1 / 37

250-407 Exam Practice Questions

CertsChief products pass your IT Certification Exam with 100% money back guaranteed. Using Confirmed test practice questions and preparation material from CertsChief. Please visit at: http://www.certschief.com

certschief
Download Presentation

250-407 Exam Practice Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. http://www.certschief.comCertification Preparation Material Symantec 250-407 Symantec Client Management Suite 7.x Demo Product - For More Information - Visit: http://www.certschief.com/exam/250-407/ Edition = DEMO ProductFull Version Features:  90 Days Free Updates  30 Days Money Back Guarantee  Instant Download Once Purchased  24/7 Online Chat Support Page | 1 http://www.certschief.com/exam/250-407/

  2. http://www.certschief.comCertification Preparation Material Question: 1 What are two prerequisites for installing and configuring IT Analytics? (Select two.) A. Microsoft Reporting and Analysis Services B. Adobe Flash C. Microsoft SQL Server 2005 Datamining Viewer Controls D. Microsoft Office Web Components 11 (2003) E. Microsoft Silverlight Answer: A,D Question: 2 What are two prerequisites for installing Out-of-Band Management? (Select two.) A. SQL Server configured in mixed authentication mode B. SQL Server configured in Windows authentication mode C. Symantec Management Platform D. SQL Analysis Service installed E. SSL/TLS Answer: A,C Question: 3 An administrator receives notification of a new vulnerability threat from Symantec Deepsight Alert Services. The alert includes the name of an executable that should be prevented from running. Which policy should the administrator configure? A. Malware Blocking policy B. Application Metering policy C. Custom Inventory policy D. Software Inventory policy Answer: A Question: 4 The IT Security department wants to prevent all versions of a particular file sharing application from running on company computers. Where must the software resource be defined before it can be prevented from running? A. Software Inventory scan B. Software Catalog C. Software Library D. Software Update policy Answer: D Question: 5 Page | 2 http://www.certschief.com/exam/250-407/

  3. http://www.certschief.comCertification Preparation Material A system administrator is testing the delivery of an application. During deployment, the administrator determines that the install path of an MSI needed to be changed without modifying the MSI. The administrator needs to change the command line parameters of the install package. Which policies would be affected when the default install command line of a software package is modified in the Software Catalog? A. policies that are assigned to a non-managed computer B. policies that leverage Software Discovery C. policies currently referencing the modified entry D. policies referencing staged software updates Answer: C Question: 6 An administrator is reviewing software resources in the software catalog. There is a duplicate for a software resource. The administrator has initiated the Resolve Duplicate Software Resources Wizard and selected the option to merge duplicate resources. What will happen to the duplicate entries in the Software Catalog? A. It creates a new software resource with the information from both entries and keeps the duplicates. B. It updates the original software resource with both unique identifiers and the duplicate is deleted. C. It creates a new software resource with the information from both entries and the entry with the newest timestamp is deleted. D. It updates the original software resources with the information from both entries and the entry with the oldest timestamp is deleted. Answer: B Question: 7 When manually creating an entry within the Software Catalog, the administrator needs the Managed Delivery policy to verify that prerequisite software is installed before deploying a new application. What should the administrator use to execute a prerequisite check? A. Detection Rule B. Applicability Rule C. Basic Inventory D. Software Filter Answer: B Question: 8 A system administrator discovers that an unauthorized piece of software called "Solitaire 2099" has been installed on company desktops. The software installs a browser toolbar that prevents the use of the company standard browser toolbar and needs to be removed immediately. The administrator has also been instructed to identify all users that are playing the game so that they can receive a private email about the situation. Which two capabilities of Inventory Solution will help the administrator? (Select two.) A. Inventory Solution provides data about the number of installed instances of an application. B. Inventory Solution automatically associates software titles to users. B. Inventory Solution automatically determines unauthorized software titles. C. Inventory Solution tracks how often an application is executed. D. Inventory Solution identifies harmful applications stored on local hard drives. Page | 3 http://www.certschief.com/exam/250-407/

  4. http://www.certschief.comCertification Preparation Material Answer: A,D Question: 9 A system administrator deployed the Inventory Solution Agent Plug-in to 15,000 endpoints across a company. Subsequently, the administrator realizes that the performance of the Notification Server is slower during the inventory scan times. Which two actions can be taken within Inventory Solution to reduce the processing impact on the Notification Server during these times? (Select two.) A. Create multiple policies on different schedules for subsets of computers. B. Create a custom weekly schedule instead of using the default weekly schedule. C. Enable the priority setting in the advanced settings of the inventory task. D. Use the AeXRunControl.exe program to randomize the collection of inventory. E. Use the throttling setting in the advanced settings of the inventory task. Answer: A,E Question: 10 After customizing the preboot configuration files, previously created configurations need to be updated. Each file is highlighted and then the option to rebuild them is selected. After all items have been updated, the "Save" button on the policy is selected to ensure all changes are stored in the database. However, after several hours or even a day, the configuration files on the PXE servers maintain an old date instead of the new date. Why do the PXE servers have the old date? A. The PXE servers are missing from the policy assigned to the preboot configurations because several policies were modified at the same time. B. SBS Services must first be restarted to accept new policy changes from the server even though the agent has received the policy. C. The PXE Server configuration policy must also be updated at the same time as the preboot configurations. D. The preboot configuration policy changes are already saved and have been lost due to saving the policy again. Answer: D Question: 11 A software was virtualized during a Managed Software Delivery installation. Which method must be used to manage the layer? A. Virtual Composer task B. Software Virtualization Command task C. Package Delivery task D. Quick Delivery task Answer: B Question: 12 An administrator needs to use the Deployment Solution task listed below in a job that will be used to capture an image of a computer running Windows XP. Prepare for Image capture. Which two configuration steps must be completed before the task can be created? (Select two.) Page | 4 http://www.certschief.com/exam/250-407/

  5. http://www.certschief.comCertification Preparation Material A. enable PXE B. create a system configuration C. create a sysprep token D. upload the applicable deploy.cab file E. add an OS license key Answer: D,E Question: 13 A group of computers are received from a computer manufacturer with a list of corresponding MAC addresses. To facilitate the imaging of the computers, the list is modified and then imported to Deployment Solution, creating new computer accounts. In a lab, all computers are started and booted into WinPE automation. In the console, a job is assigned to each computer appropriate to its hardware; but the computers never get the tasks or run the jobs. What is a likely reason for this behavior? A. The number of concurrent tasks assigned for imaging is overwhelming the SQL server. B. The computer records in the database are missing necessary key information to properly identify the computers. C. The network addresses assigned to the computers in the lab are outside the SBS configured ranges. D. New computers must first check in and be given a GUID in the console before being assigned a name and corresponding jobs or tasks. Answer: B Question: 14 A patch administrator is preparing to deploy new patches. The administrator needs to avoid applying Microsoft updates to the wrong operating systems. How should the administrator deploy the patches? A. by creating a Software Update policy to distribute the updates B. by configuring the Import Patch Data for Microsoft task and only including applicable updates C. by staging the update for each operating system in the test environment D. by only applying updates to the Target with applicable computers when creating a Software Update policy Answer: A Question: 15 Which two products are included in Altiris Client ManagementSuite 7.1 / 7.x? (Select two.) A. Service Desk B. CMDB Solution C. pcAnywhere D. Wise Package Studio Professional E. Deployment Solution Answer: C,E Question: 16 Which two technologies are supported on Intel hardware when using Out-of-Band Management? (Select two.) Page | 5 http://www.certschief.com/exam/250-407/

