The Citrix 1Y0-312 exam preparation guide is designed to provide candidates with necessary information about the CCP-V exam. It includes exam summary, sample questions, practice test, objectives and ways to interpret the exam objectives to enable candidates to assess the types of questions-answers that may be asked during the Citrix Certified Professional - Virtualization (CCP-V) exam.
It is recommended for all the candidates to refer the 1Y0-312 objectives and sample questions provided in this preparation guide. The Citrix CCP-V certification is mainly targeted to the candidates who want to build their career in Virtualization domain and demonstrate their expertise. We suggest you to use practice exam listed in this cert guide to get used to with exam environment and identify the knowledge areas where you need more work prior to taking the actual Citrix Virtual Apps and Desktops 7 Advanced Administration exam.
Citrix 1Y0-312 Exam Summary:
Exam Name
|
Citrix Virtual Apps and Desktops 7 Advanced Administration (CCP-V) |
Exam Code | 1Y0-312 |
Exam Price | $300 USD |
Duration | 90 minutes |
Number of Questions | 71 |
Passing Score | 64% |
Recommended Training / Books | CWS-322: Citrix Virtual Apps and Desktops 7 Advanced |
Schedule Exam | PEARSON VUE |
Sample Questions | Citrix 1Y0-312 Sample Questions |
Recommended Practice | Citrix Certified Professional - Virtualization (CCP-V) Practice Test |
Citrix CCP-V Syllabus:
Section | Objectives |
---|---|
Architecture Overview |
|
Determine whether the number and sizing of the Citrix StoreFront components are appropriate for a production environment. |
- StoreFront Server Redundancy - StoreFront Server Scalability |
Determine whether the number and sizing of the Citrix Gateway components are appropriate for a production environment. |
- Citrix Gateway Redundancy - Citrix Gateway Scalability |
Determine whether the number and sizing of the Citrix infrastructure components are appropriate for a production environment. |
- Citrix Delivery Controller Redundancy - Delivery Controller Scalability - Citrix Cloud Connector Redundancy - Citrix Cloud Connector Scalability Considerations - Citrix License Server Redundancy Options and Scalability - Site Database Redundancy Options - Site Database Scalability - Citrix Director Redundancy & Scalability |
Determine whether the number and sizing of machines hosting HDX sessions is meeting the needs of a production environment. |
- Determine Redundancy Requirements for Machines Running the Virtual Delivery Agent - Assess the Performance of Machines - Running the Virtual Delivery Agent - Optimizing the Performance of Windows workloads |
Manage a Virtual Apps and Desktops Environment with Multiple Locations |
|
Determine how an FMA Zone architecture can be used in an environment with multiple resource locations. |
- What are Zones? - Zones Deployment Options - FMA Zones Architecture (Deployment Example) (Hidden Slide) - Primary Zone - Satellite Zones - Reason to Create Zones - Zones with Citrix Cloud |
Determine how to configure and manage VDA Registration in a multi-zone environment. |
- VDA Registration Process and Methods Single Zone (Registration Communication Process) - Multi Zone: Registration Communication Process - Failover Registration - Moving a Catalog From One Zone to Another Zone |
Determine how to use zone preference settings. |
- Zone Preference (The default Zone Preference priority order) - Customize Zone Preference - Zone Preference (Order of Preference) |
Determine how to configure Optimal Gateway Routing in a production environment. |
- Standard Routing - Optimal Gateway Routing - Optimal Gateway Routing Configuration - Optimal Gateway Routing and Zones - StoreFront Resource Aggregation - Configure StoreFront Resource Aggregation |
Determine how to configure Subscription Store synchronization for a given scenario. |
- Subscription Store - Replicating Subscriptions between Stores in a Server Group - Replicating Subscriptions between StoreFront Server Groups - Configuring Subscription Synchronization |
Implement Backups and Disaster Recovery |
|
Determine how to perform backups of key components and data in a Citrix Virtual Apps and Desktops environment. |
- Determining backup requirements and location - StoreFront Configuration - User Data (User profiles / home folders) - Application Data - Golden Images |
Determine how to translate requirements from a disaster recovery plan into an action plan in a Citrix Virtual Apps and Desktops environment. |
- Understand Disaster Recovery Requirements - Access During a DR Event - Resources During a DR Event - Disaster Recovery and Citrix Cloud |
Determine how to fail over a Citrix Virtual Apps and Desktops environment to a disaster recovery environment, and later restore the production environment. |
- Failing Over to a DR Environment - Returning to Normal Operations |
Implement Advanced Authentication Methods |
|
Determine how one-time passwords can be used with RADIUS authentication in a Citrix Virtual Apps and Desktops environment. |
- One Time Passwords (OTP) - What is RADIUS? - Citrix Gateway and RADIUS Authentication |
Determine how to implement smart card authentication in a Citrix Virtual Apps and Desktops environment. |
