A system administrator needs to create a full clone of a computer with Windows 7 installed so the computer may be restored if necessary. Which task sequence should the administrator use?
A. BCD Edit, Reboot To "Automation," Create Image ("Back-Up Image"), Reboot To "Production"
B. Reboot To "Automation," Create Image ("Back-Up Image"), Reboot To "Production"
C. BCD Edit, Reboot To "Automation," Create Image ("Create Disk-Image"), Reboot To "Production"
D. Reboot To "Automation," Create Image ("Clone"), Reboot To "Production"
In which area of the Symantec Management Console can a system administrator specify which users have access to WMI, AMT, DASH, and other management technologies?
A. Credentials Management
B. Credential Access Manager
C. Security Role Manager
D. Out-of-Band Management
Which step is required by a user in order to request software using the Software Portal?
A. Submit a request for a user account.
B. Add a request using the Symantec Management Console.
C. Search the Software Catalog.
D. Configure a user profile.
A system administrator logs on to a managed computer to update the agent policies for software delivery. Which action should the administrator perform to refresh the policies?
A. Right-click the Symantec Management Agent, select Settings and update the Sent Basic Inventory Date and Time.
B. Right-click the Symantec Management Agent, select Settings, and Update the Configuration Requested/Changed, Date and Time.
C. Right-click the Symantec Management Agent and select Software Update Configuration.
D. Right-click the Symantec Management Agent and select Task tab and Update the Configuration Requested/Changed, Date and Time.
An administrator wants to upgrade a user's computer from Windows XP to Windows 7, incorporating PC Transplant. The administrator needs to limit the amount of data to be copied across the network during this process. Which configuration option allows the administrator to accomplish this?
A. file preservation
B. file filter
C. image file
D. A2i file
Which two rule details should be included in a policy to allow a specific version of an Integrated Development Environment to run? (Select two.)
A. MD5 hash
B. file version
C. internal name
D. file path
E. file type
Which step must be performed prior to deploying an imaging job using PXE Automation?
A. create a task to boot to Folder Automation
B. create a PXE Automation Configuration
C. create the Preboot Configuration policy on the Management Console
D. create the PXE Configuration policy on the Management Console
A system administrator needs to review the installation status of the agent plug-ins that have been enabled for a specific computer. In which two places will the administrator find this information? (Select two.)
A. the Policies view on the Symantec Management Console
B. the Computer view on the Symantec Management Console
C. the My Portal page on the Symantec Management Console
D. the Software Delivery tab of the Symantec Management Agent
E. the Jobs/Tasks tab on the Symantec Management Agent
A system administrator deploys the Altiris Client Management Suite 7.1 / 7.x agents and plug-ins. Some of the agent and plug-in installations fail during the install. Which option should be enabled in order to track agent and plug-in installation progress?
A. Enable Verbose Reporting of Status Events
B. Enable Trace Reporting of Status Events
C. Allow Failed Job Reporting for Status Events
D. Allow Agent Event Reporting for Status Events
A system administrator was asked to distribute the pcAnywhere Agent Plug-in on all Windows endpoints across a company. The administrator accepted all defaults in the pcAnywhere Solution settings and enabled the pcAnywhere Agent Plug-in. When the policy distribution was complete, many support calls came in to the help desk reporting the information listed below. - All endpoints that had another manufacturer's remote control software installed were having stability issues. - All endpoints that are behind firewalls and NAT devices were unable to be remote controlled. Which two should the system administrator have done before enabling the default policy? (Select two.)
A. The default Target in the "pcAnywhere Plug-in for Windows - Install" policy should have been modified to include incompatible software applications.
B. The "pcAnywhere Settings - Windows" policy settings in the Connection tab should have been configured properly.
C. The default Target in the "pcAnywhere Plug-in for Windows - Upgrade" policy should have been modified to include incompatible software applications.
D. T he "pcAnywhere Settings" policy settings in the Security tab should have been configured properly.
E. The default Target in the "pcAnywhere Plug-in for Windows - Install" policy should have been modified to exclude incompatible software applications.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-407 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.