Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
54 Cards in this Set
- Front
- Back
Scenario: Nether Tech Inc. administrators have provided their on-site engineer a formal change
request for the addition of SmartAuditor to the current rollout plan. The Nether Tech Inc. administrators want to leverage SmartAuditor to improve technical support, specifically to resolve end-user problems faster. How should the engineer approach this change request according to best practices? Place the following in the correct order: 1. Conduct a full system test and scalability testing. 2. Pilot the change request implementation. 3. Document the technical details of the change request. 4. Rollout into production. 5. Implement the change in a test environment. |
3,2,1,5,4
|
|
Which three items are risks that a Citrix Enterprise Engineer should be aware of during the
implementation phase of a XenApp project? (Choose three.) A. Improper load evaluator configuration B. Inconsistent server naming convention C. Improper terminal server profile design D. Inconsistent user account naming convention E. Mixed brands of user devices running XenApp Plugin F. Inconsistent set of printer drivers across the environment |
A,C,F
|
|
Scenario: After gathering basic requirements from Nether Tech Inc. administrators and IT
personnel, an engineer must decide whether a virtual or physical implementation is best suited for the environment. Several key requirements are listed below. Peak time is gam; approximately 4,000-4,500 logon attempts will be made then. Most users will have the same core applications such as Microsoft Office and Adobe Reader. Some custom applications need to be updated quarterly. Remote users and traveling field agents will need secure remote access to the environment. Several applications in the environment CANNOT co-exist together. Some applications will NOT run on an application server. Based on these requirements, which kind of implementation should the engineer recommend? A. A virtualized implementation that leveragesXenDesktop Platinum B. A physical server farm that leverages XenApp on physical servers C. A physical server farm that leverages XenApp and Provisioning Services D. A virtualized server implementation that leverages XenServer and XenApp |
A
|
|
Scenario: The new design document for Nether Tech Inc.'s environment calls for the inclusion of
several new Citrix products in addition to XenApp. XenServer will be implemented as the virtualization platform. Provisioning Services will be used to rapidly provision desktop and server images. XenOesktop will be used to publish and manage client desktops. Nether Tech Inc.'s existing environment consists of a DHCP server, a DNS server, a domain controller, several managed switches with spanning tree protocol and several routers. Which modification should the Citrix Engineer recommend from a networking standpoint in order for all of the new Citrix products to be highly optimized? A. Enable task offload on the virtual machine. B. Place each Citrix component in its own subnet. C. Configure the DHCP server to use ports 60 and 67. D. Enable the spanning tree fast link (PortFast) option on all Provisioning Services switch ports. |
D
|
|
Scenario: The new design document for Nether Tech Inc. requires that the Citrix Engineer perform
the following: 1. Upgrade from Presentation Server 4.0 to XenApp 5.0 for Windows Server 2008. 2. Integrate the XenApp 5.0 environment with the existing XenDesktop solution, which includes Provisioning Services. The engineer has successfully completed the upgrade to XenApp 5.0 for Windows Server 2008 and must now implement the second stage of the design by integrating the XenApp 5.0 farm into the XenDesktop environment so that published applications can be accessed from within the XenDesktop virtual desktops. The engineer has just created a XenApp Services Web Interface site that enumerates applications from the XenApp 5.0 farm. Which additional steps must the engineer take to integrate the existing XenApp 5.0 farm into the XenDesktop environment? Place the following in the right order: 1. Install and configure XenApp Plugin for Hosted Applications and XenApp Plugin fro Streamed Application on the target device. 2 Place the new vDisk in Standard Access Mode. 3. Reboot all virtual desktops so they receive the updated vDisk. 4. Assign a copy of the vDisk to a target device, set the image mode of the vDisk to Private Access Mode and boo the target device. 5. Create a cop of the existing vDisk used by virtual desktop in Provision Services. 6. Assign the new vDisk to all virtual desktops. 7 Build image an then shut down the target device. |
5,2,3,6,4,1,7
|
|
Scenario: The engineer at Nether Tech Inc. is assigned an implementation of Provisioning
Services for delivery of images to its XenApp servers and XenDesktop workstations. The architect has created the design for the Provisioning Services environment and took the following design decisions: One Provisioning Services farm will be created: PVSFARM. Two Provisioning Services servers will be configured with HA: PVS01 and PVS02. One site will be configured: Nether Tech Inc. Two device collections will be configured: one for XenApp servers and one for XenDesktop devices. A central store will be defined and located on the SAN and all vDisks will be added to this store. Online and offline applications will be used to minimize changes to the vDisk. A specified user account will be used for Provisioning Services service account. The TFTP service will be installed on PVS01. DHCP will be configured with options 66 and 67 to point to PVS01. An Active Directory group policy object will be configured and linked to the XenApp and XenDesktop organizations units to disable Active Directory Machine Account Password Management. What will be a risk for the new environment based on the design decisions from the architect? A. There is only one store configured for both XenApp and XenDesktop. B. TFTP via DHCP is being used and TFTP is only installed on PVS01. C. The PXE service is NOT being used to provide boot information to target devices. D. The target devices for XenApp and XenDesktop are in separate device collections. |
A
|
|
Which two statements highlight risks that a Citrix Engineer should investigate and potentially
resolve when implementing a XenApp environment? (Choose two.) A. A custom load evaluator is being used with several application silos. B. A separate zone within the production farm is being used for testing. C. XML traffic from the Web Interface to the XML Brokers is being encrypted. D. A Citrix policy exists that effectively disables users from installing drivers over ICA sessions in the environment. E. Users in the Nether Tech Inc. environment have the ability to install printer drivers on the XenApp servers through their ICA sessions. |
B,E
|
|
Scenario: Nether Tech Inc. is planning to implement Provisioning Services for deployment of
images to their XenApp servers and XenDesktop workstations. The architect has created the design for the Provisioning Services environment, making the following design decisions for the Provisioning Services environment: One Provisioning Services farm will be created: PVSFARM. Two Provisioning Services servers will be installed and configured for High Availability: PVS01 and PVS02. One site will be created: Nether Tech Inc. Two Device Collections will be configured: XenApp and XenDesktop. A central store will be defined and located on the SAN; all vDisks will be added to this store. The local hard drive of the XenApp servers will be used to store the write cache. TCP Large Send Offload will be enabled on the NICs. A specified user account will be used as Provisioning Services service account. Each Provisioning Services server will have four NICs; two teamed and connected with the "General use subnet" (per the design document) and the other two NICs, disabled. An Active Directory group policy object (GPO) will be configured and linked to the XenApp and XenDesktop organizational units to disable Active Directory Machine Account Password Management. Online and offline applications will be used to minimize changes to the vDisk. Offline applications will be pre-deployed to desktops and XenApp servers for faster access to the applications by users. According to the design decisions from the architect, which decision does NOT follow best practices? A. One site will be created. B. TCP Large Send Offload will be enabled on the NICs. C. The local hard drive of the XenApp servers is used to store the write cache. D. Online and offline applications will be used to minimize changes to the vDisk. E. Offline applications will be pre-deployed to desktops and XenApp servers for faster access to the application by users. |
B
|
|
Scenario: A Citrix Enterprise engineer is tasked with deploying XenDesktop pooled desktops for
an insurance company with 10 remote users using Provisioning Services. The design document requires write cache to use RAM for better performance. The engineer determines that the target device does NOT have enough memory to support the write cache, but there is NO option to add more RAM. The engineer's recommendation should be to change Provisioning Services vDisk . (Choose the correct phrase to complete the sentence.) A. access mode to Private Image B. access mode to Difference Disk Image C. cache type to Cache on device HD in Private Image Access Mode D. cache type to Cache on device HD in Standard Image Access Mode |
D
|
|
Scenario: A Citrix Engineer implementing the new virtualization design for Nether Tech Inc. must
configure XenApp for dynamic delivery by using Provisioning Services. Provisioning Services already exists in the environment; however, due to company policies, neither using DHCP nor modifying the DHCP scope options to include options 66 and 67 or using PXE are possible. Which configuration method should the engineer recommend in order for the virtual XenApp servers to boot from their assigned vDisk? A. TFTP Service B. Boot from SAN C. Boot Device Manager (BDM) D. Static IP Address Assignment |
