Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Citrix 1Y0-309 Exam - Cheat-Test.com

Free 1Y0-309 Sample Questions:

1. Scenario: An administrator configuring Access Gateway 8.0 Enterprise Edition in an environment that consists of a double-hop DMZ, wants connections from a web browser on the Internet to go through the first firewall to connect to Access Gateway 8.0 Enterprise Edition appliance in the first DMZ. Which port should the administrator enable on the first firewall?
A. 80
B. 389
C. 443
D. 1494
E. 1812
Answer: C

2. A back-end subnet 192.168.10.x is unreachable by the default subnet.
Which two commands should be used to configure the default gateway and the 192.168.10.x subnet from a command line interface? (Choose two.)
A. add network route 0.0.0.0 0.0.0.0 <defaultGatewayIPaddress>
B. add network route 0.0.0.0 0.0.0.0 <alternateGatewayIPaddress>
C. add network route 192.168.10.23 255.255.255.0 <defaultGatewayIPaddress>
D. add network route 192.168.10.0 255.255.255.0 <alternateGatewayIPaddress>
Answer: AC

3. How should an administrator configure SSL client certificate authentication for Access Gateway 8.0 Enterprise Edition?
A. Enable client authentication on the SSL VPN virtual server, and install the client certificate in the browser.
B. Enable client authentication on the SSL VPN virtual server, and install the client certificate on the authentication server.
C. Enable client authentication on the SSL VPN virtual server, and install the client certificate on the Access Gateway appliance.
D. Enable client authentication on the SSL VPN virtual server, and install the client certificate on clients connecting to the environment.
Answer: A

4. Scenario: An administrator for Access Gateway 8.0 Enterprise Edition suspects that some users in the environment are misusing the remote access granted to them. The administrator thinks that these users have been accessing and downloading some restricted intranet web resources.
What should the administrator check first on the Access Gateway 8.0 Enterprise Edition appliance in order to investigate these users' remote access behavior?
A. Network traces
B. Statistic counters
C. Access Gateway 8.0 Enterprise Edition audit logs
D. Access Gateway 8.0 Enterprise Edition client side debug trace files
Answer: C

5. An administrator needs to provide users with access to the company's intranet through the VPN, while also providing them with access to printers on their local area network.
Which option must the administrator turn on in order to meet this requirement?
A. Compression
B. Split Tunneling
C. Single Sign-On
D. Transparent Interception
Answer: B

6. An administrator needs to configure a policy with specific timeout rules for TCP connections and specific rules for single sign-on.
Which type of policy will the administrator need to configure in order to accomplish this task?
A. Traffic
B. Session
C. Authorization
D. Authentication
Answer: A

7. Which pre-authentication expression must be used if an administrator needs to indicate that Trend Micro version 11.25 or Symantec version 7.5 is running and McAfee version 8.0 is not running?
A. av_5_TrendMicro_11_25 && av_5_Symantec_7_5 || CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
B. av_5_TrendMicro_11_25 || av_5_Symantec_7_5 && CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
C. (av_5_TrendMicro_11_25 && av_5_Symantec_7_5) || CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
D. (av_5_TrendMicro_11_25 || av_5_Symantec_7_5) && CLIENT.APPLICATION.AV(McAfee).VERSION != 8.0
Answer: D

8. An administrator configures a traffic policy with the following expression:
REQ.HTTP.URL CONTAINS sapcip06
What will the traffic policy do when in use?
A. Block HTTP requests that contain sapcip06 in the URL.
B. Filter the HTTP requests that contain sapcip06 in the URL.
C. Block HTTP traffic that contains sapcip06 in the HTTP response.
D. Apply traffic profile attributes to the HTTP requests that contain sapcip06 in the URL.
Answer: D

9. How can users change the portal page setting?
A. Click the Portal tab and change the settings.
B. Click the "Properties" tab and change the settings.
C. Users can customize the portal page with the permission of the administrator.
D. Click somewhere on the portal page and set the portal page to the Access Gateway 8.0 Enterprise Edition default page or the company's intranet portal page.
Answer: C

10. Which two policies constitute SmartAccess functionality on Access Gateway 8.0 Enterprise Edition? (Choose two.)
A. Traffic
B. Session
C. Authorization
D. Authentication
E. Pre-Authentication
Answer: BE

11. Scenario: An administrator configures Access Gateway 8.0 Enterprise Edition so that client devices can be used along with proxy servers for access to external networks. The administrator wants the proxies to work for HTTP, SSL and FTP protocols.
Which two pieces of information should the administrator specify for each of the protocols? (Choose two.)
A. URL
B. IP address
C. Header size
D. Port number
Answer: BD

12. Scenario: The IT Manager instructed the administrator to implement cascading authentication in the environment for remote users connecting through the external logon point. Active Directory is currently used as the primary form of authentication. The administrator would like to deploy a second authentication type that will work with Active Directory and will provide some form of failover.
Which three authentication types could the administrator deploy with Active Directory when deploying Access Gateway 8.0 Enterprise Edition in this environment? (Choose three.)
A. NT 4
B. Digest
C. NTLM
D. CERT
E. RADIUS
Answer: ADE

13. Scenario: A Network Administrator is planning the remote access infrastructure for an Access Gateway 8.0 Enterprise Edition environment. In this environment, employees, vendors and customers will need to use different methods of authentication and the administrator would like to ensure that each authentication is hosted on a separate server.
Which authentication method must the administrator implement when configuring this environment?
A. Cascaded
B. Client-Based
C. Server-Based
D. Double-source
Answer: A

14. An administrator needs to transparently intercept all TCP, NetBIOS, UDP and HTTP traffics destined for the company's private network in order to make remote access stricter without limiting its use.
Which mechanism must the administrator use to allow for stricter remote access?
A. JavaScript
B. Java Client
C. ActiveX Plug-in
D. Presentation Server Client
Answer: C

15. When accessing an intranet site through Access Gateway 8.0 Enterprise Edition, which mechanism will load with a list of pre-configured resource IP addresses and port numbers?
A. JavaScript
B. Java Client
C. ActiveX Plug-in
D. Presentation Server Client
Answer: B

16. An administrator is configuring Access Gateway 8.0 Enterprise Edition in an environment and has deployed the Java Client to some of the users. The administrator must configure remote access to SAP for these users.
What should the administrator configure in order to grant these users access to SAP?
A. Intranet IP
B. Mapped IP
C. Intranet Application
D. Quarantine Groups
Answer: C

17. An administrator is configuring remote access to applications through the VPN for specific users. All of the applications require a unique source IP address to access back-end resources.
Which type of IP address should the administrator assign to these applications in order to ensure that they are accessible to the users?
A. MIP
B. SNIP
C. NSIP
D. Intranet
Answer: D

18. Scenario: Contractors logging in to a company's environment were assigned to a specific group. Due to recent security breaches, the administrator was instructed to configure Access Gateway 8.0 Enterprise to scan the contractors' devices before granting them access to the corporate network. If any contractor device fails any of the
scans, that contractor should only be allowed to access one of the eight resources that are usually available to him or her.
Which two policies should the administrator configure to meet the access requirements for this environment? (Choose two.)
A. Session
B. Authorization
C. Authentication
D. Pre-Authentication
Answer: AB

19. A public research university needs to provide remote access to the students in its distance learning program.
Which Access Gateway 8.0 Enterprise Edition client should the Network Administrator deploy in order to ensure that every student is able to connect to the environment?
A. Java Client
B. ActiveX Plug-in
C. Secure Access
D. Presentation Server
Answer: A

20. Scenario: Employees connect to their corporate network remotely using devices that are running Windows, Mac and Linux operating systems. The administrator in this environment is configuring Access Gateway 8.0 Enterprise Edition and has been instructed by the IT Manager to ensure that remote users have uniform access to the environment regardless of the operating system running on their client devices.
Which client should the administrator deploy or require employees to obtain in order to access this environment?
A. Native
B. Java Client
C. ActiveX Plug-in
D. Presentation Server
Answer: B

21. A customer evaluating the Access Gateway 7000 series appliance wants to know how many SSL transactions per second (TPS) the appliance can handle.
How many SSL transactions per second (TPS) can the Access Gateway 7000 series appliance handle?
A. 2,000 TPS
B. 4,400 TPS
C. 10,000 TPS
D. 125,000 TPS
Answer: B

22. What is the maximum recommended number of concurrent SSL VPN users for the Access Gateway 7000 series platform?
A. 2,500
B. 5,000
C. 7,000
D. 10,000
Answer: A

23. What is the maximum recommended number of concurrent SSL VPN users for the Access Gateway 9000 series platform?
A. 4,400
B. 5,000
C. 7,000
D. 9,000
Answer: C

24. Scenario: A large e-Commerce corporation is in the process of purchasing Access Gateway 8.0 Enterprise Edition to deploy in its environment. The company would like to deploy appliances that have dual power supplies only.
Which two Access Gateway appliances platforms provide dual power supplies? (Choose two.)
A. 7000 series
B. 9000 series
C. 10000 series
D. 12000 series
Answer: BC

25. Scenario: A major technology company wants to upgrade their current Access Gateway deployment to ensure that it meets their growing remote access needs as they acquire new companies. Currently, the company is supporting nearly 3,000 concurrent users on their existing SSL VPN. Due to a recently-completed merger, the company expects the concurrent user sessions through Access Gateway to increase by 40% over the next year.
Which Access Gateway 8.0 Enterprise Edition appliance platform handles the most concurrent user traffic and would be appropriate for this company?
A. 2000 series
B. 7000 series
C. 10000 series
D. 12000 series
Answer: C

26. Scenario: An administrator deployed Access Gateway 8.0 Enterprise Edition and implemented the double-hop DMZ feature. Remote users in the environment are able to send ICA traffic across the DMZ without any problems.
The administrator has been instructed to provide the same users with full VPN access to the internal network.
Which kind of deployment would be appropriate to meet the new requirements for this environment?
A. Single-hop DMZ with Web Interface in the internal network
B. Single-hop DMZ with Web Interface in the external network
C. Double-hop DMZ with a RADIUS server in the second DMZ
D. Double-hop DMZ with SSL traffic enabled in the external network
Answer: A

27. Scenario: A company currently has Secure Gateway in its environment. The company has been undergoing major expansions, and the number of employees has grown by 60% over the past three years. Recently, the company acquired a new company and is planning on integrating that company into its environment. Because of the growing number of employees, more servers and rack space are being consumed to support the growing user traffic.
Which Access Gateway 8.0 Enterprise Edition deployment type would meet the needs of this environment?
A. Access Gateway in VPN mode
B. Access Gateway in Web Interface mode
C. Access Gateway in Secure Gateway mode
D. Access Gateway in Presentation Server mode
Answer: C

28. Scenario: An administrator configuring Access Gateway 8.0 Enterprise Edition in an environment that consists of a double-hop DMZ deployment, wants connections from Presentation Server clients on the Internet to go through the first firewall in order to connect to the Access Gateway 8.0 Enterprise Edition appliance in the first DMZ.
Which port should the administrator enable on the first firewall?
A. 80
B. 389
C. 443
D. 1494
E. 1812
Answer: C

29. Scenario: An administrator configuring Access Gateway 8.0 Enterprise Edition in an environment that consists of a double-hop DMZ, wants the Access Gateway 8.0 Enterprise Edition appliance in the first DMZ to connect to the Access Gateway 8.0 Enterprise Edition appliance in the second DMZ.
Which port should the administrator configure in order to create an unsecured socket between the Access Gateway appliance in the first DMZ and the second Access Gateway appliance in the second DMZ?
A. 80
B. 443
C. 1080
D. 1494
E. 1812
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved