1.
An administrator receives notification of a new vulnerability threat from Symantec Deepsight Alert Services. The alert includes the name of an executable that should be prevented from running. Which policy should the administrator configure?
2.
The IT Security department wants to prevent all versions of a particular file sharing application from running on company computers. Where must the software resource be defined before it can be prevented from running?
3.
A system administrator is testing the delivery of an application. During deployment, the administrator determines that the install path of an MSI needed to be changed without modifying the MSI. The administrator needs to change the command line parameters of the install package. Which policies would be affected when the default install command line of a software package is modified in the Software Catalog?
4.
An administrator is reviewing software resources in the software catalog. There is a duplicate for a software resource. The administrator has initiated the Resolve Duplicate Software Resources Wizard and selected the option to merge duplicate resources. What will happen to the duplicate entries in the Software Catalog?
5.
When manually creating an entry within the Software Catalog, the administrator needs the Managed Delivery policy to verify that prerequisite software is installed before deploying a new application. What should the administrator use to execute a prerequisite check?

 
6.
After customizing the preboot configuration files, previously created configurations need to be updated. Each file is highlighted and then the option to rebuild them is selected. After all items have been updated, the Save button on the policy is selected to ensure all changes are stored in the database. However, after several hours or even a day, the configuration files on the PXE servers maintain an old date instead of the new date. Why do the PXE servers have the old date?
7.
A software was virtualized during a Managed Software Delivery installation. Which method must be used to manage the layer?
8.
A group of computers are received from a computer manufacturer with a list of corresponding MAC addresses. To facilitate the imaging of the computers, the list is modified and then imported to Deployment Solution, creating new computer accounts. In a lab, all computers are started and booted into WinPE automation. In the console, a job is assigned to each computer appropriate to its hardware; but the computers never get the tasks or run the jobs. What is a likely reason for this behavior?
9.
A patch administrator is preparing to deploy new patches. The administrator needs to avoid applying Microsoft updates to the wrong operating systems. How should the administrator deploy the patches?
10.
Which limitations are placed on software information collected using a Standalone Inventory task on an unmanaged 64-bit computer?