Citrix Related Exams
1Y0-440 Exam
Scenario: A Citrix Architect is asked by management at the Workspacelab organization to review their existing configuration and make the necessary upgrades. The architect recommends small changes to the pre-existing Citrix ADC configuration. Currently, the Citrix ADC MPX devices are configured in a high availability pair, and the outbound traffic is load balanced between two Internet service providers (ISPs). However, the failover is NOT happening correctly. The following requirements were discussed during the design requirement phase:
• The return traffic for a specific flow should be routed through the same path while using Link Load Balancing.
• The link should fail over even if the ISP router is up and intermediary devices to an ISP router are down.
• Traffic going through one ISP router should fail over to the secondary ISP, and the traffic should NOT flow through both routers simultaneously. What should the architect configure to meet this requirement?
Scenario: A Citrix Architect and a team of Workspacelab members met to discuss requirements during the design discussion for a Citrix ADC design project. Specifically, the existing Citrix ADC Configuration must be modified to meet the following authentication conditions:
• Provide users with domain drop-down page
• If the users select workspacelab.com. perform single factor authentication using LDAP
• It the users select AAATM.COM, perform two factor authentication using LDAP and RADIUS
• If the users select NSI-TEST. COM. perform SAML authentication using ADFS
What should the architect use to bind the AAA virtual server to the Citrix Gateway virtual server?
Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production NetScaler appliances that do NOT align with the designed security requirements.
Click the Exhibit button to view the configured command policies for the production NetScaler deployment.

To align the command policy configuration with the security requirements of the organization, the _______ for ______should change. (Choose the correct option to complete the sentence.)