Sei sulla pagina 1di 28

CLE – Systems and Security Management 9.

6 (clessm96)

1.- Which Remote Control Security Setting is the most secure?

a) Local Template

b) Integrated Security

c) Windows NT Security / Local Template

2.- A customer is planning the deployment of LANDESK Management Suite in an enterprise with 3000 + nodes. What
is the recommended configuration of servers for this environment?

a) One physical server hosting the Core Server, database Management System, and Web Services

b) Two physical servers: one hosting the Core Server and Web Console, and one hosting the Database Management
System

c) Two physical servers: one hosting the Core Server and Database Management System, and one hosting the Web
Console

d) Three physical servers: one hosting the Core Server, one hosting the Database Management System, and one
hosting the Web Console.

3.- You manage a LANDESK Management Suite environment. You have created a new user called “Joe” and added
him to the newly created Software Deployment group in Role Based Administration. After logging into the LANDESK
console, Joe finds he cannot see any Managed Devices. How can you correct this problem?

A) Assign a Scope to Joe´s user account or group

b) Add Joe´s Active Directory user account to the LANDESK Management Suite group

c) Add Joe´s Active Directory user account to the local Administrators group on the Core Server

d) Add the “View Managed Devices” right to the Software Deployment group in Role Based Administration

4.- You open a template and find that in the “included by” section there is another template listed. What is the
significance of this?

a) The actions of the template named in the “included by” section are included in the current template

b) The actions of the current template are included in the template named in the” included by” section

c) The Condense Template task needs to be performed on the current template

d) The “Action list” section of the current template will have actions that cannot be edited
5.- Where must a vulnerability reside to be detected during a security scan?

a) Scan Group

b) Detected Group

c) Compliance Group

d) Do Not Scan Group

e) Unassigned Group

6.- You have deployed an Operating System Image using LANDESK OS Provisioning. When the device re-boots it runs
the mini-setup instead of applying the settings in the unattend.xml file you created. Which of the following is the
mostly likely reason?

a) The active partition was set incorrectly

b) The device model does not support mini-setup

c) You are deploying Windows 7, which does not support Sysprep.

d) The deploy template does not include the inject script action.

7.- Where do you configure Patch Manager to automatically download definitions and remdiations automatically?

a) Scan and Repair Configurations

b) Agent Configurations

c) Download Updates

d) Security Configurations

8.-Why is Auto keyboard mapping beneficial to Remote Control Operators?

a) The same keystrokes from the operator’s keyboard are entered on the end user´s machine even if the user´s
machine is in a different language.

b) It locks out the keyboard of the end user to prevent that user from entering information while they are being
remotely controlled.

c) The keystrokes form the operator´s keyboard are hidden from the end user so mapping and running applications
are not disclosed

d) The keystrokes are encrypted so they cannot be seen or intercepted by outside parties.
e) The keyboard and mouse mapping can turn off the keyboard and mouse to the end user.

9.- You organization supports three regions. EMEA, APAC and US Each region has its own Active Directory Forest and
all three regions are managed separately. You have decided to install one Core Server in each region. What is the
easiest way to configure these three servers?

a) Install configure one Core Server, create a backup, and then restore the backup to the other two servers, renaming
them with the new host names and IP-Addresses.

b) Install all three Core Servers separately, configure the first Core Server, and then use Core Synchronization to
synchronize all settings to the other two servers.

c) Install all three Core Servers separately, configure the first Core Server, and then configure carry-over and pass-
through services to synchronize all settings to the other two servers

d) Install and configure one Core Server, create a mirror and replicate package, enable Content Replication on the
other two servers.

10.-How often does Software Scanning occur by default, regardless of how often the Inventory Scanner is scheduled
to run?

a) Once every (7) days

b) Once every (5) days

c) Once every (3) days

d) Once every (1) days|

11- Which attribute does the LANDESK Inventory Server service check verify the database entry is synchronized with
the managed device?

a) Device ID attributes

b) Last Software Scan Date

c) Last Hardware Scan Date

d) Last Updated by Inventory Server

12.- Where is the Software License Monitoring data stored on the client?

a) In the log file located in the SLM directory

b) In the log file located in the LDClient directory


c) In the log file located in the LANDESK directory

d) In the registry

13.- How can you transfer a report to another Core Server?

a) Save the report in the Report Designer

b) Edit a report template

c) Copy the report using Core Synchronization

d) You cannot transfer reports to another Core Server

14.- Which statement is considered a best practice when configuring LANDKESK Antivirus?

a) Automatically delete Quarantine files after 1 day

b) CPU utilization when scanning = 5%

c) Enable real – time file protection

d) Disable real – time file protection

15.- You have many different models of computers from different manufactures and you want to reduce the number
of images to maintain. Which Operating System Provisioning feature allows you to use a single image on many
devices?

a) Hardware Independent Imaging

b) PXE boot

c) Scripted installs

d) Differential images using ImageW.exe

e) DISM adapted images using ImageX.exe

16.-You have installed LANDESK Management Suite 9.6 into the default location on your Core Server. Where will the
LANDESK certificates be located?

a) C:\ProgramFiles(x86)\LANDESK\SharedFile\keys

b) C:\ProgramFiles\LANDESK\SharedFile\Keys

c) C:\ProgramFiles(x86)\LANDESKManagementSuite\Keys

d) C:\ProgramFile\LANDESK\ManagementSuite\Keys
17.- What is the correct syntax needed to install the LANDESK Agent from a Microsoft device without rebooting the
system?

a) \\CoreServerName\LDlogon\wscfg32.exe /u/no reboot

b) \\CoreServerName\LDlogon\LDAgentUnistall /silent

c) \\CoreServerName\LDMain /unistallwinclient.exe/no reboot

d) \\CoreServerName\LDMain /unistallwinclient.exe /ui /nodelcba

18.- You want patch to execute on a managed device, even if other patches have been applied and the device needs
to reboot. How can you accomplish this?

a) This is not possible. The machine must be rebooted before applying the patch

b) Schedule reboots as a task and then schedules a patch deployment

c) In the Distribution and Patch agent setting select the “start repair if reboot is already pending” check box

d) Use the registry setting “Always apply patches even if a reboot is pending = 1”

19.- In Operating System Provisioning, which imaging tool is associated with image extension .TBI?

a) LANDESK ImageW V2

b) Power quest

c) Symantec Ghost

d) Microsoft ImageX.exe

20.- You want to scan for more software extension types than just.exe file. Where do you go to add additional
extension types?

a) The LDAppl3.ini file on the Core Server

b) The LDAppl3.ini file on the managed device

c) In the Mange Software List tool in the console

d) In the Software License Monitoring tool the console


21.- Place the following items in the correct order.

1. Push the Agent discovered unmanaged devices using a scheduled task

2. Modify the Agent Configuration

3. Scan the Network using Unmanaged Device Discovery

4. Configure the Scheduler Service

5. Open and Login to the Console

a) 1,2,3,4,5
b) 5,2,4,3,1
c) 2,1,3,4,5
d) 5,4,1,2,3

22.- Which two imaging environments are supported In LANDESK Operating System Provisioning In LDMS 9.6?
(Choose2)

a) Bart PE

B) Linux PE

c) 64 bit WinPE

d) 32 bit WinPE

e) DOS

23.- You have decided to deploy a Mozilla Firefox patch using Autofix, what three areas must be configured to
accomplish this task? (Choose 3)hii

a) You must Schedule a task and select the Autofix check – box on the dialog

b) You must scan using a Distribution and Patch agent setting with “Enable Autofix” selected.

c) You must scan using an Agent configuration that does not have “Never Autofix” selected

d) You must select The Global Patch list and select “Always Autofix”

e) You must set an Autofix selection on the Mozilla Firefox patch.

f) The patch must be deployed as a policy with Autofix enabled


24.- What are the four sections in the Software License Monitoring tool? (Choose 4)

a) Reports

b) Products

c) Licenses

d) Administration

e) Dashboard

f) Applications

25.- To which group must standard reports be copied so that reports can be modified?

a) Reports can be modified regardless of location

b) Standard Reports

c) My Reports

d) Customizable Reports

26.- What is configured on the “MSI Information” tab in the Distribution and Patch agent setting?

a) The location of the .MSI that was used by the Vulnerability Scanner

b) The location of the original Installation media for Microsoft Office.

c) The .MSI files which can be downloaded from the LDlogon patch directory

d) The location of the .MSI patches scanned using the Security and Compliance tool

27.- What are the names of the WinPE Image files in LANDESK Management Suite 9.6? (Choose 2)

a) Boot.img

b) Boot_x64.wim

c) PXE.wim
d) Boot.win

e) Boot_64.img

28.- What is the default Learn Period for LANDESK Application Control (formerly known as Host Intrusion Prevention
or HIPS )?

a) 1 day

b) 2 days

c) 3 days

d) 4 days

e) 5 days

29.- Into which group would you place a user to give specific console rights that do not include ALL administrative
rights?

a) LANDESK Users

b) LANDESK Broker Config Users

c) LANDESK Console Users

d) LANDESK Management Suite

30.- Self – Organizing multicast in LANDESK Management Suite version 9.6 has two functions. What are they?
(Choose 2)

a) Multicast router identification

b) Bandwidth throttling

c) Request for re – send

d) Router auto – discovery

31.- Which two statements describe Whitelisting In LANDESK Application Control (formerly Host Intrusion of
Prevention or HIPS) In Endpoint Security? (Choose 2)

a) All files not listed in the Trusted File List are prohibited from executing

b) All files listed in the Trusted File List are prohibited from executing

c) All files not listed in the Trusted File List are allowed to execute

d) All files listed in the Trusted File List are allowed to execute
32. Which component collects and processes inventory information into the LANDESK database?
A) LDInv32.exe
B) LDScan64.exe
C) LDScn32.exe
D) LDInventory.exe

33.
What three sections are under Dashboard in the Software License Monitoring tool? (Choose 3)
A) License Optimization
B) Reports
C) Audits
D) Usage
E) Compliance

34.
You add drivers using the HII Driver Management tool. Where is the database referencing the driver library?
A) \\CoreServer\ldmain\landesk\hii\drivers
B) \\CoreServer\ldmain\landesk\osd\drivers
C) \\CoreServer\ldmain\landesk\files\drivers
D) \\CoreServer\ldlogon\landesk\hii\drivers

35.
When you create or modify an agent setting as a part of an agent configuration, what is the most
efficient way to implement the new or modified agent setting on a managed device?
A) Create a self-contained client installation package and run it on the managed device.
B) Schedule a full agent deployment from the agent configuration tool.
C) Schedule the change setting as a task from the agent configuration tool.
D) Schedule the change setting as a task from the agent settings tool.

36.
In Role-Based Administration, which rights are assigned to ‘Report Designer’ to access the designer
through the console?
A) View
B) Edit
C) Deploy
D) Create
37.
Which statement is correct regarding the LANDESK Core Server?
A) The LANDESK Core Server cannot be installed on a Domain Controller

B) The LANDESK Core Server must be a member of a Domain

C) The LANDESK Core Server does not require an NTFS File system

D) The LANDESK Core Server requires internet access for activation

38.
An end-user wants to ensure that patches are not deployed while their computer is running a Microsoft
Powerpoint presentation. How can this be accomplished?
A) Add powerpnt.exe to the "Do not disturb" setting of the Distribution and Patch agent setting,
and assure the user's device uses that setting.
B) Limit time restraints in the Repair option of the Distribution and Patch agent setting, and
assure the user's device uses that setting.
C) Set the Distribution and Patch setting to automatically defer scan and repair tasks if someone is
logged in to the managed device, and assure the user's device uses that setting.
D) Set the "Maintenance window" in the "Repair Options" section of the Distribution and Patch
agent setting, and assure the user's device uses that setting.

39.
Which repackaging method is available in the LANDESK version of the AdminStudio Repackaging Wizard?
A) Installation Monitoring
B) Installation Building
C) Snapshot
D) Setup-By-Step

40.
When discovering devices using LDAP in Unmanaged Device Discovery, what rights does the “Login as”
user require?
A) Read rights to the LDAP Schema
B) Local Administrator rights to the Core Server
C) Full Domain Admin rights, as only Domain Admins can access LDAP
D) No rights, the scanner will run in the context of System, and does not require elevated
privileges

41.
When Delta Scanning, the Inventory Scanner must compare the current scan in memory with the previous
scan. Where is the content of the previous scan held in a Windows 32-bit environment?
A) C:\%ProgramFiles%\LANDesk\InvDelta.dat
B) C:\%ProgramFiles%\LANDesk\LDClient\Data\InvDelta.dat
C) C:\%System%\LANDesk\InvDelta.dat
D) C:\%System%\LANDesk\LDClient\InvDelta.dat

42.
Where can you view the template history in Operating System Provisioning?
A) In the Application Event log on the core server
B) In the Operating System Deployment tool
C) In the Provisioning directory of the "LDLog" share
D) In a template in the History option

43.
In the Agent Configuration Tool, what is the “Rebuild All” option used for?
A) To reset all Agent Configurations to the default settings
B) To apply changes made in the "Advanced Edit" to all Agent Configurations
C) To automatically redeploy all agents that have been modified since the initial deployment
D) To apply changes to the NTSTACFG.IN# and redeploy all agents not modified since the initial
deployment

44.
A user wants to sort the managed devices in the LANDESK Management Console Network View. Which
two of the following ways would accomplish this? (Choose Two)
A) Create a query in the LANDESK console and set the sort order of the query as the default.
B) Create a new column set and set the desired sort order and apply the column set.
C) Click on the desired column header in the Network View to select the sort order.
D) Create a new filter with the desired sort order and apply it to "All Devices" in the Network View.

