Citrix 1Y0-312 Citrix Virtual Apps and Desktops 7 Advanced Administration Exam Practice Test

Page: 1 / 14
Total 118 questions

Question 1

In which location is the resulting .VHD file stored by the Enterprise Layer Manager (ELM), when creating layers or layered images with Citrix App Layering?

Answer : B

Question 2

How can a Citrix Engineer restrict end user access to an ICA file?

Answer : A

Question 3

Which two actions should a Citrix Engineer take when upgrading a Workspace Environment Management (WEM) environment? (Choose two.)

Answer : A, C

Question 4

A Citrix Engineer is in the process of updating application layers.

Which three layer integrity messages must the engineer address before finalizing the application layer? (Choose three.)

Answer : B, D, E

Question 5

Scenario: A Citrix Engineer is working on a Citrix Virtual Apps and Desktops deployment.

The current setup has the following characteristics:

Three data centers (A, B, and C), each with a large user base.

Network latency between these datacenters is more than 300 ms RTT because they are located at geographically far distances.

Which design should the engineer choose to ensure optimum performance?

Answer : B

Question 6

Scenario: A Citrix Engineer recently changed the XML port in the Citrix Virtual Apps and Desktops site. After the change, the engineer observed that there is an XML communication port mismatch. The engineer immediately identified that the port was only changed on the Delivery Controller and no change was performed on the StoreFront server.

What are the two ways the engineer can change the port on the StoreFront server to match the changes made on the Delivery Controller? (Choose two.)

Answer : B, C

Question 7

Scenario: A user from the '' domain is browsing a StoreFront server from the '' domain with URL: The user notices that the browser redirects to a server with URL: https:// and again back to The user logged into the StoreFront store without getting any authentication prompt.

is the Identity provider and is the authentication method used in this scenario.

Answer : C

Page:    1 / 14   
Total 118 questions