Scenario: A customer would like to configure a single NetScaler Gateway that facilitates access to XenMobile and XenApp/XenDesktop resources from iOS and Android mobile devices. The customer also plans for users to access XenApp and XenDesktop resources by using a web browser from other endpoints.
The following Session Policies and expressions have been configured on NetScaler:
- Policy 1: REQ.HTTP.HEADER User-Agent NOTCONTAINS CitrixReceiver && REQ.HTTP.HEADER Referer EXISTS
- Policy 2: REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER X-Citrix-Gateway EXISTS
A Citrix Engineer is asked to create a new Session Profile for users accessing resources through web browsers on their endpoint devices.
The profile should be bound to __________ and direct users to __________. (Choose the correct set of options to complete the sentence.)
Which two components are required in order for a Citrix Engineer to use the MDX Toolkit to wrap Android applications for production use? (Choose two.)
Scenario: A user has lost permission to WorxMail and the application has been uninstalled. However, the user can still access the Worx Store.
Which two sets of logs should a Citrix Engineer gather in order to help diagnose this issue? (Choose two.)
Users are unable to complete device enrollment and the Mobile Application Management (MAM) portion of enrollment is failing.
Which two steps could a Citrix Engineer take to troubleshoot this issue? (Choose two.)
Scenario: After being online for a few weeks, users can no longer access the Worx Store. After investigation, a Citrix Engineer believes there is a problem with authentication at the NetScaler Gateway.
Which command could the engineer run on the NetScaler to validate if LDAP authentication is failing?
A Citrix Engineer receives an error message while wrapping a public application obtained from the Apple App store.
What is a possible cause of the application failing to wrap?
Scenario: A Citrix Engineer has configured the XenMobile Public Key Infrastructure (PKI) integration with the domain-hosted Certificate Authority (CA). During enrollment the client certificate fails to be delivered to a device. The engineer reviews the logs and finds a "401 Unauthorized" error.
Which two steps should the engineer take to correct this issue? (Choose two.)
Scenario: User password caching must be disabled in an environment due to an information technology security policy. The security policy also mandates the following:
- Devices should NOT be allowed to be offline for more than 3 days.
- Devices should recognize updates to applications in under 24 hours in the event of critical security updates.
- Users should conduct application upgrades within 3 days of a device recognizing the availability of an update.
Which combination of settings should a Citrix Engineer recommend to meet the requirements of the security policy?
Scenario: A customer has attempted to integrate XenMobile with XenApp and XenDesktop. Users connect to the Worx Store and can see MDX applications but CANNOT see published applications or desktops.
A Citrix Engineer determines a possible cause of this issue is that either port __________ or __________ between the XenMobile Server and StoreFront is NOT open. (Choose the two correct options to complete the sentence.)
Which two components are required in order for a Citrix Engineer to use the MDX Toolkit to wrap Windows Phone applications for production use? (Choose two.)
Scenario: A Citrix Engineer is deploying XenMobile for an organization. The organization will deploy iOS and Android devices, and users will be allowed to enroll and use the solution remotely, or from an internal employee WIFI network. The NetScaler and XenMobile Server are both deployed in the Demilitarized Zone (DMZ) with no firewall between them.
The engineer has opened the following ports:
- Internet (ANY) -> NetScaler (DMZ) (Inbound) (443)
- XenMobile Server -> Internet (TCP 2195 / 2196) (Outbound)
Which two ports should the engineer ask the Security team to open? (Choose two.)
Which two triggers could a Citrix Engineer use to create an automated action to selectively wipe devices when a user account is disabled? (Choose two.)
What are two situations in which XenMobile notification templates are used? (Choose two.)