Act now and download your Citrix 1Y0-401 test today! Do not waste time for the worthless Citrix 1Y0-401 tutorials. Download Down to date Citrix Designing Citrix XenDesktop 7.6 Solutions exam with real questions and answers and begin to learn Citrix 1Y0-401 with a classic professional.

Q65.  (Topic 5) 

Why is configuring regional shared storage locations on a CIFS server using XenServer with HA enabled the best design choice for vDisk storage? 

A. It is the least expensive solution. 

B. It is a highly scalable and resilient solution. 

C. It creates the least amount of administrative overhead. 

D. It reduces the system footprint. 

Answer:


Q66.  (Topic 6) 

Scenario: 

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. 

How should the architect implement GPOs to ensure full control over which Citrix policies are applied? 

A. Create one GPO for each region. 

B. Create Citrix policies within a GPO and filter the policies based on end users and Delivery Groups. 

C. Create Citrix policies within a GPO and filter the policies based on Client Name. 

D. Create Citrix policies within a GPO and filter the Citrix policies based on IP address. 

Answer:


Q67.  (Topic 4) 

Which FlexCast model should a Citrix Architect use to deploy desktops to the Research end-user group? 

A. Hosted Shared 

B. Streamed VHD 

C. Hosted VDI Random 

D. Hosted VDI Static with Personal vDisk 

Answer:

95.  (Topic 4) 

Which licensing changes should a Citrix Architect recommend to enable the HDX Mobile feature in CGE's Jurong and Makassar offices? 

A. Purchase XenMobile licenses. 

B. Convert existing XenApp licenses to per device licenses. 

C. Purchase NetScaler Universal Licenses for each mobile device. 

D. Upgrade existing XenApp licenses to XenApp Enterprise licenses. 

Answer:


Q68.  (Topic 6) 

Scenario: 

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. 

Why would configuring loopback processing with replace on a GPO linked to all OUs containing Delivery Controllers ensure full control over which Group Policies are applied? 

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Delivery Controllers where end users log on. 

B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Delivery Controllers where end users log on. 

C. It ensures that only Citrix policies are applied on the Delivery Controllers where end users log on. 

D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies. 

Answer:


Q69.  (Topic 5) 

Why is a design with 12 NetScaler appliances, in which each datacenter deploys three NetScaler virtual servers configured with the subnets of the three sites and binded to redirection policies that are configured in ICA Proxy mode using StoreFront server, the best remote access design? 

A. It allows end users to connect to their primary datacenter through a secure, reliable, and cost-effective solution. 

B. It provides redundancy, while optimizing external WAN traffic. 

C. It segments the Gateway and load-balancing features of the NetScaler appliances. 

D. It allows for the expected expansion of remote access usage and provides SSL VPN functionality for future needs. 

Answer:


Q70.  (Topic 5) 

Why would the architect choose active-passive bonding when configuring bonded network interfaces for guest VM networks? 

A. It provides load balancing of VM traffic across multiple physical NIC interfaces at a per guest basis, and offers improved distribution of traffic across physical interfaces in the bond. 

B. It sends all guest VM traffic in the bond to an active interface, which provides the best distribution of network load. 

C. It uses a hashing algorithm, which provides better distribution of traffic across the interfaces in the bond. 

D. It uses a round robin load-balancing policy, which provides better distribution of traffic across the interfaces in the bond. 

Answer:


Q71.  (Topic 4) 

Why would having one farm with three configured sites, with two Provisioning Services servers in each datacenter, meet the requirements of a regional, single-image management strategy with minimal WAN traffic across datacenters? 

A. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability within each region. 

B. It ensures that Provisioning Services targets will NOT load balance across regions, and reduces management overhead. 

C. It ensures that Provisioning Services targets will NOT load balance between hosts, and guarantees high availability between regions. 

D. It ensures that Provisioning Services targets will NOT load balance across regions, guarantees high availability within each region, and reduces management overhead. 

Answer:


Q72.  (Topic 6) 

Scenario: 

A Citrix Architect identifies a fault in the Active Directory design for CGE's existing XenApp environments. Group Policy Objects (GPOs) from OUs across the Active Directory apply when end users log on to XenApp applications, creating undesirable end-user experiences. The architect determines that CGE needs full control over which GPOs apply in the new environment. 

Why would configuring loopback processing with replace on a GPO linked to all OUs containing Virtual Desktop Agents ensure full control over which Group Policies are applied? 

A. It ensures that only Group Policies with the correct filtering in Active Directory are applied on the Virtual Desktop Agents where end users log on. 

B. It ensures that only Group Policies located in or under the root Citrix OU are applied on the Virtual Desktop Agents where end users log on. 

C. It ensures that only Citrix policies are applied on the Virtual Desktop Agents where end users log on. 

D. It ensures that GPOs located in the root Citrix OU are replaced with Citrix policies. 

Answer: