60
CCIA 2012 Citrix Exam 1Y0-A16 USA Number : 1Y0-A16 Passing Score : 550 Time Limit : 180 min File Version : 1.1 http://www.gratisexam.com/ WRA - Rev 1.1 Jul 30, 2012 This exam base on tree structure, be care! 77 Questions all response and with references 40 % exam value, questions depend of the main questions, all these question appear on the exam, but is base on logical response. Case Study: 1 Case Study: Healthy helping Hands - Citrix Delivery Center Infrastructure Assessment Executive Summary: Healthy Helping Hands is a mufti-national health care equipment company with operations in 10 countries. The organization manufactures and distributes a variety of health care products ranging from its unique baby breathing devices to diabetes supplies to wheelchairs. Based on current projections, Health Helping Hands expects to expand the company primarily through small, targeted acquisitions as well as a modest amount of organic growth The organization has been affected by numerous technical challenges, specifically with delivering applications to its users - 4 000 employees approximately 500 of which are contractors. In addition, because the timing and size of acquisitions is unpredictable, the IT staff must have the ability to adjust the technical integration of newly acquired companies to accommodate unpredictable timing for example, while a period of several weeks or months may have been planned, the integration may need to be completed in several days These challenges caused the company to investigate the Citrix Delivery Center offerings leading to the ClO's decision to move forward with those Citrix Delivery Center products and features that address IT and user needs. With users spread throughout numerous offices, some with and some without IT staff, it is imperative that supportability administration and security are factored into the new solution However, for the 4 000 employees and contractors within the organization the CIO has mandated that users should be provided with a highly available virtualization solution that best suits their job function. 1.1 Current Citrix Environment Healthy Helping Hands currently runs a Citrix Presentation Server 4 0 farm based on Windows Server 2000 that services the Human Resources (HR) applications- Because this product has reached 'end- of-life and is no longer supported and this farm has had numerous growth issues the CIO has designated that the new design will incorporate XenApp, XenDesktop, and/or XenServer as appropriate to address present and future application and access requirements. However, before moving into the design phase, the current Presentation Server environment, as well as infrastructure, user requirements, applications and related areas have been

WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

CCIA 2012 Citrix Exam 1Y0-A16 USA

Number: 1Y0-A16Passing Score: 550Time Limit: 180 minFile Version: 1.1

http://www.gratisexam.com/

WRA - Rev 1.1 Jul 30, 2012

This exam base on tree structure, be care!

77 Questions all response and with references

40 % exam value, questions depend of the main quest ions, all these question appearon the exam, but is base on logical response.

Case Study: 1Case Study: Healthy helping Hands - Citrix Deliver y Center

Infrastructure Assessment Executive Summary:

Healthy Helping Hands is a mufti-national health care equipment company with operations in 10 countries . Theorganization manufactures and distributes a variety of health care products ranging from its unique babybreathing devices to diabetes supplies to wheelchairs. Based on current projections, Health Helping Handsexpects to expand the company primarily through small, targeted acquisitions as well as a modest amount oforganic growth The organization has been affected by numerous technical challenges, specifically withdelivering applications to its users - 4 000 employees approximately 500 of which are contractors. In addition,because the timing and size of acquisitions is unpredictable, the IT staff must have the ability to adjust thetechnical integration of newly acquired companies to accommodate unpredictable timing for example, while aperiod of several weeks or months may have been planned, the integration may need to be completed inseveral days These challenges caused the company to investigate the Citrix Delivery Center offerings leadingto the ClO's decision to move forward with those Citrix Delivery Center products and features that address ITand user needs. With users spread throughout numerous offices, some with and some without IT staff, it isimperative that supportability administration and security are factored into the new solution However, for the 4000 employees and contractors within theorganization the CIO has mandated that users should be provided with a highly available virtualization solutionthat best suits their job function.

1.1 Current Citrix EnvironmentHealthy Helping Hands currently runs a Citrix Presentation Server 4 0 farm based on Windows Server 2000that services the Human Resources (HR) applications- Because this product has reached 'end- of-life and is nolonger supported and this farm has had numerous growth issues the CIO has designated that the new designwill incorporate XenApp, XenDesktop, and/or XenServer as appropriate to address present and futureapplication and access requirements. However, before moving into the design phase, the current PresentationServer environment, as well as infrastructure, user requirements, applications and related areas have been

Page 2: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

assessed to determine current status, issues and considerations for the new design. The Consulting projectteam worked on-site at Healthy Helping Hands during the week of February 1-5„ 20.10, conducting thisInfrastructure Assessment as defined in the Statement of Work, dated January 20, 2010. This documentrepresents the deliverable for the infrastructure Assessment phase of the project.

1.2 Key Project FindingsDuring the week of February 1,2010,an assessment of Healthy Helping Hands’Application.Delivery environmentwas conducted,and the project team determined several key findings:

The current encironment is built on 32-bit architecture,although some hardware may support 64-bitarchitecture.The CIO wants to migrate all IT platforms to 64-bit during upgrade/replacement programs only.

1.3 Next StepsAfter thoroughly reviewing this document, Healthy Helping Hands should take the following actions within theshort term (one-to-two weeks) and long term (several weeks or longer):Long-Term Activities:

Migrate all IT platforms to 64-bit for compatibility and support.

1.4 Issue Status and ResolutionThe following issues were also addressed during the course of this assessment:

TBC / Users

Currently, only the Human Resources group accesses applications hosted on Citrix Presentation Server 4 0HR users typically tog on to the HR applications suite as needed, approximately two or three times throughoutthe day and then tog off when finished due to security requirements. When a new Human Resources employeejoins the company, he/she is added to this group and thus gains access to the HR applications suite In general,this group reports overall satisfaction with application access through Presentation Server. However, someusers have reported printing issues as described in Section 1 4. With the exception of the San Francisco andNew York locations where the majority of the IT staff is located, users are generally frustrated with the IT staffbecause of hardware and application access issues associated with traditional application delivery In formaland informal settings the CIO has presented the concept of vitalizing applications and desktops, and usershave responded favorably Thus, the CIO has decided that Healthy Helping Hands will virtualize all applicationsand desktops, making the delineation based on job requirements.

Client DevicesAll of the HR users currently accessing the Presentation Server-based applications do so by means ofWindows XP or Windows Vista laptop or desktop computers. With the exception of Customer Service, mostoffice users have computers that run Windows XP or Vista. The manufacturing employees have access tolocked-down antiquated computers on the Manufacturing floor and common areas. For several years, theManufacturing Department has reported numerous problems related to frequent equipment failures. This hasnormally been blamed on the environmental conditions, such as dust dirt and vibration, found on themanufacturing floor. The Customer Service employees also have antiquated computers Both the manufacturingand customer service devices will be replaced with new thin client devices as part of this initiative. Someemployees have purchased their own handheld devices, such as iPhone, HP iPAQ with Windows Mobile andBlackberry. As part of an earlier initiative, Microsoft ActiveSync is installed on the Citrix servers to facilitateWindows-based PDA sync for a small group of users. This feature is still available but should be disabled forsecurity reasons. These devices are not officially supported by the ITdepartment at Healthy Helping Hands, only 'best effort" support is provided. Current breakdown of computerdevices at Healthy Helping Hands:

TBC / Applications

The HR applications suite, named PositivelyPeople, is based on a front-end application that provides access tovarious modules, including payroll time sheets, vacation requests, new hires and former employees. Thesensitive data in the PositivelyPeople application must be treated with strict confidentiality and must only beaccessible to members of the HR user group; distribution of the data must be prevented. The output of themodules can be in either Microsoft Word or Excel file formats, $o these applications are co-located withPositivelyPeople on the same Presentation Servers and icewise presented as published applications. Thus,users are presented with three applications, PositivelyPeople, Word and Excel, and within these applications

Page 3: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

each user creates his/her own customized view. Installation of PositivelyPeople is performed manually basedon a thoroughly documented process and Installation Manager is used to deploy Word and Excel. Because onlythese three applications are published there is no process for testing and integrating new applications. Allapplications are published with consistent settings In addition, all users require access to office productivityapplications including e-mail. Several months ago Healthy Helping Hands explored hosting the CAD applicationon XenApp 5.0 Platinum for Windows Server 2003 (x86) , but only a maximum of five concurrent usersessions could successful be hosted on each server due to heavy resource requirements even with CPU andmemory optimization enabled. The vendor for PositivelyPeople has tested and certified the application to runon Windows Server 2008 . The vendor has also found that leveraging High Availably for XenApp applicationswould be beneficial Breakdown of all user groups and their application requirements:

Application Access

Users access applications by means of the Web Interface. The internal Web Interface site, http://applications.healthyhelpinqhands.com is accessible to all employees but only presents applications to theHuman Resources group at this time. If the Web Interface will be used in the future environment, this URLshould be used because this employee group is already familiar with it. Most of the HR users access theirapplication suite internally; however the IT staff recently created a Secure Gateway/Web Interface server in theDMZ so that users could access their applications while traveling. However, this server is based on olderhardware and has had intermittent issues over the past few weeks. Thus, most HR users can no longer rely onhaving remote access to their applications. In the new environment, all employees should have remote accessto their applications and/or desktops, with the exception of manufacturing floor employees and contractors.

XenApp Farm

The XenApp farm is based on the following:•One dedicated data collector

Page 4: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

•One internal Web Interface server•One Citrix/Microsoft Terminal Services license server•One SQL Server 2005 server hosting the Data Store and EdgeSight databases•One web server hosting EdgeSight web server and SQL Reporting Services•One antiquated file server hosting old user profiles•One Secure Gateway Web Interface server located in the DMZ•Eight Presentation Server 4 0 serversHotftx Rollup Pack 2 (PSE400W2K3R02) is the only hotfix retailed on each of the Presentation Server 4 0servers.

A Citrix policy is configured for all Human Resources group users and has these characreristics:

Page 5: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Virtualized Desktops

At the current lime, virtualized desktops are not used. Published desktops are only made available toadministrators, and all users in the HR group access their three applications by means of publishedapplications. Because all applications will be virtualized in the future Healthy Helping Hands will considerpublished desktops or virtualized desktops for users based on what is deemed most appropriate. The CIO hasdetermined that where virtualized desktops will be used High Availability is required.

Databases

A single SQL Server 2005 server currently houses only the Presentation Server 4.0 data store andEdgeSight database . This server is maintained by the Healthy Helping Hands database administrator, and afull backup is performed each night as part of the regular maintenance program. The backend database for thePositivelyPeople application is housed at the main data center. It is based on a clustered configuration of SQLServer 200 5. Healthy Helping Hands is moving all databases to SQL Server 2008 based on robust newhardware and virtualized servers. They would like to transition the Citrix and PositivelyPeople databases to thisnew platform as soon as reasonably possible.

Windows Server and Active Directory

The Presentation Servers are based on Windows 2000 Server Healthy Helping Hands understands thatMicrosoft has ended support for this platform and plans to move to Windows Server 2003. The TerminalServices License Server is hosted on a single domain controller wrth 100 Client Access Licenses (CALs).Because Windows XP devices include embedded Windows 2000 Server Terminal Services licenses, onlyabout half of the Terminal Services CALs have been consumed.

