PassLeader just published the NEWEST Citrix 1Y0-401 exam dumps! You can get both 1Y0-401 VCE dumps and 1Y0-401 PDF dumps from PassLeader, both VCE and PDF dumps contain the NEWEST 1Y0-401 exam questions, which will ensure your 1Y0-401 exam 100% passing! Welcome to download the valid PassLeader 1Y0-401 dumps VCE and PDF from PassLeader — https://www.passleader.com/1y0-401.html (438 Q&As Dumps)
And, you can preview the PassLeader 1Y0-401 dumps online — https://drive.google.com/open?id=0B-ob6L_QjGLpYmZVV21JLV9ab2s
QUESTION 145
How should the architect implement database high availability in an Oracle database?
A. By using Oracle RAC
B. By using Oracle DataGuard
C. By using Oracle FailSafe
D. By using Oracle Automatic Storage Management
Answer: C
Explanation:
http://www.oracle.com/technetwork/database/windows/index-082893.html
QUESTION 146
Why is database high availability an essential component of a production environment?
A. Because the Delivery Controller is stateless
B. Because server maintenance can be performed online
C. Because it prevents local host cache corruption
D. Because user data loss is prevented if a session is disconnected
Answer: A
QUESTION 147
Why is hypervisor high availability an essential component of a production database server?
A. Because the Delivery Controller is stateless
B. Because server maintenance can be performed online
C. Because it prevents local host cache corruption
D. Because user data loss is prevented if a session is disconnected
Answer: A
QUESTION 148
Why is database protection an essential component of a production environment?
A. Because the Delivery Controller is stateless
B. Because server maintenance can be performed online
C. Because it prevents local host cache corruption
D. Because user data loss is prevented if a session is disconnected
Answer: C
QUESTION 149
The company’s security compliance policy requires that remote access is logged for auditing purposes. Which data sources should be captured?
A. NetScaler logs, StoreFront logs, and Citrix Director database
B. Configuration Logging database, NetScaler logs, and Citrix Director database
C. StoreFront logs, System Event logs, and firewall logs
D. Configuration Logging database, firewall logs, and Application Event log
Answer: A
QUESTION 150
How should the architect design the centralized log for NetScaler?
A. By implementing SysLog
B. By monitoring the Windows Security Event logs
C. By sending NetScaler logging data to the SQL Reporting Services
D. By implementing the SmartAuditor feature
Answer: A
QUESTION 151
How should the architect specify that the Citrix Director database be queried?
A. By using the Citrix Director console
B. By using SQL Management Studio
C. By using SQL Reporting Services
D. By using PowerShell
Answer: A
QUESTION 152
How should the architect specify that StoreFront logs are collected?
A. By enabling tracing and automating collection of log files
B. By enabling tracing and monitoring Windows Event logs
C. By gathering data from the IIS Manager console and archiving it on a network share
D. By enabling the SmartAuditor feature and IIS logging
Answer: A
QUESTION 153
How should the architect specify that the Configuration Logging database be queried?
A. By using the Citrix Director console
B. By using SQL Management Studio
C. By using SQL Reporting Services
D. By using PowerShell
Answer: B
Explanation:
http://blogs.citrix.com/2012/03/01/how-to-set-up-a-configuration-logging-database-for-xenapp-6-5/
QUESTION 154
Why does using SysLog help the company comply with its security policy?
A. Because it is a centralized, industry-standard log that is easily queried
B. Because it password-protects the audit logs for added security
C. Because it uses a standard TCP port
D. Because it collects logs from multiple devices
Answer: A
QUESTION 155
Why does using Windows Event Viewer help the company comply with its security policy?
A. Because it is a centralized, industry-standard log that is easily queried
B. Because it password-protects the audit logs for added security
C. Because it uses a standard TCP port
D. Because it collects logs from multiple devices
Answer: A
QUESTION 156
Why does using SQL Reporting Services help the company comply with its security policy?
A. Because it is a centralized, industry-standard log that is easily queried
B. Because it password-protects the audit logs for added security
C. Because it uses a standard TCP port
D. Because it collects logs from multiple devices
Answer: D
QUESTION 157
Why does using SmartAuditor help the company comply with its security policy?
A. Because it is a centralized, industry-standard log that is easily queried
B. Because it password-protects the audit logs for added security
C. Because it uses a standard TCP port
D. Because it collects logs from multiple devices
Answer: B
QUESTION 158
Why does using Citrix Director help the company comply with its security policy?
A. Because it provides a centralized data repository
B. Because it providescontrolled accessto monitoring functions
C. Because it uses a standard TCP port
D. Because it collects data from NetScaler
Answer: D
QUESTION 159
Why does using SQL Management Studio help the company comply with its security policy?
A. Because it enables you to execute SQL queries to extract data
B. Because it enables you to create a database to store logs
C. Because it uses a standard TCP port
D. Because it provides security alerts by using SQL Mail
Answer: B
QUESTION 160
Why does using SQL Reporting Services help the company comply with its security policy?
A. Because it enables automated report delivery
B. Because it enables PDF-based reports
C. Because it uses a standard TCP port
D. Because it provides security alerts by using SQL Mail
Answer: A
QUESTION 161
Why does using PowerShell help the company comply with its security policy?
A. Because PowerShell has a commandlet for running queries from Citrix Director
B. Because it enables automated report delivery
C. Because it enables PDF-based reports
D. Because it collects logs from multiple devices
Answer: A
QUESTION 162
Why does using StoreFront logs help the company comply with its security policy?
A. Because they are centralized, industry-standard logs that are easily queried
B. Because they use password-protection for added security
C. Because they contain detailed records of user authentication activity
D. Because they collect data from multiple devices
Answer: C
Now, try the PassLeader 1Y0-401 dumps for 100% passing your 1Y0-401 exam — https://www.passleader.com/1y0-401.html (438 Q&As VCE Dumps and PDF Dumps)
And, preview the PassLeader 1Y0-401 dumps online — https://drive.google.com/open?id=0B-ob6L_QjGLpYmZVV21JLV9ab2s
Good Luck!