♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 1Y0-201 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/1Y0-201-exam/

Ucertify offers free demo for 1y0 201 pdf exam. "Managing Citrix XenDesktop 7.6 Solutions", also known as 1y0 201 pdf exam, is a Citrix Certification. This set of posts, Passing the Citrix 1y0 201 simulations exam, will help you answer those questions. The citrix 1y0 201 Questions & Answers covers all the knowledge points of the real exam. 100% real Citrix citrix 1y0 201 exams and revised by experts!

Q25. - (Topic 4) 

Scenario: Users complain that they are NOT able to print to the new special barcode printers attached to their client devices. However, they can print to other mapped printers. 

What should a Citrix Administrator do to resolve this issue? 

A. Configure the Printer Assignments policy setting. 

B. Set the Client printer redirection policy to Allowed. 

C. Configure Default Print Flags on the Desktop OS machines. 

D. Pre-stage manufacturer-provided printer drivers on the Desktop OS machines using pnputil.exe. 


Q26. - (Topic 4) 

A Citrix Administrator needs to obtain logs from Machine Creation Services. 

Which .config file should the administrator manually modify to enable logging? 

A. BrokerService.exe.Config 

B. Citrix.Configuration.SdkWcfEndpoint.exe.Config 

C. Citrix.MachineIdentity.SdkWcfEndpoint.exe.Config 

D. Citrix.MachineCreation.SdkWcfEndpoint.exe.Config 


Reference: http://support.citrix.com/article/CTX127492 (See the table). 

Q27. - (Topic 4) 

Scenario: Users of the Human Resource (HR) user group report that one of their applications is NOT being personalized. A Citrix Administrator discovers that the application writes user-specific data in %programfiles%\\HR\\%username%. 

Which policy could the administrator configure to enable personalization of this application? 

A. Folders to mirror 

B. Path to user store 

C. Directories to synchronize 

D. Path to cross platform settings store 


Q28. - (Topic 4) 

Scenario: When remote users attempt to log on through NetScaler Gateway, they are presented with the following error message: 

‘Cannot Complete your Request.’ 

When the same users are in the office, they are able to log on successfully. 

What should a Citrix Administrator change to resolve this issue? 

A. The Callback URL to match the external URL of the NetScaler Gateway. 

B. The NetScaler Gateway Authentication method to 'Enable Pass-through'. 

C. The StoreFront URL to match the external URL of the NetScaler Gateway. 

D. The External Beacon address to match the external URL of the NetScaler Gateway. 


Q29. - (Topic 1) 

Scenario: A Citrix Administrator must provide a new application to 50 users and wants to use the most cost-effective application delivery method. These users perform well-defined tasks and do NOT require personalization or offline access to applications. 

What type of application delivery method should the administrator consider? 

A. Persistent virtual desktops 

B. Hosted Server OS machine 

C. Virtual machine hosted apps 

D. Locally streamed virtual hard disk 


Q30. - (Topic 4) 

In which node within Citrix Studio could a Citrix Administrator modify the operating system type for Machine Creation Services? 

A. Hosting 

B. Policies 

C. Controllers 

D. Machine Catalogs 


Reference: https://www.citrix.com/content/dam/citrix/en_us/documents/go/citrix-xenapp-and-xendesktop-76-implementation-guide-for-healthcare.pdf 

Q31. - (Topic 4) 

Scenario: A user receives the following error when launching a Desktop OS machine 

through NetScaler Gateway: 

'Error could not connect to Application.' 

What should a Citrix Administrator temporarily disable to analyze this error? 

A. Session Reliability 

B. Authorization policy 

C. Authentication policy 

D. Secure Ticket Authority 


Q32. - (Topic 1) 

Which policy must a Citrix Administrator modify on the NetScaler to allow mobile devices to connect to a XenDesktop environment where two-factor authentication is NOT used? 


B. Session 

C. Authentication 

D. Traffic Domain