C
|
|
Scenario: Nether Tech Inc. is installing a pair of Provisioning Services servers to host vDisks for
their XenDesktop and XenApp virtual machines. The architects have called for virtual machines to get their IP configuration information and the location of the boot file using DHCP. The Symantec Ghost server will be added after Provisioning Services has been set up. Analyze the network topology below and identify the potential issue in the Design Document. Click the Task button to select the issue in the network topology. Click Exhibit button for instructions on how to complete a Hotspot item. |
Managed Switch with spanning tree protocol disabled
|
|
Scenario: Several IT administrators, engineers, and managers are participating in the first round of
testing based on a segregated environment. The IT department hopes this testing will give them early insight into these users' experiences, as well as resource requirements. Which two types of testing fit this description? (Choose two.) A. User Acceptance B. System Acceptance C. Operational Acceptance D. Implementation and Backout Acrual Tests.com |
A,B
|
|
Scenario: During the initial assessment of Nether Tech Inc.'s environment, the Citrix Engineer
assisting the Citrix Architect was denied access to the storage environment due to contract issues under review. However, the resident storage engineer provided the Citrix Engineer with information on the features that the existing remote storage system supports. The existing remote storage supports: Storing virtual machines Automating virtual machine placement Resizing disks Thin provisioning Which type of remote storage possesses these types of capabilities? A. NFS B. NetApp C. Fibre Channel D. iSCSI Hardware |
B
|
|
Scenario: According to the design document, Nether Tech Inc. has requested that the new
XenDesktop implementation provide virtual desktops to approximately 2000 concurrent users. At the moment, there is only one Desktop Delivery Controller in the environment, which is a virtual machine, and it is serving 100 pilot users. The single Desktop Delivery Controller is also hosting the Web Interface. With the increase in the number of desktops that Nether Tech Inc. intends to deliver, logon loads, Controller services and Pool management service are expected to increase. All the connection requests from end-users will still go through the single farm master. As the Citrix Engineer in charge of the XenDesktop implementation in this environment, which two changes would you make in order to fine tune the environment to ensure optimal performance? (Choose two.) A. Add additional farm masters to the environment to load balance the load. B. Add additional zone masters to the environment to load balance the load. C. Remove Web Interface and the IIS roles from the Desktop Delivery Controller farm master. D. Dynamically provision Desktop Delivery Controllers during peak hours to handle the extra load. E. Add additional Desktop Delivery Controllers to the environment to take over the Data Collector and Controller roles. |
C,E
|
|
Which three things should a Citrix Engineer consider in the Nether Tech Inc. environment when
assessing preparedness for an application virtualization implementation? (Choose three.) A. Memory utilization B. Number of servers C. Citrix Profiler Version 1.3.1 D. Network and disk resources E. Average and peak utilization of CPU |
A,D,E
|
|
Scenario: The new design document for Nether Tech Inc. requires the migration of Secure
Gateway to Access Gateway. The design document also recommends the placement of both Web Interface servers in the internal network with the Access Gateway in the DMZ. The engineer leading the project wants to take a look at the various options available for the placement of the Web Interface servers before completing the implementation. Which two additional recommendations could the engineer make for the placement of the Web Interface servers in the Nether Tech Inc. environment according to best practices? (Choose two.) A. Place both Web Interface servers behind the Access Gateway in the DMZ. B. Place both Web Interface servers parallel to the Access Gateway in the DMZ. C. Place one Web Interface server in front of the Access Gateway and the other behind the Access Gateway in the DMZ. D. Place one Web Interface server parallel to the Access Gateway and the other in the internal network in a double-hop DMZ deployment. |
A,B
|
|
Scenario: A Citrix Engineer has been instructed to convert a physical Windows web server to an
open virtualization format because the web server will be virtualized on XenServer and VMware ESX. Based on the performance of the server and the number of workloads the server is expected to support, a decision will be made with regards to which virtualization technology will be used. What are two options that must be configured in the attached screenshot when converting a physical machine to an open virtualization format? (Choose two.) A. Encrypt B. Sign with Certificate C. Create Open Virtual Appliance D. Compress Open Virtual Appliance E. Folder to store Open Virtualization Format Package |
C,E
|
|
Scenario: The engineer at Nether Tech Inc. is in the process of implementing a new manufacturing
application called Bottled Pro. The new application has certain requirements that prevent delivery in the existing XenApp environment. XenDesktop was implemented in order to provide the application to the users of the Manufacturing department. The new application will be installed as part of the vDisk that will be provisioned to the Manufacturing department users. In addition to the new application, users from the Manufacturing department must have access to a set of applications that will be delivered as streamed applications from the existing XenApp farm. The engineer's task is to create the Windows XP vDisk that will be provided by Provisioning Services to serve all 50 virtual desktops. The engineer needs to decide which Citrix software needs to be installed on the master target device before building the vDisk so users can access their required applications. Users will only be permitted to access XenApp environments from the Manufacturing department virtual desktops, so this should be taken into consideration. The engineer should also follow Citrix best practice for installing only the required software to satisfy the application delivery requirements. Which four software programs are appropriate for installation? (Choose four.) A. Streaming Profiler 5.1 B. Desktop Reciever 11.1 C. Virtual Desktop Agent 3.1 D. XenAppPrep Integration Utility E. Provisioning Services target device F. XenApp Plugin for Hosted Apps 11.0 G. XenApp Plugin for Streamed Apps 5.1 |
A,C,D,F
|
|
Which two options exist for creating the Organizational Unit for the desktop delivery controllers
(DOCs)? (Choose two.) A. Use the XenDesktop SDK. B. Run the XenDesktop Setup Wizard. C. Run the Active Directory Configuration Wizard after installation. D. Use Active Directory to manually create the service connection point. |
C,D
|
|
Scenario: Nether Tech Inc. managers all have company-issued laptops that are used for local and
remote access while traveling. In the current environment applications are installed on each laptop. Currently, the IT staff maintains these laptops. Which type of user profile will best support this model and require the lowest amount of administration? A. Local B. Roaming C. Mandatory D. Citrix Profile Management |
A
|
|
A Citrix Engineer should select XenServer in the 'To' field on the XenConvert welcome screen
when she needs to convert a________. (Choose the correct option to complete the sentence.) A. single volume of a physical disk toXenServer B. single volume on a physical disk to a bootable XVA XenServer virtual machine C. single volume on a physical disk to a XenServer template for import into XenCenter D. physical machine to an open virtualization format Package that can be imported into XenServer |
B
|
|
Scenario: An engineer must convert a single volume of a physical disk on a physical machine to a
virtualized instance in Citrix Xen Virtual Appliance format. The XenConvert 2.01 tool has been downloaded and the engineer has chosen to utilize the Tool's command line interface to perform the required conversions. The following is information about the current environment: Workload Name: Server 2003 Physical Volume: C: Destination Folder: N:misc Hostname: XenVA Username: root Password: Password 123 Which command must the administrator run in order to complete the required conversion? A. XenConvertCli P2Xva Server 2003 C:N:misc IE B. XenConvertCli P2Vhd Server2003 C:N:-misc XenVA C. XenCovertCli P2XenServ Server 2003 N:misc root Password123IE D. XenConvertCli P2XenServer Server2003 C:N:miscXenVA root Password123IE |
A
|
|
The information in the table in the attached exhibit was gathered from XenCenter to monitor
XenServer resource consumption. Based on the information in the table, which two methods could an engineer use to resolve a potential bottleneck? (Choose two.) Click the Exhibit button to view the table. A. Using XenMotion, move a virtual machine from XSXen03 to XSXen02 to free up memory on XSXen01. B. Using XenMotion, move a virtual machine from XSXen01 to XSXen02 to free up memory on XSXen01. C. Using XenMotion, move a virtual machine from XSXen03 to XSXen02 to free up CPU cycles on XSXen03. D. Using XenMotion, move a virtual machine from XSXen03 to XSXen04 to free up CPU cycles on XSXen03. E. Using XenMotion, move a virtual machine from XSXen04 to XSXen02 to free up CPU cycles on XSXen04. |
B,D
|
|
Which action must a Citrix Engineer make to use a Private Root Certificate with the Client for Java
Version 9.x when securing connections to XenApp resources? A. Enable Secure ICA B. Install the Java client on each client device C. Turn on the EnableLegacySupport parameter D. Install the root certificate on the firewall, if one exists E. Import the root certificate into the Java keystore on each client device |
A
|
|
Scenario: Nether Tech Inc.'s Research and Development team wishes to upgrade the security
around its research information. The Citrix Architect recommends the implementation of smart card technology at Nether Tech Inc.'s research and development facility in order to implement twofactor authentication. Which two types of smart cards are compatible with XenDesktop? (Choose two.) A. Contact Smart Card B. Proximity Smart Card C. Common Access Card D. USB Smart Card Token |
C,D
|
|
Scenario: Nether Tech Inc. needs to meet the highest security standards to satisfy regulatory
requirements. Secured connections between published desktop and endpoints, as well as published applications and the Web Interface need to be implemented. The Citrix Engineer needs to implement the XenOesktop, XenApp and the Web Interface infrastructures in Nether Tech Inc.'s environment. What are four XenDesktop best practices that should be considered? (Choose four.) A. Protect all computers with personal firewalls. B. Set up SSL access for the Web Interface site. C. Protect all computers with perimeter firewalls, including those at enclave boundaries as appropriate. D. Ensure the perimeter firewalls are NOT repositioned when the conventional environment is migrated to XenOesktop. E. Ensure secure communication between endpoint devices and desktops by using the Citrix ICA client and setting the encryption level to basic. F. Ensure secure communication between endpoint devices and desktops by using the Citrix ICA client and setting the encryption level to 128bit. |
A,B,C,F
|
|
Scenario: A Citrix Engineer is considering making a change to the design document in order to
allow the alternate address of the XenApp server to be given to a particular set of client devices when users attempt to access published applications. What are three settings that the Citrix Engineer must configure in order to use the alternate address of the XenApp servers for the particular set of client devices? (Choose three.) A. Enable the spanning tree protocol. B. Configure port forwarding on the managed switches. C. Configure the firewall for network address translation. D. Configure the XenApp Servers with an alternate address. E. Specify the MAC address of the client devices that should receive the alternate address. F. Specify the IP Address and Subnet Mask for each of the client devices that the users will connect from. |
C,D,F
|
|
When completed, Nether Tech Inc.'s environment will consist of XenDesktop and XenApp
resources. The engineer has configured alternate address translation on the XenApp servers and the Web Interface to use alternate address access method. What will happen if the Citrix Engineer configures alternate address translation when securing the traffic between the Web Interface and the client devices? A. The Java client will fail. B. Users will NOT be able to access XenApp streamed applications. C. External users will NOT be able to access XenDesktop virtual desktops. D. The XML transport will have to be changed to SSL Relay in order to access the desktops. E. Internal users will have to connect through the XenApp servers using the alternate address. |
C
|
|
Scenario: The new design document for Nether Tech Inc.'s environment requires the creation of a
new desktop group with an HTTPS address type for the XenServer pool master logon page. In order to secure communication between the Desktop Delivery Controller and XenServer, the design document recommends the engineer replace the default SSL certificate installed with XenServer with one from a trusted certificate authority. The name of the XenServer host is XS01. Which two commands must the engineer use to generate a certificate request on the XenServer host using the XenServer console? (Choose two.) A. Opensslgenrsa -out XS01.private 2048 B. Opensslgeneratereqsa -out XS01.private 2048 C. Opensslreq -new -outform PEM -out XS01.request -keyform PEM -key XS01.private -days 365 D. Openssl request -new -outform PEM -out XS01.request -keyform PEM -key XS01.public - 365days |
A,C
|
|
What should the Citrix Engineer enable when configuring server communication between the Web
Interface and XenApp or XenDesktop in order to allow smart card logon? A. SSL/TLS B. URL redirect C. IMA Encryption D. Two-factor authentication |
A
|
|
The Citrix Architect should recommend the implementation of a shared storage infrastructure if
_____and_____ are required. (Choose the two correct options to complete the sentence.) A. XenMotion B. disk resizing C. centralized storage D. virtual machine storage |
A,C
|
|
Which storage type should be used if thin provisioning is required from the XenServer?
A. NFS based B. Fibre Channel C. iSCSI software D. iSCSI hardware |
A
|
|
Scenario: During the initial stage of the design phase, Nether Tech Inc.'s management team did
NOT request the use of remote storage in their environment; however, after attending a recent demonstration for XenServer, Nether Tech Inc.'s management team is interested in implementing shared remote storage, specifically an implementation that will allow for fast-cloning and thin-provisioning. Which three remote storage types will meet the needs of this environment? (Choose three.) A. NetApp B. NFS based C. Fibre Channel D. iSCSI software E. iSCSI hardware F. Dell EqualLogic |
A,B,F
|
|
Scenario: Nether Tech Inc. administrators have requested the ability to fast-clone and thin-clone
existing virtual machines when necessary in the XenServer implementation. However, there is a limited amount of local storage available on the physical hosts; these hosts do NOT have access to shared storage. In addition, Nether Tech Inc. administrators plan to have several resource pools in the XenServer farm. How should the engineer configure storage in the XenServer environment in order for Nether Tech Inc. administrators to manage storage for their applications as requested? A. Configure iSCSI SR for each host B. Utilize storagelink for Windows NFS services. C. Create a local storage repository (SR) for each host. D. Create NFS-shared storage for each resource pool in the farm. |
D
|
|
Scenario: Nether Tech Inc.'s IT team is going to deploy Provisioning Services to provision a
Windows 2008 server with two processors and 1 GB RAM running scheduled tasks. The server needs to be available at all times with the exceptions of performing updates to the operating system. Nether Tech Inc. has five XenServer pools in which this machine can be installed. Resource Pools names and remote storage type: XSPooI01 - NFS shared storage XSPooI02 - iSCSI with multipathing enabled shared storage XSPooI03 - NFS and iSCSI with multipathing enabled to shared storage XSPooI04 - NFS and Single port Fiber channel connection XSPooI05 - NFS and iSCSI without multipathing enabled to shared storage XenServers and Resource Pool membership: CTXXS01 - XSPooI01 CTXXS02 - XSPooI01 CTXXS11 - XSPooI02 CTXXS12 - XSPooI02 CTXXS21 - XSPooI03 CTXXS22 - XSPooI03 CTXXS31 - XSPooI04 CTXXS32 - XSPooI04 CTXXS41 - XSPooI05 CTXXS42 - XSPooI05 A. XSPooI01 B. XSPooI02 C. XSPooI03 D. XSPooI04 E. XSPooI05 |
B,C
|
|
As part of their XenServer implementation, Nether Tech Inc. administrators wish to have the ability
to create new virtual machines using a common base VHD file and to write changes to a differencing drive. Which two storage technologies should the Citrix Engineer implement to meet these requirements? (Choose two.) A. NFS based B. Fibre Channel C. iSCSI software D. iSCSI hardware E. Local storage repository |
A,E
|
|
While reviewing the design document for Nether Tech Inc.'s XenServer implementation, the Citrix
Engineer noticed that the Citrix Architect recommended two key features for implementation: multipathing and disaster recovery. What are two reasons why shared storage will be required to meet the needs of this environment? (Choose two.) A. Multi-pathing ensures that specific virtual machines have the appropriate amount of bandwidth through the use of assigned NICs. B. Multi-pathing allows for multiple paths to the storage, which improves performance and safeguards against switch and card failures. C. High Availability automatically restarts a running virtual machine from a failing XenServer host to another running XenServer host in order to ensure continuity. D. Disaster recovery applies snapshots and fast-cloning technologies to the process of initial virtual machine placement and real-time movement of virtual machines. |
B,C
|
|
Scenario: Nether Tech Inc. plans to move forward with provisioning XenApp servers using
Provisioning Services. In addition, Nether Tech Inc. also plans on virtualizing th Provisioning Services target devices using XenServer. Engineers must consider several important criteria. The environment will need to include XenMotion in the future and maintain fast response times while XenApp maintains live, interactive user sessions. Any noticeable degradation of performance for the end-user is unacceptable. All virtual machine hard disks will be stored on a robust SAN platform. According to best practice, where should the engineer place the write cache? A. On the RAM of the target device B. On the local storage of the target device C. On the local Provisioning Services hard drive D. On a shared storage device attached to the Provisioning Services |
B
|
|
Scenario: Nether Tech Inc. has positioned or implemented several new virtualized servers on
XenServer and has a mandate to retain historical statistics as well as real-time statistics of the XenServer hosts. All virtualized servers are XenApp 5.0 servers. There are several applications with large memory footprints that crash frequently. What is the best solution to monitor the XenSever hosts? A. PerfMon B. Edgesight C. SMTP Monitoring D. XenServer Essentials |
D
|
|
Scenario: A Citrix Engineer implementing the XenApp infrastructure in the Nether Tech Inc.
environment is currently training the resident administrator on the necessary steps to monitor the environment. The Health Monitoring & Recovery feature will be used to monitor XenApp. Which three services could the engineer monitor using the Health Monitoring & Recovery tests provided by Citrix? (Choose three.) A. Citrix XTE Server B. Terminal Services C. Citrix XML Service D. Citrix MFCOM Service E. Citrix Streaming Service F. Citrix Independent Management Architecture Service |
B,C,F
|
|
Scenario: Nether Tech Inc. has just deployed two XenServer 5.0 servers into a resource pool.
Nether Tech Inc. is already hosting four Citrix XenApp servers in this pool. Citrix just released an update to XenServer. To create a test environment for this update, the Nether Tech Inc. IT Engineers have installed the update on a stand-alone XenServer which was just purchased and that has identical hardware. Currently all virtual machines can be migrated from one server to the other using XenMotion without depleting system resources. All the XenServers have the same version of licensing installed. Information: Resource Pool Name: XSPool01 XenServer Names and Resource Pool membership: CTXXS01 - XSPool01, pool master CTXXS02 - XSPool01, pool slave CTXXS03 - Stand-alone Which steps must the engineer at Nether Tech Inc. take to update the resource pool without interrupting any workloads that are currently running? Put in order: 1. Update CTXXS02 utilizing the update wizard with the new update and reboot. 2. Update CTXXS01 utilizing the update wizard with the new update and reboot. 3. Migrate all virtual machines from CTXXS01 to CTXXS02 4. Re-enable High Availability. 5. Disable High Availability on the XSPOOL01 pool. |
3,2,4,1,5,6
|
|
Scenario: The Engineer implementing the new design for Nether Tech Inc. must create a new
virtual machine and decides to use an existing exported virtual machine to do so. According to the specifications in the design document, the Engineer must ensure the MAC address on one of the virtual network interfaces associated with the exported virtual machine remains unchanged. The following is a list of environment specifications: Hostname: CTXXS99 Password: Pass 123 Pathname of the export file: XENSETUP.XVA VM name: xensetup uuid_of_Uarget_sr: c58dd3ca-1cd7-c933-95a9-32ba1864bc7a MAC Address: 2a:8b:b4:bb:da:54 Which command must the administrator use to import the existing exported virtual machine and meet the requirements of the scenario? A. xevm-import vm= filename= xensetup.xva preserve=true B. xevm-import vm= filename= xensetup.xva preserve=2a.8b.b4.bb.da.54 C. xevm-import filename= xensetup.xvasr-uuid= preserve=2a.8b.b4.bb.da.54 D. xevm-import filename=xensetup.xva preserve=true sr-uuid=c58dd3ca-1cd7-c933-95a9-32ba1864bc7a |
D
|
|
Scenario: Nether Tech Inc. has several new virtualized servers and has a mandate to retain
historical data on CPU, memory and disk usage of these virtual servers. All of these servers are XenApp 5.0 servers. Which two options are the best solutions to fit this need? (Choose two.) A. PerfMon B. EdgeSight C. HP OpenView D. XenServer Essentials |
B,D
|
|
The Citrix Engineer implementing the design of the new Nether Tech Inc. environment must
configure management protocol for monitoring the following: -NIC failures -Hard drive failures -The state of a RAID array Which protocol will meet these needs? A. SNMP B. System C. Hardware D. End-to-end |
A
|
|
Nether Tech Inc.'s environment is highly virtualized, so monitoring the host infrastructure is a top
priority. Which three features can the Citrix Engineer access in XenCenter for monitoring when implementing XenServer? (Choose three.) A. CPU B. Reboots C. Network D. Page File E. Work load F. Local hard disk of virtual machines |
A,C,F
|
|
Scenario: Nether Tech Inc. has several new virtualized servers and has a mandate to retain
historical data of the host including CPU, memory and disk usage of stated virtual servers. None of these servers are XenApp 5.0 servers. What is the best solution to fit this need? A. PerfMon B. Edgesight C. HP OpenView D. XenServer Essentials |
D
|
|
When a desktop group has been created in the Access Management Console, which configuration
items can NOT be modified afterwards? A. Logoff Behavior B. Idle Pool Settings C. Assignment Type D. Desktop Group Name E. Hosting Infrastructure Type |
C,E
|
|
Scenario: Nether Tech Inc. is implementing XenDesktop for a small number of their users. Two
Desktop Delivery Controllers will be used in the deployment. The Citrix Engineer wants to ensure that one DOC is assigned the "Master" Role, while the second DOC will be assigned the role of "Backup." What would the engineer use to configure these roles? A. Registry Editor B. CdsController.exe.config C. Presentation Server Console D. Access Management Console |
A
|
|
Some users complain about sluggish performance when connecting to a XenApp session. Which
four counters should the engineer consider when monitoring the XenApp server using EdgeSight? (Choose four.) A. CPU usage B. Idle Sessions C. Memory usage D. Network usage E. ICA latency counters F. Disconnected Sessions |
A,C,D,E
|
|
Scenario: The XenApp servers in the Nether Tech Inc. environment are hosted on XenServer.
