1Y0-341 Exam Question 76

Scenario: A Citrix Engineer is asked to implement multi-factor authentication for Citrix Gateway. The engineer creates the authentication policies and binds the policies to the appropriate bind points. The engineer creates a custom form using Notepad++ to format the page which will capture the user's credentials.
To which folder on the Citrix ADC will the engineer need to upload this form?
  • 1Y0-341 Exam Question 77

    Scenario: A Citrix Engineer needs to ensure that the flow of traffic to a web application does NOT overwhelm the server. After thorough testing, the engineer determines that the application can handle a maximum of 3,000 requests per minute. The engineer builds a limit identifier, rl_maxrequests, to enforce this limitation.
    Which advanced expression can the engineer write in the Responder policy to invoke rate limiting?
  • 1Y0-341 Exam Question 78

    An attacker inserting a malicious code that compromises the trust relationship between users and a web application is an example of a (n) _____ attack. (Choose the correct option to complete the sentence.)
  • 1Y0-341 Exam Question 79

    A review of purchases made at an online retailer shows that several orders were processed for items at an unpublished price.
    Which protection can a Citrix Engineer implement to prevent a site visitor from modifying the unit price of a product on the shopping cart page?
  • 1Y0-341 Exam Question 80

    A Citrix Engineer needs to implement Application Firewall to prevent the following tampering and vulnerabilities:
    - If web server does NOT send a field to the user, the check should NOT allow the user to add that field and return data in the field.
    - If a field is a read-only or hidden field, the check verifies that data has NOT changed.
    - If a field is a list box or radio button field, the check verifies that data in the response corresponds to one of the values in that field.
    Which security check can the engineer enable to meet this requirement?