Which protection can a Citrix Engineer implement to prevent a hacker from extracting a customer list from the company website?
Answer : D
Scenario: A Citrix Engineer is monitoring the environment with Citrix Application Delivery Management (ADM). Management has asked for a report of high-risk traffic to protected internal websites.
Which dashboard can the engineer use to generate the requested report?
Answer : B
Scenario: A Citrix Engineer created the policies in the attached exhibit.

Click the Exhibit button to view the list of policies.
HTTP Request:
GET /resetpassword.htm HTTP/1.1
Accept-Language: en-us Accept-Encoding: gzip, deflate Connection: Keep-Alive
Which profile will be applied to the above HTTP request?
Answer : A
A review of purchases made at an online retailer shows that several orders were processed for items at an unpublished price.
Which protection can a Citrix Engineer implement to prevent a site visitor from modifying the unit price of a product on the shopping cart page?
Answer : B
A Citrix Engineer reviews the App Dashboard and notices that three of the monitored applications have an App Score of less than 50.
The engineer can interpret the App Score as a metric of application . (Choose the correct option to complete the sentence.)
Answer : B
A Citrix Engineer needs to set up access to an internal application for external partners.
Which two entities must the engineer configure on the Citrix ADC to support this? (Choose two.)
Answer : A, D
ADC as a SAML SP (Service Provider) that redirects the requests from external users to an SAML IDP to do authentication prior to authorizing them applying the internal services
Scenario: A Citrix Engineer wants to configure the Citrix ADC for OAuth authentication. The engineer uploads the required certificates, configure the actions, and creates all the necessary policies. After binding the authentication policy to the application, the engineer is unable to authenticate.
What is the most likely cause of this failure?
Answer : D