Users in the environment access online and offline resources over the WAN Which two settings should the Citrix Engineer configure when creating a policy to optimize the connection for users accessing hosted applications in this environment? (Choose two.) A. Under Client Devices> Resources, select 'Drives' and select 'Disable' B. Select the 'Optimize initial policy settings for a connection type' and select 'WAN' as the Connection type. C. Under Printing> Client Printers> Auto-creation, select 'Enabled' and select 'Auto-create all client printers'. D. Under Bandwidth> Visual Effects, select 'Turn off desktop wallpaper' and select 'Enable' to turn off desktop wallpaper. |
B,D
|
|
Scenario: Nether Tech Inc. administrators have asked the on-site engineer to limit the amount of
physical XenServer hosts that need to be online at any given moment in order to limit maintenance, management and power consumption. However, the administrators wish to have the option to add further resources to the production XenServer resource pools and want the process to be automated. What must the engineer configure to optimize the virtual servers according to the administrators' criteria? A. High Availability with failover B. Workflow studio to maximize density C. Workload Balancing to maximize density D. Workload Balancing to maximize performance |
C
|
|
Scenario: Nether Tech Inc. is implementing XenApp 5.0 as part of their new virtual environment.
According to the Design Document, the XenApp servers will be virtualized using XenServer. The engineer is responsible for optimizing these virtual servers. When optimizing virtual servers in XenCenter, which three options are available? (Choose three.) A. Optimize Manually B. Optimize for General Use C. Optimize for Citrix XenApp D. Optimize for Windows Vista E. Optimize for Citrix XenDesktop |
A,B,C
|
|
Scenario: The engineer implementing the new design for Nether Tech Inc. must configure three
Provisioning Services servers with High Availability (HA) so that if the primary Provisioning Services server should fail for any reason, the High Availability server that is the least busy is selected. The write cache is on the target hard drive and vDisks are being stored on a share in a SAN. Which two steps must the engineer take when configuring High Availability in the Provisioning Services farm? (Choose two.) A. Enable HA on the vDisk B. Configure the bootstrap for HA C. Disable Windows Write Caching D. Configure target devices with shared storage |
A,B
|
|
Scenario: Provisioning Services has been installed to facilitate the deployment of XenApp virtual
machines. The Citrix Engineer's task is to remove third-party application from one of the vDisks on the production Provisioning Services server. The engineer has already made a copy of the vDisk, placed it in a test environment and removed the desired software from the new vDisk. Which five steps should the engineer take when provisioning the new vDisk to a select number of XenApp servers according to best practice? (Choose five.) A. Enable automatic updates for the new vDisk. B. Enable incremental updates for the new vDisk. C. Boot the target devices from the newly updated vDisk. D. Assign the original and newvDisks to all target devices. E. Create a delta file that will be used to update the vDisk. F. Change the filename of the new vDisk and increment the build number. G. Select the access mode for the new vDisk to be the same as that of the original vDisk. H. Select the cache type for the new vDisk to be the same as that selected for the original vDisk. |
A,C,D,F,H
|