- Smart Cards with Citrix Virtual Apps and Desktops - Smart Card PIN Prompts with Citrix Virtual Apps and Desktops |
Determine how to implement ADFS and SAML authentication in a Citrix Virtual Apps and Desktops environment. |
- Federated Identity Solutions Utilize - Claims-based Identity - Active Directory Federation Services (ADFS) and Security Assertion Markup Language (SAML) - Citrix and SAML/ADFS |
Improve App and Data Security |
|
Determine how to prevent jailbreak attacks by managing user assignments |
- User Assignments - Remove Undesired Windows and Citrix Functionality - Application and Web Browser Hardening - Restrict Access to Internal Tools - Application Whitelisting/Blacklisting Implementing Defense in Depth - Breaking Out of the Application (Attacker Example) |
Determine how to minimize the impact of attacks. |
- Separate Applications Based on their Security Sensitivity - Use NTFS to Isolate Applications on the Same Server - Use Citrix Analytics to Detect Attacks and Apply Mitigations - Session Recording - How Session Recording Works |
Secure Machines Running the Virtual Delivery Agent |
|
Determine how to Encrypt VDA communications with TLS and how to enhance OS security through image management. |
- Limitations for Default Deployment - Securing Internal Traffic with SecureICA Policy - Securing Internal Traffic with Secure ICA (TLS Encryption) - Secure the VDA - Harden Components by Using a Golden Image - Enable Cryptographic Checksum and Hashes on Golden Image and OS - Creating a Locked-down VM Template |
Determine how to use GPOs and Citrix Policies to lock down machines running VDAs. |
- Separate Policies for Users/Admins - Citrix Security and Control Policy Template - Citrix Policy Example (Clipboard Redirection) - Citrix Policy Guides - Using Citrix Gateway - SmartAccess and SmartControl with Citrix Virtual Apps and Desktops - Can I Use Registry Changes to Provide Further Lockdowns |
Advanced Troubleshooting |
|
Determine how to use various tools to troubleshoot a Citrix Virtual Apps and Desktops environment. |
- Citrix Director - Environment Tests - Citrix Diagnostics Toolkit - Citrix Scout - Citrix Supportability Pack - Citrix Insight Services - CDF Tracing Overview - CDF Tracing Tools - PowerShell - When and how to use resource tools. |
Determine how to use basic PowerShell commands to get information about a Citrix Virtual Apps and Desktops environment. |
- PowerShell Structure - Cmdlet Syntax - PowerShell is Citrix Virtual Apps and Desktops - Citrix Virtual Apps and Desktops Cmdlets Syntax - Using Get-Command - Using Get-Help - Using Show-Command |
Determine how to troubleshoot StoreFront issues for a given scenario. |
- Troubleshooting StoreFront - Credential Wallet - Enumeration - Subscriptions Store |
Determine how to troubleshoot Citrix Gateway issues for a given scenario. |
- Troubleshooting Citrix Gateway - Login Page Not Accessible - Unable to Authenticate through Citrix Gateway - Error Message Appears after Authenticating - Application Launch Issues through Citrix Gateway |
Determine how to validate FMA services and SQL connection health in a Citrix Virtual Apps and Desktops environment. |
- FMA Services - Central Configuration Service (CSS) - FMA Services and PowerShell - SQL Connections - Complete Connections and Communication (StoreFront Enumeration: SQL Server Site Database Query and App and Desktop Icon Enumeration) |
Determine how to troubleshoot VDA registration issues for a given scenario. |
- Troubleshooting VDA Registration - Registration Communication Process - Common Registration Failures - Troubleshooting Methods - Complete Connections and Communication |
Determine how to troubleshoot common HDX connection issues for a given scenario. |
- Troubleshooting HDX Connections - Analyzing Connection Requests - Load Management - Complete Connections and Communication (Session Launch: HDX Communication) |
App Layering and Creating the Layers |
|
Determine how App layering components communicate. |
- Architecture Diagram - Technical Overview - ELM Server (Enterprise Layer Manager (ELM)) - Configure the ELM Server - How App Layering Creates Layers (Process Flow) - How App Layering Creates a VM - The Layered Image Boot Process Flow - Citrix App Layering Management Console - App Layering Connectors |
Determine how to create an OS Layer. |
- Create an OS Layer (The Process of Preparing an Operating System) - Create an OS Layer (Enterprise Layer Manager (ELM) Preparation) - How Many OS Layers? (How many do we need to build?) |
Determine how to create a Platform Layer. |
- Create a Platform Layer (The Process) - Are Platform Layers Optional? (How many do we need to build?) |
Determine how to create an App Layer. |
- Create an App Layer (The Process) - How Many App Layers? (How many do we need to build?) - How to Update a Citrix Virtual Apps and Desktops Catalog Using Citrix App Layering? |
Determine how to create an Elastic App Layer. |
- Elastic App Layering - Elastic App Layer Use Case - How Many Elastic Layers? (How many do we need to build?) |
Determine how to create User Layers. |
- Types of User Layers - Requirements for all User Layers - Requirements for Full User Layers - User Layer Location - Considerations for Configuring Storage Locations - Configure Security Settings on User Layer Folders |