  6. http://www.certschief.comCertification Preparation Material A. AMT B. WMI C. ICMP D. SNMP E. ASF Answer: A,E Question: 17 Which limitations are placed on software information collected using a Standalone Inventory task on an unmanaged 64-bit computer? A. Because the Standalone package lacks native 64-bit support, only 32-bit programs are reported. B. References to the Software Catalog are missing for the unmanaged computer. C. Any patches staged in Patch Management are removed from the inventory results for the computer. D. License information is limited to Microsoft products only. Answer: B Question: 18 Which two operating systems can be managed using pc Anywhere? (Select two.) A. Linux B. iOS C. Android D. Mac E. Unix Answer: A,D Question: 19 Which protocol needs to be configured when using Real-Time System Manager to update a user's password? A. ASF B. WMI C. AMT D. WS-MAN Answer: B Question: 20 Which tool can an administrator use to view the results of a Microsoft Vulnerability scan for a specific computer? A. Windows Application Log B. Resource Manager C. Report Builder D. Altiris Log Viewer Page | 6 http://www.certschief.com/exam/250-407/

  7. http://www.certschief.comCertification Preparation Material Answer: B Question: 21 An administrator needs to create an image that can be used for a mass deployment in the company. Which Deployment Solution task should be run before creating the image? A. Run SIDGen to prepare the image for deployment B. Run Prepare for Image Capture task before cloning C. Run Capture Personality task before cloning D. Run Deploy Sysprep task before cloning Answer: B Question: 22 What is a benefit of using the Software Library? A. It offers a single, virtual location of multiple physical locations for simple access and management of software packages. B. It offers a single, physical location on the network where all software packages are stored for distribution. C. It offers a single, physical location where end-users can access software to be installed to their local system. D. It offers a single, virtual location where applications can be installed as virtual layers for a scheduled, limited time period. Answer: B Question: 23 Which two security roles allow for Create and Import software resources in Software Management Solution 7.1 by default? (Select two.) A. Symantec Software Librarian B. Symantec Supervisors C. Symantec Level 2 Workers D. Symantec Administrators E. Software Portal Administrators Answer: A,D Question: 24 A system administrator created a Software Portal entry that allows any user in the company to install a specific program. For licensing purposes, the administrator needs to determine which computers have the software. Which report can be used to track which computers have the software in question? A. the Audit Software Search report B. the Add or Remove Program Search report C. the Software Compliance Summary report D. the Installed Software report Answer: D Page | 7 http://www.certschief.com/exam/250-407/

  8. http://www.certschief.comCertification Preparation Material Question: 25 Which two are required for full use of the Symantec Management Console? (Select two.) A. Java Runtime Environment B. Adobe Shockwave C. Microsoft Silverlight D. Adobe Air E. Windows Deployment Services Answer: A,C Question: 26 What are the four steps, in correct order, to a Managed Delivery policy execution or remediation phase? A. policy execution, applicability check, compliance check, package download B. compliance check, remediation action, compliance check, report to Notification Server C. package download, compliance check, remediation action, report to Notification Server D. compliance check, package download, compliance check, policy execution Answer: B Question: 27 A Managed Software Delivery policy executes in which order? A. detection check, wait for scheduled time, compliance check, download package, wait for scheduled time, remediation action B. wait for scheduled time, compliance check, remediation action, download, wait for scheduled time, Software Execution C. wait for scheduled time, compliance check, download package, wait for scheduled time, remediation action D. download package, wait for scheduled time, compliance check, detection check, remediation action, Software Execution Answer: C Question: 28 A healthcare company has several smaller outlying locations with very limited bandwidth to corporate headquarters. Maintenance of computers in these locations is proving problematic, especially operating system upgrades and deployment. They would like to completely automate the operating system distribution, installation, and configuration for connected PCs in these locations with minimal impact on the WAN. They have selected a Site Server for each location. What must they do to enable re-imaging of managed computers to occur locally in each remote location? A. install Task and Package services on the designated site server; enable the Deployment Site server policy, Deployment Plug-in policy, and Automation Folders policy B. enable Deployment Site server and Deployment plug-in policies; establish a remote Deployment portal on the site server; configure Package Server image replication C. install Package and Deployment site services on the designated site server; enable PXE Configuration policies; enable the Deployment Task Handler policy Page | 8 http://www.certschief.com/exam/250-407/

  9. http://www.certschief.comCertification Preparation Material D. enable Deployment PXE service components on the designated site server; create a preboot configuration supporting PXE; enable the Deployment Plug-in policy Answer: A Question: 29 What is the function of the applicability rule? A. It determines conflicts with other software resources within the Software Catalog. B. It determines if a software resource has all the required components for delivery. C. It determines if a software resource is applicable to the Software Portal for self-delivery. D. It determines if a software resource is applicable to a given computer. Answer: D Question: 30 Which operating system(s) is required to install Client ManagementSuite 7.1 / 7.x? A. Microsoft Windows Server 2003 R2 32-bit B. Microsoft Windows Server 2008 R2 32-bit or 64-bit C. Microsoft Windows Server 2003 or 2008 32-bit D. Microsoft Windows Server 2008 R2 64-bit Answer: D Question: 31 A system administrator was asked to distribute the pcAnywhere Agent Plug-in on all Windows endpoints across a company. The administrator accepted all defaults in the pcAnywhere Solution settings and enabled the pcAnywhere Agent Plug-in. When the policy distribution was complete, many support calls came in to the help desk reporting the information listed below. - All endpoints that had another manufacturer's remote control software installed were having stability issues. - All endpoints that are behind firewalls and NAT devices were unable to be remote controlled. Which two should the system administrator have done before enabling the default policy? (Select two.) A. The default Target in the "pcAnywhere Plug-in for Windows - Install" policy should have been modified to include incompatible software applications. B. The "pcAnywhere Settings - Windows" policy settings in the Connection tab should have been configured properly. C. The default Target in the "pcAnywhere Plug-in for Windows - Upgrade" policy should have been modified to include incompatible software applications. D. T he "pcAnywhere Settings" policy settings in the Security tab should have been configured properly. E. The default Target in the "pcAnywhere Plug-in for Windows - Install" policy should have been modified to exclude incompatible software applications. Answer: B,E Question: 32 A system administrator deploys the Altiris Client ManagementSuite 7.1 / 7.xagents and plug-ins. Some of the agent and plug-in installations fail during the install. Which option should be enabled in order to track agent and plug-in installation progress? Page | 9 http://www.certschief.com/exam/250-407/

  10. http://www.certschief.comCertification Preparation Material A. Enable Verbose Reporting of Status Events B. Enable Trace Reporting of Status Events C. Allow Failed Job Reporting for Status Events D. Allow Agent Event Reporting for Status Events Answer: A Question: 33 A system administrator needs to review the installation status of the agent plug-ins that have been enabled for a specific computer. In which two places will the administrator find this information? (Select two.) A. the Policies view on the Symantec Management Console B. the Computer view on the Symantec Management Console C. the My Portal page on the Symantec Management Console D. the Software Delivery tab of the Symantec Management Agent E. the Jobs/Tasks tab on the Symantec Management Agent Answer: B,D Question: 34 Which two rule details should be included in a policy to allow a specific version of an Integrated Development Environment to run? (Select two.) A. MD5 hash B. file version C. internal name D. file path E. file type Answer: B,C Question: 35 Which step must be performed prior to deploying an imaging job using PXE Automation? A. create a task to boot to Folder Automation B. create a PXE Automation Configuration C. create the Preboot Configuration policy on the Management Console D. create the PXE Configuration policy on the Management Console Answer: B Question: 36 An administrator wants to upgrade a user's computer from Windows XP to Windows 7, incorporating PC Transplant. The administrator needs to limit the amount of data to be copied across the network during this process. Which configuration option allows the administrator to accomplish this? A. file preservation Page | 10 http://www.certschief.com/exam/250-407/

  11. http://www.certschief.comCertification Preparation Material B. file filter C. image file D. A2i file Answer: A Question: 37 A system administrator logs on to a managed computer to update the agent policies for software delivery. Which action should the administrator perform to refresh the policies? A. Right-click the Symantec Management Agent, select Settings and update the Sent Basic Inventory Date and Time. B. Right-click the Symantec Management Agent, select Settings, and Update the Configuration Requested/Changed, Date and Time. C. Right-click the Symantec Management Agent and select Software Update Configuration. D. Right-click the Symantec Management Agent and select Task tab and Update the Configuration Requested/Changed, Date and Time. Answer: B Question: 38 A system administrator needs to create a full clone of a computer with Windows 7 installed so the computer may be restored if necessary. Which task sequence should the administrator use? A. BCD Edit, Reboot To "Automation," Create Image ("Back-Up Image"), Reboot To "Production" B. Reboot To "Automation," Create Image ("Back-Up Image"), Reboot To "Production" C. BCD Edit, Reboot To "Automation," Create Image ("Create Disk-Image"), Reboot To "Production" D. Reboot To "Automation," Create Image ("Clone"), Reboot To "Production" Answer: A Question: 39 In which area of the Symantec Management Console can a system administrator specify which users have access to WMI, AMT, DASH, and other management technologies? A. Credentials Management B. Credential Access Manager C. Security Role Manager D. Out-of-Band Management Answer: A Question: 40 Which step is required by a user in order to request software using the Software Portal? A. Submit a request for a user account. B. Add a request using the Symantec Management Console. C. Search the Software Catalog. D. Configure a user profile. Page | 11 http://www.certschief.com/exam/250-407/

  12. http://www.certschief.comCertification Preparation Material Answer: D Question: 41 What are two attributes of an entry within the Software Catalog? (Select two.) A. command lines B. download location C. installation path D. attribute rules E. applicability rules Answer: A,E Question: 42 Update 10.0.3 was just released for software used on every computer. This package updates the existing software resource from 10.0.0 to 10.0.3. The package is configured as a software resource and will use rules to determine whether the 10.0.0 Version is installed. What is the last step of a Managed Delivery policy for computers that are missing version 10.0.0? A. Applicability Rule B. Detection Rule C. Package Download D. Software Execution Answer: A Question: 43 A help desk technician is contacted by a user who states that a critical application is working differently than expected. After remotely diagnosing the problem, a system administrator discovers that a key file is missing from the application directory. Which tool within Altiris Client Management Suite 7.1 / 7.xallows the administrator to resolve this issue without requiring a redeployment of the application or system? A. Software Management Solution B. Real-Time System Manager C. pcAnywhere D. Application Management Answer: C Question: 44 A help desk technician is responding to a printing problem and suspects the problem is the Windows print spooler service. Using Altiris Client Management Suite 7.1 / 7.x, how can the technician verify that the print spooler service is actively running before contacting the user? A. Real-Time System Manager B. Resource Manager C. Symantec Remote Assistance D. Inventory Solution Page | 12 http://www.certschief.com/exam/250-407/

  13. http://www.certschief.comCertification Preparation Material Answer: A Question: 45 Which two inventory data classes are collected during the Software Discovery scan of an Inventory Solution policy? (Select two.) A. AddRemoveProgram B. Installed File Detail C. InstalledSoftware D. Patch Windows E. Audit Results Answer: A,C Question: 46 Which criteria must be met before a Software Update policy can be created through the Patch Remediation Center? A. The number in the Updates column must equal the number in the Downloaded column. B. Computers must be discovered that require the particular software update. C. Software updates must first be downloaded from the Symantec website. D. Software updates must be marked as ready to install in the Patch Remediation Center. Answer: A Question: 47 Which two additional settings are available in the Import Patch Data for Microsoft task? (Select two.) A. Replace all Superseded Software Updates B. Disable all Superseded Software Updates C. Override Maintenance Windows Settings D. Automatically revise Software Update policies after importing patch data E. Automatically revise Software Update policies and enable distribution of newly added software updates after importing Patch data Answer: B,D Question: 48 Which statement is true about the Application Metering feature of Inventory Solution? A. It tracks and compares changes to application files and registry keys. B. It monitors and denies the usage of applications on the network. C. It gathers detailed information about application files. D. It limits the usage of applications to purchased licenses. Answer: C Page | 13 http://www.certschief.com/exam/250-407/

  14. http://www.certschief.comCertification Preparation Material Question: 49 Which type of component is included in the Software Catalog? A. licenses B. hotfixes C. updates D. uninstalls Answer: A Question: 50 Which Altiris Client ManagementSuite 7.1 / 7.xsolution tracks the installations of an application and how often the application is used? A. Application Management Solution B. Deployment Solution C. Application Metering Solution D. Inventory Solution Answer: D Question: 51 Which Altiris Client ManagementSuite 7.1 / 7.xsolution denies the usage of applications on the network? A. Software Management Solution B. Application Metering Solution C. Application Management Solution D. Inventory Solution Answer: D Question: 52 Which solution is included with Altiris Client ManagementSuite 7.1 / 7.x? A. Help Desk Solution B. Discovery Solution C. pcAnywhere D. Symantec System Recovery Answer: D Question: 53 A system administrator used a Managed Software Delivery policy to push out software to a specific department of the company and needs to report on the computers that have successfully installed the software. Which report will show the computers that have run the Managed Software Delivery policy? A. the Audit Software Search report Page | 14 http://www.certschief.com/exam/250-407/

