01. Which IP address type on a Citrix ADC is primarily used for communication with back-end servers?
a) Virtual IP (VIP)
b) Management IP (NSIP)
c) Subnet IP (SNIP)
d) Mapped IP (MIP)
02. What requirements must be met when uploading an SSL certificate to Citrix ADC?
(Select two)
a) A matching private key must exist on the appliance
b) The certificate must be signed by a root or intermediate CA
c) The certificate must be uploaded in JSON format
d) The certificate should be associated with a specific VLAN
03. Scenario: A financial services company hosts a secure banking portal through Citrix ADC. Customers have reported SSL handshake errors when connecting from older browsers. On investigation, the administrator discovers that the SSL vServer allows only TLS 1.3 and uses modern ciphers. The company must support both legacy clients and newer browsers while maintaining strong security.
Which two configuration changes could resolve the issue while ensuring a secure SSL deployment?
(Select two)
a) Enable both TLS 1.2 and TLS 1.3 protocols on the SSL vServer
b) Disable SSL session reuse on the vServer
c) Configure an SSL profile that supports a mix of strong and backward-compatible ciphers
d) Replace the certificate with a wildcard certificate signed by a private CA
04. Which setting must be enabled when configuring a Citrix ADC high availability (HA) pair across different subnets?
a) Route Health Injection (RHI)
b) Independent Network Configuration (INC) mode
c) VMAC (Virtual MAC)
d) Fail-safe mode
05. Which feature of Citrix ADC allows administrators to restrict system management access to trusted IP addresses only?
a) Access Control Lists (ACLs)
b) Admin partitions
c) Authentication profiles
d) Load balancing monitors
06. Who decides the appropriate licensing model to apply on a Citrix ADC when integrating into an enterprise environment?
a) Citrix Technical Support during initial deployment
b) End users, based on their application access needs
c) The Citrix ADC appliance itself, during auto-configuration
d) The network administrator, based on the organization’s feature requirements
07. Which entity in a Citrix ADC load balancing configuration is directly responsible for representing the backend server?
a) Server entity
b) Service group
c) Monitor
d) Virtual server (vServer)
08. Why might a Citrix Administrator use the aaad.debug command when troubleshooting authentication failures?
a) To trace IP-to-VLAN bindings
b) To review SSL certificate validity dates
c) To monitor real-time AAA authentication events
d) To display active load balancing sessions
09. What hardware components are part of a physical Citrix ADC MPX appliance?
(Select two)
a) Network Interface Cards (NICs)
b) Hypervisor resources shared with virtual instances
c) Solid State Drives (SSD) for logging and config storage
d) CPU modules dedicated to packet processing
10. When investigating SSL-related issues on Citrix ADC, what steps can help identify the root cause?
(Select two)
a) Checking if the SSL certificate chain is complete
b) Verifying that the monitor threshold is set correctly
c) Confirming that secure ciphers and protocols are enabled
d) Increasing the session persistence timeout