Why should memory and network utilization be used to identify bottlenecks?
A. Excessive memory and network utilization will slow the creation of new sessions.
B. Excessive memory and network utilization on the data collector will slow down Web Interface authentication.
C. Excessive memory and network utilization on the data collector will slow down application enumeration.
D. Excessive memory and network utilization on the XenApp server will affect the local host cache.
Scenario: The company needs to ensure that the provisioning traffic does NOT interfere with the exisiting PXE solution. The Provisioning Services servers will be connected to a 10 Gbps network. How does using a dedicated switch help the company secure streaming traffic?
A. Dedicated VLANs ensure streaming traffic is NOT visible to other VLANs in the datacenter.
B. Dedicated switches enable streaming traffic to be encrypted with IPsec.
C. Dedicated switches allow the necessary TCP offload settings to be configured on the streaming NIC.
D. Dedicated switches enable isolation of Spanning Tree instances.
Users must be able to connect remotely from their own mobile devices. What should the architect consider to increase the security of the current authentication solution?
A. Adding a second authentication factor
B. Placing domain controllers in the DMZ for remote users
C. Shortening the Active Directory password expiration period
D. Populating the RDS user profile path in the Active Directory user accounts