|
today I have pass the 1z0-026. with 52/60. I used itcertkeys dumps, upload on this site.
|
Question 1.
ITCertKeys.com has back-end databases that support HR+, MfgData+, and Outlook. If ITCertKeys.com decides to centralize the MfgData+ databases in New York, where should the Presentation Servers hosting the MfgData+ application be deployed?
A. The Presentation Servers hosting MfgData+ should be deployed in all locations.
B. The MfgData+ application should be deployed in Mexico City, Shanghai and Bangalore.
C. Servers hosting the MfgData+ application should be deployed in New York, Mexico City,
Shanghai and Bangalore.
D. Servers hosting MfgData+ should be deployed in New York.
Answer: B
Question 2.
ITCertKeys.com has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing.
Why are only user-based Group Policies required?
A. This is determined by the location of the timeout settings.
B. User configuration Group Policies will satisfy the access requirements for the mission critical
applications.
C. Timeout settings must be applied to all user sessions to meet ITCertKeys.com's security
requirements.
D. Policies for Presentation Server can only be applied on the user level.
Answer: A
Question 3.
ITCertKeys.com currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation.
Why should Web Interface be deployed within the internal network?
A. By placing the Web Interface servers on the internal network port 443 does not have to be
opened.
B. This prevents internal users from having to traverse the DMZ to access Web Interface through
port 443 or port 80.
C. By placing the Web Interface servers on the internal network, external access can be limited to
the Access Gateway appliance through port 443.
D. This is the only way to avoid opening port 80 on the internal firewall.
Answer: A
Question 4.
ITCertKeys.com has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment.
Why is downloading from the ITCertKeys.com intranet site the best option?
A. All clients can be downloaded automatically.
B. All clients can be downloaded. Clients for Windows and Java download automatically.
C. Users have access to this source and can get clients.
D. Users can get the most up-to-date clients independently.
Answer: A
Question 5.
ITCertKeys.com plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor.
Which features of Access Gateway should they recommend to best maximize security?
A. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point
analysis features should be configured for the Access Gateway. Active Directory authentication
should be used, making it necessary that user account be created.
B. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point
analysis features should be configured for the Access Gateway. Users will access by means of
Active Directory guest accounts.
C. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point
analysis should be configured for the Access Gateway. Active Directory authentication should
be used, making it necessary that user account be created.
D. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point
analysis should be configured for the Access Gateway. Users will access by means of Active
Directory guest accounts.
Answer: C
Question 6.
ITCertKeys.com plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor.
Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for ITCertKeys.com's environment in a cost-effective manner?
A. Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication
should be used, necessitating the need for the creation of user accounts.
B. Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of
Active Directory guest accounts.
C. Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of
Active Directory guest accounts.
D. Split tunneling, two-factor authentication, and endpoint analysis. Active Directory
authentication should be used, necessitating the need for the creation of user accounts.
Answer: A
Question 7.
Which type of Terminal Services profile should be deployed?
A. Mandatory profiles with folder redirection
B. Mandatory profiles
C. Roaming profiles with folder redirection
D. Roaming profiles
Answer: C
Question 8.
ITCertKeys.com plans to implement Presentation Server for users in Shanghai.
Why should a static port be defined?
A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is
more secure.
B. By defining a static port, system resources can be conserved.
C. There is no other way to establish communication over firewalls other than defining a static
port.
D. A static port will allow for License Server communications to be more secure, this, this is
optimal.
Answer: D
Question 9.
How should ITCertKeys.com deploy required Citrix hot fixes?
A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should
be done.
B. Emergency hot fixes should be deployed through manual installation with limited
documentation. All other hot fixes should be deployed by means if Installation Manger with full
documentation.
C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be
done.
D. All required hot fixes should be deployed by means of Installation Manager. Testing should be
done.
Answer: D
Question 10.
In regard to ITCertKeys.com's Advanced Access Control deployment.
Why should an Advanced Access Control web server be placed at this customer's location?
A. Adding an Advanced Access Control deployment enables the customer to incorporate their
own security standards.
B. Adding an Advanced Access Control deployment expedites administrative changes because
approval chain is closer to the customer.
C. Adding an Advanced Access Control web server will provide better load balancing across
existing hardware.
D. Adding an Advanced Access Control deployment makes administration more cost-effective for
the customer.
Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.