Which protocol needs to be configured when using Real-Time System Manager to update a user's password?
A. ASF
B. WMI
C. AMT
D. WS-MAN
Which tool can an administrator use to view the results of a Microsoft Vulnerability scan for a specific computer?
A. Windows Application Log
B. Resource Manager
C. Report Builder
D. Altiris Log Viewer
Which two operating systems can be managed using pc Anywhere? (Select two.)
A. Linux
B. iOS
C. Android
D. Mac
E. Unix
Which two technologies are supported on Intel hardware when using Out-of-Band Management? (Select two.)
A. AMT
B. WMI
C. ICMP
D. SNMP
E. ASF
Which limitations are placed on software information collected using a Standalone Inventory task on an unmanaged 64-bit computer?
A. Because the Standalone package lacks native 64-bit support, only 32-bit programs are reported.
B. References to the Software Catalog are missing for the unmanaged computer.
C. Any patches staged in Patch Management are removed from the inventory results for the computer.
D. License information is limited to Microsoft products only.
Which two products are included in Altiris Client Management Suite 7.1 / 7.x? (Select two.)
A. Service Desk
B. CMDB Solution
C. pcAnywhere
D. Wise Package Studio Professional
E. Deployment Solution
A patch administrator is preparing to deploy new patches. The administrator needs to avoid applying Microsoft updates to the wrong operating systems. How should the administrator deploy the patches?
A. by creating a Software Update policy to distribute the updates
B. by configuring the Import Patch Data for Microsoft task and only including applicable updates
C. by staging the update for each operating system in the test environment
D. by only applying updates to the Target with applicable computers when creating a Software Update policy
A software was virtualized during a Managed Software Delivery installation. Which method must be used to manage the layer?
A. Virtual Composer task
B. Software Virtualization Command task
C. Package Delivery task
D. Quick Delivery task
An administrator needs to use the Deployment Solution task listed below in a job that will be used to capture an image of a computer running Windows XP. Prepare for Image capture.
Which two configuration steps must be completed before the task can be created? (Select two.)
A. enable PXE
B. create a system configuration
C. create a sysprep token
D. upload the applicable deploy.cab file
E. add an OS license key
A group of computers are received from a computer manufacturer with a list of corresponding MAC addresses. To facilitate the imaging of the computers, the list is modified and then imported to Deployment Solution, creating new computer accounts. In a lab, all computers are started and booted into WinPE automation. In the console, a job is assigned to each computer appropriate to its hardware; but the computers never get the tasks or run the jobs. What is a likely reason for this behavior?
A. The number of concurrent tasks assigned for imaging is overwhelming the SQL server.
B. The computer records in the database are missing necessary key information to properly identify the computers.
C. The network addresses assigned to the computers in the lab are outside the SBS configured ranges.
D. New computers must first check in and be given a GUID in the console before being assigned a name and corresponding jobs or tasks.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-407 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.