Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! Citrix has retired the 1Y0-401 Exam Contact us through Live Chat or email us for more information.

1Y0-401 Designing Citrix XenDesktop 7.6 Solutions Questions and Answers

Questions 4

Scenario:

CGE needs to define its management process for desktop image releases. Some groups need a process for version control that includes thorough testing prior to production.

Why does using Hypervisor templates and leveraging Workflow Studio to deploy desktops from templates help manage the image versioning process?

Options:

A.

It allows for automatic, scripted upgrades of the deployment template.

B.

It provides centralized, automated, single-image management.

C.

It facilitates consistent deployment of base images.

D.

It allows for scripts to be executed from the same network share as the deployment template.

Buy Now
Questions 5

Scenario:

A Citrix Architect is designing a multi-server Provisioning Services solution for CGE. The solution must be highly available and minimize the risk of vDisk inconsistency.

What should the architect recommend?

Options:

A.

Configure a separate local vDisk store on each Provisioning Services server and a daily robocopy script across the two stores.

B.

Configure a separate local vDisk store on each Provisioning Services server and configure the two stores in a DFS-R group.

C.

Configure a vDisk store on a CIFS share on a NAS for each Provisioning Services server.

D.

Create the Provisioning Services vDisk store on a configured, single DFS namespace.

Buy Now
Questions 6

Scenario:

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy.

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability.

How should the architect deploy MGMT in a Hosted VDI environment?

Options:

A.

As Hosted VDI Static Persistent

B.

As Hosted VDI Static

C.

As Hosted VDI Random

D.

Hosted VDI with SCCM

Buy Now
Questions 7

Scenario:

CGE decided to virtualize its server workloads and provide a virtual solution to all of its end users. CGE is looking for an image management process that is scalable, but would like to limit infrastructure requirements.

How should the architect design the image management process using Windows Deployment Services?

Options:

A.

Prepare an existing machine as the master image.

B.

Install a new Windows image utilizing a XenServer virtual machine prepared as the master image, install the Virtual Delivery Agent (VDA), and run SysPrep on the virtual machine.

C.

Use a XenServer virtual machine to install a new Windows image with MAK prepared as the master image, and ensure the image has two network cards.

D.

Run the Capture Image Wizard on an existing machine.

Buy Now
Questions 8

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

Why is creating a resource pool comprising a maximum of 32 XenServer hosts, using a virtual disk storage repository for XenMotion and high availability, and replicating and performing backups for the meta information the best design solution?

Options:

A.

It addresses all customer requirements by ensuring appropriate design of resource pools, high availability for critical workloads, and a new storage solution for disaster recovery purposes.

B.

It ensures simple setup with a built-in failover design.

C.

It allows virtual workloads to fail over to a failover site for disaster recovery purposes.

D.

It optimizes performance and provides centralized management.

Buy Now
Questions 9

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What are the benefits of using Hosted Shared servers with Provisioning Services?

Options:

A.

It provides the highest end-user density at the lowest cost.

B.

It provides the greatest level of end-user personalization and control.

C.

It facilitates rapid provisioning and offers the highest end-user density.

D.

It offers the lowest cost and the greatest application compatibility.

Buy Now
Questions 10

Scenario:

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases.

What are the benefits of using Hosted Shared servers with Machine Creation Services, when only block storage is available on the shared storage of the Hypervisor?

Options:

A.

It provides the highest end-user density at the lowest cost.

B.

It provides the greatest level of end-user personalization and control.

C.

It offers the lowest storage performance requirement and the highest end-user density.

D.

It offers the lowest cost and the greatest application compatibility.

Buy Now
Questions 11

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with merge at the root level ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.

B.

It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.

C.

It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.

D.

It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies.

Buy Now
Questions 12

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

Which configuration should the architect recommend for the new external access architecture?

Options:

A.

One NetScaler located in all three regional datacenters, configured as a cluster using the same Global Server Load Balancing (GSLB) site, secure.cge.com. Configure the NetScaler Gateway within StoreFront with the SNIP of each NetScaler device.

B.

A high availability pair of NetScalers located in all three regional datacenters. Configure a single public DNS server record, including all three NetScaler pairs.

C.

A high availability pair of NetScalers located in all three regional datacenters, each configured to use the same Global Server Load Balancing (GSLB) site.

D.

One NetScaler located in all three regional datacenters. A single public DNS server record should be configured, including all three NetScaler pairs.

Buy Now
Questions 13

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would creating Citrix policies within a GPO, filtered by end user and Delivery Group, ensure full control over which GPOs are applied?

Options:

A.

It provides central management and control.

B.

It ensures that only policies with the correct filter in Active Directory are applied.

C.

It ensures that only settings located in the root OU are applied.

D.

It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on.

Buy Now
Questions 14

Scenario:

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ.

How should the architect configure the callback URL with one NetScaler located in all three regional datacenters?

Options:

A.

Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

B.

Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

C.

Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers.

D.

Configure the callback URL to point to the external beacon address.

Buy Now
Questions 15

The company plans to reduce their storage requirement by using thin provisioning with XenServer hosts. Which storage option should the architect verify for capability in the current environment?

Options:

A.

NFS

B.

CIFS

C.

iSCSI

D.

Fibre Channel

Buy Now
Questions 16

Scenario:

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted.

How should the architect recommend that SecureICA be implemented?

Options:

A.

By using NetScaler

B.

By implementing secure Delivery Groups

C.

By implementing an Active Directory Group Policy to configure SecureICA

D.

By installing an SSL certificate in the master image

Buy Now
Questions 17

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

How should the architect implement loopback processing to ensure full control over the Group Policies that are applied?

Options:

A.

Configure loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents.

B.

Configure loopback processing with merge on a GPO linked to all OUs containing Virtual Desktop Agents.

C.

Configure loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers.

D.

Configure loopback processing with merge on a GPO linked to all OUs containing Delivery Controllers.

Buy Now
Questions 18

Which consideration is unnecessary for the PositivelyPeople application in the new environment?

Options:

A.

File security

B.

Secure remote access

C.

Access to legacy mainframe

D.

Support for secured print jobs

Buy Now
Questions 19

Which two operational risks exist in CGE’s current environment? (Choose two.)

Options:

A.

Only one farm is running multiple zones.

B.

A test environment is NOT in place.

C.

Web Interface id NOT highly available in all regions.

D.

The London datacenter uses SAN storage.

Buy Now
Questions 20

Scenario:

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment.

Why would configuring loopback processing with replace at the root level ensure full control over which Group Policies are applied?

Options:

A.

It ensures that only Group Policies with the correct filtering in Active Directory are applied below the root level when end users log on.

B.

It ensures that only Group Policies located in the root Citrix OU are applied below the root level when end users log on.

C.

It ensures that only Citrix policies are applied below the root level when end users log on.

D.

It ensures that Group Policies located in the root Citrix OU are merged with Citrix policies.

Buy Now
Questions 21

Scenario: A Citrix Architect is estimating the required minimum bandwidth needed for CGE’s Aberdeen Engineers end-user group. To calculate this, the architect uses the Citrix published minimum figure for HDX 3D Pro bandwidth usage.

What is the minimum bandwidth required to support the Engineers end-user group located in Aberdeen?

Options:

A.

50 Mb/s

B.

150 Mb/s

C.

300 Mb/s

D.

600 Mb/s

Buy Now
Questions 22

Which two issues should a Citrix Architect address for end users? (Choose two.)

Options:

A.

Profile corruption

B.

Slow logon and logoff times

C.

Connections from non-corporate-owned devices

D.

Single-factor authentication for internal end users

Buy Now
Questions 23

Which two risks exist in the access layer of the CGE environment? (Choose two.)

Options:

A.

Secure Gateway is used by some sites.

B.

Single-factor authentication is in use for external end users.

C.

Receiver for mobile devices is installed from third-party stores.

D.

End-user connections from non-corporate-owned devices are allowed.

Buy Now
Questions 24

Which two FlexCast models should a Citrix Architect consider for the Research end-user group? (Choose two.)

Options:

A.

Remote PC Access

B.

Hosted Shared

C.

Streamed VHD

D.

On-Demand Apps

E.

Hosted VDI: Static Persistent

Buy Now
Questions 25

Which tool should a Citrix Architect use to investigate slow logon times for the Executives/Management and Back Office end-user groups in the Houston office?

Options:

A.

CDFControl utility

B.

Citrix EdgeSight console

C.

Citrix AppCenter console

D.

Group Policy Management console

Buy Now
Questions 26

Which change to the corporate Windows 7 client would prevent single sign-on to the infrastructure using the end user's Active Directory account?

Options:

A.

A Smart Card reader is installed to allow the end user to log on with an X509 certificate issued by the Active Directory Certificate Authority.

B.

The workstation has the 'Interactive login: Do not display last user name' policy applied and enforced by Group Policy Object (GPO).

C.

The native Windows Receiver is removed and end users can access the environment using the HTML Receiver through a web browser.

D.

The Windows workstation is joined to a different domain than where the end user account resides, and the two domains are in the same forest.

Buy Now
Questions 27

Which tool should a Citrix Architect use to collect session latency and bandwidth requirements for end users in the Jurong office?

Options:

A.

HDX Monitor

B.

Citrix Director

C.

Citrix EdgeSight

D.

Citrix AppCenter Console

Buy Now
Questions 28

CGE has a baseline policy that allows only the client's default printer to be available in the Citrix session.

Which end-user group requires an exception policy to override this and allow multiple printers to be available in the Citrix session?

Options:

A.

Research

B.

Engineers

C.

Back Office

D.

Executives/Management

Buy Now
Questions 29

Which action would improve the end-user experience for Technicians and Engineers?

Options:

A.

Apply a Citrix policy to enable lossless graphics

B.

Apply a Citrix policy to disable Queuing and Tossing

C.

Apply a Citrix policy to enable Desktop Composition Redirection

D.

Apply a Citrix policy to limit graphics quality based on available bandwidth

Buy Now
Questions 30

Which two- factor authentication solution would resolve the gaps in the current CGE environment, and meet the business and security requirements based on the current client types in use?

Options:

A.

A physical token carried by the end user

B.

X509 certificates stored on a Smart Card

C.

A complex Active Directory password enforced by Group Policy

D.

RADIUS authentication with an Employee ID Number

Buy Now
Questions 31

Which two issues could CGE's current home directory storage strategy cause? (Choose two.)

Options:

A.

Slow logons

B.

Unverified data backups

C.

High IOPS on the storage appliance

D.

High CPU usage on the XenApp servers

Buy Now
Questions 32

Scenario: A Citrix Architect recommends upgrading CGE’s Provisioning Services 6.1 environment to Provisioning Services 7.6. Currently, vDisks in Provisioning Services 6.1 are configured with the write cache location on the target device hard drive.

Which two applications will show increased application performance due to the upgrade to Provisioning Services 7.6? (Choose two.)

Options:

A.

SAP

B.

Salesforce

C.

OpenGL (CAD)

D.

Proprietary Energy App

Buy Now
Questions 33

Which risk could lead to a lengthy farm outage in the event of a corrupt SQL data store?

Options:

A.

SQL server backups are encrypted

B.

An untested SQL backup and restoration process

C.

SQL servers that are NOT running on the same service packs

D.

The use of SQL Mirroring instead of SQL AlwaysOn Availability Groups

Buy Now
Questions 34

A Citrix Architect recommends that the SAP and Office Suite images be consolidated into a single image.

Which two factors helped guide the architect's recommendation? (Choose two.)

Options:

A.

A reduction in Hotfix testing time

B.

CGE's planned upgrade to Microsoft Office 2013

C.

The use of both applications by all CGE end users

D.

End-user complaints about slow application launch times

Buy Now
Questions 35

Which reason explains why a Citrix Architect would identify the SQL environment as a cause of potential issues in CGE's current deployment?

Options:

A.

Use of SQL authentication

B.

Lack of backup and restoration procedures

C.

Lack of identical servers in different datacenters

D.

Network bandwidth between congested datacenters

Buy Now
Questions 36

Which option requires the fewest components to implement a fault-tolerant, load-balanced solution for end-user access at each datacenter?

Options:

A.

Two StoreFront servers in a single StoreFront server group.

B.

Two NetScalers in a high availability pair, with load balancing pointing to a single StoreFront server.

C.

Three NetScalers in a cluster, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

D.

Two NetScalers in a high availability pair, with load balancing pointing to two StoreFront servers belonging to the same StoreFront server group.

Buy Now
Questions 37

Which two current licensing issues should a Citrix Architect resolve in CGE's new virtualization design? (Choose two.)

Options:

A.

There are more RDS CALs than Citrix licenses.

B.

The Citrix and RDS licenses share the same server.

C.

There are many different license servers in the environment.

D.

There is a mixture of Enterprise, Platinum, and Advanced Citrix licenses in use.

Buy Now
Questions 38

Which two factors should a Citrix Architect consider with regard to CGE’s Back Office end-user group? (Choose two.)

Options:

A.

Their need for a special application set

B.

Their need to access additional printers

C.

Their need to install their own applications

D.

Their need to use non-corporate-owned devices

Buy Now
Questions 39

After careful review of the end users and applications in CGE's environment, a Citrix Architect has chosen several different FlexCast models for application and desktop delivery.

What are two reasons why the architect would recommend 'VDI: pooled with PvD' as an appropriate delivery model for the Desktop - Research application? (Choose two.)

Options:

A.

It allows the end users to install custom software.

B.

It gives the end users full rights over the system drive.

C.

It requires less storage space than dedicated desktops.

D.

It allows for high availability in a disaster recovery scenario.

Buy Now
Questions 40

What should a Citrix Architect do to simplify printer driver management for CGE's Back Office end-user group?

Options:

A.

Use the Citrix Universal Print Server.

B.

Enforce the use of the Citrix Universal Printer Driver.

C.

Manually install printer drivers on the XenApp servers.

D.

Modify the printer driver format of the Citrix Universal Printer Driver.

Buy Now
Questions 41

Scenario:

CGE's CIO asks a Citrix Architect to design a new Provisioning Services environment. Management asks about best practices for storing master images to ensure scalability, performance, and high availability.

Which solution should the architect recommend?

Options:

A.

Configure a shared storage location (CIFS) on a Windows File Server for each regional datacenter.

B.

Configure an iSCSI LUN on a Storage Area Network (SAN) for each Provisioning Services server.

C.

Configure an iSCSI LUN on a Network Attached Storage (NAS) device for each Provisioning Services server.

D.

Configure a shared storage location (CIFS) on a Network Attached Storage (NAS) device.

Buy Now
Questions 42

Scenario:

Each XenServer host has four 10GB network cards - two bonded for storage and management separated by separate VLAN, and the two bonded for guest VM networks. The CIO would like to see network traffic distributed across all links to maximize their utilization. Switches to which the Hypervisors will connect to support 802.3ad.

How should the architect configure the guest VM network?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Buy Now
Questions 43

How should the architect configure high availability (HA) on a XenServer VM to support an iSCSI NAS?

Options:

A.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and create a NIC bond.

B.

Connect a minimum of two network interface cards from the XenServer to the iSCSI storage network and enable Asymmetric Logical Unit Assignment (ALUA).

C.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a different Layer 3 network, run the HBA configuration utility, and verify that both can access the iSCSI storage array.

D.

Connect a minimum of two network interface cards to the iSCSI storage network, each on a separate Layer 3 network, and enable XenServer Multipathing.

Buy Now
Questions 44

Scenario:

Each XenServer host has six 10GB network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic. All switches in the environment support 802.3ad and adaptive load balancing.

How should the architect configure the storage network interfaces?

Options:

A.

Using active-active bonding

B.

Using active-passive bonding

C.

Using XenSever MPIO redundancy

D.

Using LACP bonding

Buy Now
Questions 45

Why is deploying two NetScaler appliances - one in the primary and one in the secondary datacenter, configured with GSLB, the best design solution?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Buy Now
Questions 46

Scenario:

CGE's CIO asks a Citrix Architect to design its Hypervisor networking solution. The storage team informs the architect that they have purchased a new 10GB iSCSI SAN array that the XenServer hosts will use for SAN storage. They would like the solution to meet all outlined requirements.

What should the architect recommend?

Options:

A.

Each XenServer host should be configured with six 10GB network interfaces - four dedicated for storage traffic, one for management traffic, and one for guest virtual machine (VM) network traffic.

B.

Each XenServer host should be configured with four 10GB network cards - two bonded for storage and management separated by separate VLAN, and two bonded for guest VM networks.

C.

Each XenServer host should be configured with two bonded 10GB NICs for storage, management, and guest VM networking.

D.

Each XenServer host should be configured with four 10GB NICS - two dedicated for storage, and two bonded for guest VM networks and management separated by VLAN.

Buy Now
Questions 47

How should the architect configure high availability (HA) on a NAS device share so that Provisioning Services has constant access to Provisioning Services images?

Options:

A.

By using storage replication between multiple NAS devices

B.

By using Distributed File Services Replication (DFSR) between multiple NAS devices.

C.

By using DNS Round Robin.

D.

By using XenServer with HA enabled.

Buy Now
Questions 48

Why is deploying four NetScaler appliances - two in the primary and two in the secondary data center with four NetScaler virtual servers for each appliance binded to a session policy, the best remote access design?

Options:

A.

It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution.

B.

It provides redundancy, while optimizing external WAN traffic.

C.

It segments the Gateway and load-balancing features of the NetScaler appliances.

D.

It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Buy Now
Questions 49

Why is configuring an iSCSI LUN on a SAN the best design choice for vDisk storage?

Options:

A.

It is the least expensive solution.

B.

It is a highly scalable and resilient solution.

C.

It creates the least amount of administrative overhead.

D.

It reduces the system footprint.

Buy Now
Questions 50

Why would the architect choose active-active bonding when configuring network interfaces for storage networks?

Options:

A.

It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond.

B.

It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load.

C.

It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond.

D.

It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond.

Buy Now
Questions 51

Why should memory and network utilization be used to identify bottlenecks?

Options:

A.

Excessive memory and network utilization will slow the creation of new sessions.

B.

Excessive memory and network utilization on the data collector will slow down Web Interface authentication.

C.

Excessive memory and network utilization on the data collector will slow down application enumeration.

D.

Excessive memory and network utilization on the XenApp server will affect the local host cache.

Buy Now
Questions 52

Which three user groups require remote access? (Choose three.)

Options:

A.

IT

B.

Call center

C.

Human Resources

D.

Emergency Response Team

E.

Nurses, Imaging, and Radiology

Buy Now
Questions 53

The architect needs to evaluate the options for replicating user profiles across all sites.

Which two pieces of information should the architect collect to analyze the options? (Choose two.)

Options:

A.

WAN traffic

B.

License requirements

C.

Storage infrastructure

D.

Database configuration

Buy Now
Questions 54

An architect is recommending an antivirus policy for Provisioning Services servers that are being used to provision pooled desktops. Which two options should the architect recommend for optimal performance? (Choose two.)

Options:

A.

Enable scan on read

B.

Prohibit write cache scanning

C.

Increase scheduled scanning frequency

D.

Exclude scanning of the target device drivers

Buy Now
Questions 55

The company is implementing XenDesktop globally for desktop virtualization.

How should the architect recommend installment of controllers for high availability?

Options:

A.

Install two controllers in London and two in Paris

B.

Install two controllers in New York and two in Hong Kong

C.

Install two controllers in Hong Kong and two in Tokyo

D.

Install two controllers in New York and two in London

Buy Now
Questions 56

Why does enabling the Windows Automatic Install Kit help manage the image release process?

Options:

A.

Because it automates the Windows domain join process

B.

Because it can be configured by DHCP options

C.

Because it performs a scripted Windows installation

D.

Because it automatically deploys the latest drivers and patches

Buy Now
Questions 57

What should a Citrix Engineer implement to allow users with pooled desktops to maintain persistent configurations, such as installation of new applications in their desktops?

Options:

A.

Personal vDisk

B.

Roaming profiles

C.

Folder redirection

D.

Personal network drives

E.

Citrix Profile Management

Buy Now
Questions 58

What should the architect recommend for designing the PvD storage for scalability?

Options:

A.

XenServer local storage

B.

XenServer shared storage

C.

CIFS share

D.

ShareFile StorageZones

Buy Now
Questions 59

Why does centralizing volume activation help manage the image release process?

Options:

A.

Because it reduces licensing administration

B.

Because it helps manage version control

C.

Because it automates the license download process

D.

because it enables use of Multiple Activation Keys

Buy Now
Questions 60

Why should disk and network I/O be used to identify bottlenecks?

Options:

A.

High disk and network I/O utilization of the Delivery Controller can indicate a high volume of user logons, indicating that the server may NOT have sufficient resources to handle the load.

B.

High disk and network I/O utilization of the Delivery Controller can indicate that the target device will encounter delays when mounting new vDisks.

C.

High disk and network I/O utilization of the Delivery Controller can indicate that a high number of processor-intensive applications are being utilized by the virtual desktop users.

D.

High disk and network I/O utilization of the Delivery Controller can indicate the presence of a virus or malware.

Buy Now
Exam Code: 1Y0-401
Exam Name: Designing Citrix XenDesktop 7.6 Solutions
Last Update: Nov 23, 2024
Questions: 449