Which action ensures that content is retrieved from the server of origin?
A. CACHE
B. MAY_CACHE
C. NOCACHE
D. MAY_NOCACHE
Scenario: A Citrix Engineer configures Citrix Web App Firewall to protect an application. Users report that they are NOT able to log on. The engineer enables a Start URL relaxation for the path //login.aspx.
What is the effect of the Start URL relaxation on the application?
A. Access to the path /login.aspx is unblocked.
B. Access to the path /login.aspx is blocked.
C. External users are blocked from the path /login.aspx. Internal users are permitted to the path / login.aspx.
D. Non-administrative users are blocked from the path /login.aspx Administrative users are permitted to the path /login.aspx.
Scenario: A Citrix Engineer is monitoring the environment with Citrix Application Delivery Management (ADM). Management has asked for a report of high-risk traffic to protected internal websites.
Which dashboard can the engineer use to generate the requested report?
A. App Security
B. Transactions
C. Users and Endpoints
D. App
Scenario: A Citrix Engineer is asked to help improve the performance of a web application. After capturing and analyzing a typical session, the engineer notices a large number of user requests for the stock price of the company.
Which action can the engineer take to improve web application performance for the stock quote?
A. Enable the Combine CSS optimization.
B. Create a static content group.
C. Create a dynamic content group.
D. Enable the Minify JavaScript optimization.
Which Citrix Web App Firewall profile setting can a Citrix Engineer implement to remove non-essential content from web files to improve response time?
A. Strip HTML Comments
B. Exclude Uploaded Files from Security Checks
C. Enable Form Tagging
D. Exempt Closure URLs from Security Checks
Which feature of Citrix Web App Firewall builds rules from known good traffic?
A. Sessionization
B. App Expert
C. Adaptive learning engineer
D. SNORT signatures
A Citrix Engineer needs to create a configuration job to clone a configuration from an existing Citrix ADC to a new Citrix ADC.
Which configuration source can the engineer use to accomplish this?
A. Master Configuration
B. Inbuilt Template
C. Instance
D. Configuration Template
Which data populates the Events Dashboard?
A. Syslog messages
B. SNMP trap messages
C. API calls
D. AppFlow IPFIX records
Which protection is applied on a server response from a protected application?
A. Cross-Site Request Forgeries (CSRF)
B. Form Field Consistency
C. HTML Cross-Site Scripting (XSS) D. Safe Object
Statistics for which three types of violations are presented on the App Security Dashboard? (Choose three.)
A. Web App Firewall protection
B. IP Reputation
C. SSL Enterprise Policy
D. Signature
E. AAA