March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Citrix 1Y0-401 Dumps

Page: 1 / 15
Total 449 questions

Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Question 1

Which reason explains why a Citrix Architect would identify the SQL environment as a cause of potential issues in CGE's current deployment?

Options:

A.

Use of SQL authentication

B.

Lack of backup and restoration procedures

C.

Lack of identical servers in different datacenters

D.

Network bandwidth between congested datacenters

Question 2

Which two issues could CGE's current home directory storage strategy cause? (Choose two.)

Options:

A.

Slow logons

B.

Unverified data backups

C.

High IOPS on the storage appliance

D.

High CPU usage on the XenApp servers

Question 3

What should a Citrix Architect do to simplify printer driver management for CGE's Back Office end-user group?

Options:

A.

Use the Citrix Universal Print Server.

B.

Enforce the use of the Citrix Universal Printer Driver.

C.

Manually install printer drivers on the XenApp servers.

D.

Modify the printer driver format of the Citrix Universal Printer Driver.

Question 4

A Citrix Architect plans to update the virtual environment in CGE's Jurong datacenter.

Which constraint should the architect address to satisfy CGE's stated business needs?

Options:

A.

Lack of shared storage

B.

1 Gb network infrastructure

C.

Datacenter power and cooling

D.

Mixed-server hardware landscape

Question 5

After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.

What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)

Options:

A.

It allows the end users to install custom software.

B.

It gives the end users full rights over the system drive.

C.

It requires less storage space than dedicated desktops.

D.

It allows for high availability in a disaster recovery scenario.

Question 6

Which component of the CGE environment should be updated before implementing a XenDesktop virtual desktop solution in the Houston datacenter?

Options:

A.

Server infrastructure

B.

Network connectivity

C.

Storage infrastructure

D.

Power and cooling infrastructure

Question 7

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

Options:

A.

Two StoreFront servers in a single StoreFront server group.

B.

Two NetScalers in a high availability pair, with load balancing pointing to a single StoreFront server.

C.

Three NetScalers in a cluster, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

D.

Two NetScalers in a high availability pair, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Question 8

Which risk could lead to a lengthy farm outage in the event of a corrupt SQL data store?

Options:

A.

SQL server backups are encrypted

B.

An untested SQL backup and restoration process

C.

SQL servers that are NOT running on the same service packs

D.

The use of SQL Mirroring instead of SQL AlwaysOn Availability Groups

Question 9

A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image.

Which two factors helped guide the architect's recommendation? (Choose two.)

Options:

A.

A reduction in Hotfix testing time

B.

CGE's planned upgrade to Microsoft Office 2013

C.

The use of both applications by all CGE end users

D.

End-user complaints about slow application launch times

Question 10

Which end-user group does a Citrix Architect need to consider when designing a remote access solution for CGE?

Options:

A.

Sales

B.

Back Office

C.

Technicians

D.

Executives/Management

Question 11

Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 12

Why would the architect choose active-passive bonding when configuring network interfaces for storage networks?

Options:

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Question 13

Scenario:

CGE's security administrator mandates that only Gateway services can reside in the DMZ and that all StoreFront traffic must be load balanced. The network administrator requires a resilient solution.

Which design recommendation should a Citrix Architect make to meet these requirements?

Options:

A.

Deploy six NetScaler appliances: two in each regional datacenter.

B.

Deploy two NetScaler appliances: one in the primary and one in the secondary datacenter.

C.

Deploy four NetScaler appliances: two in the primary and two in the secondary datacenter.

D.

Deploy 12 NetScaler appliances: four in the primary and four in each regional datacenter.

Question 14

Scenario:

Each XenServer host has four 10GB network cards - two bonded for storage and management separated by separate VLAN, and the two bonded for guest VM networks. The CIO would like to see network traffic distributed across all links to maximize their utilization. Switches to which the Hypervisors will connect to support 802.3ad.

How should the architect configure the guest VM network?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Question 15

Why is deploying four NetScaler appliances - two in the primary and two in the secondary datacenter with a NetScaler virtual server binded to a redirection policy, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 16

Why is a design with 12 NetScaler appliances, in which each datacenter deploys three NetScaler virtual servers configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront server, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 17

Scenario:

Each XenServer host has six 10GB network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic. All switches in the environment support 802.3ad and adaptive load balancing.

