Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

250-447 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-447 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Administration of Symantec Client Management Suite 8.5
  • Last Update: May 5, 2024
  • Questions and Answers: 129
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-447 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-447 Practice Exam Questions with Answers Administration of Symantec Client Management Suite 8.5 Certification

Question # 6

An administrator purchased a server with 16 core processors, 4 local HDDz, and 32 GB of RAM. The administrator plants to install MSSQL Server locally on the NS. What is the maximum number of managed computers, according to Symantec best practice, that hardware will support?

A.

5000

B.

500

C.

10000

D.

1000

Full Access
Question # 7

Which two (2) fields are essential to the tracking and reporting of an associated asset when creating a lease schedule in IT Management Suite 8.5? (Select two.)

A.

Internal Reference

B.

Start Date and End Date

C.

Covered Hardware

D.

Contract's Assigned User

E.

Contract's Location

Full Access
Question # 8

Which Symantec Management Agent setting should an admin modify depending on the number?

A.

The Maintenance Windows Schedule

B.

The download new configuration interval

C.

The agent blackout schedule

D.

The delta resource membership update Schedule

Full Access
Question # 9

Which two (2) product suite are available as separate products and are included in IT Management Suite 8.5? (select two)

A.

Asset management suite 8.5

B.

Server Monitor suite 8.5

C.

Contract management suite 8.5

D.

Software management suite 8.5

E.

Client management suite 8.5

Full Access
Question # 10

Which benefit does a configuration item association provide in the asset management process?

A.

Prevents the linking of unrelated items to add in troubleshooting

B.

Links resources for more convenient access to associate data

C.

Links unrelated items to add in troubleshooting asset discrepancies

D.

Prevents the linking of dissimilar items to help in auditing

Full Access
Question # 11

Which function within the Symantec Installation Manager ensures that all prerequisites are met prior to installing IT Management Suite 8.5?

A.

Installations manager verification service

B.

Install Readiness Check

C.

prerequisite system check

D.

Symantec system check

Full Access
Question # 12

A corporate president has decided to centralize management of operating system updates after a virus spread through the corporate network. The president requires the ability to create reports about which updates have been deployed, which updates are still needed, and other information that will demonstrate the security of the network.

Which two (2) features of IT Management Suite 8.5 provide all of the required functionality? (Select two.)

A.

IT Analytics

B.

Patch Management Solution

C.

Software Management Solution

D.

Inventory Solution

E.

Monitor Solution

Full Access
Question # 13

Which agent policy includes tickle and power management settings, package multicast settings, authentication settings, and event capture settings?

A.

Targeted Agent Settings policy

B.

Global Agent Settings policy

C.

Maintenance Window policy

D.

Agent Registration policy

Full Access
Question # 14

Which component of the Symantec Management Platform attempts to choose a new communication path when the default communication method with the Notification Server is unavailable?

A.

Site Server

B.

Notification Server

C.

Internet Gateway

D.

Symantec Management Agent

Full Access
Question # 15

Refer to the exhibit.

250-447 question answer

What is shown by clicking “Referenced By” whitin a filter?

A.

Whether the filter is query builder or raw SQL based

B.

The policies and targets that use the filter

C.

The account that created the filter

D.

The data clases the filter references

Full Access
Question # 16

An administrator notices a large amount of task traffic within the environment. The administrator decides to implement secondary site servers to alleviate task traffic congestion. There are three sites that each have 5,000 managed computers. The administrator has two servers and three old desktops each running Windows Server 2012 to use as site servers.

What should the administrator do to accommodate the different hardware types?

A.

Configure sites and subnets to instruct the managed computers to leverage a specific Task Server

B.

Set the desktop site servers as unconstrained while leaving the server-based site servers as constrained

C.

Create a task settings policy to limit the number of clients the desktop site servers can accommodate

D.

Set the server-based site servers as unconstrained, while leaving the desktop site servers as constrained

Full Access
Question # 17

What simple yet powerful tool is used for analyzing MS SQL queries and code executing on the Notification Server and its associated processes?

A.

Altiris Perfmon

B.

Altiris Event Viewer

C.

Altiris Profiler

D.

Altiris Log Viewer

Full Access
Question # 18

Which step must an admin complete prior to sending a computer image to a pre-defined or managed computer that lacks an existing operating system installed on the hard drive?

A.

Format the hard drive

B.

Configure driver database management

C.

Create a pre-boot configuration

D.

Install an operating system on the hard drive and install the applicable agents

Full Access
Question # 19

An administrator needs to configure a policy that specifies the scheduled time and duration of when an operation can be performed on a managed computer.

Which policy should the administrator use?

A.

Agent Registration policy

B.

Global Agent Settings policy

C.

Maintenance Window policy

D.

Targeted Agent Settings policy

Full Access