certpaper.com is installing Presentation Server 4.5. The company
requires the use of the Program Neighborhood Agent as the pass-through client and that users
should be explicitly prompted for authentication to Citrix Presentation Server. Which two steps
must the administrator take during the installation to meet the company's requirements? (Choose two.)

A. Specify the URLs of the web server running the Program Neighborhood Agent Services Site.
B. Select "yes" for pass-through authentication for the pass-through client.
C. Replace the default Client with the Program Neighborhood Agent as the pass-through client.
D. Select "no" for pass-through authentication for the pass-through client.
Answer: A,D
Administrators currently have the Health Monitoring and Recovery test relating to logons enabled
to alert them in the event of a failure. Server "CPS14" has alerted them many times today, and
they are aware of the problem but do not have time to remedy this issue until tomorrow. Which
configuration change should the administrative staff make?

A. Set the server farm properties to reboot the server if the Logon test fails.
B. Set the server farm properties to remove the server from load balancing if the test fails.
C. Set the server properties to reboot the server if the Logon test fails.
D. Set the server properties to remove the server from load balancing if the test fails.
Answer: D
Certpaper.com is creating a pilot environment which includes a Presentation Server
implementation with one farm with two zones. One zone will contain the servers to be used for
disaster recovery. The company would like to configure an automatic failover mechanism so that
the servers in the disaster recovery zone will be automatically accessed if the servers in the other
zone are unavailable. Which tasks must an administrator perform to configure the automatic
failover mechanism for this scenario?

A. Configure the Zone Preference and Failover rule in the farm settings, setting the disaster
recovery zone as primary and the production zone as backup. Assign the setting to all users.
B. Configure the Zone Preference and Failover rule in a policy, setting the disaster recovery zone
as primary and the production zone as backup. Assign the policy to all servers.
C. Configure the Zone Preference and Failover rule in a policy, setting the production zone as
primary and the disaster recovery zone as backup. Assign the policy to all users.
D. Configure the Zone Preference and Failover rule in the farm settings, setting the production
zone as primary and the disaster recovery zone as backup. Assign the setting to all servers.
Answer: C
A network administrator at Certpaper.com plans to enable workspace control within
Certpaper.com. The security manager agreed to the implementation so long as a user session
cannot be transferred from one device to another without the user taking some proactive action.
What should the administrator do to comply with the security manager?

A. Allow users to customize workspace control.
B. Implement workspace control for all sessions.
C. Enable the "Prompt user" setting for workspace control.
D. Implement workspace control for disconnected sessions only.
Answer: D
Which two Health Monitoring and Recovery tests are enabled by default? (Choose two.)
A. Citrix SMA Service
Citrix 1Y0-259: Practice Exam
B. Citrix XML Service
C. Citrix IMA Service
D. Citrix XTE Server Service
Answer: B,C
Remote users in Phoenix running Windows XP, share printers on a print server, \\phxprnsrv. When
they connect to the farm through a latent WAN connection, users complain of poor application
performance while printing. When the administrator logs in from a client device in the Phoenix
office, phxclient1, printer configurations display as in the attached exhibit. How can the
administrator resolve this printing problem?

A. Enable the Legacy client printers rule in the Citrix policy.
B. Import thePhoenix print server in the remote office and assign printers to users through Citrix policies.
C. Create a policy for print job routing to "Always connect indirectly as a client printer" and apply the policy to the users in the remote office.
D. Create a policy for print job routing to "Connect directly to network print server" and apply the policy to the users in the remote office.
Answer: C
Which benefit is the result of enabling Memory Optimization?

A. Memory is dynamically reallocated based on specific user need.
B. The administrator controls the maximum amount of memory per user.
C. Each server can more efficiently initiate applications.
D. Memory is allocated to each user proportionately.
Answer: C
A network administrator at Certpaper.com is configuring printing for a new call center. All the
printers in the call center are connected to a network so that they can be accessed as shared
resources. The administrator wants to configure a policy so that print jobs go directly from the
server running Presentation Server to the print server. Which two policy rules should the administrator configure in order to meet the requirements for the call center printing policy? (Choose two.)

A. Print job routing
B. Universal driver
C. Legacy client printers
D. Session printers
Answer: A,D
An environment requires:

Web Interface
A client with no user interface
Users access published resources from a familiar environment
The ability to centrally administer and configure the client in the Access Management Console

Based on these requirements, which two clients will be most appropriate for the administrator to use? (Choose two.)

A. Secure Access Client
B. Program Neighborhood Client
C. Program Neighborhood Agent Client
D. Web Client
Answer: C,D