How should the architect configure the storage network interfaces?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Question 18

Scenario:

CGE's security administrator mandates that only Gateway services can reside in the DMZ and that all StoreFront traffic must be load balanced. The network administrator requires a resilient solution.

How should the architect deploy the six NetScaler appliances in each regional datacenter?

Options:

A.

Deploy a NetScaler appliance in each datacenter's internal network for load balancing, and a NetScaler appliance in each datacenter’s DMZ for Gateway traffic.

B.

Deploy a NetScaler appliance in each regional datacenter's internal network for Gateway traffic, and another in each datacenter’s DMZ for load balancing.

C.

Create three NetScaler virtual servers configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server.

D.

Create six NetScaler virtual servers in high-availability pairs configured with the subnets of the three sites, and bind them to redirection policies that are configured in ICA Proxy mode using the StoreFront server.

Question 19

Why is a design with 12 NetScaler appliances, in which each datacenter deploys an HA pair in the internal network for load balancing and an HA pair in the DMZ for Gateway traffic, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Question 20

Why would the architect choose LACP bonding when configuring bonded network interfaces for guest VM networks?

Options:

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Question 21

Which two issues should a Citrix Architect address for end users? (Choose two.)

Options:

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Question 22

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

Options:

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Question 23

Which two risks exist in the access layer of the CGE environment? (Choose two.)

Options:

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Question 24

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

Options:

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Question 25

CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session.

Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

Options:

A.

Research

B.

Engineers

C.

Back Office

D.

Executives/Management

Question 26

What should a Citrix Architect identify as a potential security risk that should be resolved in the next design, based on the current provision for external access?

Options:

A.

Web Interface is used

B.

Online Plug-in 12.1 is used

C.

NetScaler Gateway is used to load balance StoreFront

D.

Single-factor authentication is used for external access

Question 27

Which two CGE end-user groups do NOT currently have their profile settings retained between sessions? (Choose two.)

Options:

A.

Sales

B.

Engineers

C.

Technicians

D.

Executives/Management

Question 28

What should CGE do to all corporate-owned and non-corporate-owned Windows client devices to ensure an optimal end-user experience?

Options:

A.

Upgrade all clients to Receiver 4.2.

B.

Install native printer drivers on all clients.

C.

Install the CloudBridge Plug-in on all clients.

D.

Install Citrix Profile management on all clients.

Question 29

Which action would improve the end-user experience for Technicians and Engineers?

Options:

A.

Apply a Citrix policy to enable lossless graphics

B.

Apply a Citrix policy to disable Queuing and Tossing

C.

Apply a Citrix policy to enable Desktop Composition Redirection

D.

Apply a Citrix policy to limit graphics quality based on available bandwidth

Question 30

Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?

Options:

A.

HDX Monitor

B.

Citrix Director

C.

Citrix EdgeSight

D.

Citrix AppCenter Console

Question 31

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect implement a set of Group Policies for each OU?

Options:

A.

Configure loopback processing with merge at the root level.

B.

Configure loopback processing with replace at the root level.

C.

Configure loopback processing with merge at the regional level.

D.

Configure loopback processing with replace at the regional level.

Question 32

Scenario:

CGE has a new XenApp image for hosting office applications and will use Provisioning Services to deploy the servers hosting these applications. However, CGE is concerned that their current strategy for deploying antivirus definition updates will reduce the performance of the provisioned servers.

Additionally, the Security team is concerned about the frequency of the antivirus definition updates and would like to have as many updates as possible without reducing performance of the provisioned disk.

Which change should a Citrix Architect recommend to CGE's current strategy for deploying antivirus definitions?

Options:

A.

Configure the antivirus client to store definition updates on a CIFS share.

B.

Restart the servers each day to clear the Provisioning Services write cache.

C.

Configure the antivirus client to store definition updates on a locally, non-provisioned disk.

D.

Disable automatic antivirus definition updates and update the definitions manually during each Provisioning Services image update.

Question 33

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect ensure full control over which Citrix policies are applied?

Options:

A.

Configure the Citrix policies in the GPOs.

B.

Create one Citrix Policy for each region.

C.

Create Citrix policies filtered by end users and Delivery Groups.

D.

Create Citrix policies and filter settings based on Client Name.

Question 34

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on.

B.

It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on.

C.

It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on.

D.

It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies.

Question 35

Which solution meets the criteria for reducing the general IT costs for the Research and Training user group to access their applications?