The IT staff of Healthy Helping Hands has built all of the servers in the Presentation Server farm manually.These servers have been in service for several years with no significant changes, so the process of building orrebuilding a server has not been a regular part of maintenance tasks However, an automated, easy-to-useserver build process must be incorporated as part of the new farm design. The Citrix-related servers arehoused within Active Directory as follows:

Page 6: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

•Domain: healthyhelpinghands.com•Organizational Unit (OU). Citnx Servers•OU: Presentation Servers (contains the Data Collector and member servers in the production farm)•OU Other (contains all other servers)

No logon scripts are enabled for users: Healthy Helping Hands abandoned logon scripts last year in favor ofGroup Policy Objects. Healthy Helping Hands applies a minimal set of Group Policy Objects (GPOs) to thePresentation Servers. Only one GPO is applied directly to the Citrix Servers OU, which configures InternetExplorer settings. Other policies are applied at a higher level and include settings for Windows Updates.Roaming profiles were implemented previously, but issues were experienced with one of the PositivelyPeoplemodules. Instead, local profiles are being used and administrators must manually delete the profiles whennecessary. No Terminal Services-specific home drives have been implemented as they have been deemedunnecessary.

Network Architecture

The site layout of Healthy Helping Hands:

Healthy Helping Hands is a worldwide organization comprised of four data centers in New York, San Francisco,London and Hong Kong and numerous regional offices each connected by a private wide area network to adata center. Additionally, hundreds of users work from small regional offices. Appropriately 20% of all userswork from home offices or travel part-time. This is likely to increase significant due to a new flexible workingpolicy for corporate users. Because of this, reliability of remote access will become more important. The CIOhas emphasized that internal WAN traffic must be kept to a minimum. As such, each user has a “home” datacenter, to which he/she primary connects; if there is a failure, virtualized applications should fail over to thedesignated backup data center. Based on this architecture the data centers are designed to support specificfunctions;

Enterprise Storage

User data is stored on the HP SAN. Healthy Helping Hands plans to have a Hewlett-Packard StorageWorkssolution with a capacity of more than 1000TB space physically located at each of the four main data centers.Initially, only about 200TB of space will be used, and there is an internal effort underway to delete files that areno longer required. Healthy Helping Hands plans to upgrade the storage solution in order to incorporateredundancy, High Availability and replication between the primary and backup data centers.

Server Hardware

Characteristics of all physical servers associated with the Presentation Server 4 0 environment; Going forward,Healthy Helping Hands is planning to purchase new hardware to support the plan virtualization environment.This capital expenditure has received preliminary budgeting approval; however, where feasible and reasonable,server virtualization should be incorporated m order to maximize the efficiency of data center operations.

Security

Users log on to the Presentation Servers based on Active Directory credentials. In addition, thePositivelyPeople application requires secondary credentials. Healthy Helping Hands explored using CitrixSingle Sign-on (Password Manager) but the rollout failed because training was not provided to users. Due tothe sensitive nature of the HR application, shadowing was disabled during installation of the PresentationServers. Going forward, however, shadowing should be enabled during installation and only allowed by Citrixpolicy for Level 3 support personnel Anti-virus software is installed on each server, and it is automaticallyupdated every hour. HR users can access their applications externally by means of the Secure Gateway server;however, this server has had intermittent failures recently. A reliable remote access solution is a requirementfor the design project.

Systems Monitoring and Management

Healthy Helping Hands primarily uses EdgeSight Service Monitoring to monitor the Presentation Serverenvironment. When the farm was first implemented, Resource Manager and a centraized monitoring tool wereused as the primary monitoring tools but were abandoned when EdgeSight 5 0 was implemented about six

Page 7: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

months ago. Because EdgeSight Service Monitoring is included with Platinum licensing, there was noadditional cost to Healthy Helping Hands.

Disaster Recovery

Although the data center in San Francisco serves as the disaster recovery site for many of Healthy HelpingHands IT operations the Presentation Server environment is not incorporated into this site. A detailed DisasterRecovery Plan for the Citrix environment does not exist at this time. As such, the Citrix environment has notbeen included in any disaster recovery test. Going forward, the CIO has mandated the use of the SanFrancisco data center for disaster recovery.

Page 8: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Exam A

QUESTION 1Which three sections should an architect incorporat e into the Project Initiation Document (PID) toensure that the project meets the business and tech nical requirements of Healthy Helping Hands?(Choose three.)

A. Risk LogB. Stage PlanC. Project ScopeD. Detailed DesignE. Resource Requirements

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:

QUESTION 2Scenario: The IT managers at Healthy Helping Hands are looking at a project to expand and upgradetheir Citrix environment to meet their current and future business needs. The main businessrequirement for this project is to provide secure a nd reliable access to company-owned applicationsfor all the current and future staff, including con tractors around the world. Which two issues present arisk to the project and its deadlines based on the assessment document? (Choose two.)

A. Print jobs intermittently failB. A dispersed user communityC. Wide range of device types in useD. Unpredictable timing and size of acquisitionsE. External access only through an intermittently failing Secure Gateway

Page 9: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 3How should an architect recommend delivery applicat ions to the Manufacturing users at HealthyHelping Hands?

A. Publish the applications to new PCs.B. Publish the applications to their existing devices.C. Use XenDesktop to deliver disk-based thin clients.D. Publish the applications to new diskless thin clients

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 10: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 4Scenario: The IT managers at Healthy Helping Hands are looking into making New York and SanFrancisco their two principal sites, each capable o f failing over to the other. This will be one of th emajor requirements for the Citrix infrastructure de sign. Which two backend infrastructure componentsneed improvements in disaster recovery support as p art of this project? (Choose two)

A. HP SAN storageB. User Profile serverC. PositivelyPeople databaseD. Terminal Services license server

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

Page 11: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 5Scenario: As Healthy Helping Hands continues to exp and, the demand placed on the current solutionwill increase significantly. As such, an architect must access the current hardware to indentifyconstraints against the company’s future growth. Wh ich statement best describes a current hardwareconstraint?

A. Hard drive capacity cannot be expanded due to space limitations.B. Existing server compressors are not capable of supporting 64-bit architecture.C. The existing 1Gbps server NIC speed is insufficient for home user connectivity.D. Server memory is at or above the maximum supported by the current hardware and operating system.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 12: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 6Healthy Helping Hands has decided to replace the PC s used by the Customer Service andManufacturing teams with new thin clients, as the P Cs are running operating systems which are nolonger covered by extended support. How many of the se thin clients will need to be purchased?

http://www.gratisexam.com/

A. 50B. 250C. 3000D. 3050

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 13: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Windows 2000 is not support by Microsoft and Citrix.

QUESTION 7The architect is deciding how to best delivery the Healthy Helping Hands application suite. Based onthe information given in the assessment document, w hich application should be streamed to desktopsrather than publish?

A. Finance application suiteB. Engineer's CAD applicationC. Manufacturing ERP application suiteD. HR PositivelyPeople application suite

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 8Printing security is a key requirement for the Huma n Resources department of Healthy Helping Hands.Which printing policy setting should be configured to enhance security for the HR department?

A. All User PrintersB. Session Printers onlyC. User's Default Printer onlyD. Local (Non-Network) Printers only

Correct Answer: BSection: (none)Explanation

Page 14: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Explanation/Reference:

QUESTION 9Given the three user types in the Healthy Helping H ands environment, task workers, mobile workers,and knowledge workers, which two user groups would be classified as knowledge workers? (Choosetwo.)

A. SatesB. MarketingC. EngineersD. ManufacturingE. Customer Service

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

QUESTION 10Based on the assessment document, which two actions must the architect take regarding CitrixLicensing in order to properly assess the environme nt?

Page 15: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

A. Restart the IIS Service.B. Restart the Citrix Licensing Service.C. Add the REPORTLOG keyword to the options file.D. Create a file called REPORT.LOG in C:\Program Files\Citrix\MyFiles.E. Select a network share to which the local system account has write access.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Symptoms

Reportlog.rl files are no longer readable in the License Management Console. You see the following errormessage in the console:

"25-Apr-2005 11:02:22AM Error: In C:\share\reportlog1.rl_o license server hostid changed ... Hint: This reportlog may have been written to by multiple servers or vendor daemons. No further events will be read from thisfile."

Refer to the following screen shot:

The following error message appears in the reportlog.rl file:

"Warning: Graph for "MPS_ENT_CCU" is too large"

Cause

Page 16: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

The Citrix License Server is coded in the reportlog.rl file. If the code changes (due to a failover in a cluster or achange in the server name) the reportlog.rl file is still written to, but the License Management Console is nolonger able to open the file.

The Reportlog.rl file is not written in clear text, but it is a text file.

Within the collected data, the head sections of separate time periods can be identified. For example:

# FLEXnet Licensing Report Log, 14 February, 2007 (17:52), "CITRIX" on "XYZ" FLEXnet Licensing v11.3.0build 28877 Z5 5 0 C;;mm|]p2f(Nt7SD`''0*HzcRBb_#E3x

Resolution

To make the file readable again, split it into sections using the following procedure:

1. Open the reportlog.rl file with a text editor (for example, Notepad) and identify the existing sections.

2. Copy and paste the content of each section of the reportlog.rl file from the original file to empty text filesnamed reportlog_period1.rl, reportlog_period2.rl, and so on.

3. Place the newly created files in the same folder as the reportlog.rl file.

4. You can open the reports in the License Management Console and run reports for the times indicated in theheader.

QUESTION 11Scenario: Healthy Helping Hands has created a new p ilot XenApp 5 Platinum Edition farm withapplications delivered to 25 pilot users. The pilot farm includes all the applications that were previ ouslypublished to the HR users and some additional appli cations to support Manufacturing.

During the pilot week of September 14th, the users of the PositivelyPeople application reporting thatthe application was responding slowly.Fortunately, EdgeSight had been installed and confi gured in the pilot farm and was recording dataduring the pilot. Attached in the exhibit is the in formation gathered from the Transaction Network Del ayreport from EdgeSight. Which theory effectively exp lains the data that is presented in the report?

A. The XenApp server is waiting on another host to respond, most likely the server hosting thePositivelyPeople database.

B. The XenApp server is waiting on the network packet queue to clear as evidenced by the 9ms networklatency being reported.

Page 17: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

C. The XenApp server is reaching maximum capacity, and the lack of physical resources on the XenAppserver is causing the response delay.

D. The Network Delay on 9/19/2009 is probably the source of complaints from the HR Users. An averagenetwork latency of almost 9ms is unacceptable.Description: C:\Documents and Settings\Administrator\Desktop\untitled.JPG

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Error: The Citrix servers reported that they are too busy to provide access to the selected resource. Event ID30107 Document ID: CTX124886 / Created On: 13-abr-2010 / Updated On: 10-mar-2012 Average Rating: (21 ratings) View products this document applies to

Symptoms

In a XenApp environment, users launch an application and receive one or more of the following errormessages:

Launching from Online Plug-in: You have not been granted access to this published application. Citrix online plug-in could not contact the server. Please check your network connection. The remote server failed to execute the application launch request. Please contact your administrator forfurther details.

Launching from Web Interface: An error occurred while making the requested connection.

In the Application event log on the Web Interface server, you find Event ID 30107 logged by XenApp Servicesor Citrix Web Interface indicating the following:The Citrix servers reported that they are too busy to provide access to the selected resource. This messagewas reported from the XML Service at address <http://servername:xml_port>

Causes

This issue occurs because of heavy group policy use and the presence of SCOM causing a deadlock conditionbetween the Lsass.exe process, the Redirected Drive Buffering Subsystem (Rdbss.sys) driver, and theWinsock kernel.

- Or -

Citrix XenApp servers return a full load when Advanced or Custom Load Evaluators are assigned.

- Or -

This issue is caused by publishing an application to a Worker Group that contains no farm servers.

The error which occurs on the Web Interface server, (Event ID 30107), has also been observed in servers thatdo not publish applications to a worker group.

XenApp 6.0 introduces the concept of Worker Groups, which allows you to publish applications to a group ofservers as an alternative to publishing to individual servers. When an application is published to a WorkerGroup, it appears in the user’s application set.

