Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Citrix 1Y0-341 Citrix ADC Advanced Topics - Security. Management and Optimization (CCP-N) Exam Practice Test

Demo: 16 questions
Total 107 questions

Citrix ADC Advanced Topics - Security. Management and Optimization (CCP-N) Questions and Answers

Question 1

Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?

Options:

A.

HTML Cross-Site Scripting (XSS)

B.

Cookie Consistency

C.

Start URL with URL Closure

D.

Buffer Overflow

Question 2

Scenario: A Citrix Engineer is asked to help improve the performance of a web application. After capturing and analyzing a typical session, the engineer notices a large number of user requests for the stock price of the company.

Which action can the engineer take to improve web application performance for the stock quote?

Options:

A.

Enable the Combine CSS optimization.

B.

Create a static content group.

C.

Create a dynamic content group.

D.

Enable the Minify JavaScript optimization.

Question 3

Scenario: During application troubleshooting, a Citrix Engineer notices that response traffic received from a protected web application is NOT matching what the web server is sending out. The auditor is concerned that Man-In-The-Middle attack is in progress.

Which action is the Citrix Web App Firewall performing that would trigger this false positive?

Options:

A.

Removing the Last-Modified header

B.

Inserting a hidden form field

C.

Removing the Accept-Encoding header

D.

Modifying and adding cookies in the response

Question 4

Scenario: A Citrix Engineer is reviewing the Citrix Web App Firewall log files using the GUI. Upon further analysis, the engineer notices that legitimate application traffic is being blocked.

What can the engineer do to allow the traffic to pass through while maintaining security?

Options:

A.

Note the protection blocking the traffic in the log entry. Edit the profile and deselect the Block action for the protection.

B.

Select the check box in the log entry. Choose Dismiss to allow the traffic to pass through from the Action menu.

C.

Note the protection blocking the traffic in the log entry. Create a new profile and policy and bind it with a larger priority number.

D.

Select the check box in the log entry. Choose Edit & Deploy to create a relaxation rule from the Action menu.

Question 5

A Citrix Engineer for an online retailer wants to ensure that customer address information is NOT stolen. Which protection can the engineer implement to prevent this?

Options:

A.

Cross-Site Request Forgeries (CSFR)

B.

HTML SQL Injection

C.

For Field Consistency

D.

Credit Card Check

Question 6

A review of purchases made at an online retailer shows that several orders were processed for items at an unpublished price.

Which protection can a Citrix Engineer implement to prevent a site visitor from modifying the unit price of a product on the shopping cart page?

Options:

A.

Cross-Site Request Forgeries (CSRF)

B.

Form Field Consistency

C.

HTML Cross-Site Scripting (XSS)

D.

HTML SQL Injection

Question 7

Scenario: A Citrix Engineer has configured Integrated Caching to improve application performance. Within hours, the Citrix ADC appliance has run out of memory.

Which Content Group setting can the engineer configure to show the caching process until a need is demonstrated?

Options:

A.

Maximum memory usage limit

B.

Quick Abort Size

C.

Do not cache – if hits are less than

D.

Do not cache – if size exceeds

Question 8

Scenario : A Citrix Engineer needs to forward the Citrix Web App Firewall log entries to a central management service. This central management service uses an open log file standard. Which log file format should the engineer use in the Citrix Web App Firewall engine settings to designate the open log file standard?

Options:

A.

CEF

B.

TLA

C.

IIS

D.

W3C

Question 9

Which action ensures that content is retrieved from the server of origin?

Options:

A.

CACHE

B.

MAY_CACHE

C.

NOCACHE

D.

MAY_NOCACHE

Question 10

A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.

Which action should the engineer enable to achieve this?

Options:

A.

Stats

B.

Block

C.

Log

D.

Learn

Question 11

Which Citrix Application Delivery Management (ADM) Analytics page allows an engineer to monitor the metrics of end-point analysis and authentication failures?

Options:

A.

Gateway Insight

B.

HDX Insight

C.

Web Insight

D.

Security Insight

Question 12

Which Citrix Web App Firewall profile setting can a Citrix Engineer implement to remove non-essential content from web files to improve response time?

Options:

A.

Strip HTML Comments

B.

Exclude Uploaded Files from Security Checks

C.

Enable Form Tagging

D.

Exempt Closure URLs from Security Checks

Question 13

Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. After the Web App Firewall policy is bound to the virtual server, the engineer notices that Citrix Web App Firewall is NOT blocking bad requests from clients. Which tool can help the engineer view the traffic that is passing to and from the client?

Options:

A.

nstrace

B.

nsconmsg

C.

syslog

D.

aaad.debug

Question 14

Scenario: A Citrix Engineer is setting up Citrix Application Delivery Management (ADM) in High Availability (HA) mode. The engineer creates both nodes and

connects them to the same subnet.

Which IP address must the engineer configure on the Citrix ADM HA pair to allow instances to reconnect to Citrix ADM after a failover?

Options:

A.

Virtual

B.

Cluster

C.

Subnet

D.

Floating

Question 15

Which variable will display the client's source IP address when added to an HTML Error Object page?

Options:

A.

$

B.

${CUENT.IPSRC}

C.

$(CLIENT.1P.SRC)

D.

$[CLIENT.IP.SRC]

Question 16

Which two protections ensure that the correct data is returned by the client? (Choose two.)

Options:

A.

Form Field Consistency.

B.

Field Formats

C.

HTML Cross-Site Scripting (XSS)

D.

Cross-Site Request Forgeries (CSRF)

Demo: 16 questions
Total 107 questions