Free 1Y0-A03 Practice Exam

1Y0-A03 Citrix XenDesktop 2.0 Enterprise Edition: Administration

#Defining Citrix XenDesktop 2.0 Enterprise Edition Architecture

  1. From which of the following Citrix components are most XenDesktop management tasks performed?
    1. Desktop Delivery Controller
    2. XenApp Advanced Configuration Tool
    3. Presentation Server Console
    4. Access Management Console

Answer: d.

Explanation: Most XenDesktop management tasks are performed from the Access Management Console. The Desktop Delivery Console enables session management tasks to be performed. Configuring of printing and policies is performed in the Presentation Server Console. XenApp Advanced Configuration Tool is just the new name for the Presentation Server Console in XenApp 5.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 14

  1. A Citrix Ready desktop appliance refers to a system that: (Choose 4)
    1. Is optimized for use with a virtual desktop
    2. Provides users access to a single virtual desktop
    3. Does not require access to the local desktop
    4. Runs on Windows XP Embedded, Windows CE, Linux or Wyse Thin OS
    5. Has to have the Desktop Receiver Embedded software installed on it
    6. Comes preinstalled with the Desktop Receiver Embedded software
    7. Is joined to a domain
    8. Runs on Windows XP or Windows XPe operating systems

Answer: a.b.d.f.

Explanation: A Citrix Ready desktop appliance is optimized for use with a virtual desktop, provides users access to a single virtual desktop, runs on Windows XP Embedded, Windows CE, Linux or custom operating systems like Wyse Thin OS, and comes preinstalled with the Desktop Receiver Embedded software to access a virtual desktop.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 156

  1. A repurposed personal computer refers to a system that: (Choose 5)
    1. Is optimized for use with a virtual desktop
    2. Provides users access to a single virtual desktop
    3. Does not require access to the local desktop
    4. Runs on Windows XP Embedded, Windows CE, Linux or Wyse Thin OS
    5. Has to have the Desktop Receiver Embedded software installed on it
    6. Comes preinstalled with the Desktop Receiver Embedded software
    7. Is joined to a domain
    8. Runs on Windows XP or Windows XPe operating systems

Answer: b.c.e.g.h.

Explanation: A repurposed personal computer refers to a system that provides users access to a single virtual desktop, does not require access to the local desktop, has to have the Desktop Receiver Embedded software installed on it, is joined to a domain and runs on Windows XP or Windows XPe operating systems.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 156

  1. A fat client refers to a system that: (Choose 4)
    1. Provides users with access to their virtual desktops from outside of the LAN through Access Gateway
    2. Runs on Windows Vista, Windows XP Professional, Windows Server 2003, Windows 2000 Professional, Linux, UNIX or Macintosh OS X operating systems
    3. Has to have the Desktop Receiver software installed on it or downloaded and installed from a web site
    4. Uses a fat client device
    5. Provides users access to the local desktop
    6. Provides users access and control over one or more virtual desktops

Answer: b.c.e.f.

Explanation: A fat client refers to a system that runs on Windows Vista, Windows XP Professional, Windows Server 2003, Windows 2000 Professional, Linux, UNIX or Macintosh OS X operating systems, has to have the Desktop Receiver software installed on it or downloaded and installed from a web site, provides users access to the local desktop and provides users access and control over one or more virtual desktops.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 157

  1. A remote system refers to a system that: (Choose 3)
    1. Provides users with access to their virtual desktops from outside of the LAN through Access Gateway
    2. Runs on Windows Vista, Windows XP Professional, Windows Server 2003, Windows 2000 Professional, Linux, UNIX or Macintosh OS X operating systems
    3. Has to have the Desktop Receiver software installed on it or downloaded and installed from a web site
    4. Uses a fat client device
    5. Provides users access to the local desktop
    6. Provides users access and control over one or more virtual desktops

Answer: a.b.d.

Explanation: A remote system refers to a system that provides users with access to their virtual desktops from outside of the LAN through Access Gateway, runs on Windows Vista, Windows XP Professional, Windows Server 2003, Windows 2000 Professional, Linux, UNIX or Macintosh OS X operating systems and uses a fat client device.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 157

  1. Which of the following features allows users to resume their work from where they left off after a connection is lost and then re-established?
    1. High availability
    2. Failover
    3. Session reliability
    4. Image provisioning

Answer: c.

Explanation: Session reliability allows users to resume their work from where they left off after a connection is lost and then re-established.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 32

  1. Which Citrix component is used to configure printing and policies?
    1. Desktop Delivery Controller
    2. Universal driver
    3. Presentation Server Console
    4. Access Management Console

Answer: c.

Explanation: The Presentation Server Console is used to configure printing and policies. The Access Management Console is used to perform most XenDesktop management tasks. The Desktop Delivery Console enables session management tasks to be performed.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 14

  1. XenDesktop uses _?_ to ensure a smooth user experience with the screen, keyboard, mouse and multimedia.
    1. Universal driver
    2. Instant on
    3. SpeedScreen
    4. Digital image management

Answer: c.

Explanation: XenDesktop uses SpeedScreen to ensure that screen updates are smooth, mouse and keyboard movements are responsive and multimedia has excellent performance over any network.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 30

  1. Which of the following features does XenDesktop employ to keep user workstations printing efficiently without using specific local print drivers?
    1. Universal driver
    2. Instant on
    3. SpeedScreen
    4. Digital image management

Answer: a.

Explanation: The universal print driver allows XenDesktop to deliver a consistent and fast printing experience for users without requiring specific local print drivers.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 30

  1. _?_ allows the movement of virtual desktops from one XenServer to another.
    1. Desktop storage optimization
    2. Desktop provisioning
    3. SpeedScreen
    4. XenMotion

Answer: d.

Explanation: XenMotion allows virtual desktops from one XenServer to another for high availability and simplified server maintenance.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 31

  1. The Desktop Delivery Controller handles which of the following? (Choose 3)
    1. Provides the ICA service
    2. Brokers connection requests
    3. Assigns a desktop to each user
    4. Manages licensing and the data store

Answer: b.c.d.

Explanation: The Desktop Delivery Controller brokers connection requests from endpoint devices, assigning a desktop to each user on demand. The delivery controller also manages licensing and the data store that contains the persistent configuration information for the farm.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 37

  1. The _?_ provides the ICA service to manage communication between a user’s desktop and endpoint device.
    1. Virtual Desktop Agent
    2. Desktop Delivery Controller
    3. Desktop Receiver
    4. Secure Remote Access

Answer: a.

Explanation: The Virtual Desktop Agent runs on each desktop that will be delivered to users. It provides the ICA service that manages communication between a user’s desktop and endpoint device.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 37

  1. The _?_ runs on the endpoint device and displays a user’s desktop.
    1. Virtual Desktop Agent
    2. Desktop Delivery Controller
    3. Desktop Receiver
    4. Secure Remote Access

Answer: c.

Explanation: The Desktop Receiver runs on the endpoint device and displays a user’s desktop.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 37

  1. What is used to secure communications between the Desktop Receiver and the XenDesktop environment?
    1. Citrix Secure Gateway
    2. Citrix Access Gateway
    3. SecureICA
    4. RSA SecurID

Answer: b.

Explanation: Secure remote access is provided by Citrix Access Gateway technology to secure communications between the Desktop Receiver and the XenDesktop environment.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 37

  1. _?_ creates the foundation for delivering virtual desktops.
    1. Provisioning Server
    2. XenApp
    3. Virtual Machine Infrastructure
    4. Secure remote access

Answer: c.

Explanation: The Virtual Machine Infrastructure component creates the foundation for delivering virtual desktops and offers advanced management features.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 38

  1. Application delivery is provided by _?_.
    1. XenApp
    2. XenServer
    3. Provisioning Server
    4. XenDesktop

Answer: a.

Explanation: Application delivery is provided by XenApp for Virtual Desktops. XenApp for Virtual Desktops delivers applications to virtual desktops on demand.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 38

  1. Which protocol is used to encrypt data between the Desktop Receiver and the datacenter?
    1. SecureICA
    2. SSL/HTTPS
    3. ICA
    4. SMB

Answer: b.

Explanation: SSL and HTTPS is the protocol which carries secure, encrypted data between the Desktop Receiver and the datacenter, providing secure remote access for users outside of the corporate LAN.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 39

  1. Which protocol is used to deliver hosted applications to virtual desktops?
    1. SecureICA
    2. SSL/HTTPS
    3. ICA
    4. SMB

Answer: c.

Explanation: The ICA protocol is used to deliver hosted applications to virtual desktops on demand, separating the application logic from user input and screen refreshes.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 39

  1. Communication between the Desktop Receiver and the Virtual Desktop Agent occurs over _?_.
    1. SecureICA
    2. SSL/HTTPS
    3. ICA
    4. SMB

Answer: c.

Explanation: Communication between the Desktop Receiver and the Virtual Desktop Agent occurs over ICA, providing PC like responsiveness of any content to any location and device.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 39

  1. The _?_ protocol streams applications to virtual desktops.
    1. SecureICA
    2. SSL/HTTPS
    3. ICA
    1. SMB

Answer: d.

Explanation: The SMB protocol streams applications to virtual desktops, allowing users to run a new application locally without requiring a new, custom image.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 39

  1. What is the first step in the desktop delivery process?
    1. The Desktop Deliver Controller queries the VM Infrastructure about virtual desktop status
    2. The virtual desktop requests profile data
    3. The endpoint device submits user credentials to a Web Interface site through Access Gateway
    4. The Desktop Delivery Controller queries the license server

Answer: c.

Explanation: The steps of the desktop delivery process are as follows: 1. The endpoint device submits user credentials to a Web Interface site through Access Gateway. 2. The Web Interface passes the user credentials to the Desktop Delivery Controller. 3. The Desktop Delivery Controller verifies user authorization. 4. The Desktop Delivery Controller queries the data store for the user’s assigned desktop groups. 5. The Desktop Delivery Controller queries the VM Infrastructure about virtual desktop status. 6. Provisioning Server for Desktops binds a vDisk to the virtual desktop. 7. The Desktop Delivery Controller identifies which desktop has been assigned for this session. 8. Web Interface sends an .ICA file to the Desktop Receiver. 9. An ICA connection is established. 10. The Virtual Desktop Agent verifies the license file with the Desktop Delivery Controller. 11. The Desktop Deliver Controller queries the license server. 12. The Desktop Delivery Controller sends policies to the virtual desktop. 13. The virtual desktop requests profile data. 14. The virtual desktop is displayed to the user. 15. Applications are delivered on demand.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 40 – 43

  1. Scenario: An administrator is planning a XenDesktop implementation for office personnel who will be connecting from a desktop appliance, will only need one virtual desktop and will only connect via the local LAN. Which of the following steps will the users follow to connect to the virtual desktop? (Choose 2)
    1. The users will enter their domain credentials and log on to a desktop
    2. The users will enter their credentials and log on to a desktop
    3. The users will turn on their local appliance
    4. The users will connect to a XenDesktop web site via a web browser
    5. The users will click on the Desktops tab and choose the appropriate desktop

Answer: b.c.

Explanation: Users who will only need access to a single virtual desktop and are on the local LAN connecting with a desktop appliance will turn on their local appliance, wait for the Welcome screen, enter their credentials and log on and wait for the desktop to appear.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 29, 30

  1. In a LAN of domain-joined, repurposed Windows XP Professional machines, how will users connect to a single, full-screen-only-mode desktop?
    1. Enter their local credentials
    2. Enter their domain credentials
    3. Click on the Desktops tab and choose the appropriate desktop
    4. Connect to a XenDesktop web site via a web browser

Answer: b.

Explanation: In a LAN of domain-joined, repurposed Windows XP Professional machines, users will connect to a single, full-screen-only-mode desktop by the following process: Turn on their local machine and connect to the XenDesktop Services site. Wait for the Windows logon screen, enter their domain credentials and wait for the desktop to appear.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 31, 32

  1. Features that are included in XenDesktop Enterprise Edition are: (Choose 6)
    1. Desktop Delivery Controller
    2. Secure Remote Access
    3. Virtual Desktop Performance Monitoring
    4. Virtual Desktop Support
    5. Virtual Machine Infrastructure
    6. VM Resource Pooling and XenMotion
    7. WAN Optimization
    8. Desktop Provisioning
    9. EasyCall
    10. Application Delivery

Answer: a.b.e.f.h.j.

Explanation: Features included in XenDesktop Enterprise Edition are Desktop Delivery Controller, Secure Remote Access (using Citrix Access Gateway), Virtual Machine Infrastructure, VM Resource Pooling and XenMotion, Desktop Provisioning (Provisioning Server) and Application Delivery (XenApp).

