Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
Scenario: A Citrix Engineer is asked to help improve the performance of a web application. After capturing and analyzing a typical session, the engineer notices a large number of user requests for the stock price of the company.
Which action can the engineer take to improve web application performance for the stock quote?
Scenario: During application troubleshooting, a Citrix Engineer notices that response traffic received from a protected web application is NOT matching what the web server is sending out. The auditor is concerned that Man-In-The-Middle attack is in progress.
Which action is the Citrix Web App Firewall performing that would trigger this false positive?
Scenario: A Citrix Engineer is reviewing the Citrix Web App Firewall log files using the GUI. Upon further analysis, the engineer notices that legitimate application traffic is being blocked.
What can the engineer do to allow the traffic to pass through while maintaining security?
A Citrix Engineer for an online retailer wants to ensure that customer address information is NOT stolen. Which protection can the engineer implement to prevent this?
A review of purchases made at an online retailer shows that several orders were processed for items at an unpublished price.
Which protection can a Citrix Engineer implement to prevent a site visitor from modifying the unit price of a product on the shopping cart page?
Scenario: A Citrix Engineer has configured Integrated Caching to improve application performance. Within hours, the Citrix ADC appliance has run out of memory.
Which Content Group setting can the engineer configure to show the caching process until a need is demonstrated?
Scenario : A Citrix Engineer needs to forward the Citrix Web App Firewall log entries to a central management service. This central management service uses an open log file standard. Which log file format should the engineer use in the Citrix Web App Firewall engine settings to designate the open log file standard?
Which action ensures that content is retrieved from the server of origin?
A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.
Which action should the engineer enable to achieve this?
Which Citrix Application Delivery Management (ADM) Analytics page allows an engineer to monitor the metrics of end-point analysis and authentication failures?
Which Citrix Web App Firewall profile setting can a Citrix Engineer implement to remove non-essential content from web files to improve response time?
Scenario: A Citrix Engineer wants to protect a web application using Citrix Web App Firewall. After the Web App Firewall policy is bound to the virtual server, the engineer notices that Citrix Web App Firewall is NOT blocking bad requests from clients. Which tool can help the engineer view the traffic that is passing to and from the client?
Scenario: A Citrix Engineer is setting up Citrix Application Delivery Management (ADM) in High Availability (HA) mode. The engineer creates both nodes and
connects them to the same subnet.
Which IP address must the engineer configure on the Citrix ADM HA pair to allow instances to reconnect to Citrix ADM after a failover?
Which variable will display the client's source IP address when added to an HTML Error Object page?
Which two protections ensure that the correct data is returned by the client? (Choose two.)