READ Free Dumps For Citrix- 1Y0-400
Question ID 1407 | The company's security compliance policy requires that remote access is logged for auditing purposes. |
Option A | A. NetScaler logs, StoreFront logs, and Citrix Director database |
Option B | B. Configuration Logging database, NetScaler logs, and Citrix Director database |
Option C | C. StoreFront logs, System Event logs, and firewall logs |
Option D | D. Configuration Logging database, firewall logs, and Application Event log |
Correct Answer | A |
Question ID 1408 | How should the architect design the centralized log for NetScaler? |
Option A | A. By implementing SysLog |
Option B | B. By monitoring the Windows Security Event logs |
Option C | C. By sending NetScaler logging data to the SQL Reporting Services |
Option D | D. By implementing the SmartAuditor feature |
Correct Answer | A |