With New Update Passleader Real 1Y0-A16 Test Questions To Pass Exam Easily (51-60)

QUESTION 51
Following a successful environmental assessment, Healthy Helping Hands has decided to implement XenApp 5, 0 for Windows Server 2008 to support all virtualized applications. How can an architect configure the new server farm so that application requirements and farm redundancy are achieved at the farm level?

A.    Configure one farm with one zone that spans the New York and San Francisco datacenters.
B.    Configure one farm with four zones based in New York, San Francisco, Hong Kong and London.
C.    Configure two farms with one zone each: one farm for New York and San Francisco and another farm for Hong Kong and London.
D.    Configure two farms with two zones each: one farm with a zone for New York and another zone for San Francisco and a second farm with a zone for Hong Kong and another zone for London.

Answer: D

QUESTION 52
Based on the farm and zone decision, how should redundancy of the data stores be addressed?

A.    For one farm, implement a master database in the primary datacenter (New York), with an updating subscriber database in San Francisco. For the second farm, implement a master database in Hong Kong, with an updating subscriber database in London.
B.    The data store for one farm should be based on a clustered configuration in the New York datacenter. For the second farm, the data store should be based on a clustered configuration in the Hong Kong datacenter.
C.    Implement the two data store databases in the primary datacenter (New York), with updating subscriber databases in the other three datacenters.
D.    Implement the two data store databases in the primary datacenter (New York) in a clustered configuration.

Answer: A

QUESTION 53
Why should the architect implement two separate master databases, one in New York and one in Hong Kong?

A.    Two databases are required because there are two separate farms
B.    Each data store must be located in the region’s primary datacenter.
C.    New York is the primary datacenter and Hong Kong will be hosting the most users.
D.    This solution maintains manageability of the farm at all times.

Answer: B

QUESTION 54
Scenario: The Healthy Helping Hands CIO is planning to implement a company-wide bring your own computer program. A company survey has identified that many of the users interested in the program plan to bring Macintosh computers. The CIO has determined that user-owned devices will NOT be managed by IT staff, will NOT receive corporate software, and will NOT receive anti-virus protection. User-owned devices should be treated as a security risk, must only communicate with necessary systems, and must NO f have the potential to cause any network downtime. Which network architecture design should the architect implement for this scenario?

A.    Use Access Gateway Enterprise Edition to restrict the user-owned devices based on endpoint analysis scans.
B.    Use Access Gateway Advanced Edition to restrict the user-owned devices based on endpoint analysis scans.
C.    Use Access Gateway Enterprise Edition to restrict the user-owned devices based on a combination of firewall rules and Access Gateway Enterprise Edition access control policies.
D.    Use Access Gateway Advanced Edition to restrict the user-owned devices based on a combination of firewall rules and Access Gateway Advanced Edition access control policies.

Answer: A

QUESTION 55
How should the architect meet the stated business requirements that user-owned PCs strictest possible security, only communicate with necessary systems, and NOT have the potential to cause any network downtime?

A.    Create Access Gateway endpoint analysis policies to identify user-owned devices based on operating system type. Restrict user-owned devices to communicate only to the Access Gateways on port 443.
B.    Create Access Gateway endpoint analysis policies to identify user-owned devices based on operating system type. Restrict user-owned devices to communicate only to the Access Gateways on port 443 and 2598.
C.    Create Access Gateway endpoint analysis policies to identify user-owned devices based on browser type Restrict user-owned devices to communicate only to the Access Gateways on port 443.
D.    Create Access Gateway endpoint analysis policies to identify user-owned devices based on browser type, user-owned devices to communicate only to the Access Gateways on port 443 and 2598.

Answer: C

QUESTION 56
Why is using Access Gateway Enterprise Edition to restrict all workstation devices and creating endpoint analysis policies based on browser the best way to ensure that user-owned PCs are treated with the strictest possible security, can only communicate with necessary systems, and do NOT have the potential to cause any network downtime without deploying corporate software to the devices?

A.    Access Gateway can identify devices before they have been connected to the local network and provides the most secure method to access virtual applications.
B.    Access Gateway can identify Macintosh computers by their browsers with an endpoint analysis scan, and it provides the most secure method to access virtual applications.
C.    Corporate devices run a standard Internet Explorer build that can be identified with endpoint analysis scan, and Access Gateway provides the most secure method to access virtual applications.
D.    A browser-based endpoint analysis scan can automatically redirect user-owned devices to the Access Gateways, and Access Gateway provides the most secure method to access virtual applications.

Answer: A

QUESTION 57
Based on the assessment of the current Healthy Helping Hands infrastructure, which is the best design option for remote access?

A.    Deploy eight Access Gateway appliances: two in San Francisco, two in New York, two in Hong Kong and two in London
B.    Deploy four Access Gateway appliances: one in each datacenter
C.    Deploy two Access Gateway appliances: one in San Francisco and one in New York
D.    Deploy one Access Gateway appliance in high availability mode in the primary New York datacenter

Answer: A

QUESTION 58
How should the architect configure the virtual servers on the two appliances?

A.    Create one virtual server for each appliance and on each appliance bind a session policy to its virtual server, which is configured in ICA Proxy mode using the datacenter Web Interface server.
B.    Create one virtual server for each appliance and on each appliance bind a redirection policy to its virtual y server, which is configured in ICA redirection mode using the datacenter Web Interface server.
C.    Create two virtual servers for each appliance and on each appliance bind a redirection policy to the virtual server(s), which is configured in ICA redirection mode using the datacenter Web Interface server.
D.    Create four virtual servers for each appliance and on each appliance bind a session policy to the virtual servers, which are configured in ICA redirection mode using the datacenter Web Interface server.

Answer: A

QUESTION 59
Why is this design the best remote access design for the environment?

A.    This design provides redundancy in case of a datacenter failure and connects users to one of the main datacenters while minimizing internal WAN traffic.
B.    This design provides redundancy in case of appliance failures and connects users to one of the main datacenters while optimizing external WAN traffic.
C.    This design provides high availability in case of hardware failures and connects users to one of the main datacenters.
D.    This design will allow for expected expansion of remote access usage and provides SSL VPN functionality for future needs.

Answer: A

QUESTION 60
As part of the new design, the Healthy Helping Hands organization wants to implement an additional layer of layer of token-based authentication. Which two vendors could the architect suggest in order to provide “out-of-the-box” support for token-based authentication for Access Gateway? (Choose two)

A.    RSA
B.    Vasco
C.    SafeSign
D.    SafeWord

Answer: AD

With New Update Passleader Real 1Y0-A16 Test Questions To Pass Exam Easily