- Shuffle Toggle OnToggle Off
- Alphabetize Toggle OnToggle Off
- Front First Toggle OnToggle Off
- Both Sides Toggle OnToggle Off
How to study your flashcards.
Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key
Up/Down arrow keys: Flip the card between the front and back.down keyup key
H key: Show hint (3rd side).h key
54 Cards in this Set
Scenario: Nether Tech Inc. administrators have provided their on-site engineer a formal change
request for the addition of SmartAuditor to the current rollout plan. The Nether Tech Inc.
administrators want to leverage SmartAuditor to improve technical support, specifically to resolve
end-user problems faster.
How should the engineer approach this change request according to best practices?
Place the following in the correct order:
1. Conduct a full system test and scalability testing.
2. Pilot the change request implementation.
3. Document the technical details of the change request.
4. Rollout into production.
5. Implement the change in a test environment.
Which three items are risks that a Citrix Enterprise Engineer should be aware of during the
implementation phase of a XenApp project? (Choose three.)
A. Improper load evaluator configuration
B. Inconsistent server naming convention
C. Improper terminal server profile design
D. Inconsistent user account naming convention
E. Mixed brands of user devices running XenApp Plugin
F. Inconsistent set of printer drivers across the environment
Scenario: After gathering basic requirements from Nether Tech Inc. administrators and IT
personnel, an engineer must decide whether a virtual or physical implementation is best suited for
the environment. Several key requirements are listed below. Peak time is gam; approximately
4,000-4,500 logon attempts will be made then. Most users will have the same core applications
such as Microsoft Office and Adobe Reader. Some custom applications need to be updated
quarterly. Remote users and traveling field agents will need secure remote access to the
environment. Several applications in the environment CANNOT co-exist together. Some
applications will NOT run on an application server. Based on these requirements, which kind of
implementation should the engineer recommend?
A. A virtualized implementation that leveragesXenDesktop Platinum
B. A physical server farm that leverages XenApp on physical servers
C. A physical server farm that leverages XenApp and Provisioning Services
D. A virtualized server implementation that leverages XenServer and XenApp
Scenario: The new design document for Nether Tech Inc.'s environment calls for the inclusion of
several new Citrix products in addition to XenApp. XenServer will be implemented as the
virtualization platform. Provisioning Services will be used to rapidly provision desktop and server
images. XenOesktop will be used to publish and manage client desktops. Nether Tech Inc.'s
existing environment consists of a DHCP server, a DNS server, a domain controller, several
managed switches with spanning tree protocol and several routers. Which modification should the
Citrix Engineer recommend from a networking standpoint in order for all of the new Citrix products
to be highly optimized?
A. Enable task offload on the virtual machine.
B. Place each Citrix component in its own subnet.
C. Configure the DHCP server to use ports 60 and 67.
D. Enable the spanning tree fast link (PortFast) option on all Provisioning Services switch ports.
Scenario: The new design document for Nether Tech Inc. requires that the Citrix Engineer perform
1. Upgrade from Presentation Server 4.0 to XenApp 5.0 for Windows Server 2008.
2. Integrate the XenApp 5.0 environment with the existing XenDesktop solution, which includes
The engineer has successfully completed the upgrade to XenApp 5.0 for Windows Server 2008
and must now implement the second stage of the design by integrating the XenApp 5.0 farm into
the XenDesktop environment so that published applications can be accessed from within the
XenDesktop virtual desktops. The engineer has just created a XenApp Services Web Interface site
that enumerates applications from the XenApp 5.0 farm.
Which additional steps must the engineer take to integrate the existing XenApp 5.0 farm into the
Place the following in the right order:
1. Install and configure XenApp Plugin for Hosted Applications and XenApp Plugin fro Streamed Application on the target device.
2 Place the new vDisk in Standard Access Mode.
3. Reboot all virtual desktops so they receive the updated vDisk.
4. Assign a copy of the vDisk to a target device, set the image mode of the vDisk to Private Access Mode and boo the target device.
