Which DNS rate-limiting command sequence correctly configures a threshold of 1,000 per second and enables it globally?

Prepare for the Citrix ADC 1Y0-241 exam. Study with multiple choice questions, hints, and detailed explanations to enhance your traffic management skills. Boost your readiness for the certification!

Multiple Choice

Which DNS rate-limiting command sequence correctly configures a threshold of 1,000 per second and enables it globally?

Explanation:
Configuring DNS rate limiting follows a flow: target the DNS traffic, define the rate limit with a time window, enforce it via a policy, and apply it globally. The sequence shown creates a stream selector for DNS traffic, then defines a limit identifier with a threshold and a time window linked to that selector. It then creates a DNS policy that enforces the limit using the correct function call sys.check_limit("DNSLimitIdentifier1"). Finally, it binds that policy globally with a priority, so the rule applies to all DNS traffic across the appliance. This combination—targeting DNS, applying a limit with a defined timeSlice, enforcing with the proper check_limit syntax, and a global binding—is the complete, correct approach for global DNS rate limiting. If you need 1,000 DNS requests per second, you would set the threshold to 1000 with a timeSlice of 1000 milliseconds, but the essential sequence—the selector, the limit identifier, the policy referencing the limit, and the global bind with a priority—remains the right pattern. The other options miss one or more of these pieces: they either don’t correctly reference the limiter, don’t target DNS traffic, or don’t perform the global binding.

Configuring DNS rate limiting follows a flow: target the DNS traffic, define the rate limit with a time window, enforce it via a policy, and apply it globally. The sequence shown creates a stream selector for DNS traffic, then defines a limit identifier with a threshold and a time window linked to that selector. It then creates a DNS policy that enforces the limit using the correct function call sys.check_limit("DNSLimitIdentifier1"). Finally, it binds that policy globally with a priority, so the rule applies to all DNS traffic across the appliance. This combination—targeting DNS, applying a limit with a defined timeSlice, enforcing with the proper check_limit syntax, and a global binding—is the complete, correct approach for global DNS rate limiting.

If you need 1,000 DNS requests per second, you would set the threshold to 1000 with a timeSlice of 1000 milliseconds, but the essential sequence—the selector, the limit identifier, the policy referencing the limit, and the global bind with a priority—remains the right pattern. The other options miss one or more of these pieces: they either don’t correctly reference the limiter, don’t target DNS traffic, or don’t perform the global binding.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy