The Refresh Guide To 1Y0-401 training tools Feb 2018

Exambible offers free demo for 1Y0-401 exam. "Designing Citrix XenDesktop 7.6 Solutions", also known as 1Y0-401 exam, is a Citrix Certification. This set of posts, Passing the Citrix 1Y0-401 exam, will help you answer those questions. The 1Y0-401 Questions & Answers covers all the knowledge points of the real exam. 100% real Citrix 1Y0-401 exams and revised by experts!

Q71.  (Topic 4) 

Scenario: 

CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying this application to the Executives/Management end-user group. The CIO mandates that a FlexCast model must be chosen that resembles this end-user group's existing delivery strategy. 

It is important that a single-image deployment is utilized and that management effort is kept to a minimum for the update process. The availability of a fast rollback plan must also be available after upgrades, since it can often result in system instability. 

Why is deploying MGMT in a Hosted Shared environment on Windows Server 2008 R2 with Provisioning Services the best solution? 

A. It offers a faster change process. 

B. End users are already comfortable working in a shared environment. 

C. It prevents XenApp server crashes. 

D. It enables faster rollbacks. 

Answer:


Q72.  (Topic 4) Scenario: 

CGE decided to virtualize its infrastructure workloads and provide a virtual solution to all end users. The infrastructure workloads include Delivery Controllers, StoreFront servers, License Servers, and Microsoft SQL Servers for databases. 

What are the benefits of using Hosted VDI with Machine Creation Services? 

A. It provides the highest end-user density at the lowest cost. 

B. It provides the greatest level of end-user personalization and control. 

C. It offers the lowest storage performance requirement and the highest end-user density. 

D. It offers the greatest application compatibility. 

Answer:


Q73.  (Topic 5) 

Why is a design with 12 NetScaler appliances, in which each datacenter deploys six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront, the best remote access design? 

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. 

B. It provides redundancy, while optimizing external WAN traffic. 

C. It segments the Gateway and load-balancing features of the NetScaler appliances. 

D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. 

Answer:

170.  (Topic 5) 

Why would the architect choose LACP bonding when configuring bonded network interfaces for guest VM networks? 

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. 

B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. 

C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond. 

D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond. 

Answer:


Q74.  (Topic 4) 

Scenario: 

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. 

Why does enabling file and folder exclusions when configuring group profiles benefit CGE's Sales end-user group? 

A. It minimizes the required storage needed for folder redirection. 

B. It simplifies home drive cleanup. 

C. It improves application performance. 

D. It allows faster logons and logoffs. 

Answer:

61.  (Topic 4) 

Scenario: 

To ensure the security of its new solution, CGE wants to limit end-user access to USB peripherals. Policies have been implemented to disable USB redirection for all end users. As a company policy, only the Research end-user group will be allowed to access USB peripheral devices. 

What could a Citrix Architect design to meet the stated requirements? 

A. A GPO that allows USB redirection, linked to the CGE OU. 

B. A GPO that allows USB redirection, linked only to the Aberdeen and Houston OUs. 

C. A Citrix policy that allows USB redirection, with a filter on the IP range for CGE's Aberdeen and Houston subnets. 

D. A Citrix policy that allows USB redirection, with a filter on the Delivery Group for the Research end-user group desktop. 

Answer:


Q75.  (Topic 6) 

Scenario: 

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. 

How should the architect ensure full control over which Citrix policies are applied? 

A. Configure the Citrix policies in the GPOs. 

B. Create one Citrix Policy for each region. 

C. Create Citrix policies filtered by end users and Delivery Groups. 

D. Create Citrix policies and filter settings based on Client Name. 

Answer:


Q76.  (Topic 6) 

Scenario: 

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. 

Why would configuring loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied? 

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on. 

B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on. 

C. It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on. 

D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies. 

Answer:


Q77.  (Topic 4) 

Scenario: 

CGE is experiencing numerous issues with its existing profile management solution. The Citrix Architect managing the project is tasked with designing a solution that alleviates existing issues and, if possible, minimizes the loss of existing customizations. Configuration changes need to be implemented quickly and with minimal complexity. 

Why does enabling 'Profile streaming' when configuring group profiles benefit CGE's Sales end-user group? 

A. It allows faster logons. 

B. It simplifies home drive cleanup. 

C. It minimizes the required storage needed for folder redirection. 

D. It improves application performance. 

Answer:


Q78.  (Topic 5) 

Why would the architect choose active-active bonding when configuring network interfaces for storage networks? 

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. 

B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. 

C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond. 

D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond. 

Answer:


Q79.  (Topic 5) 

Why is creating six NetScaler virtual servers in HA pairs, configured with the subnets of the three sites and binded to redirection policies, the best design solution? 

A. It provides intrasite redundancy in case of appliance failures, while enhancing performance through an active/active configuration. 

B. It provides redundancy in case of site failures, while optimizing external WAN traffic. 

C. It protects against WAN failures and connects end users to their home datacenter. 

D. It allows for the expected expansion of remote access usage and provides functionality for future needs. 

Answer:


Q80.  (Topic 6) 

Scenario: 

CGE's security officer states that, for compliance reasons, all network traffic between Delivery Controllers, StoreFront servers, and NetScalers must be encrypted. 

How should the architect recommend that IPsec be implemented? 

A. By using NetScaler 

B. By implementing secure Delivery Groups 

C. By implementing an Active Directory Group Policy 

D. By configuring a local IPsec policy in the master image 

Answer:

235.  (Topic 6) 

Scenario: 

A Citrix Architect is asked to design a new external access architecture for CGE. The regional datacenters have NetScaler appliances delivering load-balancing services. Security policy mandates that these internal appliances CANNOT connect to the DMZ. 

How should the architect configure the callback URL with one NetScaler located in all three regional datacenters? 

A. Configure the callback URL to point to the local NetScaler, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. 

B. Configure the callback URL to point to the external address, https://secure.cge.com, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. 

C. Configure the callback URL to point to the FQDN of the local NetScaler Gateway, and configure the Secure Ticket Authority (STA) to point to the local Delivery Controllers. 

D. Configure the callback URL to point to the external beacon address. 

Answer: