1Y0-341 無料問題集「Citrix ADC Advanced Topics - Security, Management and Optimization」

Which two settings can be used when creating a Cache Content group? (Choose two.)

正解:C、E 解答を投票する
Scenario: A hacker accessed the HTML code from a product page and manipulated the HTML code as shown:
Original Value: <input type=hidden name=price value=2379.73> Manipulated Value: <input type=hidden name=price value=9.24> Which security check can the engineer configure to counter the manipulation?

Which reason can cause fail over in a Citrix ADC Application Delivery Management High Availability pair?

Which security model should a Citrix Engineer implement to make sure that no known attack patterns pass through Citrix Web App Firewall?

解説: (JPNTest メンバーにのみ表示されます)
Scenario: A Citrix Engineer has enabled the IP Reputation feature. The engineer wants to protect a critical web application from a distributed denial of service attack.
Which advanced expression can the engineer write for a Responder policy?

解説: (JPNTest メンバーにのみ表示されます)
Scenario: A Citrix Engineer is monitoring the environment with Citrix Application Management (ADM). Management has asked lota report of high-risk traffic to protected internal websites.
Which dashboard can the engineer use to generate the requested report?

A Citrix Engineer configures the integrated caching feature to cache both static and dynamic content, but the integrated cache feature does NOT work as expected. Which two resources can the engineer use to troubleshoot this integrated cache issue? (Choose two.)

正解:A、D 解答を投票する
Scenario: A Citrix Engineer has configured a Denial-of-Service (DoS) protection on the NetScaler and found that client TCP connections are failing. After taking a packet trace, the engineer notices that the first packet was dropped and that the NetScaler terminated the connection due to DoS protection being enabled.
What step can the engineer take to resolve the client connection failure?

Scenario: A Citrix Engineer configured signature protections for Citrix Web App Firewall.
Signature Auto- Update has been enabled. Upon reviewing the log files, the engineer notices that the auto update process has an error. In the settings for Signature Auto Update the engineer notices that the URL is blank.
Which URL should the engineer enter to restore the update process?

解説: (JPNTest メンバーにのみ表示されます)
Which syntax is used to write a StyleBook?

解説: (JPNTest メンバーにのみ表示されます)
Which two protections ensure that the correct data is returned by the client? (Choose two.)

正解:A、C 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A Citrix Engineer observes that when the application firewall policy is bound to the virtual server, some of the webpages are NOT loading correctly.
Which log file can the engineer use to view the application firewall-related logs in the native format?

Which Application-level Quality of Experience (AppQoE) Action setting modifies the communication characteristics of the connections established with the associated web application?

解説: (JPNTest メンバーにのみ表示されます)
In which order is a client request to a protected web application processed?

Which Front End Optimization technique overcomes the parallel download limitation of web browsers?

解説: (JPNTest メンバーにのみ表示されます)
Scenario: A Citrix Engineer has deployed four NetScaler MPXs with the following network configuration:
- Management traffic is on VLAN 5 (NSIP).
- Application and server traffic is on VLAN 10 (SNIP).
The engineer added the NetScaler Management and Analytics System (NMAS) interface to VLAN
10 to deploy a NMAS High Availability (HA) pair to manage and monitor the applications and virtual servers. After doing so, the engineer is NOT able to see the NetScaler or applications that need to be managed.
How can the engineer resolve the issue?

A Citrix Engineer wants to quietly track attempts that cause a web application to display a list of all user accounts.
Which action should the engineer enable to achieve this?

解説: (JPNTest メンバーにのみ表示されます)
In PCRE, the only characters assumed to be literals are ___________ (Choose the correct option to complete the sentence.)

A Citrix Engineer needs to implement Application Firewall to prevent the following tampering and vulnerabilities:
- If web server does NOT send a field to the user, the check should NOT allow the user to add that field and return data in the field.
- If a field is a read-only or hidden field, the check verifies that data has NOT changed.
- If a field is a list box or radio button field, the check verifies that data in the response corresponds to one of the values in that field.
Which security check can the engineer enable to meet this requirement?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