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 34

  1. Scenario: An administrator is planning a XenDesktop implementation for an office where the users will be connecting to their choice of desktops. The users are running Windows XP on the local LAN. Which of the following steps will the users follow to connect to the virtual desktop? (Choose 2)
    1. Enter local credentials
    2. Open a web browser
    3. Access the Desktop Toolbar
    4. Connect through Access Gateway

Answer: b.c.

Explanation: In a XenDesktop implementation where the users will have the choice to connect to more than one desktop from inside of Windows on a LAN, after they have already logged on Windows, they open a web browser and browse to a XenDesktop web site. When the Welcome screen appears, they type in their credentials and log in. They will see a Desktops tab and have their choice of desktops to choose from. The first time they connect it downloads the Desktop Toolbar. They choose their desktop and it appears in the Desktop Toolbar. Users can then interact with the desktop by using the Desktop Toolbar.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 32 – 35

  1. Scenario: An administrator is planning a XenDesktop implementation for remote users running Windows XP. Which of the following are considerations for the administrator? (Choose 3)
    1. Users will use a web browser
    2. Users will turn on their desktop appliance
    3. Access Gateway must be configured
    4. Users will access the Desktop Toolbar

Answer: a.c.d.

Explanation: For remote users running Windows to connect to their desktops via XenDesktop, they will already be logged into Windows, open a web browser and browse to the XenDesktop web site that was secured by Access Gateway. They will log on to the site, select a desktop from the Desktops tab, click Connect and the desktop will appear in the Desktop Toolbar. The users will then use the Desktop Toolbar to interact with the desktop.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 36, 37

  1. Scenario: Users need to be able to install and personalize applications on their desktops being delivered through XenDesktop. How should these desktops be delivered?
    1. In pooled desktop groups
    2. Through a web browser
    3. In assigned desktop groups
    4. Through Active Directory

Answer: c.

Explanation: If users are going to need to install and manage applications on their desktops or if they need to store data not covered by profile management they should be delivered their desktops in assigned desktop groups.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 114, 115

  1. Scenario: The IT Department is planning on making use of XenDesktop to create and deliver a non-customizable desktop to all users in the call center. The users should not be able to install and personalize applications on their desktops. How should the desktops be delivered?
    1. In pooled desktop groups
    2. Through a web browser
    3. In assigned desktop groups
    4. Through Active Directory

Answer: a.

Explanation: Virtual desktops in pooled desktop groups are allocated to users on a per-session, first come, first served basis. Pooled desktops can take advantage of virtual desktop provisioning, which streams a single image to multiple desktops. XenApp for Virtual Desktops and end user profiles are used to personalize the applications, settings and data for each user.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 114

  1. Desktop groups consist of users and desktops assigned through:
    1. Presentation Server Policies
    2. The Access Management Console
    3. The Desktop Delivery Controller
    4. Active Directory

Answer: d.

Explanation: Desktop groups consist of users and desktops assigned through Active Directory.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 41

  1. The _?_ contains all of the persistent information for the farm.
    1. Data Store
    2. Desktop Delivery Controller
    3. Virtual Desktop Agent
    4. Data Collector

Answer: a.

Explanation: The data store contains all of the persistent information for the farm, including the desktop groups to which each user is assigned.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 41

  1. Scenario: A company’s desktop delivery implementation requires that each user is delivered the same desktop each time that they request one. To what type of group should the desktops be assigned?
    1. Pooled
    2. Pre-assigned
    3. Assigned-on-first-use
    4. Global

Answer: b.

Explanation: Virtual desktops in pre-assigned groups are permanently assigned to an individual user as soon as the group is created. Whenever a user requests a desktop, they are always connected to the same one. As a result, the user can safely customize the desktop to suit her needs.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 63

  1. Scenario: The desktop delivery implementation requires that the first user to connect to a specific desktop is permanently assigned that desktop. To what type of group should the desktops be assigned?
    1. Pooled
    2. Pre-assigned
    3. Assigned-on-first-use
    4. Global

Answer: c.

Explanation: Virtual desktops in assigned-on-first-use groups are permanently assigned to the first user to connect to them. As a result, the user can safely customize the desktop to suit her needs.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 63

  1. Which component passes user credentials to the Desktop Delivery Controller?
    1. Data store
    2. Endpoint device
    3. Access Gateway
    4. Web Interface

Answer: d.

Explanation: The Desktop Delivery Component installation process automatically creates multiple Web Interface sites to provide a flexible user experience. A Web Interface site passes the user credentials to the Desktop Delivery Controller.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 40

  1. What does the Desktop Delivery Controller use to verify user’s credentials?
    1. Microsoft Active Directory
    2. Web Interface
    3. VM infrastructure
    4. Data store

Answer: a.

Explanation: The Desktop Deliver Controller verifies user authorization by performing a Microsoft Active Directory query with the user’s credentials.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 41

  1. The Desktop Delivery Controller queries which of the following about virtual desktop status?
    1. Web Interface
    2. VM infrastructure
    3. Data store
    4. Microsoft Active Directory

Answer: b.

Explanation: Using the desktop group that it obtained from the data store, the Desktop Delivery Controller queries the VM infrastructure about the status of virtual desktops in that group.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 41

  1. _?_ binds a vDisk to the virtual desktop.
    1. Web Interface
    2. VM infrastructure
    3. Provisioning Server
    4. Desktop Delivery Controller

Answer: c.

Explanation: XenDesktop utilizes Provisioning Server for Desktops to stream a single desktop image (vDisk) to multiple virtual desktops hosted in the VM infrastructure.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 41

  1. A(n) _?_ connection is established after Web Interface sends a(n) _?_ file to the Desktop Receiver.
    1. RDP; .ICA
    2. ICA; .RDP
    3. RDP; .RDP
    4. ICA; .ICA

Answer: d.

Explanation: An ICA connection is established after Web Interface sends an .ICA file to the Desktop receiver.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 41, 42

  1. In the desktop delivery process, the _?_ verifies the license file with the _?_.
    1. Virtual Desktop Agent; Desktop Delivery Controller
    2. Desktop Receiver; Data Store
    3. Desktop Receiver; Desktop Delivery Controller
    4. Virtual Desktop Agent; Data Store

Answer: a.

Explanation: In the desktop delivery process, the Virtual Desktop Agent verifies the license file with the Desktop Delivery Controller.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 42

  1. In the desktop delivery process, the _?_ queries the license server to verify that the user has a valid ticket.
    1. Web Interface
    2. Desktop Delivery Controller
    3. Access Gateway
    4. Virtual Desktop Agent

Answer: b.

Explanation: In the desktop delivery process, the Desktop Delivery Controller queries the Citrix License Server to verify the user has a valid ticket.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 42

  1. The _?_ sends policies to the _?_ which then applies those policies to the virtual desktop.
    1. Web Interface; Desktop Delivery Controller
    2. Desktop Delivery Controller; Web Interface
    3. Desktop Delivery Controller; Virtual Desktop Agent
    4. Virtual Desktop Agent; Desktop Delivery Controller

Answer: c.

Explanation: The Desktop Delivery Controller sends policies to the Virtual Desktop Agent which then applies those policies to the virtual desktop.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 42

  1. Port _?_ is used to deliver hosted applications with session reliability.
    1. 443
    2. 1494
    3. 445
    4. 2598

Answer: d.

Explanation: Port 2598 is used to deliver hosted applications with session reliability.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 43

  1. Port _?_ is used to deliver hosted applications without session reliability.
    1. 443
    2. 1494
    3. 445
    4. 2598

Answer: b.

Explanation: Port 1494 is used to deliver hosted applications without session reliability.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 43

  1. Port _?_ is used to stream applications to virtual desktops.
    1. 443
    2. 1494
    3. 445
    1. 2598

Answer: c.

Explanation: Port 445 is used to stream applications to virtual desktops.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 43

  1. Which of the following management tools is used to create and manage resource pools?
    1. XenCenter
    2. Presentation Server Console
    3. Access Management Console
    4. Provisioning Server Console

Answer: a.

Explanation: XenCenter is used to create and manage resource pools.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Page 1

  1. Which of the following management tools is used to manage vDisks?
    1. XenCenter
    2. Presentation Server Console
    3. Access Management Console
    4. Provisioning Server Console

Answer: d.

Explanation: The Provisioning Server Console is used to manage components within a Provisioning Server farm, including vDisks.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 39 - 47

  1. Which of the following are true of the Desktop Delivery Controller? (Choose 3)
    1. Cannot be installed on a Domain Controller
    2. Brokers connection requests from endpoint devices
    3. Manages licensing and the data store
    4. Delivers applications on demand

Answer: a.b.c.

Explanation: The Desktop Delivery Controller cannot be installed on a Domain Controller, brokers connection requests from endpoint devices, manages licensing and the data store. XenApp for Virtual Desktops delivers applications on demand.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 37, 51

  1. The XenDesktop Setup Wizard:
    1. Installs the Desktop Delivery Controller
    2. Automates the creation of virtual desktops
    3. Installs XenDesktop
    4. Extends Active Directory for the XenDesktop implementation

Answer: b.

Explanation: The XenDesktop Setup Wizard automates parts of the creation, delivery and maintenance of large installations of virtual desktops. This wizard integrates Citrix components so that systems administrators can quickly create multiple desktops.

Source: Citrix XenDesktop 2.0 Getting Started Guide, Page 22

# Identifying Pre-Install Considerations

  1. The Active Directory Configuration Wizard is run on which of the following?
    1. The server hosting the data store
    2. The domain controller
    3. The Desktop Delivery Controller
    4. The Provisioning Server

Answer: c.

Explanation: The Active Directory Configuration Wizard is integrated in the Desktop Delivery Controller installation and is accessible on the Desktop Delivery Controller in the Start menu by selecting All Programs > Citrix > Administrator Tools > Active Directory Configuration Wizard. Before an administrator can create desktop groups, they need to create and configure the Active Directory Organizational Unit (OU) using this wizard.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 51

  1. Which of the following must an administrator do before creating desktop groups?
    1. Run the Active Directory Configuration Wizard
    2. Use a separate database server
    3. Install the Virtual Desktop Agent
    4. Configure a firewall

Answer: a.

Explanation: Before an administrator can create desktop groups, the administrator must create and configure the Active Directory Organizational Unit (OU) using the Active Directory Configuration Wizard.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 51

  1. What are the two main purposes for which the Desktop Delivery Controller uses Active Directory? (Choose 2)
    1. Bandwidth
    2. Scalability
    3. Security
    4. Controller discovery

Answer: c.d.

Explanation: The two main reasons that the Desktop Delivery Controller uses Active Directory are: 1) Security – Confirm that any outbound communications come from authorized controllers in the appropriate farm and maintain confidentiality of data exchanged by the virtual desktops and the controllers. 2) Controller discovery – Active Directory is used by XenDesktop to discover the controllers that constitute a farm. Administrators can add new controllers to a farm without having to reconfigure all virtual desktops in the farm because this information is automatically updated in Active Directory by controllers.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 64

  1. Desktop Delivery Controller uses Active Directory for which two reasons? (Choose 2)
    1. Authorization and confidentiality
    2. Microsoft and Citrix partnership
    3. Scalability
    4. Controller discovery

Answer: a.d.

Explanation: Active Directory’s inbuilt security infrastructure is used by virtual desktops to check that incoming communications from controllers come from authorized controllers in the appropriate farm. Active Directory’s security infrastructure also ensures that the data exchanged by virtual desktops and controllers is confidential. Desktop Delivery Controller uses Active Directory's inbuilt Kerberos infrastructure to guarantee the authenticity and confidentiality of communication. Active Directory is also used by virtual desktops to discover the controllers that constitute a farm. This means you can add a new controller to a farm without having to reconfigure all desktops in the farm. Instead, desktops determine which controllers are available by referring to information that controllers publish in Active Directory.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 17

  1. In a XenDesktop environment, when a target device boots from the network, DHCP sends a request to the _?_ for an IP address and Scope Option settings.
    1. XenServer
    2. Provisioning Server
    3. DNS server
    4. Desktop Delivery Controller

Answer: b.

Explanation: When a target device boots from the network, DHCP sends a request to the Provisioning Server for an IP address and Scope Option settings (options 66 and 67). The Provisioning Server returns the information as requested.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 30

  1. In a XenDesktop environment, the DHCP service delivers _?_ and _?_ to the vDisks.
    1. DNS settings; the boot file location
    2. an IP address; DNS settings
    3. an IP address; the boot file location
    4. DNS settings; a static IP address

Answer: c.

Explanation: In a XenDesktop environment, the DHCP service delivers an IP address and the boot file location to the vDisks.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 28

  1. Which DHCP option holds the IP address of the boot server?
    1. 060
    2. 066
    3. 067
    4. 068

Answer: b.

Explanation: When configuring boot options for DHCP, enable option 066 Boot Server Host Name and type in the IP address of the boot server.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 28

  1. Which DHCP option holds the name of the boot file?
    1. 060
    2. 066
    3. 067
    4. 068

Answer: c.

Explanation: When configuring boot options for DHCP, enable option 067 Bootfile Name and enter name of the boot file.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 28

  1. Which DHCP option is configured for PXE support?
    1. 060
    2. 066
    3. 067
    1. 068

Answer: a.

Explanation: Configure DHCP option 060 PXEClient for PXE support.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 30

  1. When using PXE in a XenDesktop environment, the vDisk boots, DHCP sends a request to the _?_ for an IP address and boot file options.
    1. XenServer
    2. DNS server
    3. Desktop Delivery Controller
    4. Provisioning Server

Answer: d.

Explanation: Using PXE in a XenDesktop environment, when the vDisk boots from the network, DHCP sends a request to the Provisioning Server for an IP address and boot file options and the PXE server delivers the information to the vDisk.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 30

  1. If a boot device is used to provide IP and boot information to target devices, which two options can be used to locate the Provisioning Server? (Choose 2)
    1. TFTP
    2. DNS
    3. Static IP
    4. DHCP

Answer: b.c.

Explanation: If a boot device is used to provide IP and boot information to target devices, then DNS or static IP information is used to locate the Provisioning Server. If the option ‘Use DHCP to retrieve Device IP’ is selected under Device IP Configuration settings, your DHCP server needs to provide option 6 (DNS Server).

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 197, 198

  1. _?_ cuts storage costs by streaming desktop images rather than storing them.
    1. Secure remote access
    2. XenApp
    3. Virtual machine infrastructure
    4. Provisioning Server

Answer: d.

Explanation: The Provisioning Server for Desktops component cuts storage costs for virtual desktops through OS provisioning. Rather than storing multiple desktop images, XenDesktop streams a single OS image to multiple target devices stored on the VM infrastructure.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 38

  1. An administrator can reduce the number of unique desktop images stored in the datacenter through use of which of the following? (Choose 2)
    1. Virtual desktop provisioning
    2. Active Directory roaming profiles
    3. Pre-assigned desktop groups
    4. Assigned on first use desktop groups

Answer: a.b.

Explanation: An administrator can reduce the number of unique desktop images stored in the datacenter through use of virtual desktop provisioning and roaming profiles. Virtual desktop provisioning reduces storage by streaming a single image to multiple desktops. By storing users’ profiles separately from the OS and applications, administrators can dramatically reduce the number of unique images while still providing a personalized desktop to each user.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 42, 114

  1. _?_ Image vDisks require more storage space than _?_ Image vDisks.
    1. Private; Standard
    2. Private; Public
    3. Secure; Standard
    4. Secure; Public

Answer: a.

Explanation: Private Image vDisks require more storage space than Standard Image vDisks.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 34

  1. The Provisioning Server write cache can be located _?_. (Choose 3 that can finish the sentence)
    1. as a file on the target device’s hard drive
    2. in the target device’s RAM
    3. in the Provisioning Server’s RAM
    4. as a file on the Provisioning Server

Answer: a.b.d.

Explanation: The Provisioning Server write cache can be located: as a file on the target device’s hard drive, which frees up the Provisioning Server since it does not have to process write requests and doesn’t have the finite limitation of RAM; in the target device’s RAM, which provides the fastest method of disk access since memory access is always faster than disk access; or as a file on the Provisioning Server, where all writes are handled by the Provisioning Server, which can increase disk IO and network traffic.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 34, 35

  1. A(n) _?_ Image vDisk can be shared by one or more target devices, while a(n) _?_ Image vDisk can only exist for one target device to access.
    1. Public; Private
    2. Standard; Private
    3. Open; Closed
    4. Open; Secure

Answer: b.

Explanation: A Standard Image vDisk can be shared by one or more target devices, while a Private Image vDisk can only exist for one target device. Because of this, storage will be more of a concern when using Private Image vDisks than when using Standard Image vDisks.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 85

  1. Provisioning Server write cache is only enabled for _?_ Image vDisks.
    1. Public
    2. Open
    3. Standard
    4. Private

Answer: c.

Explanation: Provisioning Server write cache need only be enabled for Standard Image vDisks since they don’t allow read and write access on the image like Private Image vDisks do.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 88

#Installing Citrix XenDesktop 2.0 Enterprise Edition

  1. Which of the following are true of installing a Desktop Delivery Controller? (Choose 3)
    1. Should be installed on a domain controller
    2. Should be installed using a domain account with local administrator rights
    3. Should not be installed using RDP
    4. Web Interface is automatically installed

Answer: b.c.d.

Explanation: A Desktop Delivery Controller cannot be installed on a domain controller, it should be installed using a domain account with local administrator rights, it should not be installed using RDP and Web Interface is automatically installed on the server during Desktop Delivery Controller installation.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 78

  1. The Virtual Desktop Agent is installed on:
    1. virtual desktops
    2. client devices
    3. Provisioning Servers
    4. Desktop Delivery Controllers

Answer: a.

Explanation: The Virtual Desktop Agent is installed on virtual desktops.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 94

  1. Which of the following are required for a Desktop Delivery Controller? (Choose 4)
    1. Active Directory
    2. A database
    3. Access to a Citrix License Server
    4. Citrix Management Consoles
    5. XenCenter

Answer: a.b.c.d.

Explanation: A Desktop Delivery Controller requires: Active Directory to store information about Desktop Delivery Controllers and to detect controllers in the farm; a database to host the data store that holds configuration information about the controllers an administrator account information; access to a Citrix License Server with valid licenses; and the Citrix Access Management Console to view and manage the farm and the Citrix XenApp Advanced Configuration Tool (Presentation Server Console) to configure printing and policies for the virtual desktops.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 77, 78

  1. Which of the following Citrix XenDesktop components must be licensed for continued functionality? (Choose 4)
    1. Access Gateway
    2. XenServer
    3. Provisioning Server
    4. XenApp for Virtual Desktops
    5. Desktop Delivery Controller

Answer: b.c.d.e.

Explanation: XenServer, Provisioning Server, XenApp for Virtual Desktops and Desktop Delivery Controller must all be licensed for continued functionality. Note that XenServer does not use the same license server as the other components in the XenDesktop environment.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 82, 83

  1. Which of the following are required to license the Desktop Delivery Controller? (Choose 2)
    1. Use the Presentation Server Console to manage licenses
    2. Install the license server on the Desktop Delivery Controller server
    3. Download the license file from www.mycitrix.com
    4. Copy the license file to the license server

Answer: c.d.

Explanation: To license some Citrix products, including the Desktop Delivery Controller, install the license server in the environment (it is not required to be installed on the Desktop Delivery Controller server, but can be), download the license file from www.mycitrix.com, copy the license file to the license server and, if the license server is installed on a different server than the Citrix product, use the Access Management Console to configure the product to point to the license server by IP address or name and specify the port number being used for the license server communications. Use the License Management Console to manage licenses.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 83

  1. Using the Access Management Console, what must an administrator do to check the XenDesktop environment for the addition or removal of devices?
    1. Refresh the Desktop Delivery Controller
    2. Restart the License Server
    3. Close and re-open the Access Management Console
    4. Run discovery

Answer: d.

Explanation: The Access Management Console relies on the discovery process to check the environment for the addition or removal of devices. The discovery process runs automatically the first time the Access Management Console is opened. An administrator should manually ‘Run discovery’ on a regular basis so that the information being viewed is up-to-date.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 88

  1. What information does an administrator need to create a vDisk? (Choose 3)
    1. Type of vDisk
    2. vDisk storage directory
    3. Disk size
    4. Disk speed

Answer: a.b.c.

Explanation: Before creating a vDisk, an administrator needs to know the type of vDisk being created, the directory in which the vDisk will be stored and the disk size required to host the operating system and other files.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 91

  1. After a vDisk is created, an operating system image must be copied to the vDisk using _?_.
    1. Provisioning Server Image Builder
    2. XenCenter
    3. Access Management Console
    4. Presentation Server Console

Answer: a.

Explanation: After a vDisk is created using Provisioning Server, an image containing the operating system must be copied to the vDisk using the Provisioning Server Image Builder utility.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 91

  1. Scenario: An administrator needs to create a new vDisk to host an operating system that will be deployed using XenDesktop. Which of the following utilities will the administrator use to create the new vDisk?
    1. Presentation Server
    2. Provisioning Server Console
    3. XenCenter
    4. Access Management Console

Answer: b.

Explanation: To create a new vDisk, open the Provisioning Server Console on the Provisioning Server. Right-click a server in the console and choose New Virtual Disk.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 92

  1. To allow Active Directory to manage passwords in the XenDesktop environment, which of the following steps must an administrator take? (Choose 3)
    1. Disable Active Directory controlled automatic re-negotiation of machine passwords
    2. Disable the ‘Disable machine account password changes’ security policy
    3. Enable machine account password management
    4. Enable automatic password management

Answer: a.c.d.

Explanation: To allow Active Directory to manage passwords in the XenDesktop environment: Disable Active Directory controlled automatic re-negotiation of machine passwords by enabling the ‘Disable machine account password changes’ security policy; enable machine account password management in the properties of a vDisk in the Provisioning Server Console; and enable automatic password management in the properties of a Provisioning Server in the Provision Server Console.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 188 – 190

  1. The virtual desktop agent: (Choose 4)
    1. Must be installed on each system that will become a virtual desktop
    2. Can be installed on Windows 2000, XP and Vista
    3. Must be configured with the port number used to communicate with the Desktop Delivery Controller
    4. Requires that the firewall on the system be configured properly
    5. Must be configured to point to a farm

Answer: a.c.d.e

Explanation: The virtual desktop agent, which is used to facilitate the connection to a virtual desktop, can be installed on Windows XP and Vista, must be installed on each system that will become a virtual desktop, must be configured with the port number used to communicate with the Desktop Delivery Controller, requires that the firewall on the system be properly configured and must be configured to point to a farm.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 94

  1. A Provisioning Server VM template is a _?_ template that is associated with a Provisioning Server _?_.
    1. fixed disk; cache
    2. diskless; cache
    3. diskless; vDisk
    4. fixed disk; vDisk

Answer: c.

Explanation: A Provisioning Server VM template is a diskless template that is associated with a Provisioning Server vDisk.

Source: Citrix XenDesktop 2.0 Getting Started Guide, Page 37

  1. The Virtual Desktop Agent consists of which components? (Choose 3)
    1. Citrix Desktop Service
    2. Citrix ICA Service
    3. Desktop Receiver
    4. Supporting services

Answer: a.b.d.

Explanation: The Virtual Desktop Agent consists of the following components that reside on the virtual desktop: The Citrix Desktop Service, which communicates with the Desktop Delivery Controller and handles the initial brokering of connections and the interactions with sessions from the Access Management Console; the Citrix ICA Service, which communicates with the Desktop Receiver and handles graphics and input; and supporting services which help with features such as auto-reconnection, printing and encryption.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 94

  1. Which management utility is used to create a virtual machine template?
    1. Provisioning Server Management Console
    2. Presentation Server Management Console
    3. Access Management Console
    4. XenCenter

Answer: d.

Explanation: To create a virtual machine template, in XenCenter select the Resource Pool. Select VM > New. Select the desired operating system template. Enter the name and description. Select the location of the operating system installation media. Set the number of CPUs and memory. Leave the Virtual Disk screen default. In the virtual network interfaces option, select the default. Deselect ‘Start VM automatically’. After clicking Finish, select the newly create VM and select the Storage tab. Select Delete to remove the storage from the VM. From the menu bar, select VM – Convert to Template.

Source: Partner and Customer Toolkit, XenDesktop 2.0 Implementation Guide, Pages 22 - 25

  1. Which management utility is used to create a diskless virtual machine?
    1. Provisioning Server Management Console
    2. Presentation Server Management Console
    3. Access Management Console
    4. XenCenter

Answer: d.

Explanation: To create a diskless virtual machine, in XenCenter select the Resource Pool. Select VM > New. Select ‘Other install media’ at the bottom of the operating system list. Enter the name and description. Select the location of the operating system installation media. Set the number of CPUs and memory. In the virtual disk option, do not add a disk. In the virtual network interfaces option, select the default. After clicking Finish, the virtual machine can be utilized or converted to a template.