  15. http://www.certschief.comCertification Preparation Material B. the Add or Remove Program Search report C. the Software Compliance Summary report D. the Installed Software report Answer: C Question: 54 A Software Request Status report displays the current status of each software request received through the Software Portal. What will happen when the system administrator runs the report for Linux systems? A. The status report will show no results because Software Portal is unsupported in the Linux environment. B. The status report will fail because Software Portal is unsupported in the Linux environment. C. The status report will show results because the Software Portal Status report reports on cross-platform operating systems. D. The status report will show results for all operating systems. Answer: A Question: 55 Refer to the exhibit. A software delivery policy titled "Windows Installer Quick Repair" fails. How should a system administrator reschedule the installation of this task from the Software Delivery tab of the Symantec Management Agent? A. Delete the policy, re-download the task and click on Application Task to automatically rerun the task. B. Click on Application Task to automatically re-run the task. C. Click on the policy properties, select the Run History tab, right-click the run-time, and set go to automatically re- run the task. D. Click on the policy properties to automatically re-run the task. Answer: B Question: 56 The client policy file update interval is set to every 8 hours. A new policy file needs to be distributed immediately to the clients in an organization. How should a system administrator accomplish this? A. Create a new client task that performs a Client Configuration update as soon as possible. Page | 15 http://www.certschief.com/exam/250-407/

  16. http://www.certschief.comCertification Preparation Material B. Create a new client task that performs an Automated Policy task that updates the client policy file as soon as possible. C. Create a new client task that performs a Basic Inventory update as soon as possible. D. Create a new client task that performs an Update Filter Membership as soon as possible. Answer: A Question: 57 A system administrator is creating a managed delivery policy to deliver software to managed computers and elects to deliver the software to the Symantec Workspace Virtualization (SWV) layer. Where is the software installed if the administrator delivers the software without having previously installed the Symantec Workspace Virtualization Plug- in? A. The installation pauses and prompts the administrator to install the Symantec Workspace Virtualization plug-in. B. The managed delivery policy installation fails. C. The installation pauses and prompts the administrator to install the Symantec Workspace Virtualization plug-in and then continues with the install. D. The software is installed into the host operating system. Answer: D Question: 58 A school with a limited budget either receives computers as donations or buys them in small quantities. As a result, the school has several varieties of computers and associated hardware. Each quarter, all student computers must be reset to a fresh state to prepare for the next group of students. When the computers are reset, the OS is manually installed, all of the drivers for each unique system are installed, and each application is installed one at a time by CD. The process is cost effective, but highly prone to error and often results in several days of clean-up by the teachers. Which two benefits would the school realize by using Deployment Solution? (Select two.) A. It can automate the application installations through use of the Software Portal. B. It can install the operating systems automatically using a Scripted OS Installation. C. It can manage the drivers for each system through use of Prepare the Image tasks. D. It can install the operating system automatically through use of PC Transplant. E. It can automate the application installations through use of Restore Software tasks. F. It can automate driver installation through use of Deploy Anywhere. Answer: B,F Question: 59 Based on a corporate policy, every 12 months one-third of the organization's computers are replaced with new systems. This results in very large purchase orders being placed all at the same time. Their current replacement processes cause significant productivity losses for the users during the replacement period. What can Deployment Solution do to help reduce their productivity losses? A. It can simplify the deployment process by bundling all steps for new system builds into a single automated policy including operating system deployment, software provisioning, and user configuration. B. It can allow for automatic creation of new computer records from an imported lists of computer information from the manufacturers, which simplifies the imaging process. C. It can simplify the process of computer deployments to departments by coordinating with an Active Directory connector for automated configuration setting tasks. Page | 16 http://www.certschief.com/exam/250-407/

  17. http://www.certschief.comCertification Preparation Material D. It can add an interface in the console to simplify and synchronize deployment schedules by allowing department heads to enter personal maintenance plans. Answer: B Question: 60 A corporate president has decided to centralize management of operating system updates after a virus spread through the corporate network. The president requires the ability to create reports about which updates have been deployed, which updates are still needed, and other information that will demonstrate the security of the network. Which two features of Altiris Client ManagementSuite 7.1 / 7.xprovide all of the required functionality? (Select two.) A. Deployment Solution B. Patch Management Solution C. Monitor Solution D. Inventory Solution E. IT Analytics Answer: B,E Question: 61 A system administrator is unable to send a file to a user through email, because it is too large (50Mb). Which feature of Altiris Client ManagementSuite 7.1 / 7.xis used to copy the file quickly within a managed network? A. Inventory Solution B. Carbon Copy Solution C. pcAnywhere Solution D. Software Management Solution Answer: C Question: 62 Inventory Solution uses which two plug-ins to gather and monitor application-related data? (Select two.) A. Inventory Rule Agent Plug-in B. Inventory Agent Plug-in C. Software Update Agent Plug-in D. Application Metering Agent Plug-in E. Software Management Solution Agent Plug-in Answer: B,D Question: 63 Which information does a file properties inventory scan gather? A. internal name, original file name, and manufacturer data B. internal name, file size, and manufacturer data C. legal trademark, file size, and extension data D. language, file path, and extension data Page | 17 http://www.certschief.com/exam/250-407/

  18. http://www.certschief.comCertification Preparation Material Answer: B Question: 64 An administrator created a software resource with a detection rule. What should be used to determine whether this software resides on a managed computer? A. Two Pass Inventory policy B. Delta File Inventory task C. Detailed File Inventory task D. Targeted Software Inventory policy Answer: D Question: 65 Which items must be specified to minimize duplication of data and minimize processing on the Notification Server when manually adding a software resource to the Software Catalog? A. Product Name, Software Product, and Language B. Product Name, Version, and Manufacturer C. Product Name, Version, and Software Product D. Product Name, Version, and Language Answer: B Question: 66 Which Symantec Management Console security item needs to be modified to allow a console user to download software updates in Patch Management Solution 7.1 without approving them? A. The Update Bulletin security privileges have to be enabled for the console user. B. The Stage Bulletin security permissions have to be enabled for the console user. C. The Stage Bulletin security privileges have to be enabled for the console user. D. The Distribute Software Update security permissions have to be enabled for the console user. Answer: C Question: 67 A system administrator has set up a custom security role to allow some desktop administrators a particular combination of software management and software update abilities. When the desktop administrators use the console, they have right-click options for performing desired operations, but when using these operations they get failure messages indicating that they have insufficient access. Which modification needs to be performed on the desktop administrators' security role to allow sufficient access? A. Additional privileges need to be added to the role. B. Additional permissions need to be added to the role. C. They have to be made members of the local Administrators group on the server. D. They have to be made members of the local Administrators group on the desktops. Page | 18 http://www.certschief.com/exam/250-407/

