Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. Management has requested dynamic distribution of users between the primary and backup data centers to ensure that all available hardware is utilized during normal operations.What is the biggest risk the architect should highlight to the customer when designing the profile strategy?
Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. As part of the graphics-mode design considerations, the architect determined that one User Group requires pixel-perfect images at all times.Which graphics mode should the architect recommend be configured for this specific group?
Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. The environment consists of 4 Citrix Hypervisor hosts, each running10 virtual machines (VMs). To meet company security standards for the environment, the IT team will need to perform routine VM snapshots, data backups, and threat scans.Which two matters should the architect consider when securing a backup plan for the company? (Choose two.)
Scenario: A Citrix Architect needs to support a Citrix Virtual Apps and Desktops environment with 2 data centers. App Layering is being used to create layered images that are used by the Virtual Delivery Agent (VDA) machines in both data center locations. To comply with disaster recovery (DR) requirements, administrators must be able to modify and deploy layered images from either data center if needed.Which statement correctly describes the process that the architect must follow to meet the requirements?
Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. Two Control Layer security requirements have been identified:✑ For security reasons, it is unacceptable to use default ports for FlexCast Management Architecture (FMA) services.✑ Management access to PowerShell and Citrix Studio should be restricted to management workstations by granular firewall rules.Which combination of ports can the architect assign to the listed Citrix services to meet the Control Layer security requirements?
Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. The customer requires that local users on the internal network have access to the Citrix environment from available, non-domain-joined desktops.How should the architect configure StoreFront for the Citrix Virtual Apps and Desktops deployment to ensure this requirement is met?