Source: Partner and Customer Toolkit, XenDesktop 2.0 Implementation Guide, Pages 22 - 25

  1. To enable a diskless virtual machine to properly interoperate with Provisioning Server, the virtual machine must be set to _?_ boot.
    1. Network
    2. Hard disk
    3. DVD drive
    4. Template

Answer: a.

Explanation: After creating a diskless virtual machine, it must be set to network boot to properly interoperate with Provisioning Server.

Source: Citrix XenServer Platinum Edition Getting Started Guide, Pages 13, 14

  1. XenServer requires a license for the XenServer hosts and another for the _?_.
    1. XenApp server
    2. Provisioning Server
    3. Desktop Delivery Controller
    4. Data store

Answer: b.

Explanation: XenServer requires installation of two licenses: one for the XenServer hosts and another for the Provisioning Server. The XenServer license keys are installed directly on each XenServer host. Provisioning Server uses the Citrix License Server to provide pooled licensing management. In the License Management Console you will see four Provisioning Server licenses for each XenServer Platinum Edition you have purchased. Provisioning Server consumes one of these for the XenServer host to which the virtual machines are being streamed. The remaining three licenses are available for provisioning additional physical machines.

Source: Citrix XenServer Platinum Edition Getting Started Guide, Page 5

  1. In order to use Provisioning Server to provision virtual machines that will be migrated with _?_ you must create them with a small disk attached.
    1. the Provisioning Server Console
    2. Image Builder
    3. XenMotion
    4. the Presentation Server Console

Answer: c.

Explanation: In order to use Provisioning Server to provision virtual machines that will be migrated with XenMotion you must create them with a small disk attached.

Source: Citrix XenServer Platinum Edition Getting Started Guide, Page 41

  1. Which of the following networking rules apply to resource pool requirements? (Choose 3)
    1. NICs across all members must connect to the same networks
    2. NICs must be in the same order on each machine
    3. Must have the same number of NICs
    4. NICs should be the same speed

Answer: a.b.d.

Explanation: Resource pool members must have similar networking including: NICs across all members must connect to the same networks. Although there can be a different number of NICs on each machine, the NICs must be in the same order on each machine. NICs should be the same speed but can be from different vendors.

Source: CTX-2401BI Citrix XenServer Enterprise Edition 4.1: Administration, Page 269

  1. The Desktop Receiver software can be installed from: (Choose 3)
    1. Product media
    2. XenDesktop web site
    3. Active Directory GPO or another software distribution product
    4. Citrix Installation Manager

Answer: a.b.c.

Explanation: The Desktop Receiver software can be installed from the product media, a XenDesktop web site, Active Directory GPO or another software distribution product.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 171

  1. What are the two main reasons to use a resource pool to host virtual machines? (Choose 2)
    1. Dynamically move virtual machines between hosts using XenMotion
    2. High availability of the virtual machines
    3. Easier administration
    4. Minimize server resources

Answer: a.b.

Explanation: A resource pool comprises multiple XenServer Host installations, bound together into a single managed entity which can host Virtual Machines. When combined with shared storage, a resource pool enables VMs to be started on any XenServer Host which has sufficient memory and then dynamically moved between XenServer Hosts while running with minimal downtime (XenMotion). If an individual XenServer Host suffers a hardware failure, then the administrator can restart the failed VMs on another XenServer Host in the same resource pool.

Source: Citrix XenServer Administrator’s Guide, 4.1.0, Page 3

  1. Which of the following are steps to install and configure XenServer for a XenDesktop implementation including Provisioning Server? (Choose 4)
    1. Create a resource pool and add XenServer Hosts to it
    2. Install XenCenter on a separate, remote computer
    3. Install XenServer Tools on the Provisioning Server
    4. Install the XenServer Host on a dedicated server
    5. Create virtual machines and install the Virtual Desktop Agent on them

Answer: a.b.d.e.

Explanation: To install and configure XenServer for a XenDesktop implementation including Provisioning Server, install the XenServer Host on a dedicated server, install the XenCenter management console on a separate, remote computer, use the XenCenter management console to connect the XenCenter Host and install the licenses, create a new resource pool and add all XenServer Hosts to it, create the virtual machines and add them to active directory and install the Virtual Desktop Agent on the virtual machines. The XenServer Tools will be installed on the virtual machines, not on the Provisioning Server.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Pages  1, 2

  1. When deploying a XenDesktop implementation that uses XenServer as the hosting infrastructure and Provisioning Server to stream the virtual desktops, where will the Virtual Desktop Agent be installed?
  1. On the virtual machines
  2. On the Provisioning Server
  3. On the client device
  4. On the Desktop Delivery Controller

Answer: a.

Explanation: In a XenDesktop implementation using XenServer as the hosting infrastructure, the Virtual Desktop Agent will be installed on the virtual machines.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Page 2

#Building vDisks

  1. Which of the following steps must be accomplished to create a Windows Vista operating system image that is able to boot from a XenServer virtual machine and leverage Provisioning Server streaming? (Choose 3)
    1. Use a Windows Vista template
    2. Create a master target device
    3. Install XenServer Tools
    4. Create and format a vDisk

Answer: b.c.d.

Explanation: To create a Windows Vista, Windows XP, Windows Server 2003 or Windows 2008 operating system image that is able to boot from a XenServer virtual machine and leverage Provisioning Server streaming, of course be sure to first install and configure the Provisioning Server Streaming Server and XenServer Platinum. Create and format a Provisioning Server vDisk for the image-build process. Create the master target device with the appropriate operating system, updates, applications and configurations. Install XenServer Tools on the target virtual machine. Install Provisioning Server Target Device on the master target device (the device that has the appropriate operating system installed). Build the image on the vDisk using Provisioning Server Image Builder.

Source: Citrix XenServer Platinum Edition Getting Started Guide, Pages 15 – 24

  1. Scenario: An administrator is given a project to create operating system images for Windows Server 2003 Enterprise, Windows Server 2008 Enterprise and Windows Vista Enterprise to be used with virtual machines in a XenDesktop deployment including XenServer and Provisioning Server. Basically, the administrator needs to create a separate _?_ for each operating system.
    1. Template
    2. DVD image
    3. vDisk
    4. ISO image

Answer: c.

Explanation: Create a new vDisk for each desired operating system to be used with virtual machines in a XenDesktop deployment including XenServer and Provisioning Server.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Page 2

  1. To create a Provisioning Server vDisk in a vDisk Pool: (Choose 5)
    1. Use the Access Management Console
    2. Use the Provisioning Server Console
    3. Select the Provisioning Server that will create the disk
    4. Select the store where this vDisk will be created
    5. Select the site where this vDisk will be added
    6. Choose either a fixed or dynamic disk
    7. Select where to boot the disk from

Answer: b.c.d.f.g.

Explanation: In the Provisioning Server Console, right-click on the vDisk Pool where you want to add those vDisks and select the Create vDisk menu option. The Create vDisk dialog appears. In the drop-down menu of the dialog box, select the store where this vDisk should reside (if creating the vDisk from the store, then the site would be selected at this step). In the ‘Server used to create the vDisk’ drop-down menu, select the Provisioning Server that will create the vDisk. Select the size to allocate to this vDisk. Type a filename for this vDisk and a description if desired. Select either Fixed or Dynamic in the VHD Format text box. Click Create vDisk. In the Provisioning Server Console, right-click on the new target device and select Properties. Select where to boot from in the ‘Boot from’ drop-down list.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 92

  1. High-level steps involved in creating and configuring a vDisk include: (Choose 4)
    1. Optimize the vDisk
    2. Create a new target device entry and set the boot properties
    3. Format the vDisk
    4. View vDisk usage
    5. Assign the vDisk to a target device
    6. Configure the vDisk mode

Answer: b.c.e.f.

Explanation: The high-level steps involved in creating and configuring a vDisk include configuring the vDisk mode (Private or Standard), formatting the vDisk (from the target device or Provisioning Server), creating the new target device entry, setting the boot properties and assigning the vDisk to a target device.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 91 – 95, 101

  1. Scenario: The IT Department has created the required virtual machines for a XenDesktop rollout. They have added the virtual machines to Active Directory. They are going to add the virtual machines to a pooled desktop group to make use of Provisioning Server. They realize that using a pooled group raises security questions. Which of the following groups should the users of the desktops belong to in order not to make changes to the desktops?
    1. Power Users
    2. Local Administrators
    3. Domain Administrators
    4. Users

Answer: d.

Explanation: If you plan to configure virtual machines for use in a pooled desktop group, you must ensure that the operating system image installed on those machines is configured to prevent end users from making any modifications. Typically, this means that end users can be members of the Users group, but not the Power Users or Administrators groups.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Page 2

  1. Which of the following will allow an administrator to automate the creation of large installations of virtual desktops?
    1. XenDesktop Setup Wizard
    2. Bios prompts
    3. Access Management Console
    4. Presentation Server Console

Answer: a.

Explanation: The XenDesktop Wizard allows the automatic creation of large installations of virtual desktops. It automatically adds these desktops to Active Directory, creates a desktop group in the Access Management Console and optimizes the idle pool count for that group based on the number of virtual desktops that were created.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 100, 119

  1. Which of the following will allow an administrator to use a template to add a large collection of target devices to the Provisioning Server database?
    1. Bios prompts
    2. Import Target Device Wizard
    3. Access Management Console
    4. Presentation Server Console

Answer: b.

Explanation: Target devices can be imported into the Provisioning Server database from a .CSV file, inheriting the properties of a template, using the Import Target Device Wizard.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 126, 144

  1. Using the Provisioning Server Console, an administrator can create new target device entries in the Provisioning Server database which of the following ways? (Choose 3)
    1. Manually create entries
    2. Use the Auto-add feature
    3. Use a template
    4. Drag and drop entries

Answer: a.b.c.

Explanation: Using the Provisioning Server Console, an administrator can create new target device entries in the Provisioning Server database: Manually by selecting Create Device and adding the information (or using a collection template); or using the Auto-add feature on the Farm Properties Options tab (optionally using a collection template).

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Pages 124, 125

  1. If an administrator needs to configure Provisioning Server to automatically add all new target devices to the database, which of the following configuration steps should the administrator take in the Provisioning Server Console?
    1. Right-click on the Device Collection icon and select Create Device
    2. Right-click on the Device Collection icon, select Create Device and enable the checkbox, ‘Apply the collection template to this new device’
    3. Right-click on the Farm node, select Properties and set Auto-add on the Options tab
    4. Right-click on the Device Collection icon and select Target Device > ‘Import devices’

Answer: c.

Explanation: To configure Provisioning Server to automatically add all new target devices to the database, in the Provisioning Server Console, right-click on the Farm node, select Properties and set Auto-add on the Options tab. Optionally, a template can be used so that all of the newly added target devices have the same properties as the template.

Source: Citrix Provisioning Server 5.0 Administrator’s Guide, Page 125

  1. Which of the following steps are required in using Image Builder? (Choose 2)
    1. Optimize virtual disk performance
    2. Delete all files and folders in the destination path before building the image
    3. Select the destination drive
    4. Click the Build button

Answer: c.d.

Explanation: To use Image Builder, you must select the destination drive and click Build. Optionally, you can choose to optimize virtual disk performance and delete all of the files and folders in the destination path before building the image.

Source: CTX-117921 XenApp and XenServer Implementation Guide, Page 10

  1. To create a diskless virtual machine in XenCenter: (Choose 5)
    1. Select an operating system
    2. Select ‘Other install media’
    3. Enter a name and description
    4. Select the location of the guest operating system installation media
    5. Set the ‘Number of vCPUs’ and ‘Initial memory’
    6. Add a virtual disk
    7. Add or remove virtual network interfaces

Answer: b.c.d.e.g.

Explanation: The Provisioning Server provides the ability to stream vDisks to diskless virtual machines. To create a diskless machine in XenCenter, connect to a XenServer and click on the New VM icon. The New VM wizard launches. In the ‘Select an operating system for the new virtual machine’ dialog, select ‘Other install media’ at the bottom of the list and click Next. In the ‘Enter a name and description for the new virtual machine’ dialog, type a name in the Name field and a description in the Description field (optional). Click Next. In the ‘Enter the location of the guest operating system installation media’ dialog, select Physical DVD Drive. Click Next. In the ‘Set the number of CPUs and the initial memory allocation for the new VM’ dialog, select the ‘Number of vCPUs’ and ‘Initial memory’ options. Click Next. In the ‘Enter the information about the virtual disks for the new virtual machine’ dialog, do not add a new disk. Click Next. In the ‘Add or remove virtual network interfaces for the virtual machine’ dialog, keep the default. Click Next. In the ‘Your new virtual machine configuration is complete’ dialog, uncheck the ‘Start VM automatically’ box. Click Finish. Once the virtual machine is created it can be utilized or created into a template.

Source: Citrix XenServer Platinum Edition Getting Started Guide, Pages 6 – 12

  1. Scenario: A company is planning to implement XenServer and Provisioning Server to virtualize, store and stream images in a XenDesktop environment. An administrator in the IT department has completed all of the prerequisites including installing and configuring the Provisioning Server, XenServer, XenCenter and licensing. The administrator prepared a vDisk for the image-build process and installed and configured DHCP and PXE on the network. Which two tasks must the IT department complete to allow Provisioning Server to stream vDisks to virtual machines? (Choose 2)
    1. Create a diskless virtual machine
    2. Convert the vDisk to a template
    3. Set a virtual machine to hard disk boot
    4. Set a virtual machine to  network boot

Answer: a.d.

Explanation: XenServer Platinum provisions virtual machines using the Provisioning Server technology, enabling IT administrators to virtualize, store and stream images of server workloads. To properly interoperate with Provisioning Server and allow Provisioning Server to stream vDisks to virtual machines, an administrator must create a diskless virtual machine and set the virtual machine to network boot.

Source: Citrix XenServer Platinum Edition Getting Started Guide, Pages 5 - 14

#Configuring Citrix Desktop Delivery Controller for XenDesktop 2.0 Enterprise Edition

  1. Which of the following is used to migrate pre-existing desktop images into desktop groups?
  1. Presentation Server Console
  2. Provision Server Console
  3. XenDesktop Setup Wizard
  4. Access Management Console

Answer: d.

Explanation: Administrators can use the Access Management Console to create a desktop group of pre-existing desktop images.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 113, 119

  1. Administrators can create a desktop group using which of the following? (Choose 2)
  1. Presentation Server Console
  2. Provision Server Console
  3. XenDesktop Setup Wizard
  4. Access Management Console

Answer: c.d.

Explanation: Desktop groups can be created using either the XenDesktop Setup Wizard or the Access Management Console.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 120 – 123

  1. Which of the following will an administrator use to create a desktop group at the farm level?
  1. Presentation Server Console
  2. Provision Server Console
  3. XenDesktop Setup Wizard
  4. Access Management Console

Answer: c.

Explanation: To create a desktop group with the XenDesktop Setup Wizard, click Next on the Welcome screen, select a desktop farm from the Desktop Farm drop-down list and click Next. Select a hosting infrastructure from the Hosting Infrastructure drop-down list. Specify the address of the hosting infrastructure (IP address or FQDN) and click Next. Type a VM infrastructure user name and password in the Credentials dialog box and click Next. Select a VM template to use as the base desktop image and click Next. Select the vDisk that will be associated with the VM template and click Next. Type the number of virtual desktops to create in the ‘No. of virtual desktops’ field. Type a base desktop name in the ‘Start of all desktop name’ field. Type the index number of the first    VM in the ‘Start number’ field. Click Next. Select an Organizational Unit location in Active Directory to add the virtual desktops that will be created by the setup wizard and click next. Type a name for the new desktop group and click Next. Review the settings on the Desktop Creation page and click Next.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 120, 121

  1. Which of the following can be used to create pooled or assigned desktop groups?
  1. Presentation Server Console
  2. Provision Server Console
  3. XenDesktop Setup Wizard
  4. Access Management Console

Answer: d.

Explanation: To create a desktop group with the Access Management Console, select Desktop Groups from the console tree. Click ‘Create desktop group’ in the Common Tasks Pane. Click Next on the Welcome screen. Select either Pooled or Assigned as the desktop group assignment. If Assigned is chosen, then select Pre-Assigned or Assign on First Use. Click Next. Select the type of VM infrastructure hosting the virtual desktops to be added to the group and click Next, or select None to create a Blade PC based desktop group. Type the address of the VM infrastructure in the Address field. Type the administrator user name and password required to log on to the VM infrastructure in the ‘User name’ and Password fields and click Next. Click Add to display available desktops. Select each desktop to add it to the desktop group and click OK. Click Next. Click Add to select Active Directory users or groups to add to the desktop group. Type a name for the new desktop group in the Display name field. Type a description in the Description field and click Next. Optionally, change the icon. Click Next. Click Finish.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Pages 121, 122

  1. To create a Blade PC based desktop group, select _?_ as the VM Infrastructure hosting the virtual desktops.
  1. Blade
  2. Pooled
  3. Assigned
  4. None

Answer: d.

Explanation: To create a Blade PC based desktop group, select None as the VM Infrastructure hosting the virtual desktops.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 121

  1. Active Directory computer names can be mapped to desktop images during the creation of a desktop group using which of the following?
  1. Presentation Server Console
  2. Provision Server Console
  3. XenDesktop Setup Wizard
  4. Access Management Console

Answer: d.

Explanation: Using the Access Management Console, Active Directory computer names can be mapped to desktop images during the creation of a desktop group.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 119

  1. Which of the following allows you to increase the compression of the SpeedScreen Image Acceleration and SpeedScreen Progressive Display without impacting image quality?
  1. SpeedScreen Latency Reduction Manager
  2. SpeedScreen Browser Acceleration
  3. SpeedScreen Multimedia Acceleration
  4. SpeedScreen Flash Acceleration
  5. SpeedScreen Image Acceleration
  6. SpeedScreen Progressive Display
  7. Heavyweight Compression

Answer: g.

Explanation: Heavyweight compression allows you to increase the compression of the SpeedScreen Image Acceleration and SpeedScreen Progressive Display without impacting image quality. Because heavyweight compression is CPU intensive and affects server scalability, it is recommended for use only with low bandwidth connections.

Source: Citrix Presentation Server 4.5 Administrator’s Guide, Page 185

  1. Which of the following offers you a trade-off between the quality of photographic image files as they appear on client devices and the amount of bandwidth the files consume on their way from the server to the client?
  1. SpeedScreen Latency Reduction Manager
  2. SpeedScreen Browser Acceleration
  3. SpeedScreen Multimedia Acceleration
  4. SpeedScreen Flash Acceleration
  5. SpeedScreen Image Acceleration
  6. SpeedScreen Progressive Display
  7. Heavyweight Compression

Answer: e.

Explanation: SpeedScreen Image Acceleration offers you a trade-off between the quality of photographic image files as they appear on client devices and the amount of bandwidth the files consume on their way from the server to the client.

Source: Citrix Presentation Server 4.5 Administrator’s Guide, Page 184

  1. Which of the following is the default compression level of SpeedScreen Image Acceleration?
  1. High
  2. Medium
  3. Low
  4. No

Answer: b.

Explanation: SpeedScreen Image Acceleration is configured with a lossy compression level. This level can be configured as ‘High compression’, ‘Medium compression’, ‘Low compression’ or ‘No compression’. The default setting is ‘Medium compression’, which is recommended for lower bandwidth connections while desiring good image quality.

Source: Citrix Presentation Server 4.5 Administrator’s Guide, Page 189

  1. Scenario: When planning to create a policy for a group of users, an administrator notes that some users will require exceptions to that policy. The administrator will need to create another policy for the users who need the exception. Where should the administrator prioritize the policy that is created for the users who require the exception?
    1. As a sub-policy to the original policy
    2. As a super-policy of the original policy
    3. Higher than the original policy
    4. Lower than the original policy

Answer: c.

Explanation: When you create policies for groups of users, clients, or servers, you may find that some members of the group require exceptions to some policy rules. To more effectively manage exceptions, you can create new policies for only those group members needing the exceptions and then rank that policy higher than the policy for the entire group.

Source: Citrix Presentation Server 4.5 Administrator’s Guide, Page 132

  1. By default, a(n) _?_ policy has the lowest priority of all policies.
  1. Application
  2. User
  3. New
  4. Old

Answer: c.

Explanation: Each policy receives a number upon creation. By default, a new policy has the lowest priority of all policies. The number assigned is based on the number of policies that exist in a server farm.

Source: CTX-1259AI Citrix XenApp: Administration, Page 260

  1. When prioritizing a policy, an administrator can: (Choose 4)
  1. Make the policy a Primary policy
  2. Make the policy a Backup policy
  3. Assign the policy the highest priority
  4. Assign the policy the lowest priority
  5. Increase the priority of the policy by one level
  6. Decrease the priority of the policy by one level

Answer: c.d.e.f.

Explanation: To prioritize a policy, in the Presentation Server Console, click the Policies node. Right-click the policy in the right pane and click Priority. If you want to assign the policy the highest priority, click Make Highest Priority; if you want to assign the policy the lowest priority, click Make Lowest Priority; if you want to increase the priority of the policy one level, click Increase Priority; if you want to decrease the priority one level, click Decrease Priority.

Source: CTX-1259AI Citrix XenApp: Administration, Page 261

  1. Policies in a XenDesktop environment are created in _?_.
  1. the Access Management Console
  2. the Provision Server Console
  3. the Presentation Server Console
  4. XenCenter

Answer: c.

Explanation: To create a policy for the XenDesktop environment, right-click the Policies node in the Presentation Server Console and select Create Policy. Type a name and a description. Optionally, configure the policy for a connection type. Configure the policy rules. Apply the policy using a filter.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 141

  1. If you change the name of a desktop group that has a Citrix policy applied to it, which of the following should you remember to do?
  1. Enable the desktop group
  2. Put the desktop group into maintenance mode
  3. Update the Citrix policy filter with the new name
  4. Reboot all of the virtual desktops in the desktop group

Answer: c.

Explanation: If you change the name of a desktop group that has a Citrix policy applied to it, remember to update the Citrix policy filter with the new name.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 72

  1. When creating a new assigned desktop group with XenServer as the hosting infrastructure, which of the following configurations will help to keep disk usage on the hosting infrastructure to a minimum?
  1. Access control
  2. Suspend the VM
  3. Encryption settings
  4. Shut down the VM

Answer: d.

Explanation: In assigned desktop groups that belong to a hosting infrastructure, the logoff behavior can be configured. When ‘Shut down the VM’ is configured, the VM will be restarted the next time the user tries to reconnect to it. Choosing this option keeps disk usage on the hosting infrastructure to a minimum. The disadvantage is that subsequent reconnections will be slower because they need to wait for the operating system to start up.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 66

  1. Scenario: The help desk has been receiving several calls from users of a Blade-based desktop group that they are unable to start their virtual desktops. The systems administrators have been starting the virtual desktops for the users. Which of the following configurations should the systems administrators make to solve this issue?
  1. Configure an Active Directory policy to remove the shutdown command from the virtual desktops
  2. Disable ‘Shut down the VM’ in the ‘Logoff behavior’ settings of the desktop group
  3. Enable ‘Suspend the VM’ in the ‘Logoff behavior’ settings of the desktop group
  4. Set the  idle desktop count to 0 for all periods in the ‘Idle pool settings’

Answer: a.

Explanation: Desktop groups that do not have a hosting infrastructure, including PC-based and Blade-based desktop groups do not have logoff behavior and idle pool settings, so the only option in this case would be to configure an Active Directory policy to remove the shutdown command from the virtual desktops.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 64 – 68, 79

  1. Scenario: Windows XP users are reporting that their desktop clocks on not showing the local time. You need to give them which of the following two rights to allow them to see the local time when using the virtual desktops?
  1. Change the time on the system on which the virtual desktop is running
  2. Change the time on the system which is delivering the virtual desktops
  3. Change time zone privilege
  4. Change the time zone registry area

Answer: a.d.

Explanation: By default, when non-privileged users connect to Windows XP virtual desktops they see the time zone of the system running the desktop instead of the time zone of their own endpoint device. To allow them to see their local time when using these virtual desktops you need to give them rights to change the time on the system on which the desktop is running and change the time zone registry area. After you do this, users who connect to Windows XP virtual desktops see their local time zone reflected in the desktop. When they log off or disconnect, the time zone of the desktop is reset to what it was before they logged on.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 77

  1. Users of Windows Vista virtual desktops who want to see their local time must have what privilege?
  1. Change the time on the system on which the virtual desktop is running
  2. Change the time on the system which is delivering the virtual desktops
  3. Change time zone privilege
  4. Change the time zone registry area

Answer: c.

Explanation: Users who want to see their local time when using Windows Vista virtual desktops must have the ‘Change the time zone’ privilege. This privilege is granted by default.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 77

  1. Scenario: A user logs on to a virtual desktop with an RDP connection. Now no one can connect to that virtual desktop via an ICA connection. Which two of the following options will fix this issue?
  1. Disconnect the RDP session
  2. Log off the RDP session
  3. Log on interactively to the console of the server hosting the virtual desktop
  4. Restart the server hosting the virtual desktop

Answer: c.d.

Explanation: If a user makes an RDP connection to a virtual desktop, an ICA connection is not possible until either a user logs on interactively on the console of the computer hosting the virtual desktop or the computer is restarted. Disconnecting the RDP session or logging off from RDP is not sufficient. To avoid this issue, consider disabling RDP.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 79

  1. In a XenDesktop implementation with XenServer as the hosting infrastructure, which of the following should be configured to allow a pooled virtual desktop group to revert to a clean state after users log off?
  1. Reboot on logoff
  2. Suspend on logoff
  3. Shut down on logoff
  4. Set idle desktop count to 0

Answer: a.

Explanation: In a XenServer/Provisioning Server XenDesktop environment, you can configure pooled virtual desktops to revert to a clean state after users log off. To do this, complete the following tasks: Create the virtual machine to use as your base image and install Citrix Virtual Desktop Agent, XenServer Tools and Citrix Provisioning Server Target Device for x 86 Platform. Create a Provisioning Server vDisk based on the virtual machine image, using the Provisioning Server Virtual Image Builder. Set the access mode for the vDisk to Standard Image (multi-client, write cache enabled). Assign the vDisk to the virtual machines you will use as pooled virtual desktops. On the Logoff Behavior page of the Create Desktop Group wizard, select Reboot on logoff.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Page 2

  1. Scenario: A company has a XenDesktop deployment using XenServer as the hosting infrastructure. Users of pooled virtual desktops are complaining that it is taking a long time to connect to a desktop. An administrator responds to the complaints by testing it out himself and decides that they are right. Which of the following configurations is probably resulting in the long wait?
  1. Logoff is set to shut down the VMs
  2. Idle pool count is set at 0
  3. Video settings are too high
  4. Logoff is set to suspend the VMs

Answer: b.

Explanation: Idle pool count settings are available only for pooled desktop groups that are part of a hosting infrastructure such as XenServer. They enable you to configure the number of VMs to be kept in a powered-on state ready for users to connect. If idle pool count is set at 0, then all of the VMs are kept in a powered-off state and take longer to connect to.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 65, 66

  1. If an administrator does not want to maintain an idle pool, the administrator should set the idle desktop count to _?_.
  1. Off
  2. Disabled
  3. 0
  4. 99999

Answer: c.

Explanation: If an administrator does not want to maintain an idle pool, the administrator should set the idle desktop count for all periods to 0.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Pages 65, 66

  1. Scenario: An administrator created a pooled desktop group with the XenDesktop Setup Wizard. Since the time of creation, several more desktops have been added to the desktop group and users in that group are complaining about longer desktop startup times. Which of the following configurations will most likely fix this issue?
  1. Set the logoff behavior to suspend the virtual machine
  2. Set the logoff behavior to shut down the virtual machine
  3. Set the idle desktop pool count to 0
  4. Update the idle desktop pool count with the correct number of desktops

Answer: d.

Explanation: When a desktop group is created with the setup wizard, the idle pool settings are automatically optimized with the correct number of virtual desktops. If more desktops are added, the idle pool values are not automatically updated and must be manually adjusted.

Source: Citrix XenDesktop 2.0 Getting Started Guide, Page 54

  1. Scenario: A company has 50 users total that need to access virtual desktops. 25 of the users work from 8:00 AM to 5:00 PM, 15 of the users work from 3:00 PM to 12:00 AM and another 10 users have the 11:00 PM to 8:00 AM shift. The users are all in a pooled desktop group. How many desktops should be available in the peak hours of the Idle Desktop Count?
  1. 40
  2. 50
  3. 35
  4. 25

Answer: a.

Explanation: The Idle Desktop Count is configured for periods during the day. During the peak hours the most desktops are going to need to be available. In this case, between the hours of 3:00 PM and 5:00 PM there will be 40 users – 25 users from the early shift and 15 users from the afternoon shift.

Source: Citrix XenDesktop 2.0 Getting Started Guide, Page 54

  1. After a policy has been created and configured, an administrator can filter the policy using: (Choose 5)
  1. Mac addresses
  2. Client Names
  3. Access Control
  4. Zones
  5. Farms
  6. Users and user groups
  7. Servers
  8. Client IP addresses

Answer: b.c.f.g.h.

Explanation: After a policy has been created and configured, an administrator can filter the policy using client names, access control (connections made through Access Gateway), users and user groups, servers and client IP addresses.

Source: CTX-1259AI Citrix XenApp: Administration, Page 249

  1. Policies that are applied to connections made through Access Gateway are filtered using:
  1. Client Names
  2. Access Control
  3. Users and user groups
  4. Servers
  5. Client IP addresses

Answer: b.

Explanation: When a policy is filtered by Access Control, it is applied to connections made through Access Gateway.

Source: CTX-1259AI Citrix XenApp: Administration, Page 249

  1. Scenario: An administrator must create a desktop group for users who will not have a choice of desktops to connect to and will not be able to personalize their desktop. Which of the following should the administrator configure for this scenario?
  1. Window-view
  2. Multi-monitor
  3. Full-screen-only
  4. Single-monitor

Answer: c.

Explanation: Users who will connect to a single desktop and will not have a choice are configured for full-screen-only mode. Full-screen-only mode uses the Desktop Receiver Embedded software to provide users access to a single virtual desktop. The desktop is displayed automatically on the user’s endpoint device in full-screen-mode. Full-screen-only mode does not allow users to control the appearance of their desktop.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 154

  1. Scenario: An administrator must create a desktop group for users who will have a choice of several different desktops to connect to. The desktops will be assigned to each user on first use and the users will be able to install applications and personalize their desktops. Which of the following should the administrator configure for this scenario?
  1. Window-view
  2. Multi-monitor
  3. Full-screen-only
  4. Single-monitor

Answer: a.

Explanation: Users in window-view mode use the Desktop Receiver software to provide access to more than one virtual desktop. The virtual desktop is displayed within a window and the desktop of the local device remains accessible. Users are allowed to control the appearance of their virtual desktops.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 155

#Delivering Desktops

  1. Manually adding information at prompts via the _?_ populates the Provisioning Server database with a new target device.
  1. Presentation Server Console
  2. XenDesktop Setup Wizard
  3. Bios
  4. Access Management Console

Answer: c.

Explanation: A new target device can be manually added to the Provisioning Server database using Bios prompts when the server is started using the PXE client.

Source: CTX-117921 XenApp and XenServer Implementation Guide, Page 7

  1. A _?_ or _?_ database must be installed before installing the first Desktop Delivery Controller in the farm in a large XenDesktop implementation. (Choose 2)
    1. Microsoft Access
    2. Microsoft SQL Server
    3. Oracle
    4. IBM DB2

Answer: b.c.

Explanation: In a large XenDesktop implementation, use either Microsoft SQL Server or Oracle for the data store. When using either of these databases for the data store, the database must be installed before the Desktop Delivery Controller can be installed. A Microsoft Access database is installed locally on the Desktop Delivery Controller and is only used for smaller XenDesktop implementations.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 78

  1. Scenario: An administrator is implementing a XenDesktop deployment for a group in the company. The administrator has configured Active Directory for use with the Desktop Delivery Controller, deployed a XenServer implementation, added a virtual machine to the Provisioning Server database and imaged a vDisk for the virtual machine. Which of the following does the administrator need to do to allow users access to the virtual desktop?
  1. Add the users to a  desktop group in the Presentation Server Console
  2. Add the virtual desktop to a desktop group in the Access Management Console
  3. Configure firewall settings for the ICA connection
  4. Install the XenServer Tools on the virtual machine

Answer: b.

Explanation: To make a virtual desktop available to users, configure the Desktop Delivery Controller and Active Directory, install and configure XenServer, including all components and licensing, add the virtual machine to the Provisioning Server database, image a vDisk to be used for the virtual desktop and add the virtual desktop to a desktop group in the Access Management Console.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Pages 1, 2

#Managing a XenDesktop 2.0 Enterprise Edition Implementation

  1. For remote access through Access Gateway, you must install _?_ and _?_. (Choose 2)
  1. RDP Client on all client devices
  2. Web Interface
  3. SecureICA
  4. Access Management Console Web Interface extension

Answer: b.d.

Explanation: For remote access through Access Gateway, you need to create a new Web Interface site. To do this, you must install the Web Interface and the Access Management Console Web Interface extension.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 20

  1. Desktop connections in a desktop group can be restricted by specified criteria using _?_.
  1. SecureICA
  2. Idle pool settings
  3. Logoff behavior
  4. Access Gateway filters

Answer: d.

Explanation: In a desktop group, the default Access Control connections allow all connections to desktops in the group. You can modify this to restrict allowed connections to those that meet the criteria of specified Access Gateway filters.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 65

  1. In a desktop group, Access Control can be modified to restrict connections with criteria specified through _?_.
  1. Access Gateway filters
  2. User filters
  3. Server filters
  4. IP address filters

Answer: a.

Explanation: In a desktop group, Access Control can be modified to restrict connections with criteria specified through Access Gateway filters.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 65

  1. Workers who need remote secure access are typically routed from their client devices through _?_ and _?_. (Choose 2)
  1. Secure Gateway
  2. Access Gateway
  3. Web Interface
  4. Program Neighborhood

Answer: b.c.

Explanation: Workers who need remote secure access are typically routed from their client devices through Access Gateway and Web Interface.

Source: Desktop Delivery Controller 2.0 Administrator’s Guide, Page 36

#Troubleshooting Desktop Images for Virtualized Delivery

  1. A vDisk will not show up in the XenDesktop Setup Wizard if _?_.
  1. the clock setting on the XenDesktop server is wrong
  2. WanScaler has not been installed and configured
  3. the name or description has one or more extended characters
  4. the vDisk is on shared storage

Answer: c.

Explanation: A vDisk will not show up in the XenDesktop Setup Wizard if, when you create a vDisk, you specify a name or a description that contains one or more extended characters (for example, Euro sign, U+20AC) or DBCS characters (for example, Hiragana letter “A”.) To resolve this issue, you must change the vDisk parameters so that the Description and the Name fields contain only standard, printable ANSI characters.

Source: Citrix XenDesktop 2.0 Getting Started Guide, Page 64

  1. Scenario: An administrator created a vDisk with the Euro sign at the beginning of the name, a description of ‘Euro vDisk 1’ and a disk size of 8000 MB. The administrator launches the XenDesktop Setup Wizard to create virtual desktops, but cannot locate the newly created vDisk. Which of the following will most likely resolve the issue?
  1. Give the vDisk a different description
  2. Re-size the vDisk
  3. Re-format the vDisk
  4. Rename the vDisk

Answer: d.

Explanation: The vDisk should be renamed without the Euro sign at the beginning. A vDisk will not show up in the XenDesktop Setup Wizard if, when you create a vDisk, you specify a name or a description that contains one or more extended characters (for example, Euro sign, U+20AC) or DBCS characters (for example, Hiragana letter “A”.) To resolve this issue, you must change the vDisk parameters so that the Description and the Name fields contain only standard, printable ANSI characters.

Source: Citrix XenDesktop 2.0 Getting Started Guide, Page 64

  1. Scenario: An administrator notices in the Access Management Console that a virtual desktop is listed as Not Registered under Desktop State. What does this tell the administrator?
  1. The Virtual Desktop Agent failed to register with the Desktop Delivery Controller
  2. The client device failed to register with Active Directory
  3. The vDisk failed to register with DHCP
  4. The Desktop Receiver failed to register with the Desktop Delivery Controller

Answer: a.

Explanation: The Desktop Delivery Controller (DDC) relies upon a software component installed upon each Virtual Desktop Machine (VDM) - the Virtual Desktop Agent (VDA) - being in communication with one of the controllers in your XenDesktop farm. This state of being in communication is referred to as the VDA being registered with a controller. If communication fails for any reason, the VDA is said to have failed to register with a controller and it will not be possible for DDC to broker a connection to the VDM in question; the VDM becomes a wasted resource.

Source: CTX-117248 Troubleshooting Virtual Desktop Agent Registration with Controllers in XenDesktop

  1. Scenario: An administrator deployed a vDisk to a target device on XenServer host and the target device crashed and displayed a blue screen with the following stop error: STOP: 0x0000007B. What was the problem?
  1. The Virtual Desktop Agent failed to register with the Desktop Delivery Controller
  2. The network ID does not match
  3. The name of the target device was invalid
  4. The SSL certificate on the XenServer is not from a trusted certificate authority

Answer: b.

Explanation: Differences in the network interface card, video card or processor on the Master Target and target device are most likely the cause of stop error 0x0000007B. This usually occurs on a XenServer that had more than one virtual network interface. In other words, this issue occurs most often when the network ID does not match.

Source: CTX-117113 If You Deploy a Virtual Disk to a Target Device Different from the Master Target, the Computer Crashes

  1. Scenario: A virtual desktop has failed to register with a Desktop Delivery Controller, as indicated to an administrator in the Access Management Console. According to best practices, which network commands should the administrator perform on both the virtual desktop and the Desktop Delivery Controller to troubleshoot this issue? (Choose 2)
  1. Telnet
  2. Ping
  3. NetStat
  4. IPCONFIG

Answer: b.d.

Explanation: If the VDM or the DDC controller sees an incorrect IP address for the other party, registration will fail. To see if this is an issue, on both machines, launch a command shell window and run the following commands: IPCONFIG and PING <OTHERMACHINE.DOMAIN.COM>. Both machines should be able to ping each other successfully by FQDN. The IP address reported for the remote machine by the PING command in each case should match the IP address reported by the IPCONFIG command on the relevant machine. If there is any discrepancy, fix the problem with your DNS configuration and restart either the VDM and/or the DDC controller, as appropriate.

Source: CTX-117248 Troubleshooting Virtual Desktop Agent Registration with Controllers in XenDesktop

  1. Scenario: A virtual desktop has failed to register with a Desktop Delivery Controller, as indicated to an administrator in the Access Management Console. Knowing the best practices to troubleshoot this problem, the administrator should check that the system’s times are within how many minutes of each other?
  1. One minute
  2. 60 minutes
  3. Five minutes
  4. 15 minutes

Answer: c.

Explanation: The communication between VDMs and DDC controllers is secured using Kerberos. This relies upon Tickets with a limited life span. If the difference in system time between the two ends of the communication is too great, the Tickets will always be considered to have timed out when they are accessed and communication fails. Check that the system time on both systems is within a reasonably small margin (the default domain-wide Kerberos setting is 5 minutes).

Source: CTX-117248 Troubleshooting Virtual Desktop Agent Registration with Controllers in XenDesktop

  1. Scenario: A virtual desktop has failed to register with a Desktop Delivery Controller, as indicated to an administrator in the Access Management Console. According to the best practices, the administrator should take troubleshooting steps in which order?
  1. 1) Check firewall configuration; 2) Check the virtual desktop’s farm membership; 3) Check both system’s time; 4) Run IPCONFIG and PING on both machines; 5) Rejoin both machines to their domain; 6) Inspect the Service Principal Names; 7) Disable all but one network adapter on the virtual desktop
  2. 1) Check the virtual desktop’s farm membership; 2) Rejoin both machines to their domain; 3) Run IPCONFIG and PING on both machines; 4) Check both system’s time; 5) Check firewall configuration; 6) Disable all but one network adapter on the virtual desktop; 7) Inspect the Service Principal Names
  3. 1) Check both system’s time; 2) Disable all but one network adapter on the virtual desktop; 3) Rejoin both machines to their domain; 4) Check firewall configuration; 5) Inspect the Service Principal Names; 6) Check the virtual desktop’s farm membership; 7) Run IPCONFIG and PING on both machines
  4. 1) Check the virtual desktop’s farm membership; 2) Check firewall configuration; 3) Run IPCONFIG and PING on both machines; 4) Check both system’s time; 5) Rejoin both machines to their domain; 6) Inspect the Service Principal Names; 7) Disable all but one network adapter on the virtual desktop

Answer: d.

Explanation: According to best practices, if a virtual desktop has failed to register with a Desktop Delivery Controller, the administrator should: 1) Check the virtual desktop’s farm membership; 2) Check firewall configuration; 3) Run IPCONFIG and PING on both machines; 4) Check both system’s time; 5) Rejoin both machines to their domain; 6) Inspect the Service Principal Names; 7) Disable all but one network adapter on the virtual desktop.

Source: CTX-117248 Troubleshooting Virtual Desktop Agent Registration with Controllers in XenDesktop

  1. Scenario: An administrator notices in the Access Management Console that a virtual desktop listed as Not Registered under Desktop State. What three steps should the administrator take first? (Choose 3)
  1. Check in the Access Management Console for the farm that the Globally Unique Identifier value shown matches that shown in the farm’s read-only properties
  2. Check that the system time on the virtual desktop and the Desktop Delivery Controller are within five minutes of each other
  3. Check the Access Management Console for the farm that the virtual desktop’s machine name is in one of the desktop groups
  4. Check the event log to make sure that the virtual desktop in question is a member of the correct farm

Answer: a.c.d.

Explanation: If a virtual desktop is listed as Not Registered in the Access Management Console, the first thing you must check is that the virtual desktop machine is properly added to the correct Desktop Delivery Controller (DDC) farm. This needs to be done from both the point of view of the virtual desktop system and of the DDC farm itself. 1. Check in the Access Management Console for the farm that the virtual desktop’s machine name is in one of the desktop groups. 2. Check that the Virtual Desktop Agent (VDA) machine in question is a member of the correct farm – look for the event log entry that gives the Globally Unique Identifier (GUID) of the base Organizational Unit (OU) the VDA has been told to use. 3. Check in the Access Management Console for the farm that the GUID value shown matches that shown in the farm’s read-only properties. If the GUID on the VDA does not match the GUID in the farm’s Access Management Console, the VDA is configured to be in a different farm. A VDA’s farm membership can be set through group policy or during installation. Correct the VDA’s farm setting and restart it to see if registration is now possible.

Source: CTX-117248 Troubleshooting Virtual Desktop Agent Registration with Controllers in XenDesktop

  1. Scenario: A virtual desktop named vDT01 is listed as Not Registered in the Desktop Group within the Access Management Console and users are unable to connect. Which of the following steps would help an administrator to troubleshoot this issue?
  1. Check that the clocks of the virtual machine and Desktop Delivery Controller are within one hour of each other
  2. Run Discovery in Access Management Console
  3. Confirm that the DNS records are correct
  4. Rename the virtual desktop to VDT01

Answer: c.

Explanation: There can be several reasons why a virtual desktop would not be registered in the Desktop Group within the Access Management Console. Things for an administrator to check are: Confirm the DNS records are correct, verify the Desktop Delivery Controller and the endpoint device can resolve each other’s IP address, check firewall settings, check that the clocks of the virtual machine and Desktop Delivery Controller are within five minutes of each other and check the Desktop Delivery Controller and Virtual Desktop Agent event logs.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 145

  1. Which of the following issues can occur with the XenDesktop Setup Wizard? (Choose 3)
  1. Stop Error 0x0000007B
  2. Desktop group not listed
  3. vDisk not listed
  4. MMC3 Error

Answer: a.b.c.

Explanation: The following issues can occur with the XenDesktop Setup Wizard: Desktop group not listed, vDisk not listed or MMC3 Error. To help troubleshoot the issue, a log file key can be added to the setup wizard executable.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 146

  1. Scenario: An administrator created a new desktop group in the Access Management Console using the IP address 192.168.5.38. The XenDesktop Setup Wizard is failing to list this newly created desktop group. Which of the following would keep this problem from occurring?
  1. Use the FQDN instead of IP address when creating a new group in the Access Management Console
  2. Use the Provisioning Server Console to create a new desktop group instead of the Access Management Console
  3. Run Discovery on the Access Management Console after creating the new desktop group
  4. Refresh the XenDesktop Wizard

Answer: a.

Explanation: To make sure that a desktop group shows up in the XenDesktop Wizard, use the same text to identify the connection. In this case, the FQDN should have been used in the Access Management Console to keep it consistent with what was used in the XenDesktop Setup Wizard.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 146

  1. Scenario: An administrator is attempting to install the XenDesktop Setup Wizard on Windows Server 2003. The installation program has generated an error indicating that it detects that MMC3 is not already installed on the server. Which of the following will resolve this issue?
  1. Install the MMC3 Hotfix
  2. Install Windows Server 2003 Service Pack 2
  3. Install Windows Server 2003 Service Pack 1
  4. Install the Access Management Console of the server before installing the XenDesktop Setup Wizard

Answer: b.

Explanation: The XenDesktop Setup Wizard installation program generates an error if it detects that MMC3 is not already installed on the server on which an administrator tries to install the wizard and the installation program ends. This issue can occur when Windows Server 2003 Service Pack 2, which is a XenDesktop prerequisite, is not installed. To resolve the issue, install Windows Server 2003 Service Pack 2 on the server on which the wizard will be installed.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 146

  1. If an administrator sees a message appear pertaining to a virtual machine not being able to run on Windows, which of the following should an administrator do according to best practices? (Choose 3)
  1. Install Windows 2003 Service Pack 2 and restart the installation
  2. Check that the device on which XenServer is installed has a CPU that supports hardware virtualization and the BIOS is enabled accordingly
  3. Perform a hardware reset of the host server and restart the installation
  4. Check the support site for the hardware manufacturer for BIOS upgrades

Answer: b.c.d.

Explanation: If an administrator encounters a message pertaining to a virtual machine cannot be run on Windows, the administrator should check that the device on which XenServer is installed has a CPU that supports hardware virtualization and the BIOS is enabled accordingly, perform a hardware reset of the host server and restart the installation and check the support site for the hardware manufacturer for BIOS upgrades.

Source: CTX-2201AI Citrix XenDesktop 2.0 Enterprise Edition: Administration, Page 147

  1. Scenario: An administrator had to create a desktop group containing a large number of virtual desktops and used multiple Citrix XenServer pools to host the machines. The administrator used the tool XenMultiPool.exe, which is provided with Citrix XenDesktop at %ProgramFiles%\Citrix\VmManagement\ and allows several Citrix XenServer pools to be used by one desktop group. After using the tool, the administrator found that not all of the pools can be accessed by the desktop group. Which of the following should the administrator do to allow the desktop group to access all of the pools?
  1. Use the same username and password for all of the XenServer Hosts
  2. Configure the desktop group with the Host Infrastructure setting to None
  3. Re-run XenMultiPool.exe on the Desktop Delivery Controller
  4. Demote all of the pools to members of the multipool

Answer: a.

Explanation: If you want to create a desktop group containing with a large number of virtual desktops, you may need to use more than one Citrix XenServer pool to host the machines. A tool is provided with Citrix XenDesktop that allows several Citrix XenServer pools to be used by one desktop group. This tool is installed at: %ProgramFiles%\Citrix\VmManagement\XenMultiPool.exe. Note that all Citrix XenServer hosts must have the same username and password to configure them for use with one desktop group.

Source: Citrix XenDesktop 2.0, Using Citrix XenServer with Desktop Delivery Controller, Page 2

#Delivering and Managing Applications

  1. Scenario: An administrator created a policy named PolicyA to disable printer auto-creation and audio for all of the users in a desktop group. The administrator realizes that some of the users in the desktop group will need audio enabled, so she needs to create a new policy, PolicyB, with audio enabled just for those specific users. What priority should PolicyB be given?
  1. Lower than PolicyA
  2. Same as PolicyA
  3. A subset of PolicyA
  4. Higher than PolicyA

Answer: d.

Explanation: When you create policies for groups of users, clients, or servers, you may find that some members of the group require exceptions to some policy rules. To more effectively manage exceptions, you can create new policies for only those group members needing the exceptions and then rank that policy higher than the policy for the entire group.

Source: Citrix Presentation Server 4.5 Administrator’s Guide, Page 132

  1. Scenario: John is an administrator in a large company. The company just received an order of over 100 new print devices. All of the printers are the same model and are compatible with the universal printer driver. John is going to create a new policy for the printers to use the universal printer driver only. Which of the following steps should he take? (Choose 3)
  1. Enable ‘Auto-creation’ and select ‘Auto-create all client printers’
  2. Enable ‘Universal driver’ and select ‘Use universal driver only’
  3. Enable ‘Native printer driver auto-install’ and select ‘Do not automatically install drivers’
  4. Create a driver compatibility list and select ‘Allow only drivers in the list’

Answer: a.b.c.

Explanation: ‘Auto-create all client printers’ automatically connects all the printers on a client device. ‘Use universal driver only’ makes sure that only the universal printer driver is used. ‘Do not automatically install drivers’ makes sure that the native drivers are not installed in the environment.

Source: CTX-1259AI Citrix XenApp: Administration, Pages 628 - 636

  1. When should the policy rule ‘Turn off client printer mapping’ be used?
  1. When auto-creation of only local client printers is desired
  2. When auto-creation of only network client printers is desired
  3. When auto-creation of client printers is not desired
  4. When auto-creation of only default client printers is desired

Answer: b.

