Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Citrix 1Y0-700 Exam - Cheat-Test.com

Free 1Y0-700 Sample Questions:

Q: 1 An administrator is considering adding an Application Firewall deployment to an environment that contains two network firewalls, a public network and a private network. Where should the administrator place the Application Firewall?

A. In the DMZ
B. Behind the private network
C. In front of the public network
D. In front of the two network firewalls

Answer: A

Q: 2 The positive security model as applied in the Application Firewall can protect
against ______ and ______ attacks. (Choose the two options that best complete the sentence.)

A. worms
B. viruses
C. zero day
D. layer 3 network
E. application layer

Answer: C, E

Q: 3 Scenario: A banking company has decided to deploy an Application Firewall in their network environment, which already has two third-party load balancers. The Application Firewall deployment will be used to inspect approximately 400 Mb/sec of traffic. How should an administrator deploy the system in this environment?

A. As a module on a NetScaler appliance
B. As a standalone Application Firewall appliance
C. As a module on a NetScaler High Availability pair
D. As a cluster of standalone Application Firewall appliances

Answer: D

Q: 4 Scenario: A busy web application (400 Mb/sec) for an ecommerce company includes pictures of items for sale that are displayed to shoppers with text descriptions, an input field to accept customer reviews, a shopping cart and an encrypted billing page for credit cards. Many more customers browse than buy. An administrator needs to create profiles for this web application on the Application Firewall. How many profiles should an administrator configure for this web application for security with maximum performance?

A. One, an advanced profile for the reviews and billing pages
B. Two, a basic profile for the reviews page and an advanced profile for the billing page
C. Three, a basic profile for browsing and separate advanced profiles for the reviews and the billing pages
D. Four, separate basic profiles for the images and text, and separate advanced profiles for the reviews and the billing pages

Answer: B

Q: 5 Which regular expression is the most restrictive and still matches all traffic that includes either a .JPG or .GIF file?

A. \.(jpg|gif)
B. [.](jpg|gif)
C. ^\(.jpg|.gif)
D. (.jpg|.gif)$

Answer: D

Q: 6 Scenario: The manufacturing department of a global biomedical company uses a web application to access manufacturing ratios and QA testing results from external plants that manufacture the biomedical devices. All the information for all the plants is stored in a data warehouse based on a Microsoft SQL server and accessed from the web application by running reports. Users receive instructions through a popup and then select the specific data for a report through a series of dynamically-generated drop-down menus populated from the Microsoft SQL database. Because the company is global, the web application also has language options that the user can select for the report to be delivered in.
Which part of the application can access sensitive data in this scenario?

A. The popup
B. The language options
C. The resultant URL for a report
D. The drop-down menus for the report details

Answer: D

Q: 7 Scenario: A media corporation has a website where viewers can read articles on current topics and stream videos of daily newscasts. The streaming videos are provided by IPTV, a streaming media application utilizing UDP. The company decides to add an Application Firewall to their network deployment to protect their site from hackers. To determine how many devices are necessary, the administrator must determine which traffic requires protection.
Which content data type(s) does the Application Firewall need to inspect in this environment?

A. Text/html
B. Images and text/html
C. UDP packets and text
D. Text/html, UDP packets and images

Answer: A

Q: 8 The positive security model works with Application Firewall by ______. (Choose a phrase to complete this statement correctly.)

A. protecting web servers based on learning
B. protecting web servers based on signatures
C. only allowing traffic that matches approved patterns
D. allowing traffic that does not match blocked patterns

Answer: C

Q: 9 Scenario: A banking company is planning on deploying an Application Firewall in their network environment. The company will need to use SSL, plans on using Advanced profiles, and requires redundancy in their network. The web servers never serve more than 300 Mb/sec
of traffic. How should an administrator deploy the Application Firewall in this environment?

A. As a standalone appliance
B. As a module on a NetScaler
C. As a cluster of standalone appliances
D. As a module on a NetScaler High Availability pair

Answer: D

Q: 10 Scenario: An administrator is configuring profiles to protect a newly acquired
web application. The web application has a few pages that use Javascript. The Javascript pages are independent of other pages on the site and users should be able to bookmark those pages. The administrator has decided to create an advanced profile. How should the administrator configure the Start URL check for the initial deployment before any relaxations are identified? (Choose two.)

A. Enable learning within the Start URL check
B. Disable blocking within the Start URL check
C. Disable URL Closure within the Start URL check
D. Enable a Start URL only for the first Javascript page on the site within the Start URL check

Answer: A, B

Q: 11 Scenario: The IT Manager of a popular social networking website has decided to deploy at least one Application Firewall to protect the millions of users that regularly log on to the
website. The social networking site allows members to post group messages, email personal messages and blogs as well as maintain a personal page with pictures, messages and backgrounds created with HTML code. An administrator is tasked with determining the content type of the data that will be passing through the Application Firewall to determine how many devices are necessary.
Which web application traffic and content data type(s) need to be inspected by the Application Firewall in this environment?

