Which two options would provide an end-to-end encryption of data, while allowing the Citrix ADC to optimize the responses? (Choose two.)
Which two options would provide an end-to-end encryption of data, while allowing the Citrix ADC to optimize the responses? (Choose two.)
To provide end-to-end encryption of data, the SSL protocol should be used for both the services and the virtual server. Using SSL for the services ensures that the data transmitted between the client and the Citrix ADC is encrypted, while using SSL for the virtual server ensures that the data transmitted between the Citrix ADC and the backend server is also encrypted. This setup allows the Citrix ADC to perform optimizations and ensure data security throughout the entire transmission path.
E y F ? https://docs.citrix.com/en-us/netscaler/12/ssl/end-to-end-encrypt.html
I would say the same.. E and F : https://docs.citrix.com/en-us/citrix-adc/current-release/ssl/how-to-articles/end-to-end-encrypt.html
Asnwer is E&F https://docs.citrix.com/en-us/citrix-adc/current-release/ssl/how-to-articles/end-to-end-encrypt.html
E and F in my opinion
How can C be correct as HTTP does not encrypt data. E & F is the correct answer.
An SSL bridge configured on the Citrix ADC appliance enables the appliance to bridge all secure traffic between the SSL client and the SSL server. The appliance does not perform offloading, encryption or decryption, or accelerating the bridged traffic. Only load balancing is done by the appliance. The SSL server must handle all SSL-related processing. Features such as content switching and cache redirection do not work, because the traffic passing through the appliance is encrypted. Because the appliance does not carry out any SSL processing in an SSL bridging setup, there is no need for SSL certificates. Citrix recommends that you use this configuration only if an acceleration unit (for example, a PCI-based SSL accelerator card) is installed in the web server to handle the SSL processing overhead. Looks to me it should be E&F
A and B in my opinion: An SSL bridge configured on the Citrix ADC appliance enables the appliance to bridge all secure traffic between the SSL client and the SSL server. The appliance does not perform offloading, encryption or decryption, or accelerating the bridged traffic. Only load balancing is done by the appliance. The SSL server must handle all SSL-related processing enable ns feature SSL LB add server s1 192.0.2.100 add server s2 192.0.2.200 add service src1 s1 SSL_BRIDGE 443 add service src2 s2 SSL_BRIDGE 443 add lb vserver ssl_bridge_vip SSL_BRIDGE 203.0.113.10 443 bind lb vserver ssl_bridge_vip src1 bind lb vserver ssl_bridge_vip src2
It would have to be E. (beyond the bridging) F would be doing SSL offloading at the Netscaler VIP, but not necessarily re-encrypting traffic to the backend.