1Y0-341 Exam Question 46
A Citrix Engineer is reviewing the log files for a sensitive web application and notices that someone accessed the application using the engineer's credentials while the engineer was out of the office for an extended period of time.
Which production can the engineer implement to protect against this vulnerability?
Which production can the engineer implement to protect against this vulnerability?
1Y0-341 Exam Question 47
A Citrix Engineer needs to configure Relaxation Rules using the learned data for SQL Injection. Which setting can the engineer enable in order to avoid false-positive learned rules?
1Y0-341 Exam Question 48
A Citrix Engineer observes that the servers hosting a critical application are crashing on a regular basis. Which protection could the engineer implement on a Citrix Web App Firewall in front of the application?
1Y0-341 Exam Question 49
Which protocol does NetScaler Management and Analytics System (NMAS) use when Discovery is run to locate instances?
1Y0-341 Exam Question 50
A Citrix Engineer has configured SQL Injection security check to block all special characters. Which two requests will be blocked after enabling this check? (Choose two.)