Which file type is used in PC Transplant to describe all of the components that are need to transfer an application’s settings and data files?

Which file type is used in PC Transplant to describe all of the components that are need to transfer an application’s settings and data files?A . PBT fileB . A2i fileC . PTP fileD . PCT fileView AnswerAnswer: B

April 18, 2021 No Comments READ MORE +

Which function within the Symantec Installation Manager ensures that all prerequisites are met prior to installing IT Management Suite 8.5?

Which function within the Symantec Installation Manager ensures that all prerequisites are met prior to installing IT Management Suite 8.5?A . Installations manager verification serviceB . Install Readiness CheckC . prerequisite system checkD . Symantec system checkView AnswerAnswer: B

April 17, 2021 No Comments READ MORE +

Which two (2) IT Management Suite 8.5 features should an administrator use in order to display an alert if a specified metric indicates a problem on a server? (Select two.)

Which two (2) IT Management Suite 8.5 features should an administrator use in order to display an alert if a specified metric indicates a problem on a server? (Select two.)A . Event ConsoleB . Event policyC . Monitor policyD . Notification ruleE . Automation ruleView AnswerAnswer: A,C

April 17, 2021 No Comments READ MORE +

What is a benefit of the IT Analytics MultiCMDB feature?

What is a benefit of the IT Analytics MultiCMDB feature?A . Provide importing of data across one or more Notification server environmentB . Provides reporting across one or more Notification server environmentsC . Provides exporting and importing of data across one or more notification server environmentsD . Provides scoping of...

April 17, 2021 No Comments READ MORE +

Which action does the Symantec Management Agent perform when it receives a tickle packet?

Which action does the Symantec Management Agent perform when it receives a tickle packet?A . It requests a policy update from the Notification Server.B . It sends its list of package download locations to the Package Server.C . It requests task information from a Task Server.D . It sends basic...

April 17, 2021 No Comments READ MORE +

What is the function of the applicability rule?

What is the function of the applicability rule?A . It determines conflicts with other software resources within the Software CatalogB . It determines if a software resource is an appropriate candidate for installation based on criteriaC . It determines if a software resource has all the required components for deliveryD...

April 15, 2021 No Comments READ MORE +

Which method is the quickest for distributing the application?

An administrator is tasked with distributing an application as soon as possible to the traveling sales organization. The sales organization works remotely 100% of the time and does NOT log on to the network. Management on their computers is accomplished with an internet gateway with an internet site server. Which...

April 15, 2021 No Comments READ MORE +

Which two (2) elements can an administrator include when building a resource target in the Computers blade of the IT Management Views? (Select two.)

Which two (2) elements can an administrator include when building a resource target in the Computers blade of the IT Management Views? (Select two.)A . Resource filtersB . Data classesC . Resource associationsD . Organizational groupsE . Filter criteriaView AnswerAnswer: A,E

April 15, 2021 No Comments READ MORE +

Which two (2) fields are essential to tracking assets when creating a warranty contract in IT Management Suite 8.5? (Select two.)

Which two (2) fields are essential to tracking assets when creating a warranty contract in IT Management Suite 8.5? (Select two.)A . Contract's Assigned UserB . Covered HardwareC . Contract's LocationD . Start and End DateE . Internal ReferenceView AnswerAnswer: B,D

April 14, 2021 No Comments READ MORE +

Which IT Management Suite 8.5 feature provides an administrator with security a resource management that limits the data a user can access based on a security role membership.

Which IT Management Suite 8.5 feature provides an administrator with security a resource management that limits the data a user can access based on a security role membership.A . resource membershipB . Security role limitingC . Security scopingD . Resource scopingView AnswerAnswer: B

April 14, 2021 No Comments READ MORE +