Which type of policy can be applied to a NetScaler Gateway virtual server to limit access to XenDesktop resources, if the user device does NOT comply with the companys security requirements?
Scenario: A Citrix Administrator is concerned about the amount of health checks the NetScaler is sending the back-end resources. The administrator would like to find a way to remove health checks from specific bound services.How can the administrator accomplish this?
Which two options would provide an end-to-end encryption data, while allowing the NetScaler to optimize the responses? (Choose two.)
Which two components need to be configured for SmartAccess? (Choose two.)
Scenario: A Citrix Administrator is troubleshooting a NetScaler issue. The administrator goes to the command line and from the Shell, tails the ns.log to view the log in real time to find the issue. After a few minutes, the administrator noticed that the logs stopped scrolling and the issue was missed.How can troubleshooting continue using the ns.log?
How can a Citrix Administrator provide two-factor authentication with tokens in a XenDesktop with NetScaler Gateway environment?