The Refresh Guide To 1Y0-371 training materials Jan 2018

Actualtests 1Y0-371 Questions are updated and all 1Y0-371 answers are verified by experts. Once you have completely prepared with our 1Y0-371 exam prep kits you will be ready for the real 1Y0-371 exam without a problem. We have Renew Citrix 1Y0-371 dumps study guide. PASSED 1Y0-371 First attempt! Here What I Did.

Q41. - (Topic 3) 

Which two triggers could a Citrix Engineer use to create an automated action to selectively wipe devices when a user account is disabled? (Choose two.) 

A. Event 

B. User property 

C. Device property 

D. Installed app name 

Answer: A,B 


Q42. - (Topic 3) 

Scenario: A Citrix Engineer needs to configure WorxMail MDX policies based on the information below. 

Environment Information 

-On-premise Exchange Server: mail.company.local 

-XenMobile Server FQDN: xms.company.com 

-NetScaler Gateway FQDN: nsg.company.com 

How could the engineer configure WorxMail MDX policies to conserve battery life and minimize re-authentication? 

A. Background Network Services: xms.company.com:443 Background Network Services Gateway: nsg.company.com:443 Network Access Mode: Tunneled to the Internal Network 

B. Background Network Services: mail.company.local:443 Background Network Services Gateway: nsg.company.com:443 Network Access Mode: Tunneled to the Internal Network 

C. Background Network Services: mail.company.local:443 Background Network Services Gateway: nsg.company.com:443 Network Access Mode: Unrestricted 

D. Background Network Services: xms.company.com:443 Background Network Services Gateway: nsg.company.com:443 Network Access Mode: Unrestricted 

Answer:


Q43. - (Topic 3) 

A Citrix Engineer needs to push native email profiles and configurations to user devices. 

Which XenMobile macros could the engineer use to automate email provisioning of native email clients on user devices? 

A. {user.username} {user.mail} 

B. (User.username) (User.mail) 

C. %user.username %user.mail 

D. #user.username #user.mail 

Answer:


Q44. - (Topic 3) 

A Citrix Engineer downloaded the incorrect version of Worx Home on an Android device and is attempting to uninstall Worx Home, but attempts to uninstall have NOT been successful. 

What should the engineer do to successfully uninstall Worx Home? 

A. Restart the device. 

B. Deactivate Worx Home as an administrator on the device. 

C. Unenroll the device. 

D. Remove all MDX applications from the device. 

Answer:


Q45. - (Topic 4) 

Scenario: A Citrix Engineer needs to create a proof of concept for a XenMobile project and needs to ensure that the following requirements are met: 

-Users must be able to access corporate web and SaaS applications from their personal mobile devices. 

-Access to Citrix hosted applications and desktops on XenApp and XenDesktop is NOT required at this time. 

-Users' devices should NOT be managed. 

-Users will require access to WorxWeb and WorxMail. 

Which three components will meet the requirements of the scenario? (Choose three.) 

A. StoreFront 

B. Worx Home 

C. MDX Toolkit 

D. Citrix Receiver 

E. XenMobile App Controller 

F. XenMobile Device Manager server 

Answer: B,C,E 


Q46. - (Topic 4) 

Scenario:XenMobile Device Manager is implemented to ensure Android and iOS users are compliant with corporate security policies. 

A Citrix Engineer is required to set the following restrictions for all devices: 

-Restrict device passcode to 4 digits 

-Disable the device camera 

Which two configuration steps should the engineer take to meet the needs of the scenario? (Choose two.) 

A. Create a configuration policy for each device type. 

B. Create a configuration policy containing both restrictions. 

C. Create a deployment package with a device type property rule. 

D. Create a single deployment package to deploy to both device types. 

E. Create separate deployment packages and deploy to each device type. 

Answer: A,E 


Q47. - (Topic 4) 

A Citrix Engineer created an Automated Action to determine when a device has been rooted or jailbroken and needs to customize the text of the email that users receive when NOT in compliance. 

How could the engineer customize the text of the email that users receive? 

A. Add text to an Ad Hoc notification. 

B. Change the Notification Server settings. 

C. Edit the corresponding Notification Template. 

D. Modify the text in the Automated Action Policy. 

Answer:


Q48. - (Topic 4) 

Scenario: A Citrix Engineer has configured a Netscaler Gateway virtual server that will be accessed externally by users through the Worx Home client. Root certificates are installed on the NetScaler. Users are having issues accessing the Netscaler Gateway remotely. 

Which two reasons could be causing this issue? (Choose two.) 

A. The certificates uploaded are SHA256. 

B. The NetScaler is missing the correct intermediate certificates. 

C. The certificates are NOT linked. 

D. The NetScaler certificate is NOT uploaded to the XenMobile Server. 

Answer: A,D 


Q49. - (Topic 4) 

Scenario: A Citrix Engineer uses the Netscaler XenMobile wizard to configure SSL Offload for a single XenMobile Server and selects the http communication to XenMobile Server under Mobile Application Management (MAM) load balancing settings. After completing the wizard, the engineer runs the Load Balancer for MAM connectivity check, which shows a failure. 

Which corrective step will the engineer need to take to ensure successful communications between the XenMobile Server and NetScaler? 

A. Add the CITRIX-XDM monitor to the load-balancing virtual server. 

B. Add the NetScaler SNIP to the Access-white list on the XenMobile Server. 

C. Allow the http service through the XenMobile Server firewall. 

D. Upload the XenMobile Server root certificate to the NetScaler. 

Answer:


Q50. - (Topic 3) 

After publishing an Android MDX application, a Citrix Engineer finds that the application only installs on devices running Android OS 4.3 and above, instead of all Android devices. 

What is the likely cause of this issue? 

A. The key used on the certificate to wrap the application uses a DSA key algorithm. 

B. The certificate used to wrap the application has expired. 

C. The certificate used to wrap the application uses SHA1 and DSA Signing algorithms. 

D. The key size of the certificate used to wrap the application is 2048 bits. 

Answer: