A system administrator is working in the Software view and notices that the corporate applications from the
application share are missing under newly discovered software.
What could be the reason for this?
A. There are duplicate entries in the Software Catalog.
B. Discovery needs to be configured for the shared location.
C. The Software Library needs to be configured to import from that location.
D. The Software Discovery policy isdisabled.
An inventory policy is set to run once at 17:00 Wednesday and is present on all computers. A user interrupts the inventory by shutting down a computer right after 17:00 and turns it back on at 08:00 the next morning. When does the inventory run?
A. Thursday morning at 08:00
B. next Wednesday evening at 17:00
C. Thursday evening at 17:00
D. never
A system administrator sets up a Software Inventory policy to run every Monday between
08:00
and 10:00. After the policy has taken effect, users report that their computers are running slowly during the inventory scans. Which setting will reduce the effect of the inventory scan on users' computers?
A.
Modify the Send Inventory Change (Deltas) Only option.
B.
Modify the System Resource Usage option.
C.
Modify the Throttle Inventory Reporting option.
D.
Modify the policy to run between 08:00 and 14:00.
A system administrator needs to quickly deploy Windows 7 to several new computers without preconfigured operating systems. The administrator decides to use an existing Ghost image since the necessary drivers have already been added to the DeployAnywhere database. The PXE Configuration is set to respond only to known computers. How should the administrator proceed?
A. Use Ghost Solution Suite to distribute the image as the computers boot to the network.
B. Import the list of new computers into the Management Console and assign an imaging task.
C. Deploy an Automation Folder to the new computers to prepare them for imaging.
D. Configure PXE to respond to a known list of MAC addresses and deploy the images only to the new systems.
A company is planning an In-Place Migration to Windows 7. They use PC Transplant to migrate the personality. Which option will help reduce the network traffic when restoring the image?
A. use File Preservation
B. use a higher compression
C. use unicast
D. deploy the OS without applications
Which default Standard Inventory policy is enabled to run when Inventory Solution is first installed?
A. Collect Full Inventory
B. Collect Hardware Inventory
C. Collect Custom Inventory
D. Collect Software Inventory
Which protocol should be configured in the connection profile when remotely managing an Intel vPro enabled system?
A. AMT
B. WS-MAN
C. SCS
D. SNMP
A system administrator is deploying the pcAnywhere plug-in to a managed computer. What must run before the computer is removed from the targeted install policy?
A. The Targeted Inventory Policy must be sent to the Symantec Management Platform from the managed computer for it to be removed from thepcAnywhere targeted install policy.
B. An Inventory File Baseline must be sent to the Symantec Management Platform from the managed computer for it to be removed from thepcAnywhere targeted install policy.
C. The Standard Inventory Policy must be sent to the Symantec Management Platform from the managed computer for it to be removed from thepcAnywhere targeted install policy.
D. Basic Inventory must be sent to the Symantec Management Platform from the managed computer for it to be removed from the pcAnywheretargeted install policy.
A system administrator needs to deploy the pcAnywhere plug-in to a subset of the Windows desktop computers in an environment. After selecting the named policy in the "Applied to" section of Altiris Client Management Suite 7.1, how should the administrator modify the targeted agent policy?
A. Update results, click OK to save the changes, and then click Save Changes.
B. Edit the SQL of the named policy, add a filter rule, update results, click OK to save the changes, and then click Save Changes.
C. Edit the named policy, add a filter rule, update results, click OK to save the changes, and then click Save Changes.
D. Create a new SQL statement for a new named policy, add a filter rule, update results, click OK to save the changes, and then click SaveChanges.
Which two types of user profiles can PC Transplant capture? (Select two.)
A. Mac users
B. Local Windows users
C. Linux users
D. Windows domain users
E. Novell Netware users
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-402 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.