Options:

A.

VM Hosted applications

B.

Streamed server OS machines

C.

Dedicated desktop OS machines

D.

Pooled desktop OS machine with Personal vDisk

Question 36

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that L2TP be implemented?

Options:

A.

By using NetScaler

B.

By implementing secure Delivery Groups

C.

By configuring an Active Directory Group Policy to configure L2TP

D.

By installing a Windows Server OS with Routing and Remote Access Service

Question 37

CGE wants to upgrade to SQL Server 2014 in order to support backend SQL databases that will support the next Citrix environment. The key requirement is high availability for all nodes in the different geographical regions.

How should a Hosted VDI FlexCast model be implemented to allow end-user-installed applications?

Options:

A.

By using Citrix Profile management

B.

By using Personal vDisks

C.

By using statically assigned virtual desktops

D.

By using a network share that contains the App-V packages

Question 38

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

Which configuration should the architect recommend for the new external access architecture?

Options:

A.

One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device.

B.

A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.

C.

A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site.

D.

One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs.

Question 39

Which consideration is unnecessary for the PositivelyPeople application in the new environment?

Options:

A.

File security

B.

Secure remote access

C.

Access to legacy mainframe

D.

Support for secured print jobs

Question 40

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Which design recommendation should the architect make when designing the new Active Directory structure?

Options:

A.

Create one OU as a root for the new environment and move Citrix policies from Citrix Studio to a GPO.

B.

Create one OU for each region and use a set of Group Policies for each regional OU.

C.

Create one OU for each region and only use Citrix policies.

D.

Create one OU as a root for the new environment and enable loopback processing.

Question 41

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What are the benefits of using Hosted Shared servers and manually installing the operating system?

Options:

A.

It provides the highest end-user density at the lowest cost.

B.

It provides the greatest level of end-user personalization and control.

C.

It offers the lowest storage performance requirement and the highest end-user density.

D.

It offers the lowest cost and the greatest application compatibility.

Question 42

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Why does using Provisioning Services and leveraging snapshots help manage the image versioning process?

Options:

A.

It enables rollbacks.

B.

It manages version control.

C.

It leverages storage array features to offload host processing.

D.

It automatically deploys the latest drivers and patches.

Question 43

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

Why is separating workloads by roles, creating a resource pool comprising a maximum of 16 XenServer hosts, and implementing multiple storage repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery purposes the best design solution?

Options:

A.

It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.

B.

It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.

C.

It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicting situations. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.

D.

It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Question 44

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

Why is deploying MGMT in a Hosted Shared environment on Windows Server 2008 R2 with Machine Creation Services the best solution?

Options:

A.

It offers a faster change process.

B.

End users are already comfortable working in a shared environment.

C.

It prevents XenApp server crashes.

D.

It enables faster rollbacks.

Question 45

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

Why is separating workloads by roles, creating a resource pool comprising a maximum of eight XenServer hosts, and implementing a storage repository for virtual disks, XenMotion, high availability, and disaster recovery backups the best design solution?

Options:

A.

It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.

B.

It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.

C.

It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicts. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.

D.

It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Question 46

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

How should the architect recommend that the target devices boot from the Provisioning Services server?

Options:

A.

By configuring a Windows deployment server

B.

By using SFTP

C.

By using FTP

D.

By using DHCP

Question 47

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

Why is separating workloads by roles, creating a resource pool comprising a maximum of 32 XenServer hosts, and implementing multiple store repositories for virtual disks, XenMotion, high availability, and backups for disaster recovery the best design solution?

Options:

A.

It ensures the logical separation of infrastructure and virtual desktop workloads, and facilitates management and expansion capabilities.

B.

It provides workload flexibility to more efficiently leverage available resources within a resource pool, and facilitates expansion options. In addition, daily backups create minimal downtime for critical workloads.

C.

It separates infrastructure and virtual desktop workloads according to resource usage characteristics to avoid conflicting situations. In addition, it provides critical database services with sufficient workload-specific resources and failover capabilities.

D.

It ensures the logical separation of all workloads and virtual desktops. In addition, the backup solution reduces the risk of data loss and minimizes downtime.

Question 48

Scenario:

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity.

Why does enabling 'Active write back' when configuring Citrix Profile management to allow standardization of profiles benefit CGE's Sales end-user group?

Options:

A.

It improves application performance.