Explanation: In some instances, it might be preferable to not auto-create client printers. An administrator can use the ‘Turn off client printer mapping’ rule to auto-create only network printers or printers connected directly to the server.

Source: CTX-1259AI Citrix XenApp: Administration, Page 612

  1. When should the policy rule ‘Do not auto-create client printers’ be used?
  1. To turn off local client printer creation when the user logs in
  2. To turn off network client printer creation when the user logs in
  3. To turn off all client printer creation when the user logs in
  4. To allow only the default client printer to be created when the user logs in

Answer: c.

Explanation: ‘Do not auto-create client printers’ turns off the auto-create option for all client printers when users log on. No client printers will be created.

Source: CTX-1259AI Citrix XenApp: Administration, Page 609

  1. When creating a printer policy, an administrator typically filters the policy by _?_ to ensure that users in a work area are assigned to corresponding printers.
  1. Access Control
  2. Client name
  3. Server
  4. Users
  5. Groups
  6. Client IP address

Answer: f.

Explanation: When creating a printer policy, an administrator typically filters the policy by client IP address to ensure that users in a work area are assigned to corresponding printers.

Source: CTX-1259AI Citrix XenApp: Administration, Page 617

  1. Scenario: The administrator at a small company wants to make sure that the five printer devices in the company use the drivers from the original manufacturer only. She installed the needed drivers on one of the servers and replicated them to the other four. While creating a policy, which of the following rules should she enable?
  1. ‘Do not automatically install drivers’
  2. ‘Use universal driver only if requested driver is unavailable’
  3. ‘Use only printer model specific drivers’
  4. ‘Use universal driver only’

Answer: c.

Explanation: By enabling the ‘Universal driver’ rule ‘Use only printer model specific drivers,’ the administrator makes sure that only the manufacturer’s drivers that she installed will be used for the five printers.

Source: CTX-1259AI Citrix XenApp: Administration, Page 628

  1. Scenario: John is an administrator in a large company. The company just received an order of over 100 new print devices. There are ten different models of print devices. John is going to install the original manufacturer drivers on one server and replicate them to the other servers. He wants to use the manufacturer drivers for the printers, but he also wants to make sure that there is always a driver available in case there are unforeseen printing issues, or in case a rogue print device is installed in the company. Which of the following steps should he take? (Choose 3)
  1. Enable the rule ‘Install Windows native drivers as needed’
  2. Enable the rule ‘Do not automatically install drivers’
  3. Enable the rule ‘Use universal driver only if requested driver is unavailable’
  4. Create a driver compatibility list and select ‘Allow only drivers in the list’
  5. Create a driver compatibility list and select ‘Allow all drivers except those in the list’

Answer: b.c.d.

Explanation: By not allowing native print drivers to automatically be installed from auto-created printers, John will make sure that no rogue drivers make it into the farm. By using a driver compatibility list, he will control which drivers are allowed in the farm. Since he knows the drivers that are allowed, but doesn’t know which drivers might try to install later, he selects ‘Allow only drivers in the list’ and adds the known acceptable drivers to the list. By selecting the ‘Use universal driver only if the requested driver is unavailable’ rule, John is making sure that there is always a driver available, whether it’s the manufacturer’s driver or the universal driver.

Source: CTX-1259AI Citrix XenApp: Administration, Page 628, 635, 636

  1. Scenario: Each user in Corporate has a print device directly connected to their client device. There are dozens of network printers in the corporate building and each user has several of them configured on their client device. A handful of the users have a network printer configured as their default printer. The material that they will be printing from the published application is sensitive so it must be printed at their local device. The IT department would also like to alleviate long logon times for the users. Which of the following policy rules should an administrator configure to best accommodate this situation?
  1. Print job routing
  2. Turn off client printer mapping
  3. Auto-create local client printers only
  4. Auto-create the client’s default printer only

Answer: c.

Explanation: By using the rule ‘Auto-create local client printers only,’ only the printers connected directly to the user’s client device through an LPT or other local port will be automatically connected. Enabling this setting ensures any network printers defined on the client device are not auto-created within the ICA session and logon times will be reduced for those who have several network printers configured on their client device.

Source: CTX-1259AI Citrix XenApp: Administration, Page 609

  1. Scenario: The IT department would prefer that the print devices in the company use the manufacturer’s print drivers for all printing, but also want to make sure users are still able to print when the manufacturer’s driver is not available. Which of the following two policy rules should be configured for this environment? (Choose 2)
  1. Native driver auto-install
  2. Universal driver
  3. Print job routing
  4. Auto-creation

Answer: a.b.

Explanation: The policy ‘Native driver auto-install’ can be set to the rule ‘Install Windows native drivers as needed.’ That allows the manufacturer’s print drivers to be used in the farm. The policy ‘Universal driver’ can be set to the rule ‘Use universal driver only if requested driver is unavailable.’ That allows the drivers to first try to use the manufacturer’s drivers, but if they are not available, the universal driver will be a fallback.

Source: CTX-1259AI Citrix XenApp: Administration, Page 628

  1. Scenario: All of the users in the Sales department have several network printers configured on their client devices. They have been printing to print devices in other departments and the other departments have started complaining that the Sales users are tying up their printers. To alleviate this, the IT department has been asked to allow each Sales user to only connect to the network printers in their area. Which of the following policy rules should the administrator assigned to this task configure for the Sales group?
  1. Session printers
  2. Auto-creation
  3. Print job routing
  4. Printer properties retention

Answer: a.

Explanation: The ‘Session printers’ policy rule allows an administrator to control the assignment of network printers.

Source: CTX-1259AI Citrix XenApp: Administration, Pages 615 – 618

  1. Scenario: Several users in the company have to work on different floors of the building and different client devices throughout the day. Of course, they must use the same login credentials no matter which computer they are working on. When they connect to published applications, they need to be able to print from a nearby print device no matter where they are. Which policy rule should the IT department configure and how should the policy be filtered to make sure that these users always have a nearby print device to print to?
  1. Session printers / Users and Groups
  2. Session printers / Client IP Address
  3. Print job routing / Users and Groups
  4. Print job routing / Client IP Address

Answer: b.

Explanation: The ‘Session printers’ policy rule allows an administrator to control the assignment of network printers. In this case, the policy should be configured by IP address. That way, the IT department can assign the IP range of the computers on each level of the building to a different policy so when a user is on the fifth floor they will have access to the fifth floor printers and when they have to move to floor two, they will have access to the second floor printers.

Source: CTX-1259AI Citrix XenApp: Administration, Pages 615 – 618

  1. If an administrator wants to configure print jobs to route directly from the Presentation Server to the network print server, which policy rule should be configured?
  1. Auto-creation
  2. Session printers
  3. Print job routing
  4. Printer properties retention

Answer: c.

Explanation: The ‘Print job routing’ rule determines whether or not a client printer is auto-connected. When the rule is configured to ‘Connect directly to network print server if possible,’ the print jobs are routed directly from the Presentation Server to the network print server. If ‘Always connect indirectly as a client printer’ is configured, print jobs are routed through the client device via the ICA protocol and redirected to the network print server.

Source: CTX-1259AI Citrix XenApp: Administration, Page 611

  1. The _?_ policy rule is used to assign network printers to users.
  1. Auto-creation
  2. Session printers
  3. Print job routing
  4. Printer properties retention

Answer: b.

Explanation: The ‘Session printers’ policy rule is used to assign network printers to users in a Presentation Server environment. Administrators can assign the default printer as well as designate the connection to network printers based on the desired policy filter.

Source: CTX-1259AI Citrix XenApp: Administration, Page 615

  1. The two main components for application streaming are: (Choose 2)
  1. Citrix Streaming Profiler
  2. Citrix Provisioning Server
  3. Citrix Streaming Client
  4. Program Neighborhood Agent

Answer: a.c.

Explanation: The two main components of application streaming are the Citrix Streaming Profiler, which an administrator uses to package an application and configure a profile that matches the operating system, service pack level, drive letter and language of the client device and the Citrix Streaming Client, which locates the streaming application, sets up an isolation environment on the client device for the application and streams the application on demand.

Source: CTX-1259AI Citrix XenApp: Administration, Pages 791, 792

  1. A user can request a streamed application through which of the following? (Choose 2)
  1. Program Neighborhood
  2. Program Neighborhood Agent
  3. Web Interface site
  4. Desktop Receiver

Answer: b.c.

Explanation: A streamed application can be requested through use of the Program Neighborhood Agent or a Web Interface site.

Source: CTX-1259AI Citrix XenApp: Administration, Page 793

  1. A profiled application can be made ready to stream to users by _?_.
  1. publishing it using the Presentation Server Console
  2. installing it on the Citrix Streaming Profiler
  3. publishing it using the Access Management Console
  4. moving it to the Web Interface site

Answer: c.

Explanation: After an application profile is created it can be made ready to stream to users by publishing it using the Access Management Console.

Source: CTX-1259AI Citrix XenApp: Administration, Page 802

  1. When publishing a profiled application, if the administrator desires the application to be installed on and launched from a Presentation Server, which of the following application delivery choices would the administrator make?
  1. Client-to-server redirection
  2. Server-to-client redirection
  3. Streamed to client
  4. Streamed if possible, otherwise accessed from server
  5. Accessed from server

Answer: e.

Explanation: ‘Accessed from server’ enables an application installed and published on a Presentation Server to be launched and accessed in an ICA session, an application to be installed by the Installation Manager or an application to be streamed to the server.

Source: CTX-1259AI Citrix XenApp: Administration, Page 846

  1. When publishing a profiled application, if the administrator desires the application to be accessed from virtual desktops that have the Citrix Streaming Client and those that don’t, which of the following application delivery choices would the administrator make?
  1. Client-to-server redirection
  2. Server-to-client redirection
  3. Streamed to client
  4. Streamed if possible, otherwise accessed from server
  5. Accessed from server

Answer: d.

Explanation: Also called dual mode streaming, in this situation an administrator can make sure the application will be streamed to those that have the Citrix Streaming Client and it will be available on a Presentation Server as a published application, an application to be installed by the Installation Manager or an application to be streamed to the server to those that don’t have the Citrix Streaming Client.

Source: CTX-1259AI Citrix XenApp: Administration, Page 847

  1. When publishing a profiled application, if the administrator desires that the application is launched locally on the virtual desktop, which of the following application delivery choices would the administrator make?
  1. Client-to-server redirection
  2. Server-to-client redirection
  3. Streamed to client
  4. Streamed if possible, otherwise accessed from server
  5. Accessed from server

Answer: c.

Explanation: ‘Streamed to client’ enables an application to be streamed from a file server to the virtual desktop so users can launch the application locally.

Source: CTX-1259AI Citrix XenApp: Administration, Page 847

  1. If an administrator wants to stream applications through the Web Interface using XenApp, then the _?_ is chosen as the type of site to create.
  1. Program Neighborhood
  2. XenApp Web
  3. XenApp Services
  4. Presentation Server

Answer: b.

Explanation: If an administrator wants to stream applications through the Web Interface using XenApp, then the XenApp Web site (or Access Platform site) is chosen as the type of site to create.

Source: CTX-1259AI Citrix XenApp: Administration, Page 867

  1. If an administrator wants to stream applications through the Citrix XenApp Plugin using XenApp, then the _?_ is chosen as the type of site to create.
  1. Program Neighborhood
  2. XenApp Web
  3. XenApp Services
  4. Presentation Server

Answer: c.

Explanation: If an administrator wants to stream applications through the Citrix XenApp Plugin (formerly Program Neighborhood Agent) using XenApp (formerly Presentation Server), then the XenApp Services site (formerly Program Neighborhood Agent Services site) is chosen as the type of site to create.

Source: CTX-1259AI Citrix XenApp: Administration, Page 867

  1. Before publishing a streaming application, you must prepare the application with the _?_ .
  1. Citrix Streaming Client
  2. XenApp Services site
  3. Program Neighborhood
  4. Citrix Streaming Profiler

Answer: d.

Explanation: Before publishing a streaming application, you must prepare the application with the Citrix Streaming Profiler. On the workstation with the Streaming Profiler installed, make sure the application’s setup program is available from the profiling workstation. From the Start menu, open the Streaming Profiler and select to create a New Profile. In the profiling wizard, select the operating systems that match your end-users' operating systems. This is the initial target in the profile. Follow the wizard steps to install the application in the streaming application profile. Finally, save the completed profile on a network file share that your end-users can access.

Source: CTX112374 Citrix Presentation Server 4.5 Installation Checklist

Comments are closed.