Which object should an administrator use to collect a full hardware inventory using a schedule that also provides the overall compliance of the targeted endpoints?
Which agent policy contains settings to configure the alternate Notification Server URL, UNIX/Linux/Mac (ULM) settings, bandwidth throttling, and communication blockouts?
Which two (2) elements can an administrator include when building a resource target in the Computers blade of the IT Management Views? (Select two.)
An administrator needs to create an image that can be used for a mass deployment in the company. Which Deployment Solution task should the administrator perform before creating the image?
An administrator purchased a server with 16 core processors, 4 local HDDz, and 32 GB of RAM. The administrator plants to install MSSQL Server locally on the NS. What is the maximum number of managed computers, according to Symantec best practice, that hardware will support?
Which two (2) critical pieces of information should an administrator consider when working with organizational views and organizational groups? (Select two.)
Which Windows Scheduled Tasks are used to recreate codebases for all packages that may be in an "Invalid" state, when validating Package Services operation?
An administrator needs to quickly deploy Windows 7 to several new computers without pre-configured operating systems. The administrator decides to use an existing Ghost image since the necessary drivers have already been added to the Deploy Anywhere database. The Network Boot Services configuration is set to respond only to known computers.
How should the administrator proceed?
Which service must an administrator enable on a UNIX, Linux, or Mac endpoint to complete a push installation of the Symantec Management Agent 8.5?
Which step is required before a user can request software through the Software Portal?
What simple yet powerful tool is used for analyzing MS SQL queries and code executing on the Notification Server and its associated processes?