Which feature of Learning should a Citrix Engineer configure to direct Citrix Web App Firewall to learn from specific sessions?
Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. After the Web App Firewall policy afweb_protect is bound to the virtual server, the engineer notices that pages are displaying in plain text with graphics included.
What is the likely cause of this?
Scenario: A Citrix Engineer wants to configure the Citrix ADC for OAuth authentication. The engineer uploads the required certificates, configure the actions, and creates all the necessary policies. After binding the authentication policy to the application, the engineer is unable to authenticate.
What is the most likely cause of this failure?
Scenario: A Citrix Engineer has established protections for web applications using Citrix Web App Firewall. One of the application owners is concerned that some negative traffic is passing through to the application servers. The owner wants confirmation that Citrix Web App Firewall is blocking negative traffic. Which CLI command can the engineer use to display statistics on a per-protection basis for the enabled protections?
Scenario: During application troubleshooting, a Citrix Engineer notices that response traffic received from a protected web application is NOT matching what the web server is sending out. The auditor is concerned that Man-In-The-Middle attack is in progress.
Which action is the Citrix Web App Firewall performing that would trigger this false positive?
Which variable will display the client's source IP address when added to an HTML Error Object page?
Which variable will display the client’s source IP address when added to an HTML Error Object page?
Which Citrix Application Delivery Management (ADM) Analytics page allows an engineer to measure the ICA Round Trip Time for user connections?
Scenario: A Citrix Engineer wants to configure the Citrix ADC for 0Auth Authentication. The engineer uploads the required certificates, configures the actions, and creates all the necessary policies. After binding the authentication policy to the application, the engineer is unable to authenticate.
Which two protections ensure that the correct data is returned by the client? (Choose two.)
Which Front End Optimization technique reduces the number of files to be requested for download?
Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. After the Web App Firewall policy afweb_protect is bound to the virtual server, the engineer notices that Citrix Web App Firewall is NOT properly displaying the page.
A positive number for the Policy Hits counter for afweb_protect, tells the engineer the number of times Citrix Web App Firewall__________. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Engineer manages Citrix Application Delivery Management (ADM) for a large holding company. Each division maintains its own ADC appliances. The engineer wants to make Citrix ADM features and benefits available to each group independently.
What can the engineer create for each division to achieve this?
What is required for connecting a data center to the Citrix Application Delivery Management (ADM) Service?
A Citrix Engineer wants to create a configuration job template to add a DNS nameserver to each Citrix ADC instance. What is a valid variable name for the DNS nameserver?
Scenario: A Citrix Engineer Is using Citrix Application Delivery Management (ADM) to manage 20 Citrix ADC VPX appliances. The engineer has added the instances to Citrix ADM. The nsroot password has been changed but is the same across all 20 instances.
The engineer needs to update____________ with the new password in Citrix ADM to ensure continued connectivity to the appliances. (Choose the correct option to complete the sentence.)
Scenario: A Citrix Engineer reviews the log files for a business-critical web application. The engineer notices a series of attempts to directly access a file, /etc/passwd.
Which feature can the engineer implement to protect the application against this attack?
A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.
Which action should the engineer enable to achieve this?
What can a Citrix Engineer implement to protect against the accidental disclosure of personally identifiable information (PII)?
Which three items does Citrix Application Delivery Management (ADM) require when adding an instances? (Choose three.)
Scenario: A Citrix Engineer is asked to implement multi-factor authentication for Citrix Gateway. The engineer creates the authentication policies and binds the policies to the appropriate bind points. The engineer creates a custom form using Notepad++ to format the page which will capture the user’s credentials.
What is the first step the engineer must perform to assign this form to the authentication process?
Scenario: A Citrix Engineer has configured Integrated Caching to improve application performance. Within hours, the Citrix ADC appliance has run out of memory.
Which Content Group setting can the engineer configure to show the caching process until a need is demonstrated?
Scenario: A Citrix Engineer needs to ensure that the flow of traffic to a web application does NOT overwhelm the server. After thorough testing, the engineer determines that the application can handle a maximum of 3,000 requests per minute. The engineer builds a limit identifier, rl_maxrequests, to enforce this limitation.
Which advanced expression can the engineer write in the Responder policy to invoke rate limiting?
Scenario: A Citrix Engineer implements Application-level Quality of Experience (AppQoE) to protect a web application. Shortly after that, users call to complain that nearly every request is being met with a Captcha.
What can the engineer do to improve the user experience?
Which Citrix Application Delivery Management (ADtv1) Analytics page allows a Citrix Engineer to monitor Citrix Virtual Apps and Desktop traffic?
A Citrix Engineer reviews the App Dashboard and notices that three of the monitored applications have an App Score of less than 50.
The engineer can interpret the App Score as a metric of application. (Choose the correct option to complete the sentence.)
A review of purchases made at an online retailer shows that several orders were processed for items at an unpublished price.
Which protection can a Citrix Engineer implement to prevent a site visitor from modifying the unit price of a product on the shopping cart page?