Which step can a Citrix Administrator take to use default compression policies?
Correct Answer:A
Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/optimization/http-compression.html
Scenario: A Citrix Administrator executed the following commands on the Citrix ADC:
> add policy dataset Admin_group ipv4
> bind policy dataset Admin_group 192.168.149.10 –index 11
> bind policy dataset Admin_group 192.168.149.39 –index 12
> bind policy Admin_group 192.168.149.49 –index 13
> add responder policy POL_1 “!(CLIENT.IP.SRC.TYPECAST_TEXT_T.CONTAINS_ANY(”Admin_group”))” RESET > bind lb vServer lb_vsrv_www –policyName POL_1 –priority 100 –gotoPriorityExpression END –type REQUEST
What will be the effect of these commands?
Correct Answer:A
Scenario: A Citrix Administrator manages an environment that has a Citrix ADC high availability (HA) pair running on two MPX appliances. The administrator notices that the state of the secondary Citrix ADC is ‘Unknown’.
What is causing the secondary state to be ‘Unknown’?
Correct Answer:D
A Citrix Administrator needs to use a client’s IP address as the source IP address for Citrix ADC-to- server connections.
Which Citrix ADC mode can the administrator use to meet this requirement?
Correct Answer:D
Reference: https://support.citrix.com/article/CTX121974
A Citrix Network Engineer informs a Citrix Administrator that a data interface used by Citrix ADC SDX is being saturated.
Which action could the administrator take to address this bandwidth concern?
Correct Answer:C
Reference: https://training.citrix.com/public/Exam+Prep+Guides/241/1Y0-241_Exam_Preparation_Guide_v01.pdf
Scenario: A Citrix Administrator configured an authentication, authorization, and auditing (AAA) policy to allow users access through the Citrix ADC. The administrator bound the policy to a specific vServer. Which policy expression will allow all users access through the vServer?
Correct Answer:A
Reference: https://docs.citrix.com/en-us/citrix-adc/current-release/aaa-tm/entities-of-authentication-authorization-auditing/authentication-policies.html