QUESTION 91
Scenario: An administrator is creating virtual servers to receive encrypted and non-encrypted HTTP traffic as well as non-encrypted TCP traffic. The administrator plans to forward all traffic from the NetScaler system to the back-end servers as clear text. How should the administrator configure the services and virtual servers?
A. Create HTTP type service
Create TCP type service
CreateTCP type vserver
Bind the HTTP type service and TCP type vserver together Bind theTCP type service and vserver
together
B. Create HTTP type service
Create TCP type service
Create HTTP type vserver
Create TCP type vserver
Bind the HTTP type service and vserver together
Bind the TCP type service and vserver together
C. Create HTTP type service
Create TCP type service
Create SSL type service
Create HTTP type vserver
Create TCP type vserver
Bind the HTTP type service and vserver together
Bind the TCP type service and vserver together
Bind the SSL type service and HTTP type vserver together
D. Create HTTP type service
Create TCP type service
Create HTTP type vserver
Create TCP type vserver
Create SSL type vserver
Bind the HTTP type service and vserver together
Bind the TCP type service and vserver together
Bind the HTTP type service and SSL type vserver together
E. Create HTTP type service
Create TCP type service
Create SSL type service
Create HTTP type vserver
Create TCP type vserver
Create SSL type vserver
Bind the HTTP type service and vserver together
Bind the TCP type service and vserver together
Bind the SSL type service and vserver together
Answer: D
QUESTION 92
An administrator needs to configure a monitor to track the health of a POP3 entity in a network environment that includes a NetScaler system. Which type of monitor must the administrator configure to track the health of this entity?
A. User
B. Inline
C. Load
D. SASP (Server Application State Protocol)
Answer: A
QUESTION 93
Which custom monitor parameter must an administrator configure to receive an SNMP trap if a monitor probe fails to respond within the specified parameter?
A. Retries
B. Failure Retries
C. Success Retries
D. Response timeout
E. Response timeout threshold
Answer: E
QUESTION 94
An administrator is configuring a virtual server for encrypted traffic from clients that need to be decrypted prior to being forwarded to the back-end servers. Which type of virtual server (Front-end) and service (Back-end) should the administrator configure?
A. Front-end SSL, back-end SSL
B. Front-end TCP, back-end SSL_TCP
C. Front-end SSL_TCP, back-end TCP
D. Front-end SSL_TCP, back-end SSL_TCP
Answer: C
QUESTION 95
Scenario: An events ticketing company plans to use the content switching feature of NetScaler to parse traffic so that users purchasing tickets or answering surveys go to group A servers, users accessing images go to either group B or C servers depending on the ticket category and all other traffic goes to group D. All servers are in the same web farm. Which two actions must an administrator perform to correctly define the content switching virtual server so that traffic NOT going to groups A -C gets directed to group D? (Choose two.)
A. Bind a load balancing virtual server to the appropriate service for the web farm
B. Bind the appropriate service to a load balancing virtual server for serving content group D
C. Bind the appropriate load balancing virtual server to the content switching virtual server without a policy
D. Bind the appropriate load balancing virtual server to the content switching virtual server with the appropriate policy for content group D
Answer: BC
QUESTION 96
Scenario: The computers at a company were recently infected with the nimda virus. An administrator at the company plans to prevent this from happening again by using the content filtering feature of the NetScaler system to terminate a client connection when a possible instance of the nimda virus is detected. The administrator has already created a policy expression that will match traffic with ROOT.EXE or CMD.EXE and plans to use the NetScaler default “RESET” action to terminate the appropriate connections.
In order to achieve the desired result, the administrator should __________ prior to binding the policy at the appropriate level. (Choose the correct phrase to complete the sentence.)
A. add the filter with the policy expression and the action specified
B. add the filter with the policy expression and then add the action to the filter
C. create the action and then add the filter with the policy expression and the action specified
D. create the action, add the filter, and then add the action and the policy expression to the filter
Answer: A
QUESTION 97
Scenario: An administrator is troubleshooting monitoring for web servers in an environment. Currently, services are often being marked down due to slow back-end servers. The administrator wants to configure the vserver and services so that existing connections stay open when a service is marked down but not when a vserver is marked down. How must the administrator configure the service and virtual server to reflect this dependency?
A. set lb vserver lbv1 -downStateFlush ENABLED
set service svc1 -downStateFlush ENABLED
B. set lb vserver lbv1 -downStateFlush DISABLED
set service svc1 -downStateFlush ENABLED
C. set lb vserver lbv1 -downStateFlush ENABLED
set service svc 1 -downStateFlush DISABLED
D. set lb vserver lbv1 -downStateFlush DISABLED
set service svc1 -downStateFlush DISABLED
Answer: C
QUESTION 98
Scenario: An administrator plans on configuring health checks for services bound to web servers 1 and 2 which are listening on TCP port 80 for HTTP and TCP port 443 for HTTPS. Service1 receives the encrypted traffic and Service 2 receives the clear text traffic. Which type of monitor should the administrator bind to the services to meet the needs of this environment?
A. A TCP monitor to Service1 and Service2
B. An HTTP-ECV monitor to Service1 and Service2
C. An HTTP monitor with the secure parameter selected to Service1 and an HTTP monitor to Service 2
D. A TCP-ECV monitor with the secure parameter selected to Service 1 and a TCP monitor to Service 2
Answer: C
QUESTION 99
Scenario: A security administrator wants to monitor the rate at which unacknowledged SYN packets are received by the NetScaler system for individual VIP addresses. The administrator plans to configure SNMP on the NetScaler to be informed about synflood rates. Which two traps are set when the set SNMP alarm command is used? (Choose two.)
A. synflood
B. entitySynflood
C. synfloodNormal
D. entitySynfloodNorm
Answer: BD
QUESTION 100
Scenario: An administrator is planning on configuring health checks for services bound to web servers 1 and 2 which are listening on TCP port 80 for HTTP and TCP port 443 for HTTPS. Service1 receives the encrypted traffic and Service 2 receives the clear text traffic. How should the administrator create the monitor for Service1 using the command line interface?
A. set mon monitor-SVC1-Mon TCP -secure YES
B. add lb mon monitor-SVC1-Mon HTTP -secure YES
C. set mon monitor-SVC1-Mon HTTP -transparent NO
D. add lb mon monitor-SVC1-Mon TCP -transparent NO
Answer: B
Passleader Offer Low Price 1Y0-A21 Sample Questions 100% Guarantee Pass Exam