O'Reilly logo

The Real Citrix CCA Exam Preparation Kit by Shawn Tooley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1 What type of encryption methodology is used for session encryption with SecureICA?
A Asymmetric
B Public key
C Private key
D Proprietary
Correct Answer & Explanation: C. SecureICA uses a private key methodology for encryption. A key exchange is done at session initialization, so that the proper key is passed to the client.
Incorrect Answers & Explanations: A, B, and D. Answer A is incorrect because asymmetric encryption uses a public key methodology. Answer B is incorrect because a public key system is one in which a public key is used in conjunction with a private key. Answer D is incorrect because the public key methodology used is an industry standard.
2 What level of ICA encryption is generally used with ICA sessions?
A RC5 (128-bit) logon only ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required