A. HTTP traffic with GIF content data types
B. HTTP traffic with text/html and text/javascript content data types
C. All TCP and UDP traffic with text/html and GIF content data types
D. All TCP traffic with text/html, POP3 and NNTP content data types

Answer: B

Q: 12 Scenario: An online auctioning site has a web application that allows users to post their own items, including images and text. Users are permitted to animate their sites with Javascript. Auctioneers and shoppers must create an account and log in to be able to view any items. The web application creates session IDs at each login to keep track of shoppers and their carts and to generate suggestions for similar purchases.
Which three parts of the application can be exploited to access sensitive data? (Choose three.)

A. The text
B. The login
C. The images
D. The Javascript
E. The session IDs

Answer: B, D, E

Q: 13 Scenario: An administrator has been tasked with protecting an ecommerce application. The web application contains a shopping cart and a login based checkout system that stores information in a Microsoft SQL Server database. The administrator wants to protect the shopping cart and payment information by preventing cookie tampering and SQL injection as well as preventing application malfunctions from displaying multiple instances of credit card numbers. The administrator decided to use an advanced profile.
Based on the advanced defaults, which two changes must the administrator make to protect the application as described in the scenario? (Choose two.)

A. Enable blocking for the SQL Injection check.
B. Enable blocking for the Cookie Consistency check.
C. Enter a relaxation for the entry point in the Start URL check.
D. Enable blocking for the Credit Card check for the credit card types accepted on the site.
E. Enter the relaxations for the fields containing submissions to the Microsoft SQL database in the SQL Injection check.

Answer: C, D

Q: 14 Scenario: A company's corporate security policy requires that web servers be protected with end-to-end SSL encryption. An administrator is configuring SSL in an environment with
a load balancer and a standalone Application Firewall deployment to meet the corporate security policy.
At a minimum, which two SSL termination points are necessary for this environment? (Choose two.)

A. at the web server
B. on the load balancer
C. on the network firewall
D. at the Application Firewall

Answer: A, D

Q: 15 An administrator is creating and uploading an SSL certificate for a production environment. For added security, the administrator plans on encrypting the SSL key generated using the DES algorithm. What should the administrator generate to accomplish this?

A. A self-signed certificate with DER as the keyform
B. A self-signed certificate with PEM as the keyform
C. A certificate signing request with DER as the keyform
D. A certificate signing request with PEM as the keyform

Answer: D

Q: 16 Scenario: An administrator is configuring an Application Firewall to protect a critical company web application and will be using many of the protections including Cookie Consistency. The company security policy requires that no information about which servers, services or firewalls being used is available through web traffic. The administrator needs to modify the Application Firewall default cookie so that it does not have "citrix" in it. How can the administrator change the name of the Application Firewall session cookie?

A. Through Engine Settings
B. In the settings tab of the basic profile
C. In the settings tab of the advanced profile
D. By modifying the policy bound to the web application's profile

Answer: A

Q: 17 Scenario: An administrator is configuring the initial settings for a standalone
Application Firewall in an environment with web servers that receive encrypted and non-encrypted traffic. Server1 with IP address 10.10.10.1 and Server2 with IP address 10.10.10.2 receive the non-encrypted traffic, and Server3 with IP address 10.10.10.3 receives the encrypted traffic. The administrator has already configured the servers.
Which two sets of steps should the administrator take to configure virtual servers (vservers) and services through the name-based approach to meet the deployment needs of this environment? (Choose two.)

A. Add a vserver labeled vs1 of type HTTP and bind it to services sv1 and sv2, and a vserver labeled vs2 of type SSL and bind it to service sv3.
B. Add a service labeled sv1 and bind it to Server1, a service labeled sv2 and bind it to Server2, and a service labeled sv3 and bind it to Server3.
C. Add a service labeled sv1 and bind it to 10.10.10.1, a service labeled sv2 and bind it to 10.10.10.2, and a service labeled sv3 and bind it to 10.10.10.3.
D. Add a vserver labeled vs1 of type HTTP and bind it to service sv1, a vserver labeled vs2 of type HTTP and bind it to service sv2, and a vserver labeled vs3 of type SSL and bind it to service sv3.

Answer: B, D

Q: 18 An administrator needs to configure a standalone Application Firewall to receive encrypted traffic and verify that the back-end servers receive clear text traffic. Which type of virtual server deployment should the administrator deploy for this environment?

