A Citrix Engineer is reviewing the log files for a sensitive web application and notices that someone accessed the application using the engineer’s credentials while the engineer was out of the office for an extended period of time.
Which production can the engineer implement to protect against this vulnerability?
Correct Answer:
D
What is required for Implementing to the Citrix Application Delivery Management (ADM) Service?
Correct Answer:
B