Which two (2) elements can an administrator include when building a resource target in the Computers blade of the IT Management Views? (Select two.)
A. Resource filters
B. Data classes
C. Resource associations
D. Organizational groups
E. Filter criteria
Which service must an administrator enable on a UNIX, Linux, or Mac endpoint to complete a push installation of the Symantec Management Agent 8.5?
A. mosh
B. telnet
C. ssh
D. init
Which two (2) fields are essential to tracking assets when creating a warranty contract in IT Management Suite 8.5? (Select two.)
A. Contract's Assigned User
B. Covered Hardware
C. Contract's Location
D. Start and End Date
E. Internal Reference
Which two (2) items are attributes of a configuration item in IT Management Suite 8.5? (Select two)
A. Resource association
B. Collation
C. View
D. Hierarchy
E. Data class
Which step is required before a user can request software through the Software Portal?
A. Search the Software Catalog
B. Submit a request for a user account
C. Provide manager contact information
D. Configure a user profile
An administrator must deploy software to a user's computer to remedy a problem. The administrator is trying to determine whether to create a policy or a task to deploy the software to the user's computers. In which two situations should the admin choose a policy instead of a task? (Select 2)
A. When actions are recurring
B. When actions are to be performed on a Schedule
C. When actions are to be performance on only a few resources
D. When actions are to be performed only once
E. When actions needs to be performed in near-real time
An admin for a hospital system is tasked with tracking electrocardiogram (EKG) devices. The admin decides to base the custom EKG resource type on the computer
What does basing this custom resource type on the existing resource type allow?
A. The ability to create EKG resources type as computer resources
B. The ability to leverage the computer resoruce type icon for EKG resoruces within the console
C. The ability to inherit data class and resource associations of the computer resorurce type
D. The ability to utilize a computer report as a base for EKG report
What is the maximum number of computers that could be adequately managed for an "on- box" installation of the Microsoft SQL Server with Notification Server
A. 10,000
B. 7,500
C. 12,500
D. 5,000
An administrator is tasked with installing a site server at a small, remote site. The site will have 12 endpoints communicating with this new site server.
What is the primary consideration in determining whether to install the site server with a desktop-class computer a operating system or a server-class computer and operating system?
A. The maximum amount of memory that can be installed on the computer
B. The number and size of packages to be staged on the site server
C. The frequency of tasks being executed on the clients
D. The number of concurrent TCP connections
Which IT Management Suite 8.5 feature provides an administrator with security a resource management that limits the data a user can access based on a security role membership?
A. resource membership
B. Security role limiting
C. Security scoping
D. Resource scoping
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-447 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.