Resolutions

Apply this Microsoft Fix - A computer that is running Windows Server 2008 R2 or Windows 7 stops responding

Page 18: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

randomly - http://support.microsoft.com/kb/2265716

- Or -

CTX115686 – XenApp Servers Return a Full Load when Advanced or Custom Load Evaluators are Assigned

- Or -

Add one or more servers to the Worker Group assigned to the published application.

If no applications are published to a Worker Group, check to see that logins are not disabled to the server. Ifthey are, re-enable logins.

More Information

Review and install recommended fixes for best stability - CTX129229 – Recommended Hotfixes for XenApp 6.0and Later on Windows Server 2008 R2

CTX115686 – XenApp Servers Return a Full Load when Advanced or Custom Load Evaluators are Assigned

CTX126663 – XenApp Error: Citrix servers reported that they are too busy to provide access to the selectedresource...

eDocs - Using Worker Groups for Enhanced Resource Access

eDocs - Web Interface Event IDs and Messages – Event ID 30107 and all others defined

This document applies to:Web Interface 5.3Web Interface 5.4XenApp 5.0 for Windows Server 2008 x64XenApp 5.0 for Windows Server 2008 x86XenApp 6.0 for Windows Server 2008 R2

QUESTION 12Scenario The IT managers at Healthy Helping Hands a re updating their environment. Recertify the HRusers have been experiencing intermittent outages i n remote access to their application. Whichsolution should be included in the project to addre ss this problem?

A. Issue company laptops to HR usersB. Replace the existing Secure Gateway server.C. Add a second Secure Gateway server to the environment.D. Request that HR users upgrade their Internet connections

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Introduction

Latency is the delay it takes for a package to travel from the server to the client, and vice versa. A simple pingcommand will tell you the latency for that ping to arrive to its destination. (called the entry “time=”)

A LAN environment usually has a low latency, as it has to travel a short distance.

When going over WAN connections or using the internet (which uses a lot of routers to go from a to b) latencycan increase. The biggest latency is seen when crossing continents or using satellites. In combination with poorbandwidth this is fatal.

Page 19: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

So, what do we need for smooth operation?

A user’s session needs roughly 20kbit for a Citrix session, and 30kbit for a Terminal Server session. Latencyshould be under 150 to operate smoothly.

Keep in mind that if the user is not using applications, nothing other than probably the keepalives (will comeback to that later) will consume some minor bandwidth, but mostly nothing will go over the line.

So it’s all about active sessions that take up bandwidth. A session can take more if the bandwidth is available,but will still work when the available bandwidth becomes smaller.

QUESTION 13Scenario: Several users in the HR user group will b e traveling to trade conferences this year to meetindustry training requirements and stay current on developing trends in the field While workingremotely, these users will need to upload presentat ions and training material distributed during theconferences onto sponsored USB keys. Based on the a nalysis document, how can an architect ensurethat the current environment allows the HR user gro up to meet this need?

A. Edit the HR Users policy to allow client mappings.B. Provide a secure FTP site for presentation and training material uploads.C. Maintain the current environment since it currently allows users to map their drives.D. Move the Secure Gateway/Web Interface server to the DMZ in the environment to allow for remote

connections.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Mapping Client Drives

Updated: 2012-04-23

Client drive mapping allows drive letters on the XenApp or XenDesktop server to be redirected to directoriesthat exist on the local user device. For example, drive H in a Citrix user session can be mapped to a directoryon the local user device running Receiver.

Client drive mapping makes any directory mounted on the local user device, including a CD-ROM, DVD or aUSB memory stick, available to the user during a session. When a server is configured to allow client drivemapping, users can access their locally stored files, work with them during their session, and then save themagain either on a local drive or on a drive on the server.Two types of drive mapping are available:Static client drive mapping enables administrators to map any part of a user device's filesystem to a specifieddrive letter on the server at logon. For example, it can be used to map all or part of a users home directory or /tmp, as well as the mount points of hardware devices such as CD-ROMs, DVDs, or USB memory sticks.Dynamic client drive mapping monitors the directories in which hardware devices such as CD-ROMs, DVDsand USB memory sticks are typically mounted on the user device and any new ones that appear during asession are automatically mapped to the next available drive letter on the server.

When Receiver connects to XenApp or XenDesktop, client drive mappings are reestablished unless automaticclient device mapping is disabled. You can use policies to give you more control over how client devicemapping is applied. For more information see the XenApp and XenDesktop documentation.To specify drives and directories to map at logon On the Tools menu, click Settings.Choose Drive Mapping from the drop-down menu. For each drive letter, the Drive Mapping list shows the diskor pathname of the user device directory mapped to the drive. In the Enable/Read/Write columns, icons displaywhether each mapped drive is enabled for use and what type of access the user will have to the drive.Select the check box in the Enable column next to an available drive letter and then click the box for the drive.Click Modify. A standard UNIX file selection dialog box appears. Select the UNIX directory you want to map and

Page 20: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

click OK. Alternatively, you can simply type the directory path in the box next to the required drive letter.The mapped directory appears in the Drive Mapping list. If the drive letter you selected is not available on theWindows server, the specified directory is mapped to another free drive letter at logon.Specify the access for the drive by clicking the corresponding read/write icons. You can use: Icon Meaning (Pair of glasses) Read access (Pair of glasses, with question mark) Prompt for read access on first access per session (Pair of glasses, obscured by cross) No read access (Pencil) Write access (Pencil, with question mark) Prompt for write access on first access per session (Pencil, obscured by cross) No write access

Ensure that Enable Drive Mapping is selected.Click OK. Log off from any server connections already established and reconnect. The same drive mappingand access settings will apply to all connection entries.To enable dynamic mapping of client drives during a sessionOn the Tools menu, click Settings.Choose Drive Mapping from the drop-down menu.Select Enable Dynamic Drive Mapping.Click OK. Note: When dynamic client drive mapping is enabled, Receiver monitors the /media and /mnt/media directoriesfor new mounts.To view mapped client drives when connected to a Windows serverFrom your session, double-click My Computer on the remote desktop. When connected to publishedapplications, users can access local drives in the same way as they would when running applications locally.To manually map a client drive on a Windows server

Mapped drives that do not appear after logon can be manually mapped from within an ICA session. Use thefollowing procedure to manually map a client drive:In the Connection view, select the connection you want to open. On the Connections menu, click Connect and log on to the server.On the server, start Windows Explorer. On the Tools menu, click Map Network Drive. The Map Network Drive dialog box appears.In the Drive list, select a server drive letter. This drive letter represents the mapped client drive. Click Browse. In the Browse For Folder dialog box, expand Client Network.Expand Client, and select the appropriate entry for your directory from the list of available client drives.If you want to have this drive available to you each time you log on to this server, select Reconnect at logon.Click OK.To configure drive mapping for floppy disks

You can manually map floppy drives on servers for access within a session. To do this, access DOS formattedfloppies mounted on your user device using the following command:

mount -t vfat /dev/fd0 /mnt/floppy

Then select the /mnt/floppy directory in the Drive Mapping dialog box.

QUESTION 14Scenario: In order to plan for the possibility of a pandemic flu, the HR department for Healthy Helpin gHands has asked an architect to test whether the in frastructure could accommodate 300 key or 'at risk"workers working from home over a two week period. B ased on the information in the assessmentdocument, can the existing infrastructure support s uch a situation?

A. No, there are insufficient licenses available to support this requirement.B. Yes, sufficient capacity exists to support this temporary requirement; no action is required.C. No. two additional servers are required to support the remote workers during this two weekD. No. the Secure Gateway/Web Interface server has insufficient capacity to support this requirement.

Correct Answer: A

Page 21: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Section: (none)Explanation

Explanation/Reference:

QUESTION 15In the future upgrade environment, Healthy Helping Hands wants to provide the IT department with theability to interact with user session for training and troubleshooting without compromising securitydemands. How can an architect meet the needs of the Healthy Helping Hands IT department?

A. Enable shadowing in the current environment.B. Use Group Policy to enable Microsoft Remote Support.C. Purchase license for a third party remote viewing software.D. Enable shadowing once the environment is migrated to XenApp 5.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Planning for Shadowing

Session shadowing monitors and interacts with user sessions. When you shadow a user session, you can vieweverything that appears on the user’s session display. You can also use your keyboard and mouse to remotelyinteract with the user session. Shadowing can be a useful tool for user collaboration, training, troubleshooting,and monitoring by supervisors, help desk personnel, and teachers.

Shadowing is protocol-specific. This means you can shadow ICA sessions over ICA and Remote DesktopProtocol (RDP) sessions over RDP only. Important: Shadowing restrictions are permanent. If you disable shadowing, or enable shadowing but disablecertain shadowing features during Setup, you cannot change the restrictions later. You must reinstall XenAppon the server to change shadowing restrictions.

Any user policies you create to enable user-to-user shadowing are subject to the restrictions you place onshadowing during Setup.

Page 22: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Shadowing is a server-level setting, so you can enable shadowing on one server and disable it on another.

Citrix does not recommend disabling shadowing as a substitute for user and group connection policies.

http://support.citrix.com/proddocs/topic/xenapp5fp-w2k3/ps-planning-shadowing-v2.html

QUESTION 16Scenario: The Healthy Helping Hands infrastructure assessment identified that the Manufacturing teamhas access to locked-down terminals in order to com plete their work. However, frequent breakdownsdue to unauthorized software installations have cau sed productivity problems for the Manufacturingstaff. How can an architect reduce the breakdowns a s the applications are moved to a virtualenvironment?

A. Upgrade the workstations to new computers.B. Lock the workstations using local group policies.C. Upgrade the workstations to diskless computers.D. Deploy the Desktop Appliance Lock on all workstations.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:To install the Desktop Appliance Lock

Updated: 2010-10-12Important: Log on using a local administrator account to carry out this installation procedure.

This procedure installs the plug-in so that virtual desktops are displayed through the Desktop Appliance Lock.Do not use this procedure if you want the Desktop Viewer to be available to users.On the installation media, navigate to the folder called Citrix Receiver and Plug-ins\Windows\Online Plug-in,and run CitrixOnlinePluginFull.exe from the command line, adding the SERVER_LOCATION property. Forinformation about this property, see To configure and install the online plug-in using the plug-in installer andcommand-line parameters.Enter the URL of the XenDesktop Services site where your virtual desktops are located. The URL must be inthe format http://servername or https://servername. If you are using hardware or software for load balancing orfailover, you can enter a load-balanced address. Important: Check that the URL you enter is correct. If the URL is incorrectly typed, or you leave the field emptyand the user does not enter a valid URL when prompted after installation, no virtual desktop or local desktopwill be available.On the XenDesktop installation media, navigate to the Clients\ica32 folder and double-clickDesktopApplianceLock_en.msi. The Citrix Desktop Appliance Lock wizard appears.On the License Agreement page, read and accept the Citrix license agreement and click Install. The InstallationProgress page appears.In the Installation Completed dialog box, click Close.When prompted, restart the user device. If you have been granted access to a desktop and you log on as adomain user, the restarted device will be displayed through the Desktop Appliance Lock.

http://support.citrix.com/proddocs/topic/online-plugin-121-windows/ica-xd-install-embedded-stage-one.html

QUESTION 17Based on the CIO's WAN traffic requirement, users a t which two locations would have a single point offailure when attempting to access applications? (Ch oose two)

A. Hong Kong SiteB. Berlin Regional OfficeC. Rome Sates Branch Office

Page 23: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

D. New York Main Data Center

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 18Healthy Helping Hands is going to use Provisioning Services for the virtual desktop. How should thearchitect design the Provisioning Services componen t of the environment?

A. Six Provisioning Services server, two in San Francisco, two in New York, one in London and one in HongKong should be used.

B. Two Provisioning Services servers, one in San Francisco and one in New York, should be used.C. Four Provisioning Services server, two in San Francisco and two in Now York, should be used.D. Eight Provisioning Services servers, two each in San Francisco, New York, London and Hong Kong should

be used.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 19How many farms and sites should the architect creat e and which farm options should be enabled forthe Provisioning Services farm(s)?

Page 24: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

A. One central farm and one central site should be created for the Provisioning Services farm and auditingshould be enabled.

B. Two farms should be created, one in San Francisco and one in New York. Two sites should be created, one' in San Francisco and one in New York for each farm. The Offline database support and Auditing optionsshould be enabled.

C. Two farms should be created and four sites should be created in each farm: San Francisco, New York,“London and Hong Kong. The Offline database support and Auditing options should be enabled.

D. One central farm and one site for each regional office should be created. The Auto-Add, Auditing andOffline database support options should be enabled.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 20Why is this the best design for the Provisioning Se rvices farm?

A. Four Provisioning Services servers, one for each datacenter, will provide high availability. One site shouldbe sufficient for the entire farm because of the small number of vDisks. Auditing should be enabled in orderto keep track of actions taken by different administrators.

B. This design will meet security requirements once it can keep track of all administrative changes to the farmand regional device collections in one site for the farm. High availability will be provided with four servers,which will increase the availability of the virtual desktops.

C. Four Provisioning Services servers will provide high availability. One site will enable the administrator tocreate different views to keep track of different vDisks for the virtual desktops in different locations.

D. Four Provisioning Services servers will provide high availability. The auditing tool will record configuration 'actions on components within the Provisioning Services farm to the Provisioning Services database,enabling administrators to troubleshoot and monitor recent changes.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 21Scenario: The CIO at Healthy Helping Hands has deci ded to implement a new design to incorporateXenApp, XenDesktop, and/or XenServer as appropriate to address present and future application andaccess requirements, Healthy Helping Hands will ini tially implement virtualized desktops only for themost appropriate user groups and will plan the migr ation of all other user groups into virtual desktop sat a later date. Based on the applications and user requirements outlined in the assessment document,to which user group should an architect assign a vi rtual desktop using XenDesktop in the first phase?

A. Only the Sales, Engineers and Contractors user groups should access a virtual desktop.B. Only the Engineers, Marketing and Contractors user groups should initially receive a virtual desktop using

XenDesktop.C. Only the Engineers user group should initially receive a virtual desktop using XenDesktop.D. The Engineers, Marketing, IT and Contractors user groups should initially receive a virtual desktop using '

XenDesktop.

Correct Answer: B

Page 25: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Section: (none)Explanation

Explanation/Reference:

QUESTION 22Based on these user groups, how many XenDesktop far ms should be created and where should theybe located?

A. Create four farms and locate one in each datacenter.B. Create one farm and locate it in the San Francisco backup/disaster recovery site.C. Create two farms. Locate one in New York and one in San Francisco.D. Create three farms. Locate one in New York, one in Hong Kong and one in London.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 23Why is using two farms the best design for the shor t-term rollout of XenDesktop?

A. New York is the primary site and San Francisco is the backup/disaster recovery site.B. Engineering users require different XenDesktop farm settings than other users.C. This is the fewest number of farms possible for the required number of initial users.D. This will ensure scalability when the rest of the user groups are migrated to virtual desktops.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 24Scenario: In order to ensure that additional server s and client desktops can be made available asquickly as possible, Healthy Helping Hands is eager to take advantage of the functionality ofProvisioning Services to provide virtual hard drive s for virtual servers and workstations. However, on eof the main requirements from Healthy Helping Hands is that virtualized applications shouldseamlessly failover to the designated backup datace nter when necessary. What should an architectsuggest for the storage of desktop and/or server vD isks in order to comply with the company'srequirement?

A. A distributed SAN to store all virtual hard drivesB. A centralized SAN to store all virtual hard drivesC. The local hard drive of the user's file or profile server to store the virtual hard drivesD. The local hard drive of the first Provisioning Services server installed to store the virtual hard drives

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 26: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 25Scenario: The CIO of Healthy Helping Hands has deci ded to implement virtual desktops as part of theapplication virtualization solution. The groups ide ntified for desktop virtualization during the initi alrollout are Engineers, Marketing, IT and Contractor s. The users will be connecting internally, frombranch offices, while traveling and when working fr om home. None of the users identified for the initi alrollout currently use Macintosh devices. Based on t hese requirements, an architect has decided to useCitrix Receiver to distribute the necessary plug-in s. How many Merchandising Servers and AccessGateway appliances are necessary to support this di stribution model, and where should they belocated?

A. One Merchandising Server and one Access Gateway located in the New York office.B. Two Merchandising Servers and two Access Gateway appliances, one of each kind located in the New York

office and the San Francisco office.C. Four Merchandising Servers and four Access Gateway appliances, two of each kind located in the New

York office and the San Francisco office.D. Eight Merchandising Servers and eight Access Gateway appliances, two of each kind located in each of the

four datacenters.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 26Based on the deployment, which includes two Merchan dising Servers, how should the architect deploythe Citrix Receiver plug-in to all users included i n the initial rollout?

A. Create a Microsoft Group Policy Object to deploy the software to internal users by means of a computerstartup script, and create an external Citrix Receiver download web page for external users.

B. Create a Microsoft Group Policy Object to deploy the software to internal users by means of a user logonscript, and create an external Citrix Receiver download web page for external users.

C. Manually install the Citrix Receiver as a user with administrative rights to the local workstation and create aninternal Citrix Receiver download web page for external users.

D. Create internal and external Citrix Receiver download web pages for all users and manually install the CitrixReceiver as the locally logged on user.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 27Why does the deployment, which includes creating an internal Citrix Receiver download web page,best meet the business requirements in this scenari o?

A. Users may travel between branch offices and may need to work from home.B. There is no way to automatically deploy the Citrix Receiver by means of electronic software delivery.C. This type of deployment does not require intervention from IT staff.D. This type of deployment supports the highest number of simultaneous Citrix Receiver downloads.

Page 27: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 28Scenario: Users in the Engineering and Marketing de partments frequently suffer performance issueswhen accessing the CAD application and the Marketin g design application, which are both resource-intensive applications. Healthy Helping Hands would like to provide the users in both the Engineeringand Marketing departments with a better experience when they access these applications. WhichXenApp feature can an architect enable to improve t he user experience?

A. Create a Service Level Policy to enable preferential load balancingB. Apply an Advanced load evaluator to the CAD applications and the Marketing design applications.C. Apply the Default load evaluator to the servers hosting the resource-intensive applications.D. Apply a Custom load evaluator to the CAD and Marketing design applications.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 29How can the architect ensure that users in the Engi neering and Marketing departments havepreferential access to CPU resources?

A. Apply the service level policy to the Engineering and Marketing groups based on the client name filter.B. Apply the service level policy to the servers on which the applications reside based on the server filter.C. Apply the service level policy to the Engineers and Marketing user groups based on the users filter.D. Apply the service policy to the Engineering and Marketing user groups based on the Access Control filter.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 30Why should the architect apply the service level po licy to the Engineering and Marketing user groupsbased on the Access Control filter?

A. This allots more CPU shares to those using these applications.B. This increases the bandwidth for the users accessing these applications.C. This allots more memory to sessions in which these applications are opened.D. This reduces the length of time it takes for users to access these applications.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 28: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 31Healthy Helping Hands must ensure accurate monitori ng of their XenDestop environment to ensureearly warning of virtual desktop problems. Which co mponent of XenDesktop Platinum could thearchitect use to provide this?

A. Citrix EdgeSightB. Citrix WorkFlow StudioC. Citrix Collaboration ProductsD. Citrix EdgeSight Active Application Monitoring

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Installing EdgeSight for Monitoring Virtual Desktops

Updated: 2011-11-10

When monitoring physical endpoint machines, EdgeSight Agents store performance and availability data in alocal database. Because virtual desktops in a pool are not preserved across reboots, agents must store dataexternally on a database server and a file share. The following figure shows the components required for virtualdesktop monitoring.

EdgeSight Server - In addition to displaying reports and providing an interface for administration andconfiguration, EdgeSight Server includes database broker components which respond to agent requests for aconnection string to an EdgeSight Agent Database Server.EdgeSight Agent Database Server -The EdgeSight Agent Database Server provides storage for data collectedby EdgeSight Agents running on virtual desktops in a pool. During installation you will be asked to specify thename of the pool and the name of the EdgeSight Server which will act as the database broker. (Multiple agentdatabase servers can be associated with a pool.) Once the agent database server has been installed, itregisters with the EdgeSight Server and regularly reports its operational status.Agent Data File Share - The agent data file share provides storage for files such as log files and INI files which

Page 29: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

are not stored on the EdgeSight Agent Database Server. It is recommended that you set up your file share oneither the EdgeSight Server or on an Agent Database Server machine. Note: In the above diagram, Agent Data File Share is shown separately to indicate that it is not part of theEdgeSight Server or EdgeSight Agent Database Server installation and requires separate setup.EdgeSight for Virtual Desktops Agent - Initially, the EdgeSight Agent requests a connection string to anEdgeSight Agent Database Server. Once the agent is operational, it writes data to the agent database serverand copies files to the agent data file share.Install the EdgeSight Server that will also act as the broker for remote agent databases. See ConfiguringDatabase Brokers for details.Install one or more agent database servers for each pool. See Installing the Agent Database Server for details.Setup a file share for agent data that does not reside in the database. See Setting Up the Agent Data FileShare for details.Install the EdgeSight Agent on the disk to be used by virtual desktops. See Installing the Agent for details. Foroverall system requirements for a virtual desktop environment, see “Virtual Desktop Monitoring Requirements”in System Requirements.

QUESTION 32How can the architect ensure that accurate informat ion about the virtual desktop status is available?

A. Install Citrix Workflow Studio on the virtual desktop.B. Install Citrix Workflow Studio on the Provisioning Services server.C. Install Citrix Workflow Studio on the XenApp server.D. Install Citrix Workflow Studio on the EdgeSight database server.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 33Why should the architect install Citrix Workflow St udio on the XenApp server?

A. The architect will be able to gather end user and application-related performance metrics for the publishedapplications delivered in the virtual desktops.

B. The architect will be able to gather the performance metrics of the applications that are locally executed inthe virtual desktop.

C. The architect will be able to quickly gather performance data of the zone data collector that could affectMicrosoft Windows™ overall performance for the virtual desktop users.

D. The architect will be able to quickly gather performance data of the XML broker that could affect overallperformance for the virtual desktop users.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 34Healthy Helping Hands has determined that Citrix Re peater will be used for WAN acceleration but canonly budget for six appliances at this time. Where should an architect deploy these appliances?

A. Deploy two each in New York, San Francisco and Hong Kong.B. Deploy two each in San Francisco and New York and one each in Mexico City and Hong Kong.

Page 30: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

C. Deploy two each in New York and San Francisco and one each in Hong Kong and London.D. Deploy two in New York and one each in San Francisco, Hong Kong, London and Miami.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 35Network traffic is expected to double from the manu facturing locations when a new application isadded early next year. How should Healthy Helping H ands address this requirement?

A. Deploy the Repeater plug-in to all physical and virtual desktops in the manufacturing locations.B. Deploy the Repeater plug-in to all devices in Mexico City.C. Budget for three Branch Repeater appliances.D. Budget for two pairs of Access Gateway Enterprise Edition appliances.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 36Why should Repeater plug-in be deployed to all the devices in Mexico City?

A. Increasing bandwidth between international sites takes a long time.B. This is the most cost-effective solution that addresses future bandwidth requirements.C. The devices in Mexico City would support the Repeater plug-in.D. Using Repeater plug-in offers better stability and more predictable results than leasing additional bandwidth.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 37Scenario: Architects working with Healthy Helping H ands have decided that a one-size-fits-all virtualdesktop solution does not align with the overall go als of simplifying the environment and delivering t henecessary applications to employees. After assessin g the needs of the manufacturing group, thearchitect decides that a virtualized desktop soluti on is most appropriate. Which type of desktop shoul dthe architect select when designing the virtual des ktop solution for manufacturing employees atHealthy Helping Hands?

A. HostedB. StreamedC. Mobile/OfficeD. Published

Correct Answer: A

Page 31: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Section: (none)Explanation

Explanation/Reference:

QUESTION 38How should the architect implement the hosted deskt ops in a virtualized environment while utilizingXenServer resource pools and desktop pools?

A. Create a single resource pool combining server and desktop components together. Create a desktop poolfor groups of 500 users.

B. Create multiple resource pools combining server and desktop components together. Create one pool ofMicrosoft™Windows ™ desktops.

C. Create multiple resource pools separating server and desktop components. Create one pool of desktops.D. Create a single resource pool combining server and desktop components together. Create one pool of

desktops.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 39Why should the architect separate the server and de sktop components?

A. Infrastructure components are better utilized and configurable pool options are kept separately for thedesktops.

B. Server workloads and desktop workloads cannot be configured in the same resource pool.C. This increases performance of the desktops.D. This allows for separate pool upgrades.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 40Healthy Helping Hands is considering using some vir tual XenApp servers hosted on XenServer.Whatwould be the best method for provisioning these vir tual servers in accordance with best practices for

Page 32: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

virtualized XenApp Servers?

A. Use Provisioning Services with eight vDisks in Private Image modeB. Use Provisioning Services with one vDisk in Difference Disk Image modeC. Use Provisioning Services with one vDisk in Standard Image modeD. Use Provisioning Services with two vDisks in Standard Image mode

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 41Where should the write cache be placed for the XenA pp servers using the Difference Disk Image modevDisk?

A. The write cache should be placed on the target device hard drive.B. The write cache should be placed on the target device RAMC. The write cache should be placed on the Provisioning Services server as local storage.D. The write cache should be placed on the Provisioning Services server as shared storage on the HP SAN.

Correct Answer: DSection: (none)

Page 33: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Explanation

Explanation/Reference:

Page 34: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 42Why is using Difference Disk Image mode the best so lution?

A. This mode will allow for the XenApp updates to be saved between reboots, saving administration time andeffort.

B. It offers the same benefits of Standard Image mode and will allow for the installation of XenApp applicationsto be saved between reboots, saving administration time and effort.

C. It simplifies the XenApp updates by allowing changes to be kept between reboots. This means the imagedoes not need to be placed in Private Image mode, updated and then changed back to a shared mode.

D. This mode can save time in the testing phase of XenApp while the applications are being tested beforeimplementation in the production environment.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 43Scenario: The new Citrix environment for Healthy He lping Hands will deliver many applications tousers from a number of different servers or desktop s. In order to support this, user profiles need to beflexible as we/I as easily and quickly applied to e ach user session. Which type of user profile should anarchitect deploy?

A. Local Non-roaming ProfilesB. Roaming Profiles with Folder RedirectionC. Citrix User Profile Manager with Folder RedirectionD. Mandatory Profiles with Folder Redirection

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 35: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 44Where should the local profile be stored?

A. %appdata%B. %systemroot%C. %systemdrive%D. %homedrive%

Correct Answer: ASection: (none)Explanation

Explanation/Reference:You can see the permissions on %APPDATA% by using the icacls tool at the command prompt. Here's what itlooks like on my machine:C:\Users\davidp>icacls %APPDATA%C:\Users\davidp\AppData\Roaming NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F) BUILTIN\Administrators:(I)(OI)(CI)(F) MACHINE09\davidp:(I)(OI)(CI)(F)

QUESTION 45Why should an architect use Local Profiles for this environment?

A. Gives the same user experience in all sessions and keeps profiles smallB. Gives the same user experience in all sessions and retains profile changes after logoffC. Keeps profiles local for quick loadingD. Keeps profiles small for quick loading

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 36: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 46Scenario: Healthy Helping Hands decided to virtuali ze their server workloads and provide virtualdesktops to some of their users. The server workloa ds include Desktop Delivery Controller, Citrixcomponent servers (Web Interface, License Server). Microsoft SQL Server for databases and the virtualdesktops. How should the XenServer resource pools b e designed to host all required workloads?

A. All workloads, including servers and virtual desktops, should be in a single XenServer resource pool foreasier management and maintenance for each datacenter.

B. Create three dedicated resource pools: one for the Desktop Delivery Controller, one for the virtual desktops,and one for all other servers.

C. Create a dedicated resource pool for server workloads and another resource pool for virtual desktops ineach datacenter.

D. Create three dedicated resource pools: one for the XenDesktop controller and related infrastructure (WebInterface, Provisioning Services), one for virtual desktops, and one for the remaining infrastructure server(backend database server, domain controller).

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 47How should the workloads be distributed within the XenServer resource pool?

A. The server workloads should be provided on XenServer hosts with more CPU cores and speed, ensuringfast processing, and virtual desktops should be provided on XenServer hosts with large memory formaximum density. The virtual disk of each virtual machine will be hosted locally, at the XenServer host.

B. The server workloads should be provided on XenServer hosts with large memory for maximum density, andvirtual desktops should be provided on XenServer hosts with the most CPU cores and speed ensuringmaximum user experience for each. The virtual disk of each virtual machine will be hosted locally at theXenServer host.

C. All workloads should be evenly distributed in the resource pool, and for administrative simplification theyshould be tagged in XenCenter.

D. All workloads should be evenly distributed in the resource pool, and for administrative simplification theyshould be grouped in Active Directory Organizational Units.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 37: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 48Scenario: Several applications accessed by the Fina nce and HR departments of Healthy Helping Handsrequerements application access to be as secure as possible. One of these apportions is thePositivelyPeople application. How can an architect meet the company requirements for secure accessto the PositivelyPeople application?

A. Stream the application to the XenApp server and publish the application to users.B. Stream the application to the XenApp server and directly to the client device and publish the application lo

users.C. Install the application locally on each XenApp server and publish the application as a hosted application.D. Install the application locally on a virtual machine and publish the application as a VM hosted application.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 49How should the ICA session policy be configured to support the PositivelyPeople application andsecurity requirements?

A. Create an ICA session policy to disable local client drive, printer and clipboard mapping functionality.B. Create an ICA session policy to enable 128-bit encryption for ICA sessions.C. Create an ICA session policy to disconnect user sessions after five minutes of inactivity.D. Create an ICA session policy to limit users to one concurrent session.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 38: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 50Why would disconnecting user sessions after five mi nutes of inactivity be the best way to securesensitive data?

A. It reduces the risk of data theft from an unsecured client device.B. It automatically flushes sensitive data from the Citrix Receiver.C. Users can continue working from where they left off without losing any of their work.D. It reduces the overall session network bandwidth.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 51Following a successful environmental assessment, He althy Helping Hands has decided to implementCitrix XenApp 5, 0 for Windows Server 2008 to suppo rt all virtualized applications. How can an archite ctconfigure the new server farm so that application r equirements and farm redundancy are achieved atthe farm level?

A. Configure one farm with one zone that spans the New York and San Francisco datacenters.B. Configure one farm with four zones based in New York, San Francisco, Hong Kong and London.C. Configure two farms with one zone each: one farm for New York and San Francisco and another farm for

Hong Kong and London.D. Configure two farms with two zones each: one farm with a zone for New York and another zone for San

Francisco and a second farm with a zone for Hong Kong and another zone for London.

Correct Answer: B

Page 39: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Section: (none)Explanation

Explanation/Reference:

QUESTION 52Based on the farm and zone decision, how should red undancy of the data stores be addressed?

A. For one farm, implement a master database in the primary datacenter (New York), with an updatingsubscriber database in San Francisco. For the second farm, implement a master database in Hong Kong,with an updating subscriber database in London.

B. The data store for one farm should be based on a clustered configuration in the New York datacenter. Forthe second farm, the data store should be based on a clustered configuration in the Hong Kong datacenter.

C. Implement the two data store databases in the primary datacenter (New York), with updating subscriberdatabases in the other three datacenters.

D. Implement the two data store databases in the primary datacenter (New York) in a clustered configuration.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 53Why should the architect implement two separate mas ter databases, one in New York and one in HongKong?

A. Two databases are required because there are two separate farmsB. Each data store must be located in the region's primary datacenter.C. New York is the primary datacenter and Hong Kong will be hosting the most users.D. This solution maintains manageability of the farm at all times.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 54Scenario: The Healthy Helping Hands CIO is planning to implement a company-wide “Bring your owncomputer” program. A company survey has identified that many of the users interested in the programplan to bring Macintosh computers. The CIO has dete rmined that user-owned devices will NOT bemanaged by IT staff, will NOT receive corporate sof tware, and will NOT receive anti-virus protection.User-owned devices should be treated as a security risk, must only communicate with necessarysystems, and must NO f have the potential to cause any network downtime. Which networkarchitecture design should the architect implement for this scenario?

A. Use Access Gateway Enterprise Edition to restrict the user-owned devices based on endpoint analysisscans.

B. Use Access Gateway Advanced Edition to restrict the user-owned devices based on endpoint analysisscans.

C. Use Access Gateway Enterprise Edition to restrict the user-owned devices based on a combination offirewall rules and Access Gateway Enterprise Edition access control policies.

Page 40: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

D. Use Access Gateway Advanced Edition to restrict the user-owned devices based on a combination dfirewall rules and Access Gateway Advanced Edition access control policies.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Access Gateway 9.1, Enterprise Edition

Updated: 2010-11-16

The Access Gateway is a network appliance that securely delivers any application with policy-basedSmartAccess control - anywhere. Users can obtain easy-to-use secure access to all of the enterpriseapplications and data they need to be productive. IT organizations can cost-effectively extend access toapplications outside the data center while maintaining strict control through SmartAccess application-levelpolicies. IT organizations are empowered to cost-effectively meet the demands of all workers, deliver flexibleworking options, and implement business continuity while ensuring the highest-level of information security andreducing support calls. What's New

The Access Gateway 9.1, Enterprise Edition release offers support for nested LDAP group extraction, the MPX5500 appliance, Imprivata OneSign, Session Identifiers, and Citrix Receiver. For more detailed informationabout these features, see New Features in the 9.1 Release.In This Section

This section of eDocs contains information about installing, setting up, and configuring Access GatewayEnterprise Edition.Readme for Citrix Access Gateway 9.1, Enterprise Edition Contains information about known issues in therelease.Access Gateway Enterprise Edition Pre-Installation Checklist Provides planning information you should reviewand a list of tasks you should complete before installing the Access Gateway in your network.Introducing Citrix Access Gateway Enterprise Edition Provides information about new features in the release,terminology changes, core components of the Access Gateway, and compatibility with other Citrix products, aswell as a brief overview of how the Access Gateway works.Deploying the Access Gateway Provides information about deploying the Access Gateway in the networkdemilitarized zone (DMZ), in a secure network without a DMZ, and with additional appliances to support loadbalancing and failover. Also provides information about deploying the Access Gateway with Citrix XenApp andCitrix XenDesktop.Getting Started with Citrix Access Gateway Provides information about using the configuration utility andwizards to configure settings such as the host name, install licenses, create virtual servers, configure IPaddress, configure routing, configure name service providers, and test the Access Gateway configuration.Configuration and Management of the Access Gateway Provides information about configuring detailedsettings that enable users to connect to resources in the secure network, such as configuring high availability,installing and managing certificates, configuring policies and profiles, configuring authentication andauthorization, understanding various client connection methods, configuring connections for the AccessGateway Plug-in, configuring the Access Interface, configuring endpoint policies, and maintaining the AccessGateway.Integrating Access Gateway Enterprise Edition with Citrix XenApp and Citrix XenDesktop Explains how toconfigure the Access Gateway appliance to work with Citrix XenApp and Citrix XenDesktop.Access Gateway Advanced Concepts Provides information about deploying the Access Gateway in a double-hop demilitarized zone, configuring DNS virtual servers, using operators and operands in policy expressions,configuring server-initiated connections, enabling Access Gateway Plug-in logging, and configuring FIPS 140-2on the model 9000 FIPS series appliance.

QUESTION 55How should the architect meet the stated business r equirements that user-owned PCs strictestpossible security, only communicate with necessary systems, and NOT have the potential to cause anynetwork downtime?

Page 41: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

A. Create Access Gateway endpoint analysis policies to identify user-owned devices based on operatingsystem type. Restrict user-owned devices to communicate only to the Access Gateways on port 443.

B. Create Access Gateway endpoint analysis policies to identify user-owned devices based on operatingsystem type. Restrict user-owned devices to communicate only to the Access Gateways on port 443 and2598.

C. Create Access Gateway endpoint analysis policies to identify user-owned devices based on browser typeRestrict user-owned devices to communicate only to the Access Gateways on port 443.

D. Create Access Gateway endpoint analysis policies to identify user-owned devices based on browser type,user-owned devices to communicate only to the Access Gateways on port 443 and 2598.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 56Why is using Access Gateway Enterprise Edition to r estrict all workstation devices and creatingendpoint analysis policies based on browser the bes t way to ensure that user-owned PCs are treatedwith the strictest possible security, can only comm unicate with necessary systems, and do NOT havethe potential to cause any network downtime without deploying corporate software to the devices?

A. Access Gateway can identify devices before they have been connected to the local network and providesthe most secure method to access virtual applications.

B. Access Gateway can identify Macintosh computers by their browsers with an endpoint analysis scan, and itprovides the most secure method to access virtual applications.

C. Corporate devices run a standard Internet Explorer build that can be identified with endpoint analysis scan,and Access Gateway provides the most secure method to access virtual applications.

D. A browser-based endpoint analysis scan can automatically redirect user-owned devices to the AccessGateways, and Access Gateway provides the most secure method to access virtual applications.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 57Based on the assessment of the current Healthy Help ing Hands infrastructure, which is the best designoption for remote access?

A. Deploy eight Access Gateway appliances: two in San Francisco, two in New York, two in Hong Kong andtwo in London

B. Deploy four Access Gateway appliances: one in each datacenterC. Deploy two Access Gateway appliances: one in San Francisco and one in New YorkD. Deploy one Access Gateway appliance in high availability mode in the primary New York datacenter

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 42: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

QUESTION 58How should the architect configure the virtual serv ers on the two appliances?

A. Create one virtual server for each appliance and on each appliance bind a session policy to its virtualserver, which is configured in ICA Proxy mode using the datacenter Web Interface server.

B. Create one virtual server for each appliance and on each appliance bind a redirection policy to its virtual yserver, which is configured in ICA redirection mode using the datacenter Web Interface server.

C. Create two virtual servers for each appliance and on each appliance bind a redirection policy to the virtualserver(s), which is configured in ICA redirection mode using the datacenter Web Interface server.

D. Create four virtual servers for each appliance and on each appliance bind a session policy to the virtualservers, which are configured in ICA redirection mode using the datacenter Web Interface server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 59Why is this design the best remote access design fo r the environment?

A. This design provides redundancy in case of a datacenter failure and connects users to one of the maindatacenters while minimizing internal WAN traffic.

B. This design provides redundancy in case of appliance failures and connects users to one of the maindatacenters while optimizing external WAN traffic.

C. This design provides high availability in case of hardware failures and connects users to one of the maindatacenters.

D. This design will allow for expected expansion of remote access usage and provides SSL VPN functionalityfor future needs.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 60As part of the new design, the Healthy Helping Hand s organization wants to implement an additionallayer of layer of token-based authentication. Which two vendors could the architect suggest in order t oprovide “out-of-the-box” support for token-based au thentication for Access Gateway? (Choose two)

A. RSAB. VascoC. SafeSignD. SafeWord

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:http://support.citrix.com/servlet/KbServlet/download/13584-102-665036/AGE_4.0_Enhanced_Authentication_Architecture.pdf

Page 43: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Besides supporting Windows NT/AD authentication, the Logon Agent has been enhanced to support thefollowing two-factor authenticators (Out-of-the-box):o RSA SecurIDo Secure Computing SafeWordo RADIUS

QUESTION 61The architect discovered two considerations during the assessment that may be addressed byenabling SmartAuditor. What are these two considera tions? (Choose two)

A. Users report that print jobs intermittently fail.B. User are not able to access their applications remotely.C. Employees are required to log off when not using PositivelyPeople.D. User are frustrated with the IT Stuff because of application access issues.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:SmartAuditor

SmartAuditor allows you to record the on-screen activity of any user’s session, over any type of connection,from any server running XenApp. SmartAuditor records, catalogs, and archives sessions for retrieval andplayback.

SmartAuditor uses flexible policies to trigger recordings of XenApp sessions automatically. This enables IT tomonitor and examine user activity of applications — such as financial operations and healthcare patientinformation systems — demonstrating internal control, thus ensuring regulatory compliance and successfulsecurity audits. Similarly, SmartAuditor also aids in technical support by speeding problem identification andtime-to-resolution.Benefits

Enhanced auditing for regulatory compliance. SmartAuditor allows organizations to record on-screen useractivity for applications that deal with sensitive information. This is especially critical in regulated industries suchas health care and finance, where compliance with personal information security rules is paramount. Tradingapplications and patient information systems are two prime examples.

Powerful activity monitoring. SmartAuditor captures and archives screen updates, including mouse activity andthe visible output of keystrokes in secured video recordings to provide a record of activity for specific users,applications, and servers. Organizations that use SmartAuditor have a better chance of proving criminal intent,where it exists, by using video evidence combined with traditional text-based eDiscovery tools.

Faster problem resolution. When users call with a problem that is hard to reproduce, help desk support staffcan enable recording of user sessions. When the issue recurs, SmartAuditor provides a time-stamped visualrecord of the error, which can then be used for faster troubleshooting.

http://support.citrix.com/servlet/KbServlet/download/17886-102-665587/SmartAuditor-Administrators-Guide.pdf

QUESTION 62Due to difficulties with the current Secure Gateway environment, an architect has been asked to ensurethat remote users will only have to enter their cre dentials once in order to gain secure access to all oftheir resources. Which architecture components are required to best achieve this goal?

A. Web interface 128-bit SSL enabled and Password ManagerB. Access Gateway, Advanced Access Control and Password ManagerC. Web Interface with 128-bit SSL, Advanced Access Control and Password ManagerD. Access Gateway, Web Interface. Advanced Access Control and Password Manager

Page 44: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Migrating from the Secure Gateway to Access Gateway

Updated: 2012-05-03

This topic discusses how to prepare to migrate from the Secure Gateway to Access Gateway, and the twomigration options you can choose: In-place migration or parallel migration. Preparing to Migrate

Before migrating from the Secure Gateway to Access Gateway, consider the following:Make sure that user devices meet system requirements. For more information about system requirements, seethe appropriate guide for the Citrix online plug-in.Make sure port 443, the default security port on the firewall is open between the Internet and Access Gateway.This requirement is identical in a Secure Gateway deployment.Install Access Gateway. For details, see the installation instructions for your Access Gateway appliance.Acquire and install the appropriate certificates on Access Gateway. These include:Server certificate for Access GatewayRoot certificates for Access Gateway, Secure Ticket Authority (STA), and user devicesConfigure the networks that users can connect to through Access Gateway.Migrating Options

You can choose from the following two options for migrating from the Secure Gateway to Access Gateway:In-place migration, in which you transfer the certificate and fully qualified domain name (FQDN) on the SecureGateway to Access GatewayParallel migration, in which you obtain a new signed certificate and FQDN for Access Gateway

Each option is valid; however, the in-place migration has the potential to temporarily disrupt access to internalresources when compared with a new installation.

After the migration is complete, users can log on with their current credentials and do not have to perform anyconfiguration to their device. Each option requires minimal user support.Performing an In-Place Migration

When you choose an in-place migration from the Secure Gateway to Access Gateway, you export the SecureGateway certificate, upload it to Access Gateway and bind it to a virtual server.The certificate must be in PEM format before you can install it on Access Gateway. If you are unfamiliar withthe process of converting certificates, Citrix recommends a new installation of Access Gateway and the use ofa new certificate.Important: If you are transferring a certificate from the Secure Gateway to Access Gateway Enterprise Edition,the FQDN of the certificate installed on the virtual server must match the FQDN of the Secure Gateway. Withthis option, you cannot take a phased approach because two identical FQDNs cannot reside on the samenetwork.

An in-place migration is identical to a new installation of Access Gateway, except for the following items:You use the Secure Gateway certificate on Access GatewayThe FQDN on the Access Gateway certificate must match the FQDN of the Secure Gateway

Although in-place migration results in the least amount of user support (users do not need to be notified of anew Web address), if any mistakes are made in the configuration of the Access Gateway that were notidentified by proper testing procedures, all of your users are directly impacted. Mistakes could prevent usersfrom logging on or connecting to published applications or desktops in the server farm.Performing a Parallel Migration

Citrix recommends as a best practice that you run Secure Gateway parallel to Access Gateway until all usersare properly migrated to the appliance. To perform a parallel migration, you need to do the following:

Page 45: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Obtain a new FQDN and certificate.Provide users with a new Web address for accessing resources to usersProvide users with a date when they will start using Access Gateway

A parallel migration gives you a greater level of control over configuration. You can undertake a phasedmigration approach, rather than transferring all users at one time as you would do during an in-place migration.You can migrate users to Access Gateway in groups, thereby preventing downtime for connections.

Performing a parallel migration is identical to a new installation of Access Gateway. You follow the steps toinstall the appliance, licenses, and certificates, in addition to configuring authentication and other settings on theappliance. Users continue to connect to the Secure Gateway until configuration of Access Gateway is complete.The Secure Gateway runs parallel to Access Gateway until you migrate all users successfully to the newenvironment. This option requires you to purchase or generate a new server certificate. A significant benefit,however, is that users do not experience a disruption in their access to internal resources.

To perform a parallel migration to Access Gateway, complete the following steps:Install Access Gateway.

This step configures the basic TCP/IP settings for Access Gateway.Configure the STA settings on Access Gateway to connect to resources on computers running XenApp.Note: You can add more than one server running the STA to the list. The list of servers must be identical to theservers configured for the Web Interface.Install a server certificate on Access Gateway to secure client connections.Note: To use names that you can resolve for the STA and Web Interface, configure your Domain Name System(DNS) servers.Configure the settings in the Web Interface for user access.Remove the Web Interface from the DMZ and place it in the secure network.Note: You can also remove the server running the Secure Gateway from the DMZ and the server can berepurposed for another role.After Access Gateway is installed in your network, create a test user on Access Gateway to test the connection.

If you have configured single sign-on to the Web Interface, users are logged on automatically and have accessto published applications and desktops. If not, users log on to the Web Interface and can then can access theirpublished applications or desktops.

QUESTION 63Scenario: After assessing the Healthy Helping Hands infrastructure, an architect recommends that alldesktops be virtualized using a XenServer, XenDeskt op and Provisioning Services environment. Thearchitect also recommends purchasing XenDesktop pla tinum licenses. Which parameter should thearchitect recommend for monitoring in order to ensu re integration with the organization's existingstorage solution?