A. SSL
B. TCP
C. HTTP
D. SSL and SSL_TCP
E. SSL, SSL_TCP, and HTTP

Answer: A

Q: 19 Scenario: An Internet-based company running an online blogging site is preparing to open a new section of the site for auctioning items and for adding encryption to the entire
site. The company just purchased a standalone Application Firewall and plans to use the system to avoid increasing the CPU utilization due to SSL encryption and decryption that the web servers would otherwise incur. An administrator has already created the necessary certificate and key pairs. Which three entities should an administrator create for this scenario? (Choose three.)

A. A virtual server of type SSL for the web servers
B. A virtual server of type HTTP for the web servers
C. Server objects that point to the back-end web servers
D. Services of type SSL associated with the web servers
E. Services of type HTTP associated with the web servers

Answer: A, C, E

Q: 20 Which step must an administrator take when a server certificate is signed by an intermediate certificate authority?

A. Copy the intermediate certificate into the same file as the server certificate, placing it in the file after the server certificate.
B. Copy the intermediate certificate into the same file as the server certificate, placing it in the file before the server certificate.
C. Copy the intermediate certificate into the same file as the root certificate, placing it in the file after the private key of the server.
D. Copy the intermediate certificate into the same file as the root certificate, placing it in the file before the private key of the server.

Answer: A

Q: 21 Scenario: A web application displays images of company products and descriptive text. The website also contains a purchasing page which requires customers to create or log into a customer account and provide credit card information. After a customer makes a purchase, the application responds with a summary page of the purchases and the credit card the customer used. The web application assigns session cookies to users once they have logged into their customer account. What is a minimum profile type that an administrator should configure for this website?

A. An advanced profile for all the pages with the credit card check configured
B. A basic profile for the pages containing only text and images and an advanced profile with the credit card check configured
C. A basic profile for the pages containing only text and images and an advanced profile with the SAFE Object check configured for the purchasing page
D. An advanced profile with the SAFE Object check configured for the purchasing page and pages containing images and a basic profile for the pages containing only text

Answer: A

Q: 22 Scenario: A web application presents medical research volunteers with a survey pertaining to their medical history as well as some personal information such as their social
security information, gender, age, ethnicity, and contact information. Each page on the website displays questions and provides empty fields for participants to enter their responses. At the end of the survey, the web application generates a summary sheet with the participant's answers and saves the results to a back-end database.
To make the application compliant with government policies, the administrator wants to ensure that the sensitive information is not displayed on the summary sheet and that hackers cannot obtain participant information through the web application.
Which two Application Firewall protections should the administrator configure to meet the needs of this scenario? (Choose two.)

A. Deny URLs
B. Field Format
C. SAFE Object
D. SQL Injection

Answer: C, D

Q: 23 Scenario: An administrator at a company that designs and administers web surveys needs to ensure that only one option is selected per set of radio buttons and that participants cannot go to a page within a survey without first going to the one directly before it. Which two Application Firewall protections must the administrator configure to meet these requirements? (Choose two.)

A. Start URL
B. Deny URL
C. Field Formats
D. Form Field Consistency

Answer: A, D

Q: 24 Which Application Firewall protection guards against the risk of a hacker executing arbitrary code on the web server by sending a request with an extremely long header?

A. Deny URL
B. URL Closure
C. Buffer Overflow
D. Cookie Consistency

Answer: C

Q: 25 An administrator wants to ensure that image files are not inspected by a profile. In the policy to which the profile is bound, which qualifier and operator pair should an administrator use in an expression to exclude image files?

A. URL !=
B. URL ==
C. URL CONTAINS
D. URL NOTCONTAINS

Answer: D

Q: 26 Scenario: An Application Firewall administrator added a basic profile to a forum that accepts posts from users. Since the deployment of the profile, Tim O'Malley from the
company AppSelect can no longer post on the forum. Which setting should an administrator configure to allow Tim O'Malley to post on the site while still protecting the site?

A. Set SQL Injection to transform.
B. Set a Field Format rule for this field.
C. Create an advanced profile for this page.
D. Create a Cross-Site Scripting relaxation for this field.

Answer: A

Q: 27 Scenario: The developers pushed a new page onto a site protected by an Application Firewall. This new page tracks customers by timestamping their session cookies. Customers now complain they are being redirected to the homepage when they try to go to the new page. The administrator needs to find and correct the misconfiguration. What did the administrator fail to do?

A. Enable URL Closure
B. Enable the Start URL protection
C. Configure a Start URL relaxation
D. Enable the Cookie Consistency protection
E. Configure a Cookie Consistency relaxation

Answer: E


© 2014 Cheat-Test.com, All Rights Reserved