Free 1Y0-204 Exam Braindumps

Pass your Citrix Virtual Apps and Desktops 7 Administration exam with these free Questions and Answers

Page 8 of 37
QUESTION 31

Scenario: A Citrix Administrator is configuring the Workspace Experience to provide users with access to their applications and desktops. The administrator deployed Microsoft Azure Active Directory (AD) already and wants to leverage it to support user access to the Workspace Experience.
Which two steps does the administrator need to take to enable users to authenticate using Azure AD to the Workspace Experience? (Choose two.)

  1. A. Add Cloud Connector information to the Azure AD console.
  2. B. Enable Azure AD authentication under Workspace Configuration in Citrix Cloud.
  3. C. Add Azure AD Account under Identity Providers in Citrix Cloud.
  4. D. Deploy Cloud Connectors to support Azure AD authentication.

Correct Answer: BC

QUESTION 32

Scenario: A Citrix Administrator needs to reduce costs by limiting users' printing sources. The administrator needs to stop automatic creation of all client printers in a session and map printers based on the floor of the building from which the user's session connects.
Which two policies should the administrator configure to complete this task? (Choose two.)

  1. A. Printer properties retention
  2. B. Auto-create client printers
  3. C. Direct connections to print servers
  4. D. Session printers

Correct Answer: CD

QUESTION 33

Scenario: A Citrix Administrator has configured a Citrix ADC active-passive high availability (HA) pair. When the HA pair fails over, customers are unable to access the hosted websites. After some troubleshooting, the administrator found that the upstream router was NOT updating its ARP table.
What can the administrator configure to resolve this issue?

  1. A. Virtual MAC
  2. B. Independent Network Configuration (INC) mode
  3. C. Route Monitor
  4. D. HA monitor

Correct Answer: A

QUESTION 34

Scenario: The Director of network security in a financial organization wants to protect the enterprise network from any external malware threats. To do this, the director needs to gain visibility into otherwise-bypassed traffic and control access to malicious web sites. The director is required to do the following:
1Y0-204 dumps exhibit Intercept and examine all the traffic, including SSL/TLS (encrypted traffic), coming in, and going out of the enterprise network.
1Y0-204 dumps exhibit Block access to URLs identified as serving harmful or insecure content.
1Y0-204 dumps exhibit Identify users (employees) in the enterprise who are accessing malicious websites.
Which Citrix ADC deployment mode should a Citrix Administrator use to achieve this requirement?

  1. A. Default Gateway
  2. B. Citrix Secure Web Gateway
  3. C. Citrix Gateway
  4. D. Access Gateway

Correct Answer: B

QUESTION 35

How can a Citrix Administrator enable the ability to monitor application failures for Desktop OS machines running the Virtual Delivery Agent (VDA)?

  1. A. By installing an Application Probe Agent on the Desktop OS VDA machines
  2. B. By entering a PowerShell command on a Delivery Controller
  3. C. By upgrading to premium licenses
  4. D. By configuring a Citrix policy

Correct Answer: A

Page 8 of 37

Post your Comments and Discuss IBM 1Y0-204 exam with other Community members: