A Citrix Engineer needs to prevent an attack against insecure operating-system or web- server software. The attack can cause the system to crash or behave unpredictably when it receives a data string that is larger than it can handle.
Which security check on the Application Firewall can the engineer enable to prevent such attacks?
A. Start URL
B. Deny URL
C. Buffer Overflow
D. Field Format
Which protocol does NetScaler Management and Analytics System (NMAS) use when Discovery is run to locate instances?
A. RIP
B. TCP
C. ICMP
D. NITRO
Scenario: A Citrix Engineer configures the Application Firewall for protecting a sensitive website. The security team captures traffic between a client and the website and notes the following cookie:
citrix_ns_id The security team is concerned that the cookie name is a risk, as it can be easily determined that the NetScaler is protecting the website.
Where can the engineer change the cookie name?
A. Application Firewall Policy
B. Application Firewall Engine Settings
C. Application Firewall Default Signatures
D. Application Firewall Profile
What can a Citrix Engineer do to decrease browser load times by increasing the number of parallel connections to the resource?
A. Configure Domain Sharding.
B. Add more web servers.
C. Block JavaScript on client browsers.
D. Do NOT allow HTML websites.
A Citrix Engineer needs to configure an application firewall profile to ensure that the images uploaded on the website are NOT malicious. The engineer needs to create a policy to filter the upload requests and ensure that they are in JPEG format.
Which expression can the engineer use to fulfill this requirement?
A. http.req.url.endswith (".jpeg) and and http.req.method.eq (POST)
B. http.req.url.contains (".jpeg) and and http.req.method.eq (GET)
C. http.req.url.endswith (".jpeg) || http.req.method.eq (GET)
D. http.req.header ("Content-Type").contains ("image/jpeg") || http.req.method.eq(POST)
A Citrix Engineer has determined that users are able to access random URLs on a web site through bookmarks and by manually typing in the URLs to skip the pages required to reach that part of the website.
Which two checks can the engineer enable to prevent this attack? (Choose two.)
A. Form Field Consistency
B. Deny URL
C. Start URL
D. Buffer overflow
E. HTML Cross-site scripting
Scenario: A Citrix Engineer uses one StyleBook on a NetScaler Management and Analytics System (NMAS) to create multiple load-balanced virtual server configurations for NetScaler instances. The configuration is saved in a config pack.
In which two locations is the StyleBook config pack saved? (Choose two.)
A. NetScaler Instance
B. NetScaler SDX
C. Syslog Server
D. Local network
E. NMAS
A Citrix Engineer has correctly installed and configured the NetScaler Web Logging (NSWL) client but has noticed that logs are NOT being updated.
What could be causing this issue?
A. The TCP port 3011 is NOT open between the NSWL client and NetScaler.
B. The NSWL client executable is NOT running on the client.
C. The NSWL buffer is full on the NetScaler.
D. An NSIP is missing in the log.conf file
Which NetScaler Management Analytics System (NMAS) feature can the Citrix Engineer use to convert configuration tasks performed using the GUI to CLI commands?
A. Master Configuration
B. Inbuilt Template
C. Record-and-Play
D. Configuration Template
Which meta-character can be used as a wildcard to match a single character in a given position?
A. A forward slash (/)
B. A period (.)
C. An asterisk (*)
D. A dollar Sign ($)