Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Altiris 060-DSFA680 Exam -

Free 060-DSFA680 Sample Questions:

1. You have started the Boot Disk Creator using the Deployment Console’s Tools > Boot Disk Creator menu option (the stand-alone method).
Which statements about using the Boot Disk Creator in this mode are true? (Choose two.)
A. Boot Disk Creator can be used to install automation configurations to a PXE server
B. Boot Disk Creator can be used to create installation packages that install Embedded Automation
C. Boot Disk Creator can be used to enable Boot Integrity Services (BIS)
D. Boot Disk Creator can be used to create network boot devices that install an automation partition
E. Boot Disk Creator can be used to modify PXE server automation configurations
Answer: B, D

2. How are PC Transplant rules prioritized?
A. the highest-numbered priority rule takes precedence
B. the task that finishes first takes priority
C. the Global Filter rule always takes priority
D. the lowest-numbered priority rule takes precedence
Answer: D

3. You are modifying Feature5 (3) in an MSI package using the Wise MSI Editor.
What does the 3 in parentheses represent?
A. this is the third version of Feature5
B. feature5 contains three resources
C. feature5 is the third in line during the installation process
D. feature3 is dependent on the installation of Feature5
Answer: B

4. What are two valid Deployment Database rules? (Choose two.)
A. During a custom Deployment Solution installation, the Deployment Database can be installed using a custom name.
B. Each Deployment System can have multiple Deployment Databases.
C. You can install only one Deployment database per Deployment system.
D. Each Deployment Database, when installed on SQL 2000 or SQL 2005, can manage a maximum of 2,500 computers.
E. A single Deployment Database can manage computers for two separate Deployment Systems.
Answer: A, C

5. Additional Deployment Solution licenses can be added using which methods? (Choose two.)
A. running License.exe from the Deployment Share
B. running eXpress.exe from the Deployment Share
C. selecting Start > All Programs > Altiris > Deployment Solution > Product Licensing Utility
D. selecting Help > About from the Deployment Console
Answer: A, C

6. Which two are valid Deployment Solution condition rules? (Choose two.)
A. If a computer does not meet the criteria of any custom conditions, the job will not run.
B. If a computer does not meet the criteria of any custom conditions, the job will run the tasks associated with the default condition.
C. If a computer meets the criteria of multiple custom conditions, the job will run the tasks associated with Condition 1, then Condition 2, and so on.
D. Only one condition and its associated tasks can be used.
Answer: B, D

7. When shipped with Deployment Solution, Software Virtualization Solution (SVS) can be used______.
A. free for one year from the date Deployment Solution was purchased
B. free for the entire time Deployment Solution is used; no additional license is required
C. free for 120 days after SVS has first been used
D. free for 120 days after Deployment Solution has been installed
Answer: D

8. Which utilities or programs can be used to add additional pre-boot automation operating systems to your Deployment System? (Choose two.)
A. Boot Disk Creator
B. PXE Automation Installer
C. Remote Agent Installer
D. PXE Configuration Utility
E. Sysprep
F. Component Install option (from the Deployment Solution installation program)
Answer: A, D

9. What are two reasons to reject a computer from a Deployment Database? (Choose two.)
A. to quarantine the computer on which a virus scan detected an infection
B. to keep the computer from being assigned to an incorrect Deployment database
C. to block an intruder when the computer’s login credentials fail
D. to keep the computer from using a Deployment Solution license
Answer: B, D

10. The Deployment Console’s Filter feature______.
A. ensures that jobs are only executed by computers that meet certain specifications
B. assigns jobs to computers if the user meets certain specifications
C. ensures each computer belongs to only one group
D. locates and displays computers based on specific criteria
Answer: D

11. What are three tasks that you can perform using the Altiris ImageExplorer? (Choose three.)
A. change the Windows SID contained in the image
B. copy files between two images
C. change the size of the partitions in the image
D. delete files from images
E. add new files to images
F. split large images into smaller files
Answer: B, E, F

12. Hardware independent images accommodate for ______ on destination computers. (Choose two.)
A. operating system differences
B. hardware differences
C. differences in applications needed
D. unique computer security IDs (SIDs)
Answer: B, D

13. Which criteria are used when selecting a computer as the master computer in a multicast imaging session? (Choose two.)
A. the Deployment ID number assigned to the computer (example: 5000025)
B. MAC address
C. CPU speed
D. installed RAM
E. bandwidth
F. the PXE server selects the master
Answer: B, C

14. Which Deployment Solution components are optional when performing a custom Deployment Solution installation? (Choose three.)
A. Deployment Web Console
B. Deployment Server
C. DHCP Server
D. Pre-boot operating system
E. Deployment Database
F. PXE server
Answer: A, D, F

15. A managed computer can access the Altiris automation files from which three locations? (Choose three.)
A. the DHCP Server
B. the embedded Altiris automation area of an operating system on the target computer's hard drive
C. the Deployment Server
D. the PXE Server
E. the Deployment Share
F. a removable device (CD, USB device, or diskette)
Answer: B, D, F

16. What is the purpose of the token replacement process in conjunction with hardware independent images?
A. to remove the Windows security ID (SID) before imaging a computer
B. to customize application installations in Windows Installer (.MSI) format
C. to automatically customize template files with unique computer information
Answer: C

17. When might unicast technology be a more efficient method of deploying images?
A. when there is a Deployment Server dedicated only to deploying images
B. when only a few computers are being imaged at the same time
C. during hours of peak bandwidth usage
D. when the images are very large
E. when the number of computers requiring imaging exceeds the multicast threshold
Answer: B

18. How do you avoid capturing irrelevant changes to the hard drive when Wise SetupCapture is set to scan the entire root drive (C:\)?
A. run a comparison scan
B. configure exclusions
C. run multiple scans
D. perform a clean installation of Windows before running SetupCapture
Answer: B

© 2014, All Rights Reserved