5. Create a cop of the existing vDisk used by virtual desktop in Provision Services.
6. Assign the new vDisk to all virtual desktops.
7 Build image an then shut down the target device.
Scenario: The engineer at Nether Tech Inc. is assigned an implementation of Provisioning
Services for delivery of images to its XenApp servers and XenDesktop workstations. The architect
has created the design for the Provisioning Services environment and took the following design
decisions: One Provisioning Services farm will be created: PVSFARM. Two Provisioning Services
servers will be configured with HA: PVS01 and PVS02. One site will be configured: Nether Tech
Inc. Two device collections will be configured: one for XenApp servers and one for XenDesktop
devices. A central store will be defined and located on the SAN and all vDisks will be added to this
store. Online and offline applications will be used to minimize changes to the vDisk. A specified
user account will be used for Provisioning Services service account. The TFTP service will be
installed on PVS01. DHCP will be configured with options 66 and 67 to point to PVS01. An Active
Directory group policy object will be configured and linked to the XenApp and XenDesktop
organizations units to disable Active Directory Machine Account Password Management. What will
be a risk for the new environment based on the design decisions from the architect?
A. There is only one store configured for both XenApp and XenDesktop.
B. TFTP via DHCP is being used and TFTP is only installed on PVS01.
C. The PXE service is NOT being used to provide boot information to target devices.
D. The target devices for XenApp and XenDesktop are in separate device collections.
Which two statements highlight risks that a Citrix Engineer should investigate and potentially
resolve when implementing a XenApp environment? (Choose two.)
A. A custom load evaluator is being used with several application silos.
B. A separate zone within the production farm is being used for testing.
C. XML traffic from the Web Interface to the XML Brokers is being encrypted.
D. A Citrix policy exists that effectively disables users from installing drivers over ICA sessions in
E. Users in the Nether Tech Inc. environment have the ability to install printer drivers on the
XenApp servers through their ICA sessions.
Scenario: Nether Tech Inc. is planning to implement Provisioning Services for deployment of
images to their XenApp servers and XenDesktop workstations. The architect has created the
design for the Provisioning Services environment, making the following design decisions for the
Provisioning Services environment: One Provisioning Services farm will be created: PVSFARM.
Two Provisioning Services servers will be installed and configured for High Availability: PVS01 and
PVS02. One site will be created: Nether Tech Inc. Two Device Collections will be configured:
XenApp and XenDesktop. A central store will be defined and located on the SAN; all vDisks will be
added to this store. The local hard drive of the XenApp servers will be used to store the write
cache. TCP Large Send Offload will be enabled on the NICs. A specified user account will be used
as Provisioning Services service account. Each Provisioning Services server will have four NICs;
two teamed and connected with the "General use subnet" (per the design document) and the other
two NICs, disabled. An Active Directory group policy object (GPO) will be configured and linked to
the XenApp and XenDesktop organizational units to disable Active Directory Machine Account
Password Management. Online and offline applications will be used to minimize changes to the
vDisk. Offline applications will be pre-deployed to desktops and XenApp servers for faster access
to the applications by users. According to the design decisions from the architect, which decision
does NOT follow best practices?
A. One site will be created.
B. TCP Large Send Offload will be enabled on the NICs.
C. The local hard drive of the XenApp servers is used to store the write cache.
D. Online and offline applications will be used to minimize changes to the vDisk.
E. Offline applications will be pre-deployed to desktops and XenApp servers for faster access to
the application by users.
Scenario: A Citrix Enterprise engineer is tasked with deploying XenDesktop pooled desktops for
an insurance company with 10 remote users using Provisioning Services. The design document
requires write cache to use RAM for better performance. The engineer determines that the target
device does NOT have enough memory to support the write cache, but there is NO option to add
more RAM. The engineer's recommendation should be to change Provisioning Services vDisk .
(Choose the correct phrase to complete the sentence.)
A. access mode to Private Image
B. access mode to Difference Disk Image
C. cache type to Cache on device HD in Private Image Access Mode
D. cache type to Cache on device HD in Standard Image Access Mode
Scenario: A Citrix Engineer implementing the new virtualization design for Nether Tech Inc. must
configure XenApp for dynamic delivery by using Provisioning Services. Provisioning Services
already exists in the environment; however, due to company policies, neither using DHCP nor
modifying the DHCP scope options to include options 66 and 67 or using PXE are possible. Which
configuration method should the engineer recommend in order for the virtual XenApp servers to
boot from their assigned vDisk?
A. TFTP Service
B. Boot from SAN
C. Boot Device Manager (BDM)
D. Static IP Address Assignment
Scenario: Nether Tech Inc. is installing a pair of Provisioning Services servers to host vDisks for
their XenDesktop and XenApp virtual machines. The architects have called for virtual machines to
get their IP configuration information and the location of the boot file using DHCP. The Symantec
Ghost server will be added after Provisioning Services has been set up. Analyze the network
topology below and identify the potential issue in the Design Document. Click the Task button to
select the issue in the network topology. Click Exhibit button for instructions on how to complete a
Managed Switch with spanning tree protocol disabled
Scenario: Several IT administrators, engineers, and managers are participating in the first round of
testing based on a segregated environment. The IT department hopes this testing will give them
early insight into these users' experiences, as well as resource requirements. Which two types of
testing fit this description? (Choose two.)
A. User Acceptance
B. System Acceptance
C. Operational Acceptance
D. Implementation and Backout Acrual Tests.com
Scenario: During the initial assessment of Nether Tech Inc.'s environment, the Citrix Engineer
assisting the Citrix Architect was denied access to the storage environment due to contract issues
under review. However, the resident storage engineer provided the Citrix Engineer with
information on the features that the existing remote storage system supports. The existing remote
storage supports: Storing virtual machines Automating virtual machine placement Resizing disks
Thin provisioning Which type of remote storage possesses these types of capabilities?
C. Fibre Channel
D. iSCSI Hardware
Scenario: According to the design document, Nether Tech Inc. has requested that the new
XenDesktop implementation provide virtual desktops to approximately 2000 concurrent users. At
the moment, there is only one Desktop Delivery Controller in the environment, which is a virtual
machine, and it is serving 100 pilot users.
The single Desktop Delivery Controller is also hosting the Web Interface. With the increase in the
number of desktops that Nether Tech Inc. intends to deliver, logon loads, Controller services and
Pool management service are expected to increase. All the connection requests from end-users
will still go through the single farm master. As the Citrix Engineer in charge of the XenDesktop
implementation in this environment, which two changes would you make in order to fine tune the
environment to ensure optimal performance? (Choose two.)
A. Add additional farm masters to the environment to load balance the load.
B. Add additional zone masters to the environment to load balance the load.
C. Remove Web Interface and the IIS roles from the Desktop Delivery Controller farm master.
D. Dynamically provision Desktop Delivery Controllers during peak hours to handle the extra load.
E. Add additional Desktop Delivery Controllers to the environment to take over the Data Collector
and Controller roles.
Which three things should a Citrix Engineer consider in the Nether Tech Inc. environment when
assessing preparedness for an application virtualization implementation? (Choose three.)
A. Memory utilization
B. Number of servers
C. Citrix Profiler Version 1.3.1
D. Network and disk resources
E. Average and peak utilization of CPU
Scenario: The new design document for Nether Tech Inc. requires the migration of Secure
Gateway to Access Gateway. The design document also recommends the placement of both Web
Interface servers in the internal network with the Access Gateway in the DMZ. The engineer
leading the project wants to take a look at the various options available for the placement of the
Web Interface servers before completing the implementation. Which two additional
recommendations could the engineer make for the placement of the Web Interface servers in the
Nether Tech Inc. environment according to best practices? (Choose two.)
A. Place both Web Interface servers behind the Access Gateway in the DMZ.
B. Place both Web Interface servers parallel to the Access Gateway in the DMZ.
C. Place one Web Interface server in front of the Access Gateway and the other behind the
Access Gateway in the DMZ.
D. Place one Web Interface server parallel to the Access Gateway and the other in the internal
network in a double-hop DMZ deployment.
Scenario: A Citrix Engineer has been instructed to convert a physical Windows web server to an
open virtualization format because the web server will be virtualized on XenServer and VMware
ESX. Based on the performance of the server and the number of workloads the server is expected
to support, a decision will be made with regards to which virtualization technology will be used.
