What does basing this custom resource type on the existing resource type allow?
An admin for a hospital system is tasked with tracking electrocardiogram (EKG) devices. The admin decides to base the custom EKG resource type on the computer What does basing this custom resource type on the existing resource type allow?A . The ability to create EKG resources type as computer resourcesB...
Which steps must the administrator take to track the vehicles?
An administrator is tasked with tracking the IT department's vehicles. The department currently has 8 vehicles and is expected to add 4 additional vehicles during the next year. Which steps must the administrator take to track the vehicles?A . Create a vehicle resource type, create vehicle-related data classes, add the...
Which object can an admin assign security permissions to that will allow resource scoping to occur in a report?
Which object can an admin assign security permissions to that will allow resource scoping to occur in a report?A . Resource targetB . Organizational groupC . Resource filterD . CMDB ruleView AnswerAnswer: C
Which resource containers can an administrator arrange in a hierarchy so that one container may include other containers?
Which resource containers can an administrator arrange in a hierarchy so that one container may include other containers?A . Resource targetsB . Organizational views and groupsC . Resource filtersD . Policies and tasksView AnswerAnswer: B
An administrator is creating a policy to deliver a software application to an entire environment, but needs to prevent installation on computers that already have the software which option allows the installation of the software application only on computers that need the software?
An administrator is creating a policy to deliver a software application to an entire environment, but needs to prevent installation on computers that already have the software which option allows the installation of the software application only on computers that need the software?A . The software detection ruleB . The...
Which two (2) features of IT Management Suite 8.5 provide all of the required functionality?
A corporate president has decided to centralize management of operating system updates after a virus spread through the corporate network. The president requires the ability to create reports about which updates have been deployed, which updates are still needed, and other information that will demonstrate the security of the network....
Which option in the SMC will cause an inventory policy to run and report data at random times during a user-specified window?
Which option in the SMC will cause an inventory policy to run and report data at random times during a user-specified window?A . Throttle inventory scan evenly over a period of pre-determined hoursB . Apply to computersC . System resource usageD . randomize execution scheduleView AnswerAnswer: B
Which two (2) default secury roles allow a user to créate and import software resources in IT Management Suite 8.5? (Select two)
Which two (2) default secury roles allow a user to créate and import software resources in IT Management Suite 8.5? (Select two)A . Software Portal AdministratorsB . Symantec AdministratorsC . Symantec SupervisorsD . Symantec Software LibrarianE . Symantec Level 2 WorkersView AnswerAnswer: D,E
Which policy should the administrator use?
An administrator needs to configure a policy that specifies the scheduled time and duration of when an operation can be performed on a managed computer. Which policy should the administrator use?A . Agent Registration policyB . Global Agent Settings policyC . Maintenance Window policyD . Targeted Agent Settings policyView AnswerAnswer:...
What happens to computers without the SWV Agent when an administrator distributes an MSI application through a Managed Delivery policy to all company computers and installs the application into a virtual layer?
A company has an environment where only some computers have the Symantec Workspace Virtualization (SWV) agent installed. What happens to computers without the SWV Agent when an administrator distributes an MSI application through a Managed Delivery policy to all company computers and installs the application into a virtual layer?A ....