In which way does implementing Worx PIN improve the user experience while maintaining Enterprise security?
Which two components are required in order for a Citrix Engineer to use the MDX Toolkit to wrap Android applications for production use? (Choose two.)
A Citrix Engineer must deploy a scheduling policy to __________ and __________ devices in order to allow these devices to check in automatically without further intervention by the engineer. (Choose the two correct options to complete the sentence.)
A Citrix Engineer needs to design a multi-node, scalable XenMobile solution.
Which database type should the engineer choose to meet the needs of this deployment?
Which two types of certificates will require a restart when uploaded to a XenMobile Server using the XenMobile Console? (Choose two.)
Which three permissions may a Citrix Engineer control with a Role-based Access Control (RBAC) policy? (Choose three.)
A Citrix Engineer is currently in the process of a first-time installation of a XenMobile Server using the command-line interface.
Which two settings are required when configuring the remote database using SQL authentication? (Choose two.)
Which three options must occur on the virtual server during the initial configuration of the Mobile Application Management (MAM) load-balancing virtual server? (Choose three.)
Scenario: A Citrix Engineer is deploying XenMobile for an organization. The organization will deploy iOS and Android devices, and users will be allowed to enroll and use the solution remotely, or from an internal employee WIFI network. The NetScaler and XenMobile Server are both deployed in the Demilitarized Zone (DMZ) with no firewall between them.
The engineer has opened the following ports:
- Internet (ANY) -> NetScaler (DMZ) (Inbound) (443)
- XenMobile Server -> Internet (TCP 2195 / 2196) (Outbound)
Which two ports should the engineer ask the Security team to open? (Choose two.)
Scenario: User password caching must be disabled in an environment due to an information technology security policy. The security policy also mandates the following:
- Devices should NOT be allowed to be offline for more than 3 days.
- Devices should recognize updates to applications in under 24 hours in the event of critical security updates.
- Users should conduct application upgrades within 3 days of a device recognizing the availability of an update.
Which combination of settings should a Citrix Engineer recommend to meet the requirements of the security policy?
A Citrix Engineer integrated a XenMobile Server with StoreFront and now users are unable to enumerate any of their XenApp applications.
Which step must the engineer take to resolve this issue?
Which two steps must a Citrix Engineer take to configure client certificate authentication on a NetScaler Gateway virtual server? (Choose two.)
Scenario: A Citrix Engineer is configuring a load-balanced virtual server on the NetScaler that will handle the Mobile Application Management (MAM) traffic from Netscaler Gateway. The engineer binds multiple XenMobile Servers to the service group.
Which persistence method should the engineer use to determine to which XenMobile Server to send the MAM traffic?
A Citrix Engineer notices that several devices in the XenMobile Console show up as Mobile Application Managed (MAM) only.
What is a possible cause of this issue?
Scenario: A Citrix Engineer would like to test an updated application before publishing it for production use. After wrapping the application with the latest MDX toolkit and uploading the application to the XenMobile Server with a different name, the engineer observes that the application is displayed as an update to the existing application.
What could cause this behavior?
Scenario: A customer plans to use the XenMobile Server as the SAML Identity Provider for ShareFile authentication. SAML authentication should be available for MDX users as well as through the desktop sync client for Windows and Mac. The customer does NOT plan to use StorageZone Connectors.
What is the minimum configuration that a Citrix Engineer must perform in order to meet the needs of the customer?
A Citrix Engineer recently enabled Worx PIN authentication on a XenMobile Server.
What should the engineer instruct users to do in order to enable Worx PIN on their devices?