What are two options that must be configured in the attached screenshot when converting a
physical machine to an open virtualization format? (Choose two.)
B. Sign with Certificate
C. Create Open Virtual Appliance
D. Compress Open Virtual Appliance
E. Folder to store Open Virtualization Format Package
Scenario: The engineer at Nether Tech Inc. is in the process of implementing a new manufacturing
application called Bottled Pro. The new application has certain requirements that prevent delivery
in the existing XenApp environment. XenDesktop was implemented in order to provide the
application to the users of the Manufacturing department. The new application will be installed as
part of the vDisk that will be provisioned to the Manufacturing department users. In addition to the
new application, users from the Manufacturing department must have access to a set of
applications that will be delivered as streamed applications from the existing XenApp farm. The
engineer's task is to create the Windows XP vDisk that will be provided by Provisioning Services
to serve all 50 virtual desktops. The engineer needs to decide which Citrix software needs to be
installed on the master target device before building the vDisk so users can access their required
applications. Users will only be permitted to access XenApp environments from the Manufacturing
department virtual desktops, so this should be taken into consideration. The engineer should also
follow Citrix best practice for installing only the required software to satisfy the application delivery
requirements. Which four software programs are appropriate for installation? (Choose four.)
A. Streaming Profiler 5.1
B. Desktop Reciever 11.1
C. Virtual Desktop Agent 3.1
D. XenAppPrep Integration Utility
E. Provisioning Services target device
F. XenApp Plugin for Hosted Apps 11.0
G. XenApp Plugin for Streamed Apps 5.1
Which two options exist for creating the Organizational Unit for the desktop delivery controllers
(DOCs)? (Choose two.)
A. Use the XenDesktop SDK.
B. Run the XenDesktop Setup Wizard.
C. Run the Active Directory Configuration Wizard after installation.
D. Use Active Directory to manually create the service connection point.
Scenario: Nether Tech Inc. managers all have company-issued laptops that are used for local and
remote access while traveling. In the current environment applications are installed on each
laptop. Currently, the IT staff maintains these laptops. Which type of user profile will best support
this model and require the lowest amount of administration?
D. Citrix Profile Management
A Citrix Engineer should select XenServer in the 'To' field on the XenConvert welcome screen
when she needs to convert a________. (Choose the correct option to complete the sentence.)
A. single volume of a physical disk toXenServer
B. single volume on a physical disk to a bootable XVA XenServer virtual machine
C. single volume on a physical disk to a XenServer template for import into XenCenter
D. physical machine to an open virtualization format Package that can be imported into XenServer
Scenario: An engineer must convert a single volume of a physical disk on a physical machine to a
virtualized instance in Citrix Xen Virtual Appliance format. The XenConvert 2.01 tool has been
downloaded and the engineer has chosen to utilize the Tool's command line interface to perform
the required conversions. The following is information about the current environment: Workload
Name: Server 2003 Physical Volume: C:
Destination Folder: N:misc Hostname: XenVA Username: root Password: Password 123 Which
command must the administrator run in order to complete the required conversion?
A. XenConvertCli P2Xva Server 2003 C:N:misc IE
B. XenConvertCli P2Vhd Server2003 C:N:-misc XenVA
C. XenCovertCli P2XenServ Server 2003 N:misc root Password123IE
D. XenConvertCli P2XenServer Server2003 C:N:miscXenVA root Password123IE
The information in the table in the attached exhibit was gathered from XenCenter to monitor
XenServer resource consumption. Based on the information in the table, which two methods could
an engineer use to resolve a potential bottleneck? (Choose two.)
Click the Exhibit button to view the table.
A. Using XenMotion, move a virtual machine from XSXen03 to XSXen02 to free up memory on
B. Using XenMotion, move a virtual machine from XSXen01 to XSXen02 to free up memory on
C. Using XenMotion, move a virtual machine from XSXen03 to XSXen02 to free up CPU cycles on
D. Using XenMotion, move a virtual machine from XSXen03 to XSXen04 to free up CPU cycles on
E. Using XenMotion, move a virtual machine from XSXen04 to XSXen02 to free up CPU cycles on
Which action must a Citrix Engineer make to use a Private Root Certificate with the Client for Java
Version 9.x when securing connections to XenApp resources?
A. Enable Secure ICA
B. Install the Java client on each client device
C. Turn on the EnableLegacySupport parameter
D. Install the root certificate on the firewall, if one exists
E. Import the root certificate into the Java keystore on each client device
Scenario: Nether Tech Inc.'s Research and Development team wishes to upgrade the security
around its research information. The Citrix Architect recommends the implementation of smart
card technology at Nether Tech Inc.'s research and development facility in order to implement twofactor
authentication. Which two types of smart cards are compatible with XenDesktop? (Choose
A. Contact Smart Card
B. Proximity Smart Card
C. Common Access Card
D. USB Smart Card Token
Scenario: Nether Tech Inc. needs to meet the highest security standards to satisfy regulatory
Secured connections between published desktop and endpoints, as well as published applications
and the Web Interface need to be implemented. The Citrix Engineer needs to implement the
XenOesktop, XenApp and the Web Interface infrastructures in Nether Tech Inc.'s environment.
What are four XenDesktop best practices that should be considered? (Choose four.)
A. Protect all computers with personal firewalls.
B. Set up SSL access for the Web Interface site.
C. Protect all computers with perimeter firewalls, including those at enclave boundaries as
D. Ensure the perimeter firewalls are NOT repositioned when the conventional environment is
migrated to XenOesktop.
E. Ensure secure communication between endpoint devices and desktops by using the Citrix ICA
client and setting the encryption level to basic.
F. Ensure secure communication between endpoint devices and desktops by using the Citrix ICA
client and setting the encryption level to 128bit.
Scenario: A Citrix Engineer is considering making a change to the design document in order to
allow the alternate address of the XenApp server to be given to a particular set of client devices
when users attempt to access published applications. What are three settings that the Citrix
Engineer must configure in order to use the alternate address of the XenApp servers for the
particular set of client devices? (Choose three.)
A. Enable the spanning tree protocol.
B. Configure port forwarding on the managed switches.
C. Configure the firewall for network address translation.
D. Configure the XenApp Servers with an alternate address.
E. Specify the MAC address of the client devices that should receive the alternate address.
F. Specify the IP Address and Subnet Mask for each of the client devices that the users will
When completed, Nether Tech Inc.'s environment will consist of XenDesktop and XenApp
resources. The engineer has configured alternate address translation on the XenApp servers and
the Web Interface to use alternate address access method. What will happen if the Citrix Engineer
configures alternate address translation when securing the traffic between the Web Interface and
the client devices?
A. The Java client will fail.
B. Users will NOT be able to access XenApp streamed applications.
C. External users will NOT be able to access XenDesktop virtual desktops.
D. The XML transport will have to be changed to SSL Relay in order to access the desktops.
E. Internal users will have to connect through the XenApp servers using the alternate address.
Scenario: The new design document for Nether Tech Inc.'s environment requires the creation of a
new desktop group with an HTTPS address type for the XenServer pool master logon page. In
order to secure communication between the Desktop Delivery Controller and XenServer, the
design document recommends the engineer replace the default SSL certificate installed with
XenServer with one from a trusted certificate authority. The name of the XenServer host is XS01. Which two commands must the engineer use to
generate a certificate request on the XenServer host using the XenServer console? (Choose two.)
A. Opensslgenrsa -out XS01.private 2048
B. Opensslgeneratereqsa -out XS01.private 2048
C. Opensslreq -new -outform PEM -out XS01.request -keyform PEM -key XS01.private -days 365
D. Openssl request -new -outform PEM -out XS01.request -keyform PEM -key XS01.public -
What should the Citrix Engineer enable when configuring server communication between the Web
Interface and XenApp or XenDesktop in order to allow smart card logon?
B. URL redirect
C. IMA Encryption
D. Two-factor authentication
The Citrix Architect should recommend the implementation of a shared storage infrastructure if
_____and_____ are required. (Choose the two correct options to complete the sentence.)
B. disk resizing
C. centralized storage
D. virtual machine storage
Which storage type should be used if thin provisioning is required from the XenServer?
A. NFS based
B. Fibre Channel
C. iSCSI software
D. iSCSI hardware
Scenario: During the initial stage of the design phase, Nether Tech Inc.'s management team did
the use of remote storage in their environment; however, after attending a recent demonstration
for XenServer, Nether Tech Inc.'s management team is interested in implementing shared remote
storage, specifically an implementation that will allow for fast-cloning and thin-provisioning. Which
three remote storage types will meet the needs of this environment? (Choose three.)
B. NFS based
C. Fibre Channel
D. iSCSI software
E. iSCSI hardware
F. Dell EqualLogic
Scenario: Nether Tech Inc. administrators have requested the ability to fast-clone and thin-clone
existing virtual machines when necessary in the XenServer implementation. However, there is a
limited amount of local storage available on the physical hosts; these hosts do NOT have access
to shared storage. In addition, Nether Tech Inc. administrators plan to have several resource pools
in the XenServer farm. How should the engineer configure storage in the XenServer environment
in order for Nether Tech Inc. administrators to manage storage for their applications as requested?
A. Configure iSCSI SR for each host
B. Utilize storagelink for Windows NFS services.
C. Create a local storage repository (SR) for each host.
D. Create NFS-shared storage for each resource pool in the farm.
Scenario: Nether Tech Inc.'s IT team is going to deploy Provisioning Services to provision a
Windows 2008 server with two processors and 1 GB RAM running scheduled tasks. The server
needs to be available at all times with the exceptions of performing updates to the operating
system. Nether Tech Inc. has five XenServer pools in which this machine can be installed.
Resource Pools names and remote storage type:
XSPooI01 - NFS shared storage
XSPooI02 - iSCSI with multipathing enabled shared storage
XSPooI03 - NFS and iSCSI with multipathing enabled to shared storage
XSPooI04 - NFS and Single port Fiber channel connection
XSPooI05 - NFS and iSCSI without multipathing enabled to shared storage XenServers and
Resource Pool membership:
CTXXS01 - XSPooI01
CTXXS02 - XSPooI01
CTXXS11 - XSPooI02
CTXXS12 - XSPooI02
CTXXS21 - XSPooI03
CTXXS22 - XSPooI03
CTXXS31 - XSPooI04
CTXXS32 - XSPooI04
CTXXS41 - XSPooI05
CTXXS42 - XSPooI05
As part of their XenServer implementation, Nether Tech Inc. administrators wish to have the ability
to create new virtual machines using a common base VHD file and to write changes to a
differencing drive. Which two storage technologies should the Citrix Engineer implement to meet
these requirements? (Choose two.)
A. NFS based
B. Fibre Channel
C. iSCSI software
D. iSCSI hardware
E. Local storage repository
While reviewing the design document for Nether Tech Inc.'s XenServer implementation, the Citrix
Engineer noticed that the Citrix Architect recommended two key features for implementation: multipathing
and disaster recovery. What are two reasons why shared storage will be required to meet
the needs of this environment? (Choose two.)
A. Multi-pathing ensures that specific virtual machines have the appropriate amount of bandwidth
through the use of assigned NICs.
B. Multi-pathing allows for multiple paths to the storage, which improves performance and
safeguards against switch and card failures.
C. High Availability automatically restarts a running virtual machine from a failing XenServer host
to another running XenServer host in order to ensure continuity.
D. Disaster recovery applies snapshots and fast-cloning technologies to the process of initial virtual machine placement and real-time movement of virtual machines.
Scenario: Nether Tech Inc. plans to move forward with provisioning XenApp servers using
Provisioning Services. In addition, Nether Tech Inc. also plans on virtualizing th Provisioning
Services target devices using XenServer. Engineers must consider several important criteria. The
environment will need to include XenMotion in the future and maintain fast response times while
XenApp maintains live, interactive user sessions. Any noticeable degradation of performance for
the end-user is unacceptable. All virtual machine hard disks will be stored on a robust SAN
platform. According to best practice, where should the engineer place the write cache?
A. On the RAM of the target device
B. On the local storage of the target device
C. On the local Provisioning Services hard drive
D. On a shared storage device attached to the Provisioning Services
Scenario: Nether Tech Inc. has positioned or implemented several new virtualized servers on
XenServer and has a mandate to retain historical statistics as well as real-time statistics of the
XenServer hosts. All virtualized servers are XenApp 5.0 servers. There are several applications
with large memory footprints that crash frequently. What is the best solution to monitor the
C. SMTP Monitoring
D. XenServer Essentials
Scenario: A Citrix Engineer implementing the XenApp infrastructure in the Nether Tech Inc.
environment is currently training the resident administrator on the necessary steps to monitor the
environment. The Health Monitoring & Recovery feature will be used to monitor XenApp. Which
three services could the engineer monitor using the Health Monitoring & Recovery tests provided
by Citrix? (Choose three.)
A. Citrix XTE Server
B. Terminal Services
C. Citrix XML Service
D. Citrix MFCOM Service
E. Citrix Streaming Service
F. Citrix Independent Management Architecture Service
Scenario: Nether Tech Inc. has just deployed two XenServer 5.0 servers into a resource pool.
Nether Tech Inc. is already hosting four Citrix XenApp servers in this pool. Citrix just released an
update to XenServer. To create a test environment for this update, the Nether Tech Inc. IT
Engineers have installed the update on a stand-alone XenServer which was just purchased and
that has identical hardware. Currently all virtual machines can be migrated from one server to the
other using XenMotion without depleting system resources. All the XenServers have the same
version of licensing installed. Information:
Resource Pool Name: XSPool01
XenServer Names and Resource Pool membership:
CTXXS01 - XSPool01, pool master
CTXXS02 - XSPool01, pool slave
CTXXS03 - Stand-alone
Which steps must the engineer at Nether Tech Inc. take to update the resource pool without
interrupting any workloads that are currently running?
Put in order:
1. Update CTXXS02 utilizing the update wizard with the new update and reboot.
2. Update CTXXS01 utilizing the update wizard with the new update and reboot.
3. Migrate all virtual machines from CTXXS01 to CTXXS02
4. Re-enable High Availability.
5. Disable High Availability on the XSPOOL01 pool.
Scenario: The Engineer implementing the new design for Nether Tech Inc. must create a new
virtual machine and decides to use an existing exported virtual machine to do so. According to the
specifications in the design document, the Engineer must ensure the MAC address on one of the
virtual network interfaces associated with the exported virtual machine remains unchanged. The
following is a list of environment specifications:
Password: Pass 123
Pathname of the export file: XENSETUP.XVA
VM name: xensetup uuid_of_Uarget_sr: c58dd3ca-1cd7-c933-95a9-32ba1864bc7a
MAC Address: 2a:8b:b4:bb:da:54
Which command must the administrator use to import the existing exported virtual machine and
meet the requirements of the scenario?
A. xevm-import vm= filename= xensetup.xva preserve=true
B. xevm-import vm= filename= xensetup.xva preserve=2a.8b.b4.bb.da.54
C. xevm-import filename= xensetup.xvasr-uuid= preserve=2a.8b.b4.bb.da.54
D. xevm-import filename=xensetup.xva preserve=true sr-uuid=c58dd3ca-1cd7-c933-95a9-32ba1864bc7a
Scenario: Nether Tech Inc. has several new virtualized servers and has a mandate to retain
historical data on CPU, memory and disk usage of these virtual servers. All of these servers are
XenApp 5.0 servers. Which two options are the best solutions to fit this need? (Choose two.)
C. HP OpenView
D. XenServer Essentials
The Citrix Engineer implementing the design of the new Nether Tech Inc. environment must
configure management protocol for monitoring the following:
-Hard drive failures
-The state of a RAID array
Which protocol will meet these needs?
Nether Tech Inc.'s environment is highly virtualized, so monitoring the host infrastructure is a top
priority. Which three features can the Citrix Engineer access in XenCenter for monitoring when
implementing XenServer? (Choose three.)
D. Page File
E. Work load
F. Local hard disk of virtual machines
Scenario: Nether Tech Inc. has several new virtualized servers and has a mandate to retain
historical data of the host including CPU, memory and disk usage of stated virtual servers. None of
these servers are XenApp 5.0 servers. What is the best solution to fit this need?
C. HP OpenView
D. XenServer Essentials
When a desktop group has been created in the Access Management Console, which configuration
items can NOT be modified afterwards?
A. Logoff Behavior
B. Idle Pool Settings
C. Assignment Type
D. Desktop Group Name
E. Hosting Infrastructure Type
Scenario: Nether Tech Inc. is implementing XenDesktop for a small number of their users. Two
Desktop Delivery Controllers will be used in the deployment. The Citrix Engineer wants to ensure
that one DOC is assigned the "Master" Role, while the second DOC will be assigned the role of
"Backup." What would the engineer use to configure these roles?
A. Registry Editor
C. Presentation Server Console
D. Access Management Console
Some users complain about sluggish performance when connecting to a XenApp session. Which
four counters should the engineer consider when monitoring the XenApp server using EdgeSight?
A. CPU usage
B. Idle Sessions
C. Memory usage
D. Network usage
E. ICA latency counters
F. Disconnected Sessions
Scenario: The XenApp servers in the Nether Tech Inc. environment are hosted on XenServer.
Users in the environment access online and offline resources over the WAN Which two settings should the Citrix Engineer configure when creating a policy to optimize the
connection for users accessing hosted applications in this environment? (Choose two.)
A. Under Client Devices> Resources, select 'Drives' and select 'Disable'
B. Select the 'Optimize initial policy settings for a connection type' and select 'WAN' as the
C. Under Printing> Client Printers> Auto-creation, select 'Enabled' and select 'Auto-create all client
D. Under Bandwidth> Visual Effects, select 'Turn off desktop wallpaper' and select 'Enable' to turn
off desktop wallpaper.
Scenario: Nether Tech Inc. administrators have asked the on-site engineer to limit the amount of
physical XenServer hosts that need to be online at any given moment in order to limit
maintenance, management and power consumption. However, the administrators wish to have the
option to add further resources to the production XenServer resource pools and want the process
to be automated. What must the engineer configure to optimize the virtual servers according to the
A. High Availability with failover
B. Workflow studio to maximize density
C. Workload Balancing to maximize density
D. Workload Balancing to maximize performance
Scenario: Nether Tech Inc. is implementing XenApp 5.0 as part of their new virtual environment.
According to the Design Document, the XenApp servers will be virtualized using XenServer. The
engineer is responsible for optimizing these virtual servers. When optimizing virtual servers in
XenCenter, which three options are available? (Choose three.)
A. Optimize Manually
B. Optimize for General Use
C. Optimize for Citrix XenApp
D. Optimize for Windows Vista
E. Optimize for Citrix XenDesktop
Scenario: The engineer implementing the new design for Nether Tech Inc. must configure three
Provisioning Services servers with High Availability (HA) so that if the primary Provisioning
Services server should fail for any reason, the High Availability server that is the least busy is
selected. The write cache is on the target hard drive and vDisks are being stored on a share in a
SAN. Which two steps must the engineer take when configuring High Availability in the
Provisioning Services farm? (Choose two.)
A. Enable HA on the vDisk
B. Configure the bootstrap for HA
C. Disable Windows Write Caching
D. Configure target devices with shared storage
Scenario: Provisioning Services has been installed to facilitate the deployment of XenApp virtual
machines. The Citrix Engineer's task is to remove third-party application from one of the vDisks on
the production Provisioning Services server. The engineer has already made a copy of the vDisk,
placed it in a test environment and removed the desired software from the new vDisk. Which five
steps should the engineer take when provisioning the new vDisk to a select number of XenApp
servers according to best practice? (Choose five.)
A. Enable automatic updates for the new vDisk.
B. Enable incremental updates for the new vDisk.
C. Boot the target devices from the newly updated vDisk.
D. Assign the original and newvDisks to all target devices.
E. Create a delta file that will be used to update the vDisk.
F. Change the filename of the new vDisk and increment the build number.
G. Select the access mode for the new vDisk to be the same as that of the original vDisk.
H. Select the cache type for the new vDisk to be the same as that selected for the original vDisk.