1Y0-341 Exam Question 106
Scenario: A Citrix Engineer wants to use Citrix Application Delivery Management (ADM) to monitor a single Citrix ADC VPX with eight web applications and one Citrix Gateway. It is important that the collected data be protected.
Which deployment will satisfy the requirements?
Which deployment will satisfy the requirements?
1Y0-341 Exam Question 107
Scenario: During application troubleshooting, a Citrix Engineer notices that response traffic received from a protected web application is NOT matching what the web server is sending out. The auditor is concerned that Man-In-The-Middle attack is in progress.
Which action is the Citrix Web App Firewall performing that would trigger this false positive?
Which action is the Citrix Web App Firewall performing that would trigger this false positive?
1Y0-341 Exam Question 108
Which protection is applied on a server response from a protected application?
1Y0-341 Exam Question 109
Which two protections ensure that the correct data is returned by the client? (Choose two.)
1Y0-341 Exam Question 110
Scenario: A Web Application Developer asked a Citrix Engineer to implement Citrix Web App Firewall protections. To provide consistency in branding, the developer asked that the web server provide a custom message when a violation occurs. Which profile setting does the engineer need to configure to provide the custom message?