In an environment which requires secure user access, a Citrix Administrator configures Authentication, Authorization and Auditing (AAA) to redirect a user to the logon page.
Which four steps are required to complete the authentication process? (Choose four.)
A. Configure a syslog server to capture invalid logon attempts?
B. Verify that the user is authorized to access specific intranet content
C. Collect the user’s credentials to cache them in a directory that is accessible through LDAP
D. Log the user accesses, including invalid login attempts, in an audit log
E. Create a load-balancing virtual server to redirect for secure access
F. Maintain a session timeout, after which users must authenticate again to regain access to the intranet
G. Apply specified two-factor authentication method
B. Verify that the user is authorized to access specific intranet content
C. Collect the user’s credentials to cache them in a directory that is accessible through LDAP
D. Log the user accesses, including invalid login attempts, in an audit log
F. Maintain a session timeout, after which users must authenticate again to regain access to the intranet
https://docs.citrix.com/en-us/citrix-adc/12-1/aaa-tm/ns-aaa-how-it-works-con.html