If a user device does NOT comply with a company's security requirements, which type of policy can a Citrix Administrator apply to a Citrix Gateway virtual server to limit access to Citrix Virtual Apps and Desktops
resources?
Scenario: After deploying a Citrix ADC in production, a Citrix Administrator notices that client requests are NOT being evenly distributed among backend resources. The administrator wants to change from the default load-balancing method to one that will help distribute the load more evenly.
Which load-balancing method would ensure that the server with the least amount of network utilization is receiving new connections?
What are three possible policy results in a default (advanced) policy configuration? (Choose three.)
A Citrix Administrator wants to customize the look of the landing page presented to users during the
authentication process on Citrix ADC.
Which nFactor component should the administrator modify in this scenario?
authentication/nfactor-authentication-configuring.html
What are three possible policy results in a default (advanced) policy configuration? (Choose three.)
Sharmaine
2 months ago