B.

It simplifies home drive cleanup.

C.

It minimizes the required storage needed for folder redirection.

D.

It improves data accuracy in volatile environments.

Question 49

Scenario:

CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.

Why is Windows Deployment Services the best image management method for this environment?

Options:

A.

It allows for user-installed applications.

B.

It reduces machine provisioning time.

C.

It allows for the use of local user profiles.

D.

It supports the use of customized language packs.

Question 50

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Which tool should a Citrix Architect recommend for those groups?

Options:

A.

Provisioning Services

B.

Hypervisor templates and snapshots

C.

Windows Deployment Services

D.

Machine Creation Services

Question 51

Contractors need a consistent environment to perform quality assurance testing of applications.

Which two types of solutions should the architect recommend? (Choose two.)

Options:

A.

Random server OS machines

B.

Pooled desktop OS machines

C.

Dedicated desktop OS machines

D.

Pooled desktop OS machines with Personal vDisk

Question 52

The company is implementing XenDesktop globally for desktop virtualization.

Why should an architect recommend multiple controllers in each datacenter?

Options:

A.

To protect against controller database failure

B.

To enable users to maintain uninterrupted connection to their desktops

C.

To protect users from WAN link failure

D.

To ensure that new desktop and application sessions can be launched

Question 53

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

How should the architect recommend that the target devices boot from the provisioning server?

Options:

A.

By configuring a Windows deployment server

B.

By using SFTP

C.

By using FTP

D.

By using DHCP

Question 54

What are the benefits of using hosted shared environment with Personal vDisk?

Options:

A.

It retains the single image management function while allowing users to install applications

B.

It provides a high level of security while allowing user customization

C.

It has a low storage performance requirement and high user density

D.

It delivers low-cost and high application compatibility

Question 55

Which two business drivers are critical for the Contractors user group? (Choose two.)

Options:

A.

Printing security

B.

Secure remote access

C.

Granular security policies

D.

Support for mobile devices

Question 56

The architect recommended pooled desktop OS machines with Personal vDisks for the Nurses, Imaging and Radiology user group. How should an engineer implement antivirus software on these desktop OS machines?

Options:

A.

Install the antivirus software into the base image.

B.

Deploy the antivirus package as an App-V application.

C.

Deploy the antivirus software through a Group Policy startup script.

D.

Install the antivirus software in the master Personal vDisk as a user-installed application.

Question 57

Why should CPU and memory consumption be used to identify bottlenecks?

Options:

A.

Excessive CPU and memory consumption will slow the loading of vDisks and cache files by Provisioning Services

B.

Excessive CPU and memory consumption on the vDisk store will slow down the PXE boot process.

C.

Excessive CPU and memory consumption can increase fragmentation of the TFTP boot strap file.

D.

Excessive CPU and memory consumption can increase fragmentation of the vDisks.

Question 58

Why is this the best design for the XenServer resource pools?

Options:

A.

This design ensures that all server workloads and virtual desktop workloads are logically separated and do NOT interfere with each other. Furthermore, it ensures easier management and expansion capabilities.

B.

This design provides flexibility for all workloads to use available resources within a resource pool more efficiently and ensures expansion options if the environment should grow. Furthermore, performing a backup on a daily basis provides availability of critical workloads with some downtime.

C.

This design separates server workloads from virtual desktops according to the different resource usage characteristics and avoids conflicting situations. Also, critical database services have sufficient resources within their workload-specific resource pool and failover capabilities.

D.

This design ensures logical separation of all workloads and virtual desktops. Also, providing a backup solution reduces the risk of data loss and minimizes downtime.

Question 59

What are the benefits of using L2TP to meet the company’s compliance requirements?

Options:

A.

It encrypts internal ICA traffic

B.

It encrypts ICA traffic from remote users

C.

It is required to enable the SSL Relay service

D.

It complies with industry-standard SSL encryption requirements.

Question 60

Scenario: The company is designing a cost-efficient environment for the call center workers. The IT department is replacing the existing thin clients with newer models.

Only block storage is available on the shared storage of the hypervisor.

How should the architect recommend that Hosted VDI be provisioned to fulfill the virtualization requirements for the call center?

Options:

A.

By using Machine Creation Services

B.

By using Provisioning Services

C.

By manually installing the operating system

D.

By using cloned VM templates

Page: 1 / 15
Total 449 questions