Deploy a Layered Image using Citrix Virtual Apps and Desktops |
|
Determine how to create an App Layering template. |
- Create a Template (The Process) - OS Layers - Platform Layers - App Layers - Elastic Layers - User Layers |
Determine how a Citrix Virtual Apps and Desktops image deployment changes when using Citrix App Layering. |
- Citrix Virtual Apps and Desktops Approach without App Layering - Citrix Virtual Apps and Desktops Approach with App Layering - Installing the Virtual Delivery Agent (Preparing the Eventual Layered Image for MCS) - Using App Layering with MCS |
Explore Layer Priority and Maintain an App Layering Environment |
|
Determine how layer priority affects the composition of layered images. |
- Layer Priority - How does Layer Priority Affect the Boot Process? - How does Layer Priority Work? - Layer Priority Change Scenario |
Determine how to update different types of layers. |
- Updating Layers - Layer Update - Layer Deletion |
Determine how to maintain and update the App Layering environment. |
- ELM Server Coordination and Management - ELM Backup Server - ELM Multi-Location - Creating Backups for Layers - ELM Server Periodic Updates - Updating the ELM Server |
Determine additional App Layering considerations and how to locate additional information as needed. |
- Layering Anti-Virus - Layering Microsoft Office - Layering Microsoft Office 365 |
Workspace Environment Management (WEM) Administration |
|
Determine how to deploy the components of a Workspace Environment Management (WEM) solution. |
- What is Workspace Environment Management (WEM)? - WEM Technical Components Overview (On-premises) - WEM Technical Components Overview (Citrix Cloud Service) - Infrastructure Services (The Role) - WEM Initial Installation - The WEM Administration Console - The WEM Agent - The WEM Agent (Processing Cache) - SQL Server Database - Active Directory |
Determine how to perform general administration of WEM in a given scenario. |
- Configuration Set - Configuration Set vs. User Settings - User Statistics vs. Agent Statistics - Delegating Administration - Administrator Permissions Monitoring |
Use WEM to Centralize Environment Management, Optimize Performance and Secure Environments |
|
Determine how to manage user resources with WEM in a given scenario. |
- Adding Users and Machines to WEM - Actions - Filters - Conditions - Assignments |
Determine how to manage user profiles using WEM in a given scenario. |
- Citrix Profile Management - Citrix Profile Management Health Status |
Determine how to use various WEM Transformer features in a given scenario. |
- Transformer Settings - General Settings - Advanced Settings - Advanced and Administration Settings - Logon/Logoff & Power Settings |
Determine how user logon times are optimized using WEM. |
- Login Time Scenario - Without WEM - Login Time Scenario - With WEM |
Determine how to use WEM to increase the security of a Citrix Virtual Apps and Desktops environment. |
- Use WEM to Enforce Security on the Machine Running the VDA - Application Security - Process Management - Environmental Settings |
Migrate and Upgrade WEM |
|
Determine how to migrate user environment management to WEM in a given scenario. |
- To Make the Move Process - Common Features to Move - Migrating from On-Premises WEM to the WEM Citrix Cloud Service |
Determine how to upgrade a WEM deployment in a given scenario. |
- WEM Component Upgrade Order
|
Determine how to implement redundancy in a WEM deployment. |
- Implement Multiple WEM Brokers - Load Balance Multiple WEM Brokers - Multi-Datacenter Architecture Options |
Recommended Knowledge and Skills for 1Y0-312:
Item | Description |
---|---|
Knowledge of how the following Windows components integrate with Citrix technologies:
|
- Active Directory Domain Services - Active Directory Certificate Services - Domain Name System (DNS) - Dynamic Host Configuration Protocol (DHCP) - Group Policy Objects (GPOs) - NTFS Permissions - Windows Authentication and Authorization - Knowledge of IIS - Roles and features of Windows Server 2016 |
Knowledge of Microsoft Windows Operating Systems |
- Windows 10 - Windows Server 2016 |
Knowledge of SQL 2012 R2 and newer | - Knowledge of SQL clustering and mirroring |
General networking skills (i.e. IP Address assignment/Subnets/VLANs) | |
Knowledge of hypervisors
|
|
Knowledge of shared storage configuration and management | |
Knowledge of Microsoft licensing |
Recommended Product Experience for 1Y0-312:
Item |
---|
- Citrix Virtual Apps and Desktops 7 Build 1912 LTSR |
- Citrix App Layering |
- StoreFront Build 1912 LTSR |
- Workspace Environment Management Build 1912 |
- Citrix Gateway |
- Citrix ADC |
- Citrix Federated Authentication Service Build 1912 LTSR |
- Machine Creation Services |
- User Profile Management |
Time Limit:
Type of Candidate | Time Limits* | Notes |
---|---|---|
Native English speakers | 90 minutes | |
Non-native English speakers that take the exam in countries where English is a foreign language
|
90 minutes + 30 minutes (time extension)
|
Time extension granted automatically |
Non-native English speakers that take the exam in countries where English is NOT a foreign language
|
90 minutes + 30 minutes (time extension)
|
Must request time extension from Citrix.
|