Scenario: A Citrix Engineer needs to ensure that the flow of traffic to a web application does NOT overwhelm the server. After thorough testing, the engineer determines that the application can handle a maximum of 3,000 requests per minute. The engineer builds a limit identifier, rl_maxrequests, to enforce this limitation.
Which advanced expression can the engineer write in the Responder policy to invoke rate limiting?
Correct Answer:
B
Which protection is applied on a server response from a protected application?
Correct Answer:
D
A Citrix Engineer is reviewing the log files for a sensitive web application and notices that someone accessed the application using the engineer’s credentials while the engineer was out of the office for an extended period of time.
Which production can the engineer implement to protect against this vulnerability?
Correct Answer:
D
Which Front End Optimization technique causes the Citrix ADC to resize images before sending them to the client?
Correct Answer:
B
Scenario: A Citrix Engineer is reviewing the Citrix Web App Firewall log files using the GUI. Upon further analysis, the engineer notices that legitimate application traffic is being blocked.
What can the engineer do to allow the traffic to pass through while maintaining security?
Correct Answer:
D