A. CPU usage on the XenDesktop serversB. Disk queue length on the XenDesktop serverC. CPU usage on the Provisioning Services serversD. Disk queue length on the Provisioning Services servers

Correct Answer: DSection: (none)Explanation

Explanation/Reference: High Disk Queue Length on a Provisioning Server Target

Page 46: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

By:Rick RohneProvisioning Server is a great addition to your application delivery environment, but there are some things to beaware of when determining if your system is a good candidate to become a PVS target host. You can read myblog citrix provisioning server tweaks to see some best practices, but one main thing to look out for is how thesystem uses it's disk for temp space. A Server with a high disk Queue length may not be a good candidate;however, there are things you can do to work around this.

In Standard mode, PVS uses the vDisk image file which consists of the PVS target’s system drive, OS, andApplications. The vDisk file is generally hosted on the PVS server and usually stored on a fast disk. The PVSTarget’s local reads are redirected over the network and read directly from this virtual hard drive. When a writeis performed (in standard mode) to the system drive, the write is stored in a temporary write cache file calledthe vDiskcache (which may reside on the PVS Server, a local disk, RAM, or Shared volume such as a FiberChannel or iSCSI attached disk. Subsequent reads from the same file will be performed from the write cacheinstead of the original file that is stored on the vDisk.

Due to the nature of the reads and writes, a provisioning server target may experience disk bottlenecks whichmay slow the performance/experience of the system or users logged onto the system. This is because there isa small overhead incurred when performing reads and writes that are made to and from the vDiskcache. ThePVS agent must keep track of the files that are stored in the vDiskcache and proxy all requests from the systemdrive to the vDiskcache file. You can track the performance of the reads and writes by monitoring the PhysicalDisk “Disk Queue Length”. You generally want to keep the Queue length pretty low, (typically under 40 but thelower the better).

Here is a sample of what the Physical Disk Queue Length looked like on a server before redirecting ApplicationdataNow don’t be alarmed!!! You will only find these issues on systems that perform a lot of disk writes to thesystem drive. Large Application Temp files, Print spooler files, and application log files will notably cause aproblem if the disk of a non PVS system is already being affected. While Citrix continues to improve thisprocess, there are many things you can do to reduce the reads and writes to the vDiskcache file.

If you have an application that has these symptoms, try to identify the file/files that are being written. Askyourself the following questions:

Do these files require persistence or can they be flushed?

Can you redirect these files to a file share?

Page 47: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Can logging be disabled?

Are these files user files or system files?

The best way to deal with these issues is to redirect the files directly to the write cache physical volume. If thesefiles require persistence (Such as user data) you can perform redirection to a file share. In the case of XENAppservers, you will find that many applications place large data, such as dictionaries and temp files, in theApplication Data portion of the user's profile, which roams with the user. To improve performance, you canredirect the Application Data folder to a network share or you can identify the file that is being written and findother ways to redirect the file. You can also combine Folder Redirection and roaming user profiles to decreaselogon and logoff times for roaming and mobile users.

After redirecting Application data, the Disk Queue length dropped and user experience was satisfactory

QUESTION 64Scenario: The architect for Healthy Helping Hands h as identified that virtualizing the entire serverinfrastructure will provide the best return on inve stment (ROI) and lowest maintenance costs for thenew infrastructure. In order to proceed with this r ecommendation, a monitoring strategy must be put inplace to ensure that the virtualization platform do es NOT become overloaded. Which virtualizationcomponent should an architect monitor to identify v irtual desktop bottlenecks?

A. XenServer hostsB. XenDesktop serversC. Provisioning Services serversD. XenApp servers

Correct Answer: CSection: (none)Explanation

Explanation/Reference:http://support.citrix.com/servlet/KbServlet/download/24559-102-647931/XD%20-%20Top%2010%20Mistakes%20Identified%20When%20Doing%20Desktop%20Virtualization.pdf

http://support.citrix.com/servlet/KbServlet/download/19042-102-19576/XenDesktop%20Best%20Practices.pdf

QUESTION 65How can the architect identify if the XenApp server s are the source of a bottleneck?

A. Identify excessive CPU and memory consumption.B. Identify excessive memory and network utilization

Page 48: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

C. Identify excessive disk and network I/O.D. Identify excessive disk I/O and page file utilization.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Tuesday, July 19, 2011Two Ways to Increase the Capacity of Your Citrix XenApp Farm

Even with the most meticulous design, the day will come when your farm's capacity is not sufficient any more.User numbers increase, applications become more resource-hungry and the amount of data to be handledincreases steadily. So what do you do? Simply more of the same, i.e. buy more servers and add them to thefarm? That is one way of increasing capacity, but it is not the only one and therefore may not be the best.

In this article I am assuming that your farm actually is near 100% capacity (with a safety margin, of course).Only then does the following discussion make sense. It may very well be that a farm appears to be fully loaded,but in reality the terminal servers are having a good time idling around. In such cases some other componentslows things down. The list of potential sources of trouble is long and includes the network, infrastructureservers (Citrix data store, domain controllers, file servers, application servers, etc.) and even misconfigurationof the virus scanners. Before going out and spending money on new hardware or software, it might be a goodidea to have an external consultant review your farm design to make sure you are spending your company'smoney on the right things.Identify the Capacity Bottleneck

Once you are sure that you actually have a capacity bottleneck, the obvious first step is to identify it. Justknowing "I cannot get more than x users on each of my servers" is not going to be enough.

A XenApp farm is a very complex thing. Finding a bottleneck may at first sound like looking for a needle in ahaystack. So let's simplify. Every terminal server consists of the following main components:

MemoryCPUs

Today's (dual) 1 GBit/s network cards are fast enough for typical XenApp servers. Hard disks are not usedmuch, except for storing temporary and user profile data, and large parts of the profiles are redirected to a fileserver anyway. CPU management in XenApp works well. That leaves us with memory as the culprit. How fastwas that for performance analysis?

I must admit I lied to you. Finding a capacity bottleneck may very well be a really tough job. Every farm isdifferent. No two XenApp customers have the same application set. But still, if we are mostly looking at typicaloffice or task workers and taking a typical network and farm design as a basis, it mostly boils down to memorybeing short.

There are two kinds of memory shortage on 32-bit systems. The first is exhaustion of kernel memory (see myearlier article on the subject for details). The second simply is lack of enough RAM to satisfy the runningapplications' demands.

Depending on whether your servers reach the limit of their kernel or application memory pool, one or more ofthe following scaling options may apply to your situation.

QUESTION 66Why should CPU and memory consumption be used to id entify bottlenecks?

A. Excessive CPU and memory consumption will slow the creation of new sessions.

Page 49: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

B. Excessive CPU and memory consumption on the data collector will slow down Web Interfaceauthentication.

C. Excessive CPU and memory consumption on the data collector will slow down application enumeration.D. Excessive CPU and memory consumption on the XenApp server will affect the local host cache.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Slow Response or Keyboard Lag when in a XenApp Session Document ID: CTX125882 / Created On: 10-mar-2012 / Updated On: 10-mar-2012 Average Rating: (3 ratings) View products this document applies to

Symptoms

You experience slow response or keyboard lag when in a XenApp session. Often the issue is blamed onnetwork latency, XenApp load, or a general XenApp issue. However the issue might be related to a hardwareconfiguration issue or an operating system issue.

In some cases, users might experience 5 to 30 seconds of keyboard lag, where use types or send commandsfrom the keyboard or mouse are not displayed until 5 to 30 seconds later on the screen. The issue is oftenintermittent and cannot be reproduced consistently.

This behavior is often be blamed on network latency; however users on a local area network with no networklatency can experience the keyboard lag.

The problem might occur on minimal or fully loaded XenApp servers. Whether there is one person logged on orthere are one hundred people logged onto a XenApp server, the keyboard lag might occur.

To determine if keyboard lag is caused by a hardware configuration issue or related to the operating system,verify the following items. Start a Remote Desktop Protocol session to the XenApp server in question; you will experience the samekeyboard lag experience. This eliminates the ICA protocol as the issue as well as XenApp being the issue. Open Performance Monitor and monitor the network, you will observe gaps in the performance monitor datacollection graphs.

Page 50: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Monitor the following counters in performance monitor: Physical Disk (instance)\%Idle Time – This measures the percent time that your hard disk is idle. Typically ifthis monitor falls below 20 percent, then it means that your read/write requests are queuing up and your harddisk cannot service requests in a timely matter. Average Disk/Sec Write – This measures the time in seconds it takes to write data to the disk. Typically thisshould not be greater than 20 milliseconds for non cached writes with little or no spikes. For Average Disk/SecWrite cached writes only, the measure should not be greater than 4 milliseconds with little or no spikes.

Resolution

Use the following steps to reduce or eliminate the keyboard lag, a combination or all of the solutions below canremedy the issue: For Microsoft Windows 2003 servers, determine if Enable advanced performance is enabled. By enabling writecache, this might improve disk performance to reduce delays or lags. Refer to Microsoft KB Article http://support.microsoft.com/default.aspx?scid=kb%3BEN-US%3B324446. Relocate the local profile directory (Documents and Settings or Users directory) to another disk. The operatingsystem might be contending with the local profile data for read and write access to the disk. Refer to MicrosoftKB Article http://support.microsoft.com/kb/214653. Some servers might be configured with only one hard drive dedicated to running the Operating System in thecase of blade systems. For these scenarios, you might consider reconfiguring the Operating System to run on aRAID-0 or RAID-1 system allowing for potentially faster disk I/Os. Additionally, having a RAID system with acaching system also improves disk performance. Consider a hardware upgrade, replacing the hard drives with faster performance hard drives to reduce readand write contention between the operating system and local user profiles. For blade systems, consider moving the operating system to a Storage Area Network (SAN). Moving theoperating system to a high performance disk subsystem can consequently improve server performance.

QUESTION 67Wich two components need to be included in the upda ted disaster recover plan the current DisasterRecovery Plan as outlined in the assestment, docume nt? Choose two

A. EdgeSigth DatabaseB. User datadirectoriesC. Citrix XenApp ServersD. User profiles directoriesE. PositiviltyPeople Database

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 68Based on assessment document, for wich user group m ay administrator need to use ICA ssesionpolicies to control the session bandwith?

A. SalesB. FinanceC. MarketingD. Costumer ServiceE. Human Resources

Correct Answer: BSection: (none)Explanation

Page 51: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Explanation/Reference:

QUESTION 69During the data collection and analisys phase of th e project architecs discovery the certain user grou prequire access to several versionsof Internet Explo rer. How should be architec desing and deploymentscenariofor the older versions of the Internet Expl orer that must be manintened indefinitely in theenviroment?

A. Create one machine hosted application for each Internet Explorer versions and publish the applicationsB. Create one streaming application for each Internet Explorer version and stream the application directly to

the users devicesC. Create one application isolation enviroment for each Internet Explorer version and piublish the application

with XenAppD. Create application silos by installing different versions of Internet Explorer to different XenApp servers and

publish the application with XenApp

Correct Answer: ASection: (none)Explanation

Explanation/Reference:VM Hosted Apps

Updated: 2011-05-02

VM hosted apps allows you to isolate applications and host them from virtual machines or physical computers,including blade servers, running Windows single-user desktop operating systems. Users access theseapplications through a Web browser, the Citrix online plug-in, or Citrix Receiver, just as they would applicationshosted from XenApp servers running Microsoft Terminal Services. VM hosted apps allows you to hostapplications that otherwise must be installed locally or require extensive compatibility testing on XenAppservers.

You can publish any Windows application as a VM-hosted application, but ideal candidates include applicationsthat:Are incompatible with or not supported by Terminal ServicesRequire special hardware devices, such as USB, special keyboards, or biometric devicesConsume large amounts of computing or graphics resourcesRequire a single-user environment

VM hosted apps uses Citrix XenDesktop technology to deliver applications hosted on desktops, but unlikeXenDesktop, it gives users no direct access to the desktops themselves.

To use VM hosted apps, you create a VM hosted apps farm and populate it with desktop groups configuredwith applications you want to deliver. You give users access using the Web Interface. Although VM hosted appscannot share a farm with XenApp servers, a VM hosted apps farm can share a Web Interface site with XenAppserver farms. Applications from both types of farms appear the same to users.Components of VM Hosted AppsDesktop Delivery Controller. The Desktop Delivery Controller authenticates users, manages the assembly ofuser virtual desktop environments, and brokers connections between users and their virtual desktops. Itcontrols the state of the desktops, starting and stopping them based on demand and administrativeconfiguration.Management Consoles. VM hosted apps includes two management consoles: the Delivery Services Consoleand the Presentation Server Console. These are similar to the consoles you use to manage XenApp serverfarms. The Delivery Services Console enables you to create, update, and manage desktop groups in VM hosted appsfarms. You can also use it to configure and manage VM hosted apps farms, create and modify Citrixadministrators, configure access to desktops, manage user sessions, monitor the health and performance of

Page 52: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

the farm, create reports, and view hotfix information, as you would on a XenApp server farm.The Presentation Server Console enables you to set Citrix policies and configure printers.Virtual Desktop Agent. You install the Virtual Desktop Agent on the desktops in your farm. It managescommunication between the desktops and the Desktop Delivery Controller and between the desktops and userdevices.Using VM Hosted Apps With Other XenApp Features

VM hosted apps performs best when virtual machines are hosted using XenServer. However, other hostinginfrastructures are supported.

Use Provisioning services to provision desktops for VM hosted apps.

Use Profile manager to manage user personalization settings for VM hosted apps.

Service monitoring and Edgesight resource manager are not compatible with VM hosted apps, but applicationperformance monitoring can be used with VM hosted apps by downloading Edgesight for Desktops.

SmartAuditor is not compatible VM hosted apps.Licensing and VM Hosted Apps

VM hosted apps uses XenApp Enterprise and Platinum licenses. No additional Citrix licenses are required.Each user consumes one XenApp license for all application sessions, regardless of whether applications arehosted using VM hosted apps or XenApp server.

QUESTION 70

A. EdgeSigthB. Resource ManagerC. Windows Event LogsD. Windows Performance Monitor

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

QUESTION 71

A. Disable user logon scripts

Page 53: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

B. Minimal set of Group Policies ObjectsC. Local user profiles on XenApp ServersD. All Citrix Server separate isolate in a separate OU

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 72

A. Client computer in a Apple MacintoshB. User only have a 512 Kbps internet connectionC. Client files are not available on the Web Server InterfaseD. User does not have administrative permissions on the computer

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 73

A. Is the answerB. Is the answerC. Is the answerD. Is the answer

Correct Answer: D

Page 54: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Section: (none)Explanation

Explanation/Reference:

QUESTION 74

A. Is the answerB. Is the answerC. Is the answerD. Is the answer

Correct Answer: DSection: (none)Explanation

Explanation/Reference:How to test End User Experience Monitoring Document ID: CTX117180 / Created On: 20-may-2008 / Updated On: 04-feb-2009 Average Rating: (1 ratings) View products this document applies to

Page 55: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

Summary

This document explains how to verify that End User Experience Monitoring (EUEM) data is being collected in aCitrix EdgeSight deployment or test environment.

Requirements

• Presentation Server 4.5 Enterprise or Platinum Edition

• Presentation Server Client 10.x or later

• EdgeSight 4.5 for Presentation Server

Background

When verifying EdgeSight functionality, it is important to allow significant time to pass for EUEM data to displayin real-time reports.

To begin testing, start an ICA session and perform actions a typical user would do (that is, browse the Web, runMicrosoft Outlook, and so on) and allow the session to go on for a few minutes. While doing this, open the real-time report Presentation Server User Summary, locate the user in question, and check the Excel chart. If noEUEM data is available yet, go back to the start page and run the report until EUEM data populates the charts.Once this is confirmed, a manual performance upload can be done for historical report usage.

Note: Some EUEM data is correlated at different times, so it is preferred to allow the agent to report up on itsown.

Procedure

1. Open a published desktop from using Presentation Server Client version 10.x or later.

2. Log on with a regular domain user account.

3. Launch Internet Explorer.

4. Browse to YouTube (or a similar streaming video site).

5. Play two videos in two separate tabs.

6. Wait about two minutes.

7. Navigate to Real Time > Remote > Presentation Server User Summary and verify that the data populatesproperly.

More Information

CTX114495 – End User Experience Monitoring Statistics Explained

This document applies to:EdgeSight for Presentation Server 4.5EdgeSight for XenApp 5.0

Hotfix EUEM100W003 - For Citrix End User Experience Monitoring for Citrix Presentation Server 4.5 andXenApp 5.0 for Windows Server 2003 Document ID: CTX132613 / Created On: 27-mar-2012 / Updated On: 27-mar-2012 Average Rating: not yet rated Download EUEM100W003.zip

Page 56: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

HTTPS DOWNLOAD

View products this document applies to

Filename: EUEM100W003.zip Replaces: All previous versions Date: March, 2012 Language: English (US) Readme version: 1.00

Readme Revision HistoryVersion Date Change Description 1.00 March, 2012 Initial release

Important Note(s) about This Release

Caution! This release may require you to edit the registry. Using Registry Editor incorrectly can cause seriousproblems that may require you to reinstall your operating system. Citrix cannot guarantee that problemsresulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk.Where to Find Documentation

This document describes the issue(s) resolved by this release and includes installation instructions. Foradditional product information, including supported operating systems and system requirements, see CitrixeDocs, the Citrix Product Documentation Library.New Fixes in This Release

A process notification thread that exits unexpectedly can cause published applications to not appear in thereport or to be under-reported.

[From EUEM100W003 ][#LA0065]Fixes from Replaced Hotfixes

Published desktops do not appear in application usage reports.

[From EUEM100W001 ][#233005]

EdgeSight reports on published application launch counts can show fewer launches than the actual numbers.This happens as a result of application launches triggered by other published applications such as scripts andcommands. Such launches can intermittently fail to be captured.

Note: To address this issue in its entirety, you must install a hotfix that contains Fix #LA0136. Fix #LA0136 isavailable as an EdgeSight for XenApp Agents hotfix. The combination of Fixes #LA0066 and #LA0136 resolvesthe issue in most scenarios. Additionally, consider installing a XenApp hotfix that contains Fix #LA0572. Fix#LA0572 addresses this issue specifically in scenarios with short-lived sessions (sessions shorter than 5seconds).

[From EUEM100W002 ][#LA0066]Installing This Release

Notes:

This version is packaged as a .zip file containing the replacement EUEM.msi file. For more information aboutdeploying msi files, see Microsoft article 884016 or visit the Microsoft Web site and search on keywordmsiexec.

To install this version successfully, servers must not have registry modification restrictions in place.

Page 57: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

To install this version:

Copy the file to a shared folder on the network.

Extract the compressed file and save the EUEM.msi file on the computer you want to update.

Run the .msi file.

Restart the computer if prompted to do so.Copyright © 2012 Citrix Systems, Inc. All rights reserved. Citrix is a registered trademarks, and Citrix XenApp, Citrix XenApp for UNIX, Citrix XenServer, and CitrixXenDesktop are trademarks of Citrix Systems, Inc. in the United States and other countries. All other trademarks and registered trademarks are the property of their respective owners.

This document applies to:Feature Pack 1 for Presentation Server 4.5Presentation Server 4.5 for Windows Server 2003Presentation Server 4.5 for Windows Server 2003 x64 EditionXenApp 5.0 for Windows Server 2003 x64XenApp 5.0 for Windows Server 2003 x86

QUESTION 75

A. Is the answerB. Is the answerC. Is the answerD. Is the answer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 76

Page 58: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

A. IIS 6B. Secure GatewayC. Access GatewayD. Citrix SSL Relay

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Configuring SSL/TLS Between Servers and Clients

For XenApp to accept connections encrypted with SSL or TLS, you must use SSL Relay to configure supporton each XenApp server.

Citrix SSL Relay can secure communications between clients, servers running the Web Interface, and XenAppservers that are using SSL or TLS. Data sent between the two computers is decrypted by the SSL Relay andthen redirected using SOCKSv5 to the Citrix XML Service.

SSL Relay operates as an intermediary in the communications between the plug-in and the Citrix XML Servicerunning on each server. Each plug-in authenticates the SSL Relay by checking the relay’s server certificateagainst a list of trusted certificate authorities. After this authentication, the plug-in and SSL Relay negotiaterequests in encrypted form. SSL Relay decrypts the requests and passes them to the server.

When returning the information to the plug-in, the server sends all information through SSL Relay, whichencrypts the data and forwards it to the client to be decrypted. Message integrity checks verify that eachcommunication is not tampered with.In general, use SSL Relay for SSL/TLS support when you:Want to secure communications with servers that host the Citrix XML Service.Have a small number of servers to support (five or fewer). To use SSL/TLS to protect against internal threats inlarger farms, consider configuring SSL/TLS support with Secure Gateway. Do not need to secure access at a DMZ.Do not need to hide server IP addresses or you are using Network Address Translation (NAT).Need end-to-end encryption of data between clients and servers.

Configure SSL Relay and the appropriate server certificate on each XenApp server in the server farm. Bydefault, SSL Relay is installed with XenApp in C:\Program Files (x86)\Citrix\SSLRelay, where C is the drivewhere you installed XenApp.

The Citrix XML Service provides an HTTP interface for enumerating applications available on the server. Ituses TCP packets instead of UDP, which allows connections to work across most firewalls. The Citrix XMLService is included in the server. The default port for the Citrix XML Service is 80.Installing and Configuring the SSL Relay ToolIf you configure the SSL Relay tool with the User Account Control (UAC) feature of Microsoft Windows enabled,you might be prompted for administrator credentials. To run the SSL Relay tool, you must have the followingprivileges and associated permissions:Domain administratorDelegated administratorAdministrator group of the local computer where you are installing the tool

QUESTION 77

Page 59: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

A. XenApp ServersB. XenDesktop ServersC. Web Interfase ServersD. Access Gateway Appliances

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Access Gateway Appliances

Updated: 2010-10-27

The Citrix Access Gateway appliances range from the Model 2010 appliance and the Access Gateway VPX,which are supported by Access Gateway 5.0 and Access Gateway Standard Edition, to the Model MPX 5500,7000, 9010, and 10100 appliances, which are supported by Access Gateway Enterprise Edition. The variousAccess Gateway appliances are similar in that they use the same types of components, but different modelsprovide different hardware capabilities and scalability.In This Section

This section of eDocs contains information about hardware installation and initial configuration for all AccessGateway appliances.

Introducing Access Gateway Hardware Describes the Access Gateway hardware platforms and provides detailed information about each platform andits components.

Preparing for Installation Describes how to unpack the Access Gateway appliance and prepare the site and rack for installing theappliance. Lists the cautions and warnings that you should review before you install the appliance.

Installing the Access Gateway Appliance Describes the steps to install the rails, mount the hardware, connect the cables, and turn on the appliance.

Initial Configuration of the Access Gateway Describes how to perform initial configuration of your Access Gateway appliance and assign management andnetwork IP addresses.

Replacing the Secure Gateway with Access Gateway Describes the steps to replace the

Page 60: WRA - Rev 1.1 Jul 30, 2012 This exam base on tree

http://www.gratisexam.com/