Symantec Exam Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ]

Similar documents
Vendor: Symantec. Exam Code: Exam Name: Administration of Altiris Client Management Suite 7.1.

ExamPrepAway. Latest Exam Guide & Learning Materials

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

ACCURATE STUDY GUIDES, HIGH PASSING RATE! Question & Answer. Dump Step. provides update free of charge in one year!

Exam : ST Title : Altiris Client Management Suite 7.0 (STS) Version : Demo

: Administration of Symantec IT Management Suite 8.0 SCS Exam. Study Guide v. 1.0

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Administering System Center 2012 Configuration Manager

Administration of Altiris Client Management Suite 7.0 Study Guide

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Altiris Client Management Suite 7.1 from Symantec User Guide

10747D: Administering System Center 2012 Configuration Manager

"Charting the Course to Your Success!" MOC D Administering System Center 2012 Configuration Manager. Course Summary

Symantec Server Management Suite 8.5 powered by Altiris technology Release Notes

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Administrering System Center 2012 Configuration Manager vd

Administering System Center 2012 Configuration Manager

Altiris IT Management Suite 7.1 from Symantec Enhanced Console Views Getting Started Guide. Version 7.1

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Administering System Center Configuration Manager

Symantec IT Management Suite 7.5 powered by Altiris technology Planning for Implementation Guide

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager

Administering System Center Configuration Manager ( A)

Altiris Software Management Solution 7.1 from Symantec User Guide

A: Administering System Center Configuration Manager

10.4 infinity Release Notes

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Administering System Center Configuration Manager

Altiris Deployment Solution 7.1 SP1a MR1 from Symantec User Guide

Altiris IT Management Suite 7.1 SP1 from Symantec Planning and Implementation Guide

Table of Contents Release Notes 2013/03/25. Introduction in OS Deployment Manager. in Security Manager System Requirements

EML10 Best Practces for Implementing Deployment Solution Hands-On Lab

Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP1a

Altiris Client Management Suite 7.1 from Symantec User Guide for Mac Management

Microsoft Administering System Center Configuration Manager

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

Administering System Center Configuration Manager

WhatsConnected v3.5 User Guide

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

BMC Remedyforce Discovery and Client Management. Frequently asked questions

Administer System Center Configuration Manager for Desktop Support

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Freshservice Discovery Probe User Guide

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Risk Intelligence. Quick Start Guide - Data Breach Risk

Administering System Center Configuration Manager ( )

TECHNICAL DESCRIPTION

Q A F 2.2 ger A n A m client dell dell client manager 2.2 FAQ

Patch Management using Dell Management Console v1.0

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

ALTIRIS Software State Management

: Administration of Symantec Endpoint Protection 14 Exam

: 20696C: Administering System Center Configuration Manager and Intune

INFOBrief. Dell OpenManage Client Administrator 3.0. Key Points

A: Administering System Center Configuration Manager

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Sophos Enterprise Console Help. Product version: 5.3

ACCURATE STUDY GUIDES, HIGH PASSING RATE! Question & Answer. Dump Step. provides update free of charge in one year!

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

ForeScout Extended Module for Symantec Endpoint Protection

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

DEPLOYMENT WHITE PAPER.

PassReview. PassReview - IT Certification Exams Pass Review

Administering System Center Configuration Manager

Scalability and Performance of Dell EMC OpenManage Essentials (OME) Version 2.3

Dell Client Manager 2.0 FAQ

PowerShell for System Center Configuration Manager Administrators

ZENworks 2017 What s New Reference. December 2016

Symantec Endpoint Protection Family Feature Comparison

Demo Lab Guide OpenManage Essentials

Intel Active Management Technology Overview

Administering System Center Configuration Manager and Intune

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

May 2016 If you have questions regarding a particular customer situation, please reach out to DL-SYMC- Encryption-Ask-PM for guidance.

Security Challenges: Integrating Apple Computers into Windows Environments

Citrix Exam 1Y0-200 Managing Citrix XenDesktop 7 Solutions Exam Version: 6.5 [ Total Questions: 121 ]

Administering System Center 2012 Configuration Manager (10747D)

Symantec System Recovery 2011 Management Solution Technical FAQ

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541

Inviso SA. Step-by-Step Guide DATE: NOVEMBER 21, 2017

ObserveIT 7.1 Release Notes

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Administering System Center Configuration Manager and Intune

ForeScout Extended Module for ServiceNow

M20696 Administering System Center Configuration Manager and Intune

Symantec Ghost Solution Suite Web Console - Getting Started Guide

IBM IBM Tivoli Endpoint Manager V8.1 Implementation.

What s New. New and Enhanced Features in NetSupport DNA v4. Welcome Dashboard. Auto Discovery. Platform Support

for businesses with more than 25 seats

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)

NE Administering System Center Configuration Manager and Intune

Comodo IT and Security Manager Software Version 6.9

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Symantec Deployment Solution 8.0 powered by Altiris technology User Guide

Symantec Endpoint Protection Installation Guide

Transcription:

s@lm@n Symantec Exam 250-402 Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ]

Question No : 1 What are two prerequisites for installing and configuring IT Analytics? (Select two.) A. Microsoft Reporting and Analysis Services B. Adobe Flash C. Microsoft SQL Server 2005 Datamining Viewer Controls D. Microsoft Office Web Components 11 (2003) E. Microsoft Silverlight Answer: A,D Question No : 2 What are two prerequisites for installing Out-of-Band Management? (Select two.) A. SQL Server configured in mixed authentication mode B. SQL Server configured in Windows authentication mode C. Symantec Management Platform D. SQL Analysis Service installed E. SSL/TLS Answer: A,C Question No : 3 An administrator receives notification of a new vulnerability threat from Symantec Deepsight Alert Services. The alert includes the name of an executable that should be prevented from running. Which policy should the administrator configure? A. Malware Blocking policy B. Application Metering policy C. Custom Inventory policy D. Software Inventory policy Answer: A Question No : 4 2

The IT Security department wants to prevent all versions of a particular file sharing application from running on company computers. Where must the software resource be defined before it can be prevented from running? A. Software Inventory scan B. Software Catalog C. Software Library D. Software Update policy Answer: D Question No : 5 A system administrator is testing the delivery of an application. During deployment, the administrator determines that the install path of an MSI needed to be changed without modifying the MSI. The administrator needs to change the command line parameters of the install package. Which policies would be affected when the default install command line of a software package is modified in the Software Catalog? A. policies that are assigned to a non-managed computer B. policies that leverage Software Discovery C. policies currently referencing the modified entry D. policies referencing staged software updates Answer: C Question No : 6 An administrator is reviewing software resources in the software catalog. There is a duplicate for a software resource. The administrator has initiated the Resolve Duplicate Software Resources Wizard and selected the option to merge duplicate resources. What will happen to the duplicate entries in the Software Catalog? A. It creates a new software resource with the information from both entries and keeps the duplicates. B. It updates the original software resource with both unique identifiers and the duplicate isdeleted. C. It creates a new software resource with the information from both entries and the entry with the newest timestamp isdeleted. 3

D. It updates the original software resources with the information from both entries and the entry with the oldest timestamp isdeleted. Question No : 7 When manually creating an entry within the Software Catalog, the administrator needs the Managed Delivery policy to verify that prerequisite software is installed before deploying a new application. What should the administrator use to execute a prerequisite check? A. Detection Rule B. Applicability Rule C. Basic Inventory D. Software Filter Question No : 8 A system administrator discovers that an unauthorized piece of software called "Solitaire 2099" has been installed on company desktops. The software installs a browser toolbar that prevents the use of the company standard browser toolbar and needs to be removed immediately. The administrator has also been instructed to identify all users that are playing the game so that they can receive a private email about the situation. Which two capabilities of Inventory Solution will help the administrator? (Select two.) A. Inventory Solution provides data about the number of installed instances of an application.b.inventory Solution automatically associates software titles to users. B. Inventory Solution automatically determines unauthorized software titles. C. Inventory Solution tracks how often an application isexecuted. D. Inventory Solution identifies harmful applications stored on local hard drives. Answer: A,D Question No : 9 A system administrator deployed the Inventory Solution Agent Plug-in to 15,000 endpoints 4

across a company. Subsequently, the administrator realizes that the performance of the Notification Server is slower during the inventory scan times. Which two actions can be taken within Inventory Solution to reduce the processing impact on the Notification Server during these times? (Select two.) A. Create multiple policies on different schedules for subsets of computers. B. Create a custom weekly schedule instead of using the default weeklyschedule. C. Enable the priority setting in the advanced settings of the inventory task. D. Use the AeXRunControl.exe program to randomize the collection of inventory. E. Use the throttling setting in the advanced settings of the inventory task. Answer: A,E Question No : 10 After customizing the preboot configuration files, previously created configurations need to be updated. Each file is highlighted and then the option to rebuild them is selected. After all items have been updated, the "Save" button on the policy is selected to ensure all changes are stored in the database. However, after several hours or even a day, the configuration files on the PXE servers maintain an old date instead of the new date. Why do the PXE servers have the old date? A. The PXE servers are missing from the policy assigned to the preboot configurations because several policies were modified at the sametime. B. SBS Services must first be restarted to accept new policy changes from the server even though the agent has received the policy. C. The PXE Server configuration policy must also be updated at the same time as the preboot configurations. D. The preboot configuration policy changes are already saved and have been lost due to saving the policy again. Answer: D Question No : 11 A software was virtualized during a Managed Software Delivery installation. Which method must be used to manage the layer? A. Virtual Composer task 5

B. Software Virtualization Command task C. Package Delivery task D. Quick Delivery task Question No : 12 An administrator needs to use the Deployment Solution task listed below in a job that will be used to capture an image of a computer running Windows XP. Prepare for Image capture. Which two configuration steps must be completed before the task can be created? (Select two.) A. enable PXE B. create a system configuration C. create a sysprep token D. upload the applicable deploy.cab file E. add an OS license key Answer: D,E Question No : 13 A group of computers are received from a computer manufacturer with a list of corresponding MAC addresses. To facilitate the imaging of the computers, the list is modified and then imported to Deployment Solution, creating new computer accounts. In a lab, all computers are started and booted into WinPE automation. In the console, a job is assigned to each computer appropriate to its hardware; but the computers never get the tasks or run the jobs. What is a likely reason for this behavior? A. The number of concurrent tasks assigned for imaging is overwhelming the SQL server. B. The computer records in the database are missing necessary key information to properly identify the computers. C. The network addresses assigned to the computers in the lab are outside the SBS configured ranges. D. New computers must first check in and be given a GUID in the console before being assigned a name and corresponding jobs or tasks. 6

Question No : 14 A patch administrator is preparing to deploy new patches. The administrator needs to avoid applying Microsoft updates to the wrong operating systems. How should the administrator deploy the patches? A. by creating a Software Update policy to distribute the updates B. by configuring the Import Patch Data for Microsoft task and only including applicable updates C. by staging the update for each operating system in the test environment D. by only applying updates to the Target with applicable computers when creating a Software Update policy Answer: A Question No : 15 Which two products are included in Altiris Client Management Suite 7.1? (Select two.) A. Service Desk B. CMDB Solution C. pcanywhere D. Wise Package Studio Professional E. Deployment Solution Answer: C,E Question No : 16 Which two technologies are supported on Intel hardware when using Out-of-Band Management? (Select two.) A. AMT B. WMI C. ICMP 7

D. SNMP E. ASF Answer: A,E Question No : 17 Which limitations are placed on software information collected using a Standalone Inventory task on an unmanaged 64-bit computer? A. Because the Standalone package lacks native 64-bit support, only 32-bit programs arereported. B. References to the Software Catalog are missing for the unmanaged computer. C. Any patches staged in Patch Management are removed from the inventory results for the computer. D. License information is limited to Microsoft products only. Question No : 18 Which two operating systems can be managed using pc Anywhere? (Select two.) A. Linux B. ios C. Android D. Mac E. Unix Answer: A,D Question No : 19 Which protocol needs to be configured when using Real-Time System Manager to update a user's password? A. ASF 8

B. WMI C. AMT D. WS-MAN Question No : 20 Which tool can an administrator use to view the results of a Microsoft Vulnerability scan for a specific computer? A. Windows Application Log B. Resource Manager C. Report Builder D. Altiris Log Viewer Question No : 21 An administrator needs to create an image that can be used for a mass deployment in the company. Which Deployment Solution task should be run before creating the image? A. Run SIDGen to prepare the image for deployment B. Run Prepare for Image Capture task before cloning C. Run CapturePersonality task before cloning D. Run Deploy Sysprep task before cloning Question No : 22 What is a benefit of using the Software Library? A. It offers a single, virtual location of multiple physical locations for simple access and management of software packages. B. It offers a single, physical location on the network where all software packages are 9

stored for distribution. C. It offers a single, physical location where end-users can access software to be installed to their local system. D. It offers a single, virtual location where applications can be installed as virtual layers for a scheduled, limited timeperiod. Question No : 23 Which two security roles allow for Create and Import software resources in Software Management Solution 7.1 by default? (Select two.) A. Symantec Software Librarian B. Symantec Supervisors C. Symantec Level 2 Workers D. Symantec Administrators E. Software Portal Administrators Answer: A,D Question No : 24 A system administrator created a Software Portal entry that allows any user in the company to install a specific program. For licensing purposes, the administrator needs to determine which computers have the software. Which report can be used to track which computers have the software in question? A. the Audit Software Search report B. the Add or Remove Program Search report C. the Software Compliance Summary report D. the Installed Software report Answer: D Question No : 25 Which two are required for full use of the Symantec Management Console? (Select two.) 10