  19. http://www.certschief.comCertification Preparation Material Answer: B Question: 68 A maintenance window is configured to start at 21:00 and end at 22:00. The default Software Update Agent policy has been scheduled to run at 19:00. A Software Update policy is created and configured to install updates at 17:00, repeating daily. The maintenance window is honored. All machines are powered down Wednesdays for maintenance between 20:00 and 00:00, but are powered on at all other times. If it is Wednesday at 21:00, when can updates next be installed? A. 18:00 on Thursday B. 19:00 on Thursday C. 21:00 on Thursday D. immediately E. never Answer: C Question: 69 An administrator needs to create an exact image of a computer using Deployment Solution 7.1. Which type of imaging task should the administrator use? A. Capture Disk Image task B. Backup Disk Image task C. Capture Personality task D. Restore Backup Image task Answer: A Question: 70 Which two types of user profiles can PC Transplant capture? (Select two.) A. Mac users B. Local Windows users C. Linux users D. Windows domain users E. Novell Netware users Answer: B,D Question: 71 Which file type is used in PC Transplant to describe all of the components that are needed to transfer an application's settings and data files? A. PBT file B. PCT file C. Gho file D. A2i file Page | 19 http://www.certschief.com/exam/250-407/

  20. http://www.certschief.comCertification Preparation Material Answer: D Question: 72 Where do you view the status of Software Updates while on a managed computer? A. Add Remove Programs B. Event Viewer C. Software Management Agent D. Symantec Management Agent Answer: B Question: 73 How can greater efficiency and consistency be achieved when deploying multiple Managed Software Delivery policies to endpoints? A. Update the Managed Delivery Settings policy to define standard default settings for new Managed Delivery policies. B. Configure and run the Update Managed Delivery Policies task to reconfigure Managed Software Delivery policies with default settings. C. Configure the Default Software Settings policy to specify standardized settings for newly created Managed Software Delivery policies. D. Enable the Synchronize Software Policies scheduled task to update existing Managed Software Delivery policies with predefined settings. Answer: A Question: 74 Which Patch Management Solution 7.1 setting controls the restart action of an endpoint after a software update is applied? A. Default Software Update Plug-in Policy B. Software Update Plug-in Policy C. Patch Management Agent Global Policy D. Patch Management Plug-in Policy Answer: A Question: 75 Which default Standard Inventory policy is enabled to run when Inventory Solution is first installed? A. Collect Full Inventory B. Collect Hardware Inventory C. Collect Custom Inventory D. Collect Software Inventory Answer: C Page | 20 http://www.certschief.com/exam/250-407/

  21. http://www.certschief.comCertification Preparation Material Question: 76 Which protocol should be configured in the connection profile when remotely managing an Intel vPro enabled system? A. AMT B. WS-MAN C. SCS D. SNMP Answer: A Question: 77 A system administrator is deploying the pcAnywhere plug-in to a managed computer. What must run before the computer is removed from the targeted install policy? A. The Targeted Inventory Policy must be sent to the Symantec Management Platform from the managed computer for it to be removed from the pcAnywhere targeted install policy. B. An Inventory File Baseline must be sent to the Symantec Management Platform from the managed computer for it to be removed from the pcAnywhere targeted install policy. C. The Standard Inventory Policy must be sent to the Symantec Management Platform from the managed computer for it to be removed from the pcAnywhere targeted install policy. D. Basic Inventory must be sent to the Symantec Management Platform from the managed computer for it to be removed from the pcAnywhere targeted install policy. Answer: D Question: 78 A system administrator needs to deploy the pcAnywhere plug-in to a subset of the Windows desktop computers in an environment. After selecting the named policy in the "Applied to" section of Altiris Client ManagementSuite 7.1 / 7.x, how should the administrator modify the targeted agent policy? A. Update results, click OK to save the changes, and then click Save Changes. B. Edit the SQL of the named policy, add a filter rule, update results, click OK to save the changes, and then click Save Changes. C. Edit the named policy, add a filter rule, update results, click OK to save the changes, and then click Save Changes. D. Create a new SQL statement for a new named policy, add a filter rule, update results, click OK to save the changes, and then click Save Changes. Answer: C Question: 79 A system administrator needs to quickly deploy Windows 7 to several new computers without preconfigured operating systems. The administrator decides to use an existing Ghost image since the necessary drivers have already been added to the DeployAnywhere database. The PXE Configuration is set to respond only to known computers. How should the administrator proceed? A. Use Ghost Solution Suite to distribute the image as the computers boot to the network. B. Import the list of new computers into the Management Console and assign an imaging task. Page | 21 http://www.certschief.com/exam/250-407/

  22. http://www.certschief.comCertification Preparation Material C. Deploy an Automation Folder to the new computers to prepare them for imaging. D. Configure PXE to respond to a known list of MAC addresses and deploy the images only to the new systems. Answer: B Question: 80 A company is planning an In-Place Migration to Windows 7. They use PC Transplant to migrate the personality. Which option will help reduce the network traffic when restoring the image? A. use File Preservation B. use a higher compression C. use unicast D. deploy the OS without applications Answer: A Question: 81 An inventory policy is set to run once at 17:00 Wednesday and is present on all computers. A user interrupts the inventory by shutting down a computer right after 17:00 and turns it back on at 08:00 the next morning. When does the inventory run? A. Thursday morning at 08:00 B. next Wednesday evening at 17:00 C. Thursday evening at 17:00 D. never Answer: D Question: 82 A system administrator sets up a Software Inventory policy to run every Monday between and 10:00. After the policy has taken effect, users report that their computers are running slowly during the inventory scans. Which setting will reduce the effect of the inventory scan on users' computers? A. Modify the Send Inventory Change (Deltas) Only option. B. Modify the System Resource Usage option. C. Modify the Throttle Inventory Reporting option. D. Modify the policy to run between 08:00 and 14:00. Answer: B Question: 83 An endpoint computer boots into WinPE Automation for initial deployment. After two hours waiting in WinPE, however, nothing happens. Which two items should be checked? (Select two.) A. the SBS Server logs to verify endpoint communication with the server B. the endpoint computer to ensure the PECTAgent is active in memory C. the imaging task to verify that it is assigned to the endpoint computer D. the BootWiz driver store to ensure appropriate network drivers are present for the endpoint Page | 22 http://www.certschief.com/exam/250-407/

  23. http://www.certschief.comCertification Preparation Material E. the SBS Server config files to verify they are aware of the endpoint computer F. the PXE Server Configuration to ensure it is configured to respond to Initial Deployment computers Answer: B,D Question: 84 An imaging task is created for upgrading a current environment from Windows XP to Windows 7 using Ghost and the inventory from the existing computer. A valid license key is assigned and a valid image is captured. To facilitate imaging, clients are instructed to close their applications and leave, but to leave their computers logged in so the imaging task can properly identify them. However, each attempt to assign and run the task on an endpoint computer results in failure almost immediately. What is the likely cause? A. The endpoint computer is incapable of running Windows 7 based on current inventory. B. Incorrect permissions were configured for the task when running in automation. C. Imaging tasks fail when executed in production on endpoint computers. D. The endpoint computer configuration is missing from the SBS services. Answer: C Question: 85 New software bulletins have been released by Microsoft and are unavailable in the console. Which step should be taken to distribute the software updates? A. Run Import Patch Data for Microsoft task. B. Stage the Microsoft Vulnerability Alerts. C. Run the Microsoft Vulnerability Analysis report. D. Re-download Microsoft QChain. Answer: A Question: 86 A system administrator is working in the Software view and notices that the corporate applications from the application share are missing under newly discovered software. What could be the reason for this? A. There are duplicate entries in the Software Catalog. B. Discovery needs to be configured for the shared location. C. The Software Library needs to be configured to import from that location. D. The Software Discovery policy is disabled. Answer: C Question: 87 A healthcare company has several small outlying locations with extremely limited bandwidth to corporate headquarters. Maintenance of computers in these locations has improved significantly with the recent addition of a Site Server and fully automated installations of operating systems using Deployment Solution. The only exception is with new computers or computers that need to have their OS drive replaced. The system administrator is unable to apply a new operating system to these computers remotely. What needs to be configured to enable fully automated imaging of these computers? Page | 23 http://www.certschief.com/exam/250-407/

  24. http://www.certschief.comCertification Preparation Material A. enable Initial Deployment, configure Respond Using PXE, deploy the Automation plug-in to the site server B. create a PXE server and configure DHCP to forward requests to it, copy OS files to the remote location, build a valid preboot configuration C. configure PXE Services to start, create a preboot configuration to use PXE, send updated inventory to the CMDB D. enable Respond to New Computers, install PXE services on the site server, configure replication of the PXE configurations Answer: C Question: 88 Which two configuration processes must be completed before an administrator can deploy a corporate image to unmanaged computers without user intervention? (Select two.) A. System Configuration B. Predefined Computers C. Initial Deployment settings D. PXE Server Configurations E. Install Automation folder F. Install Deployment Plug-in and Symantec Management Agent Answer: C,D Question: 89 Which two site services must be running on a Site Server before installing the Deployment Site Server components when using Deployment Solution? (Select two.) A. IIS Services B. Package Services C. PXE Services D. Task Services E. Out-of-Band Services Answer: B,D Question: 90 What occurs after the Microsoft Vulnerability Analysis task detects vulnerabilities? A. Patches are automatically created and run to fix the vulnerabilities. B. Filters are automatically created and help target Software Update policies. C. Inventory is received and updates are queued to run on a defined schedule. D. Bulletins are applied to the managed computer. Answer: B Question: 91 A virtual package on a client computer is corrupted. What is the procedure by design to fix the problem? Page | 24 http://www.certschief.com/exam/250-407/

  25. http://www.certschief.comCertification Preparation Material A. Deactivate and Reset B. Delete and Reset C. Deactivate and Reinstall D. Reset and Reinstall Answer: A Question: 92 Which item is available when creating a schedule for software remediation? A. user logoff B. computer shutdown C. user logon D. next software update cycle Answer: C Question: 93 How is it possible to override a Managed Delivery policy default setting? A. Add the Managed Delivery policy to the Software Portal. B. Create the policy without the Managed Delivery Policy Wizard. C. Create a Quick Delivery task using the Software Library Wizard. D. Add the Managed Delivery policy to the Software Catalog. Answer: B Question: 94 What is required to install software with multiple dependencies? A. Application Metering policy B. Software Delivery task C. Package Delivery task D. Managed Delivery policy Answer: D Question: 95 A Deployment Solution administrator needs to re-image an employee's hard disk without losing an important, existing folder. How can the administrator deploy the computer image without erasing the existing folder? A. Use a File Preservation task to mark the important folder as one to preserve during imaging. B. Deploy an image using the RapidDeploy imaging engine using the File Preservation feature. C. Use a PC Transplant task to mark the important folder as one to preserve during imaging. D. Deploy an image using the Ghost imaging engine using the File Preservation feature. Answer: D Page | 25 http://www.certschief.com/exam/250-407/

  26. http://www.certschief.comCertification Preparation Material Question: 96 Deployment Solution backup images are designed to be used for which purpose? A. to be deployed to any computer that needs to be re-imaged B. to be deployed to any computer assigned to the same Deployment Solution Site Server from which the backup image was created C. to be deployed to the computer from which the computer was captured or its replacement D. to be deployed to a computer being migrated to a newer operating system Answer: C Question: 97 Which two methods can be used to assign a Deployment Solution imaging job using the drag and drop technique? (Select two.) A. Drop the job on a saved search. B. Drop the job on the list pane heading. C. Drop the job on the Policies blade. D. Drop the job on the Computers blade. E. Drop the job on the Manage > Computers menu bar. Answer: A,B Question: 98 A Deployment Solution administrator is creating a job to capture an image of a computer's hard drive using a Disk Image task. What should precede the Disk Image task? A. a task to run Sysprep B. a task to defrag the disk C. a task to run PC Transplant D. a task to capture the computer's OS license key Answer: A Question: 99 An administrator is looking at a Patch Management Compliance report listing several computers requiring Microsoft patches. Which two steps are required to update the computers with the required patches? (Select two.) A. Import all listed updates into a filter. B. Right-click each update and select "Stage". C. Create a policy for each listed patch using the wizard. D. Right-click each computer and select "Update Computer". E. Import all listed computers into a target. Answer: B,C Question: 100 Page | 26 http://www.certschief.com/exam/250-407/

  27. http://www.certschief.comCertification Preparation Material Altiris Client ManagementSuite 7.1 / 7.xSolutions (such as Patch Management Solution, Inventory Solution, and Software Delivery Solution) have been integrated into the Software Management Framework. What is a benefit of this integration? A. It allows all applications installed on the framework to be accessed by all solutions. B. It allows different versions of an application installed on the framework to run side by side. C. It allows all solutions built on the framework to eliminate duplication of work and data. D. It allows all solutions built on the framework to use different sets of resources. Answer: C Question: 101 How does the Software Management Framework improve software management? A. It allows the creation of a single policy to install a software title and ensures that it remains properly installed. B. It allows for comprehensive tracking of software execution statistics. C. It allows software titles to be associated to software licenses and purchases. D. It allows for a single view of current deployments and cost details based on current installations and purchasing details. Answer: A Question: 102 The Software Update Policy Wizard is used to create the Patch Management policy, which is distributed to manage computers. How can a system administrator disable unsupported operating systems? A. For the selected operating systems, delete the software bulletin that has been selected for installation. B. For the selected operating systems, deselect the software bulletin that has been selected for installation. C. For the selected operating systems, disable the software policy. D. For the selected operating systems, remove the software policy. Answer: B Question: 103 Which component of Altiris Client ManagementSuite 7.1 / 7.xhelps reduce the cost of imaging and managing workstations from a centralized location? A. Symantec Workspace Corporate B. Ghost Solution Suite C. Deployment Solution D. Asset Management Solution Answer: C Question: 104 A maintenance window is set from 22:00 to 00:00. The Default Software Update Agent policy is set to install software updates at 03:00. A Software Update policy is created and scheduled to install as soon as possible. The Page | 27 http://www.certschief.com/exam/250-407/

  28. http://www.certschief.comCertification Preparation Material maintenance window is honored. All machines are powered on 24 hours a day, seven days a week. Assuming the policy has been applied, when is the earliest the software update can be installed? A. 03:00 B. 22:00 C. immediately D. never Answer: B Question: 105 What needs to occur for a managed computer to receive software updates? A. The targeted managed computer must be in the prerequisite maintenance window. B. The targeted managed computer must have the selected prerequisite software bulletin rule. C. The targeted managed computer must meet the selected prerequisite inventory rule. D. The targeted managed computer must have a staged bulletin. Answer: C Question: 106 A system administrator is setting up a policy to deliver a software application to an entire environment. As part of the delivery, the administrator needs to prevent installation on computers that already have the software. Which option allows execution only on computers that need the software? A. the software update staging rule B. the software detection rule C. the inventory scan definition D. the deployment plug-in configuration Answer: B Question: 107 A help desk technician is using pcAnywhere to work on a system remotely. The technician discovers that operating system files are missing and this is causing errors when logging on to the system. Which pcAnywhere feature should the technician use to solve this problem? A. file deploy B. file transfer C. file copy D. file explorer Answer: B Question: 108 A system administrator needs to add an existing software release to a specific software product. With the desired software release selected, which method should be used to complete this process? Page | 28 http://www.certschief.com/exam/250-407/

  29. http://www.certschief.comCertification Preparation Material A. Click the "Manage this software" link. B. Double-click the software release and assign it to the desired software product. C. Right-click the software release and select the Add to Software Product link. D. Right-click the software release and select the Software Catalog link and from this new page, add the software release to the desired product. Answer: B Question: 109 Which PC Transplant feature is useful when creating a Personality Package for different types of media such as CD- ROMs, USB drives, or DVDs? A. Global Filter B. Span Package C. PC Transplant Editor D. A2i Builder Answer: B Question: 110 A user must run PCTEdit.exe from which location in order to edit an existing PC Transplant package? A. \\Servername\eXpress\PCT B. Symantec Management Console Actions menu C. Windows Start Menu/Altiris/PC Transplant D. \\Servername\Deployment\Task Handler\PCT Answer: D Question: 111 A corporation received a large order of new laptops for their sales force. Based on corporate security standards, each laptop must be outfitted with several pieces of software including virus protection, VPN software, and Office software. Unfortunately, some of the software that comes from the manufacturer is prohibited on the network and must be removed. How can Deployment Solution help this corporation? A. Through use of PC Transplant, it can automatically remove unwanted software and deploy the correct software from the already installed OS. B. Through use of DeployAnywhere, it can automatically distribute the necessary software anywhere the new sales representatives live. C. Through use of Distribute Image tasks, it can distribute custom-configured operating environments with only their software installed automatically. D. Through use of Backup Software and Deploy Software tasks, it can pull off the unwanted OEM packages and push new software packages automatically. Answer: C Question: 112 Which prerequisite must be met before implementing Software Management Solution? Page | 29 http://www.certschief.com/exam/250-407/

  30. http://www.certschief.comCertification Preparation Material A. The Symantec Installation Manager must be installed on a managed computer. B. The Symantec Management Agent must be installed on a managed computer. C. The Symantec Management Platform must be installed on a managed computer. D. The Software Management Solution must be installed on a managed computer. Answer: B Question: 113 Microsoft Office has been successfully pushed out as a Quick Delivery task to a group of systems. When the administrator checks the report of software currently installed on the systems, the newly delivered software is missing. Why is the installed software missing from the report? A. The detection rule for Office was configured with an incorrect MSI code. B. The most recent Software Inventory scan was run before the delivery was completed. C. SQL Server timed out during the building of the report, causing incomplete report results. D. The Software Management Solution Agent needs to be installed on the targeted computers. Answer: B Question: 114 Which two tasks should be included in a job that will capture an image of a computer if the image will be used to image multiple computers? (Select two.) A. Prepare for Image capture B. Reboot to Automation C. Apply System configuration D. Create Image E. Reboot to PXE Answer: A,D Question: 115 A Deployment Solution job is being used to deploy a computer image and a computer's personality. Which two tasks should follow the imaging task and should be used before using a personality deployment task? (Select two.) A. Update Client Configuration B. Reboot to Production C. Copy File D. Apply System Configuration E. Reboot to Automation Answer: A,B Question: 116 Which Patch Management Solution 7.1 policy controls the notification items displayed to the user when software updates are being processed on the endpoint? Page | 30 http://www.certschief.com/exam/250-407/

  31. http://www.certschief.comCertification Preparation Material A. the Software Update Plug-in policy B. the Default Software Update Plug-in policy C. the Default Software Bulletin Plug-in policy D. the Default Patch Update Plug-in policy Answer: B Question: 117 An inventory policy is set to run weekly at 18:00 on Wednesdays and is present on all computers. However, a user shuts down a laptop right after the inventory starts at 18:00 and turns it on the next morning at 08:00. When will the inventory run? A. Thursday morning at 08:00 B. next Wednesday evening at 18:00 C. Thursday evening at 18:00 D. never Answer: B Question: 118 An administrator sets up an inventory to run at 16:00 weekly on Wednesdays, with the setting to throttle inventory reporting evenly over a period of 4 hours. All clients are refreshing their configuration policies every 4 hours. The current time is 08:00 on Tuesday morning. When will the inventory be collected? A. Tuesday, within 4 hours of receiving the policy B. Wednesday, between 14:00 and 18:00 C. Wednesday, at 16:00 D. Wednesday, between 16:00 and 20:00 Answer: D Question: 119 When reviewing compliance reports for the Microsoft products, the system administrator notices that the data and bulletins have remained unchanged for two weeks. What should the administrator check to address this issue? A. Revise Software Update task B. Import Patch Data for Microsoft policy C. Patch Management Import task D. Microsoft Compliance Update policy Answer: B Question: 120 What can be used to create pivot-based reports from data gathered by Inventory Solution? A. CMDB Solution B. Advanced Reporting C. IT Analytics Page | 31 http://www.certschief.com/exam/250-407/

  32. http://www.certschief.comCertification Preparation Material D. Customized Reporting Answer: C Question: 121 In addition to pcAnywhere and Inventory Solution, which component of Altiris Client ManagementSuite 7.1 / 7.xcan be used for a unified management of both Windows and Mac OS X based computers? A. Software Portal B. Workspace Virtualization C. Deployment Solution 7.1 SP1 D. Application Metering Answer: A Question: 122 What are two Software Update Plug-in responsibilities? (Select two.) A. gathers an inventory on all installed software and their associated service pack level B. sends execution results of all software installed to the Notification Server C. gathers specific inventory on supported operating systems, applications, and the associated service pack level D. sends execution results of applied software bulletins to the Notification Server E. notifies users before a Managed Delivery policy executes Answer: C,D Question: 123 Microsoft released several critical and important updates and a system administrator needs to determine which updates are applicable to the existing environment. Where can the administrator access additional information about applicable software updates? A. Microsoft Vulnerability Analysis B. Patch Remediation Center C. Software Updates Catalog D. Software Update Management Center Answer: B Question: 124 What are two possible Patch Management Solution 7.1 configuration changes that can be made to reduce the total number of bulletins managed in the solution? (Select two.) A. Deselect additional languages that are undesired in the Managed Languages section of the Patch Management core settings. B. Edit the PMImport.xml and delete rows that contain unused language and product names found in the file. C. Select Microsoft product names from the Resource Inclusions section of the Microsoft settings. D. Select unused Microsoft product names in the environment in the Resource Exclusions section of the Microsoft settings. E. Select the Disable All Superseded Software Updates setting within the Import Data for Microsoft policy. Page | 32 http://www.certschief.com/exam/250-407/

  33. http://www.certschief.comCertification Preparation Material Answer: A,D Question: 125 A company has an environment where only some computers have the Symantec Workspace Virtualization (SWV) agent installed. When the system administrator distributes an MSI application through a Managed Delivery policy to all company computers and installs the application into a virtual layer, what will happen to computers without the SWV Agent? A. The application installation will fail. B. The SWV agent will automatically be installed; then the application will be installed into a virtual layer. C. The application will be installed as nonvirtual, but the application will be moved into a virtual layer after the SWV agent is installed. D. The application will be installed as nonvirtual. Answer: D Question: 126 A customer is implementing pcAnywhere and has very strict security guidelines. How can a system administrator help ensure that pcAnywhere is secure and still use all of its features? A. select View Only mode B. use PID/PPS C. block the unsecure ports D. use encryption Answer: D Question: 127 Which information is gathered by a Targeted Software Inventory? A. installed software details from a computer in a specific part of the network B. installed software details for previously deployed software C. installed software details for a specific software resource D. installed software details from computers that used the Software Portal Answer: C Question: 128 The Delta Hardware Inventory policy is configured to run daily at 18:00. The Delta Software Inventory policy is configured to run weekly on Mondays at 18:00. Both policies are enabled for all managed computers. What will happen on Mondays at 18:00? A. Both policies will run simultaneously, only reporting their uniquely different information. B. Both policies will run simultaneously, reporting all their overlapping information. C. The weekly task will run on Monday and the daily task will be postponed until its next scheduled run on Tuesday. D. One policy will run and the second policy will start once the first completes. Answer: D Page | 33 http://www.certschief.com/exam/250-407/

  34. http://www.certschief.comCertification Preparation Material Question: 129 What can cause duplicate entries for a software resource in the Software Catalog? A. The same software is added to the Software Catalog by different methods. B. Two versions of the same application exist within the Software Catalog. C. Two software applications use the same detection rule within the Software Catalog. D. Two or more applications reference the same installation files within the Software Catalog. Answer: A Question: 130 Which two agents or plug-ins are required for Patch Management to successfully deploy client patches? (Select two.) A. Symantec Management Agent B. Software Delivery Agent Plug-in C. Patch Management Update Agent Plug-in D. Software Update Agent Plug-in E. Patch Management Agent Plug-in Answer: A,D Question: 131 Which agent plug-in must be distributed to deploy patches? A. Inventory Rule Agent Plug-in B. Software Management Framework Agent Plug-in C. Patch Management Agent Plug-in D. Software Update Agent Plug-in Answer: D Question: 132 A system administrator needs to change the domain to which a computer belongs. What must the administrator create before creating a task to change a computer's domain? A. a system configuration B. an automation configuration C. a Sysprep imaging configuration D. an Apply System Configuration task Answer: A Question: 133 Which configuration step should be completed before a computer image can be sent to a managed computer without an existing operating system installed on its hard drive? Page | 34 http://www.certschief.com/exam/250-407/

  35. http://www.certschief.comCertification Preparation Material A. create preboot configurations B. install an operating system on the hard drive and install the applicable agents C. configure predefined computers D. configure initial deployment Answer: A Question: 134 What must be done after a managed computer has been patched? A. Run a Software Inventory task. B. Run a Microsoft Vulnerability Analysis task. C. Update the Agent Configuration policy. Answer: C Question: 135 What are two results of configuring the default settings for all new Managed Software Delivery policies? (Select two.) A. It speeds up the overall creation of the policies. B. it prevents users from being able to change policies. C. It provides greater flexibility during the creation of the policies D. It promotes consistency across policies. E. It centralizes the distribution of the policies. Answer: A,D Question: 136 When manually creating an entry within the Software Catalog, what is the function of the detection rule? A. It determines whether the software entry is installed. B. It determines whether an update for the software has been detected C. It determines if a system is applicable for the software entry D. It determines Which files have been detected as identifiers for the software entry. Answer: A Question: 137 Which Patch Management option enables error checking on Differential mode replication? A. Verity Data Integrity B. Verity Differential Integrity Check C. Verity Differential Replication D. Verity Replication Mode Answer: A Page | 35 http://www.certschief.com/exam/250-407/

  36. http://www.certschief.comCertification Preparation Material Question: 138 How should an administrator automate the deployment of an application that requires input during the install? A. create a Visual Basic Script to apply the file and registry changes B. create a Visual Basic Script that simulates keystrokes to provide the required input C. create a Distribute Software task to run on client machines D. create an installer using Wise SetupCapture Answer: D Question: 139 What is the role of the Software Catalog in application deployment? A. provides installation information B. is used to look up target client systems C. stores installation files D. provides application inventory for target systems Answer: A Question: 140 Where would an administrator assign an application to the Software Portal? A. Software Library B. Software Catalog C. Managed Delivery policy D. Quick Delivery task Answer: B Page | 36 http://www.certschief.com/exam/250-407/

  37. http://www.certschief.comCertification Preparation Material Demo Product - For More Information - Visit: http://www.certschief.com/exam/250-407/ 20% Discount Coupon Code: 20off2016 Page | 37 http://www.certschief.com/exam/250-407/

More Related