Year End Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

250-447 Questions and Answers

Question # 6

What do the SMA status icons indicates? Drag and drop the status descriptions on the left to the corresponding SMA status icon on the right.

Full Access
Question # 7

A company has an environment where only some computers have the Symantec Workspace Virtualization (SWV) agent installed.

What happens to computers without the SWV Agent when an administrator distributes an MSI application through a Managed Delivery policy to all company computers and installs the application into a virtual layer?

A.

The application installation fails

B.

The application is installed as non-virtual, but the application is moved into a virtual layer after the SWV agent is installed

C.

The SWV agent is automatically installed; then the application is installed into a virtual layer

D.

The application is installed as non-virtual

Full Access
Question # 8

How can an administrator achieve greater efficiency and consistency when deploying multiple Managed Software Delivery policies to endpoints?

A.

Configure and run the Software Portal Settings policy to update existing Managed Software Delivery policies with default settings

B.

Configure the Software Catalog Item task to specify standardized settings for newly created Managed Software Delivery policies

C.

Update the Managed Delivery Settings policy to define standard default settings for new Managed Delivery policies

D.

Enable the Software Product Recalculation Schedule task to update existing Managed Software Delivery policies with predefined settings

Full Access
Question # 9

Which two (2) endpoint management features are available in IT Management Suite 8.5? (Select two.)

A.

Asset Barcoding and Tracking

B.

Centralized Management Platform

C.

Browser Agnostic Management Interface

D.

Software License Management

E.

Filevault Encryption Management

Full Access
Question # 10

Which two (2) console items should an administrator use to specify the accounts used by the notification server to access wmi, amt dash, and other management protocols? (select two)

A.

Security risk manager

B.

Event console

C.

Symantec access manager

D.

Credential management

E.

Network discovery task

Full Access
Question # 11

How can an administrator quickly view and export report results while creating a filter based on the location of computers?

A.

Executing the Filter Results Report Builder

B.

Executing Assets by Location Organizational View Builder

C.

Executing and saving the IT Analytics Computers by Location Report Builder

D.

Executing the Computers by Location Report Builder

Full Access
Question # 12

What is the risk to the inventory data gathered from these endpoints, if an Inventory Policy is created with the throttling period set to extend after users typically shut down computers and go home?

A.

All inventory tasks will fail because they are not scheduled

B.

All Inventory tasks will fail because they missed their scheduled time

C.

Inventory tasks will succeed because the random start time is outside the throttling period

D.

Inventory tasks will fail because they missed their random start time in the throttling period

Full Access
Question # 13

Which benefit does a configuration item association provide in the asset management process?

A.

Prevents the linking of unrelated items to add in troubleshooting

B.

Links resources for more convenient access to associate data

C.

Links unrelated items to add in troubleshooting asset discrepancies

D.

Prevents the linking of dissimilar items to help in auditing

Full Access
Question # 14

How can an administrator associate an asset with more than one owner?

A.

Set the "Ownership Rule" to "Department Precedence"

B.

Set the "Automatic Updating" of the Organizational Hierarchies

C.

Set the "Ownership Style" to "Multiple" or "Multiple with Warning"

D.

Set the "Ownership Details" to the "Edit View" for each asset type

Full Access
Question # 15

Which step is required before a user can request software through the Software Portal?

A.

Search the Software Catalog

B.

Submit a request for a user account

C.

Provide manager contact information

D.

Configure a user profile

Full Access
Question # 16

An administrator needs to create an image that can be used for a mass deployment in the company. Which Deployment Solution task should the administrator perform before creating the image?

A.

Run the Deploy Sysprep task before cloning

B.

Run the Prepare for Image Capture task before cloning

C.

Run SIDGen to prepare the image for deployment

D.

Run the Capture Personality task before cloning

Full Access
Question # 17

What is the most likely cause when an endpoint that is in Cloud Enabled Management mode is unable to retrieve packages from a site server defined properly in the “Default Internet Site”

A.

The user added the site server to the notification server as TCP port 443 instead of port 4726

B.

The user added the site server to the Internet Gateway with TCP Port 443 instead of port 4726

C.

The user added the site server to the Internet Gateway with TCP Port 4726 instead of port 443

D.

The user added the site server to the notification server as TCP port 4726 instead of port 443

Full Access
Question # 18

An administrator must deploy software to a user´s computer to remedy a problem. The administrator is trying to determine whether to create a policy or a task to deploy the software to the user´s computers. In which two situations should the admin choose a policy instead of a task? (Select 2)

A.

When actions are recurring

B.

When actions are to be performed on a Schedule

C.

When actions are to be performance on only a few resources

D.

When actions are to be performed only once

E.

When actions needs to be performed in near-real time

Full Access
Question # 19

Which ITMS 8.5 component does the Symantec Management Agent query to obtain a list of packages download locations?

A.

Software Management Framework

B.

Internet Gateway

C.

Package Server

D.

Notification Server

Full Access