Download Free Citrix 1Y0-A25 VCE Files From Braindumo2go – Get Citrix 1Y0-A25 Certification Right Now

QUESTION 1
Scenario: Nether Tech’s corporate policy requires that passwords are NOT requested for XenApp passthrough connections, except for those that pertain to members of the Nursing Users group. Nurses connect to XenApp servers hosting applications in the Nurses Worker Group. Click the Exhibit button to view a list of the policies configured in the environment.
 clip_image001_thumb_thumb_thumb_thumb_thumb_thumb_thumb_thumb
An engineer needs to prioritize the three policies so that only members of the Nurses group are prompted for passwords when they connect to their XenApp resources. What is the correct order of prioritization for the policies from lowest to highest?

A.    Unfiltered, Nurses, Corporate Users
B.    Corporate Users, Nurses, Unfiltered
C.    Unfiltered, Corporate Users, Nurses
D.    Nurses, Unfiltered, Corporate Users

Answer: D

QUESTION 2
Scenario: As part of the designs for the XenDesktop site and XenApp farm at Nether Tech, a Citrix Engineer is instructed to ensure that all auto-created printers use the Citrix Universal Printer Driver. As the deployment phase begins, a home user is experiencing issues printing to a locally attached printer. When print jobs are sent to the printer, the pages print, but only with strange characters on them. To resolve the user’s printing issue, the engineer should create a Citrix User policy and __________. (Choose the correct phrase to complete the sentence.)

A.    set a session printer to the user’s default printer
B.    set the client printer names to legacy printer names
C.    set the client printer names to standard printer names
D.    set PCL5c driver at the top of the Universal driver preference list

Answer: D

QUESTION 3
Scenario: Nether Tech’s head office, which has over 400 employees, is located in the city center of Amsterdam, where the majority of the employees rely on public transport to travel to and from the office. During the winter, a significant amount of disruption is caused when staff cannot get into the office. Nether Tech wants to ensure that staff can connect to their corporate desktops from their home computers or corporate issued laptops during times of disruption. Nether Tech has a XenApp farm already. This farm can be accessed externally and all staff members have access. Nether Tech can only spare two virtual servers to facilitate a solution that will allow employees to access their own corporate physical desktops. Any solution must allow employees to work directly with their own corporate physical desktops. Which solution will best suit Nether Tech’s needs?

A.    Deploy two XenApp servers to the existing farm and publish the RDP client.
B.    Deploy two XenApp servers to the existing farm and publish a hosted desktop for all users.
C.    Deploy two desktop controllers to the existing farm and use XenDesktop to publish each user’s desktop.
D.    Deploy two desktop controllers servers to the existing farm and use XenApp to publish each user’s desktop.

Answer: C

QUESTION 4
Scenario: An engineer has been instructed to implement a new XenApp farm. The IT Manager at Nether Tech wants idle sessions for server hosted applications to be disconnected after two hours and idle sessions for XenApp server hosted desktops to be disconnected after eight hours. There is a separate domain group policy which disconnects idle sessions after four hours. The XenApp servers hosting the server hosted desktops are in a worker group named Apps. The XenApp servers hosting the server hosted desktop are in a worker group named Desktops. Several Computer policies are configured in the environment. Click the Exhibit button to view the list of configured Computer policies.
 clip_image001[4]_thumb_thumb_thumb_thumb_thumb_thumb_thumb_thumb
Users are complaining that their idle sessions are disconnected after four hours. What must the engineer do to meet the requirements stated in the environment?

A.    Remove the Domain Group Policy.
B.    Disable Domain Group Policy Inheritance.
C.    Change the Domain Group Policy to 8 hours.
D.    Change the Domain Group Policy to 2 hours.

Answer: B

QUESTION 5
Scenario: In order to complete the rollout of a new XenApp farm, a Citrix Engineer is required to set a policy to allow all client printers to auto-create for the domain group called Accounting Users. Their current unfiltered Citrix policy is configured to only auto-create the client’s default printer. The engineer must also ensure that any changes made will NOT affect other users in the farm. All the XenApp servers are in a single worker group. Which three actions must the engineer take to allow the Accounting Users group to receive all of their printers? (Choose three.)

A.    Increase the policy priority.
B.    Decrease the policy priority.
C.    Assign the policy to the Accounting User group.
D.    Assign the policy to the existing XenApp Worker group.
E.    Create a User policy and set the policy to allow the autocreation of all client printers.
F.    Create a Computer policy and set the policy to allow the autocreation of all client printers.

Answer: ACE

QUESTION 6
Scenario: Nether Tech is delivering Windows 7 virtual desktops to 1000 employees using XenDesktop in a XenServer hosting infrastructure that consists of 16 XenServer hosts. Provisioning Services is used to provide standard OS image streaming to the virtual desktops in standard image mode. The Citrix Engineer in the environment has observed a decrease in overall performance. Which two actions should the engineer take to increase performance? (Choose two.)

A.    Delete snapshots from the XenServer storage repository.
B.    Configure the vDisk write cache mode on the target device.
C.    Configure the vDisk write cache mode on the Provisioning Services server.
D.    Create a hard drive on the XenServer storage repository for each virtual machine.

Answer: BD

QUESTION 7
Scenario: Nether Tech has rolled out Windows Server 2008 XenApp published desktop to 1000 employees as their primary workspace since 2008. Recently the Citrix team has been receiving an increasing number of tickets on slow logons and logoffs and slow XenApp server performance. After further investigation, the Citrix team discovered low available disk space on the system drive of the XenApp servers. The majority of the disk space has been occupied by thousands of temporary Internet files and cookies on the local profile cache as well as in the roaming profile storage. The CIO of Nether Tech made a decision to discard the temporary Internet files and cookies but to keep the rest of the user profile information and reclaim local disk space. To accomplish this goal, the Citrix Engineer is looking to use Citrix Profile Management to replace Windows roaming profile. Which two group policy options in the Citrix profile management administrative template should the Citrix Engineer configure to accomplish this goal? (Choose two.)

A.    In profile handling, enable “Delete locally cached profiles on logoff”.
B.    In file system, configure exclusion list: local settings\temporary internet files.
C.    In Streamed user profiles, configure logon without the download temporary Internet files folder.
D.    In Advanced Settings, configure folder redirection: c:\users\%username%\local settings\temporary internet files.
E.    In file system, configure exclusion list: C:\Documents and Settings\%username%\microsoft\internet explorer\temporary internet files.

Answer: AB

QUESTION 8
Scenario: A Citrix Engineer plans to set up a regularly scheduled backup and archive implementation for five critical Windows 2008 Server R2 virtual machines. Each virtual machine must be backed up on a different day at the same time of day and archived to a safe place for extra security. Which two actions must the engineer take to configure the scheduled backup and archive implementation for these five virtual machines? (Choose two.)

A.    Automatically archive to a remote NFS share.
B.    Automatically archive to a remote EXT3 share.
C.    Automatically archive to a local XenServer share.
D.    Create one protection and recovery policy for all five virtual machines.
E.    Create five protection and recovery policies; one for each virtual machine.

Answer: AE

Braindump2go New Realeased Citrix 1Y0-A25 Dumps Free Download

http://www.braindump2go.com/1y0-a25.html