Scenario: A Citrix Engineer reviews the log files for a business-critical web application. The engineer notices a series of attempts to directly access a file, /etc/passwd.
Which feature can the engineer implement to protect the application against this attack?
Scenario: A Citrix Engineer has configured Citrix Application Delivery Management (ADM) to monitor applications presented by Citrix ADC appliances. When reviewing the App Security Dashboard, the engineer finds no data.
What must the engineer do to ensure data is being collected from the applications?
A Citrix Engineer for an online retailer wants to ensure that customer address information is NOT stolen. Which protection can the engineer implement to prevent this?
Which feature of Citrix Web App Firewall builds rules from known good traffic?
A Citrix Engineer is notified that no traffic is reaching the protected web application. While investigating, the engineer notices that the Citrix Web App Firewall policy has 516,72 hits. What should the engineer check next?