250-405 Administration of Symantec Management Platform Test Set 4

What should an administrator do to ensure the correct sequence of a series of tasks?


Options are :

  • create a sequential task that calls the tasks
  • drop the tasks on the systems in the correct order
  • schedule the tasks to occur in the correct order
  • create a job that calls the tasks

Answer : create a job that calls the tasks

Which rule must be followed when configuring a hierarchy?


Options are :

  • Each Notification Server can have zero or one parent; each Notification Server can have zero or more children.
  • Each Notification Server must have one parent; each Notification Server must have one child.
  • Each Notification Server can have zero or one parent; each Notification Server can have zero or one child.
  • Each Notification Server can have zero or more parents; each Notification Server can have zero or one child.

Answer : Each Notification Server can have zero or one parent; each Notification Server can have zero or more children.

Which two Resource Attributes can be inherited from Base Resource Types? (Select two.)


Options are :

  • Association Types
  • Data Classes
  • Resource Scope
  • Resource Types
  • Organizational Group

Answer : Association Types Data Classes

ST0-135 Symantec Network Access Controls Technical Exam Set 3

An administrator has cloned the Windows x64 filter and wants to modify it to show unmanaged Windows x64 computers. Given the information provided in the exhibit, which action should the administrator perform to accomplish this task?


Options are :

  • in the "{0} Equals section" add a [vComputerResource].[UnManaged] rule to read 1
  • in the "{0} Equals section" add a [vComputerResource].[IsManaged] rule to read 0
  • in the "{0} Equals section" modify the [vComputerResource].[IsManaged] rule to read 0 instead of 1
  • in the "{1} Like section" add an [AeX AC Identification].[System Type] expression of '%unmanaged%

Answer : in the "{0} Equals section" modify the [vComputerResource].[IsManaged] rule to read 0 instead of 1

How are security roles, privileges, and permissions replicated in a hierarchy?


Options are :

  • Down a hierarchy
  • They are NOT replicated
  • Up and down a hierarchy
  • Up a hierarchy

Answer : Down a hierarchy

An administrator wants to disable communication between the Notification Server and the Symantec Management Agents during the first hour of the business day to eliminate additional traffic on the network. How should the administrator configure this arrangement?


Options are :

  • by creating a new policy that disables the Altiris Agent policy at a scheduled time
  • by adding a blockout on the Agent Settings-Targeted policy
  • by adding a blockout to the Network Blockout policy
  • by adding a blockout on the Agent Settings-Global policy

Answer : by adding a blockout on the Agent Settings-Targeted policy

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 12

A named resource target contains 50 computers in the Sales Department. Several policies and tasks are applied to this target. An administrator modifies one of these policies by changing this target so that the policy now applies to 25 computers in the Engineering Department. How are the policies and tasks affected?


Options are :

  • Only the policies and tasks that the administrator created are affected and apply to the 25 computers in the Engineering Department.
  • Every policy and task that applies to the target now applies to 75 computers in both the Sales and Engineering Departments.
  • Every policy and task that applies to the target now only applies to the 25 computers in the Engineering Department
  • Only the policy that the administrator changed is affected; all others only apply to the 50 computers in the Sales Department.

Answer : Every policy and task that applies to the target now only applies to the 25 computers in the Engineering Department

What is the difference between security privileges and permissions?


Options are :

  • Privileges specify actions a user can perform; permissions specify security settings inherited from a parent console interface item.
  • Privileges specify users and groups in a security role; permissions specify console interface items a user can access.
  • Privileges specify security role to which a user belongs; permissions specify security settings inherited from a parent console interface item.
  • Privileges specify actions a user can perform; permissions specify console interface items a user can access.

Answer : Privileges specify actions a user can perform; permissions specify console interface items a user can access.

Which component is used to configure Altiris Agent settings?


Options are :

  • Site Server
  • Configuration Management Database (CMDB)
  • Symantec Management Console
  • Notification Server

Answer : Symantec Management Console

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 2

There are Notification Servers in New York, Chicago, and Los Angeles. Corporate headquarters are in New York and should manage all computers. Administrators in Chicago and Los Angeles should only have access to their own computers. How should hierarchy be configured to support these security requirements?


Options are :

  • Configure security roles in New York and replicate them upward
  • Configure security roles in New York and replicate them downward
  • Configure security roles on each Notification Server and disable replication
  • Configure security roles on each Notification Server and replicate them upward

Answer : Configure security roles in New York and replicate them downward

Which organizational view shows all resources in the Configuration Management Database?


Options are :

  • The Asset organizational view
  • The Default organizational view
  • A custom organizational view
  • The Active Directory Domain organizational view

Answer : The Active Directory Domain organizational view

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 12

What must an administrator do to edit a sample task?


Options are :

  • Clone the sample task and edit the clone
  • Right-click and select the task's properties
  • Clone the sample task and edit the original task
  • Clone the source folder of the sample

Answer : Clone the sample task and edit the clone

Which action does the Client Task Sub Agent perform?


Options are :

  • sends an IP tickle packet
  • retrieves status information from the Task Server
  • receives job and task information
  • multicasts tasks to other Client Task Agents

Answer : receives job and task information

A company has created an organizational group Human Resources (HR) and properly secured it through role and scope security. All HR computers must be in this group to prevent unauthorized access to personnel information. All HR computers run a specific application. How can the administrator automatically assign new HR computers to the HR organizational group?


Options are :

  • create a security policy
  • create a configuration policy
  • create an automation policy
  • create a user policy

Answer : create an automation policy

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 2

What is the minimum version of Notification Server 6.0 that can be upgraded to Symantec Management Platform 7.5?


Options are :

  • Notification Server 6.0 R11
  • Notification Server 6.0 R6
  • Notification Server 6.0 R3
  • Notification Server 6.0 R13

Answer : Notification Server 6.0 R13

Which two objects automatically group resources based on their specific characteristics? (Select two.)


Options are :

  • automation filters
  • dynamic targets
  • static filters
  • static targets
  • dynamic filters

Answer : dynamic targets dynamic filters

Which Symantec Management Platform component processes data sent by the Altiris Agent and stores it in the Configuration Management Database?


Options are :

  • Software Management Framework
  • Site Services
  • Notification Server
  • Symantec Management Console

Answer : Notification Server

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 6

What is achieved by increasing the configuration request interval of the Symantec Management Agent?


Options are :

  • It reduces the size of the database.
  • The Inventory Rule agent runs less often.
  • It allows older Windows operating systems to be managed by the Symantec Management Agent.
  • It reduces the processing load and network traffic on the Notification Server.

Answer : It reduces the processing load and network traffic on the Notification Server.

Which statement is true about the Default Shared Schedules shipping with Notification Server?


Options are :

  • They can override maintenance windows.
  • They cannot be deleted.
  • They cannot be modified.
  • They cannot be disabled.

Answer : They cannot be deleted.

Which two settings in the Targeted Agent Settings page are most likely to negatively affect server performance if configured incorrectly? (Select two.)


Options are :

  • Enable tickle on Altiris Agents
  • Compress events over:
  • Allow Altiris Agents to use multicast for downloading packages
  • Disable communication at startup and after blockouts for up to:
  • Download new configuration every:

Answer : Compress events over: Download new configuration every:

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 6

How is resource scoping implemented?


Options are :

  • by including appropriate filters and organizational views and groups in a target's rules
  • by creating multiple organizational views and groups that contain appropriate subset of resources
  • by replacing filters and organizational views and groups in a target with appropriate secured data classes
  • by granting permissions to appropriate organizational views and groups to a security role

Answer : by granting permissions to appropriate organizational views and groups to a security role

What is the first point of contact for the Altiris Agent?


Options are :

  • Package Service
  • Notification Server
  • Symantec Management Console
  • Task Service

Answer : Notification Server

Which tab in the Query Builder allows the user to view the filter source statements?


Options are :

  • Filtered Query
  • Parameter Query
  • Field Query
  • Resolved Query

Answer : Resolved Query

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 6

How long are User-based policies cached on a managed computer?


Options are :

  • Two months
  • One week
  • Two weeks
  • One month

Answer : One week

Which feature characterizes the centralized management model?


Options are :

  • A single IT management team
  • A large company with subsidiaries
  • Several data centers
  • Language barriers between sites

Answer : Language barriers between sites

What is the first place to start troubleshooting issues with the Symantec Management Platform?


Options are :

  • The Altiris Profiler
  • Perfmon
  • Windows Event Viewer
  • The Altiris Log Viewer

Answer : The Altiris Log Viewer

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 3

Which tool must be used to modify licensing?


Options are :

  • Symantec Installation Manager
  • Altiris Installation Manager
  • Symantec Management Console
  • Altiris Management Console

Answer : Symantec Installation Manager

What is the Symantec recommended method for a Service Desk agent to use to install the Altiris Agent when visiting a user's cubicle?


Options are :

  • Agent Upgrade Policy
  • Scheduled Push
  • Manual Push
  • Manual Pull

Answer : Manual Pull

What can the administrator use to have resources assigned to specific sites without administrative intervention and as they register with the Notification Server?


Options are :

  • Automation policy
  • Active Directory import policy
  • Inventory policy
  • Custom Inventory policy

Answer : Automation policy

250-400 Administration Altiris Client Management Suite Exam Set 3

Two administrators run the same report that displays Windows XP SP1 workstations imported from Active Directory. The North America Symantec Administrator returns 2,500 workstations. The Marketing Manager returns 500 workstations. When they compare the results, they find that there is an overlap of 100 workstations. Why is there an overlap in the reports?


Options are :

  • Because of workstation security privilege intersection
  • Because the workstations belong to multiple organizational groups in same organizational view.
  • Because of workstation security role filters
  • Because the workstations belong to organizational groups in separate organizational views

Answer : Because the workstations belong to organizational groups in separate organizational views

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions