A Citrix Engineer needs to prevent an attack against insecure operating-system or web- server software. The attack can cause the system to crash or behave unpredictably when it receives a data string that is larger than it can handle.
Which security check on the Application Firewall can the engineer enable to prevent such attacks?
A. Start URL
B. Deny URL
C. Buffer Overflow
D. Field Format
Which TCP flag will the NetScaler Application Firewall module send in response to a malformed/non-RFC complaint request from a client?
A. FIN+ACK packet with a window size set to 9845
B. RST packet with a window size set to 9845
C. RST +ACK packet with a window size set to 0
D. FIN packet with a window size set to 0
A Citrix Engineer observes that when the application firewall policy is bound to the virtual server, some of the webpages are NOT loading correctly.
Which log file can the engineer use to view the application firewall-related logs in the native format?
A. /var/log/iprep.log
B. /var/nslog/newnslog
C. /var/nslog/ns.log
D. /var/log/ns.log
When the NetScaler marks a client connection as "non-trackable", the default behavior of the NetScaler without making any change to the HTTP Profile is to ______. (Choose the correct option to complete the sentence.)
A. proxy the connection to the target.
B. proxy the connection to the client.
C. track the connection.
D. drop the connection.
Scenario: A Citrix Engineer has migrated an application to NetScaler to secure it from application layer attacks. The engineer receives a complaint that the application is timing out while users are actively accessing the page. Those users are forced to reestablish the connection.
What can be the cause of this issue?
A. The maximum session lifetime is NOT configured.
B. The session time out is configured to a low value.
C. The application is configured with a low session timeout.
D. The maximum session lifetime is less than the session timeout.
Scenario: A Citrix Engineer has configured the Signature file with new patterns and log strings and uploaded the file to Application Firewall. However, after the upload, the Signature rules are NOT implemented.
What can the engineer modify to implement Signature rules?
A. The Signature update URL should have an older version than the one on Application Firewall.
B. The new Signature file should have new ID and version number.
C. The NetScaler version should be upgraded before upgrading the signatures.
D. The Signature upgrade will take effect only after a restart.
A Citrix Engineer needs to deploy the NetScaler Management and Analytics System (NMAS) in their company environment to ensure that NMAS provides uninterrupted operation in all situations.
Which deployment type can meet this requirement?
A. Active-Active High Availability Mode
B. Single-Server Deployment Mode
C. NMAS integrated with Director mode
D. Active-Passive High Availability Mode
Scenario: A Citrix Engineer has configured a Denial-of-Service (DoS) protection on the NetScaler and found that client TCP connections are failing. After taking a packet trace, the engineer notices that the first packet was dropped and that the NetScaler terminated the connection due to DoS protection being enabled.
What step can the engineer take to resolve the client connection failure?
A. Enable the SYN COOKIE mechanism.
B. Enable Denial-of-Service TCP connections.
C. Disable the SYN COOKIE mechanism.
D. Change the services from TCP to HTTP.
Which method is used by NetScaler Management and Analytics System (NMAS) to gather licensing information from NetScaler?
A. CFLOW
B. APPFLOW
C. NITRO
D. IPFLOW
Which meta-character can be used as a wildcard to match a single character in a given position?
A. A forward slash (/)
B. A period (.)
C. An asterisk (*)
D. A dollar Sign ($)