최신 CCA 1Y0-A28 무료샘플문제:
1. Scenario: A company has three HTTP servers that are load balanced using NetScaler. When users connect to the HTTP application they often receive inconsistent data or are advised that they need to log on again. Which step should the engineer take to correct this?
A) Configure persistence with appropriate timeouts.
B) Change the global TCP Client Idle Time-Out value.
C) Remove Down State Flush.
D) Change the idle timeout value for the service.
2. Scenario: When the NetScaler was set up, compression was enabled. The network
engineer would like to disable compression ONLY for a particular virtual server.
How could the engineer accomplish this?
A) Uncheck Compression in the system basic features.
B) Create a policy with a NOCOMPRESS action, bound the virtual server Compression (request) point.
C) Disable compression on the services or service groups bound to the virtual server.
D) Create a policy with a NOCOMPRESS action, bound to the global request point.
3. Scenario: A network engineer has bound four policies to an HTTP virtual server as follows:
PolicyA is bound with a priority of 10 and has the following expression:
REQ.IP.SOURCEIP == 10.10.10.0 PolicyB is bound with a priority of 15 and has the following expression: REQ.IP.SOURCEIP != 10.10.11.0 PolicyC is bound with a priority of 20 and has the
following expression: REQ.IP.SOURCEIP == 10.10.12.0 PolicyD is bound with a priority of 25 and has the following expression: REQ.IP.SOURCEIP != 10.10.13.0 When a connection is made from a PC with an IP address of 10.10.12.15, which policy will be applied?
A) PolicyA
B) PolicyB
C) PolicyD
D) PolicyC
4. Scenario: The network engineer is unable to access a specific SSL site through the NetScaler. While reviewing traces on the NetScaler, the network engineer noticed "Handshake" failures from the server. These handshake failures could be the result of the virtual server . (Choose the correct option to complete the sentence.)
A) only allowing TLS
B) not allowing SSLv3
C) not allowing correct ciphers
D) configured to demand client authentication
5. Which step could a network engineer take to prevent brute force logon attacks?
A) Configure the Access Gateway Policies.
B) Enable the AAA Application feature.
C) Configure the Cache redirection Policies.
D) Enable the Rate Limiting feature.
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: C | 질문 # 3 정답: B | 질문 # 4 정답: C | 질문 # 5 정답: D |