45.
No usage data or installation data is displayed in Software License Monitoring. What needs to be done to see usage data?
A) Run an inventory scan to collect software information
B) Select Recalculate from the Administration | Calculations section of SLM
C) Select Publish from the Administration | Calculations section of SLM
D) Select 'Make Available to Clients' in Manage Software List Module
46.
You want to remote control a managed device using HTML Remote Control. However, when you right-click
on the device in the Network View of the console, HTML Remote Control is not an option. What is the
reason that HTML Remote Control is not an option?
A) In the Remote Control setting, "Allow HTML access" was not selected
B) The console is not configured to use HTML access
C) HTML protocol is not enabled on the console
D) The end-user does not grant permission for HTML access

47.
When scheduling a report, when is the supporting query executed?
A) When the report is scheduled
B) When the report is run
C) When the report is saved
D) As configured in the Report Designer

48.
What is the Best Known Method for the LANDESK Administrator to verify that the Inventory Scanner checks
for specific software?
A) Check in the LDAPPL3.ini file on the managed device.
B) Check in the LDAPPL3.ini file on the Core Server.
C) Check through the Manage Software List in the LANDESK Console.
D) Check through the Software Report in the Reporting tool.

49.
When using an Uninstall Association in LANDESK Software Distribution, what type of Delivery Method must
you use?
A) Push
B) Policy
C) Policy Support Push
D) Targeted Multicast

50.
Which information is displayed when inspecting a query using the Inspector?
A) The results of the query
B) The count of devices selected by the query
C) The SQL instructions used by the query
D) The last time the query was run
51.
When using Device Control in LANDESK Endpoint Security, what type of encryption can be enabled?
A) PGP
B) Blowfish
C) TPM
D) AES256

52.
How do you successfully deploy the LANDESK Agent to an unmanaged device when the end-user does not
have administrator rights on that device?
A) Configure a “Run As” Script using the Legacy AgentConfiguration and Installation
B) Configure the LANDESK Scheduler Service to deploy the Agent using a Domain
Administrator account
C) Configure the Agent to include an Administrator Name and its associated password when
installed via Login Script
D) Configure the Agent to include an Administrator Name and its associated password when
deployed as an Advance Agent

53.
If you enable Shadow Copy on your Managed Devices, where will the files be stored by default?
A) %System%\ShadowCopy
B) %ProgramFiles%\ShadowCopy
C) %ProgramFiles%\LANDESK\LDClient\ShadowCopy
D) C:\System Volume Information\ShadowCopy
E) \\CoreServerName\LDLogon\ShadowCopy\DeviceName

54.
Put the following statements in the correct logical order:

I. Download the LANDESK Patch content remediations

II. Download the LANDESK Patch content definitions

III. Repair the Vulnerability

IV. Perform a Vulnerability Scan


A) I, IV, II, III
B) I, II, III, IV
C) II, IV, I, III
D) II, I, III, IV

55.
When automating a standard .MSI package, what is the name of the answer file?
A) Transform (.MST)
B) Respond (.RSP)
C) Answer (.ANS)
D) Process (.PRS)

56.
Which tool allows setting custom return codes in Software Distribution?
A) Delivery Methods
B) Manage Scripts
C) Distribution Packages
D) Schedules Tasks

57.
You have recently applied a Microsoft Windows 7 patch to 345 devices. After the patch deployment you
notice that Microsoft Excel no longer starts correctly. You open Security and Patch Information on one of
the Devices, and try to select Uninstall Patch, however the option is not available, why is that?
A) The Device that you have selected had the Patch applied using Windows Update, not
LANDESK Patch Manager
B) LANDESK Patch Manager does not support Patch uninstallations
C) The Device that you have selected is not currently on-line
D) The vendor did not design the patch to be uninstalled

58.
Where do you configure an Operating System Provisioning Template to use Multicast?
A) In the Deploy Image action in the Pre-OS installation section of the template
B) In the Deploy Image action in the Post-OS installation section of the template
C) In the Deploy Image action in the OS installation section of the template
D) In the Deploy Image action in the System Configuration section of the template

59.
When configuring a Virus Scan in LANDESK Antivirus, what three types of scans can be selected? (Choose
3.)
A) Files scanned by extension
B) Scan executables only
C) Files scanned by format
D) All files
E) Scan multimedia files only

60.
While testing a package for distribution in LANDESK Management Suite version 9.6 you notice that the
user is asked when to run the installation. You want the package to be installed silently without any user
interaction. Where would you make the necessary changes?
A) In the .MSI file
B) In the Distribution Package
C) In the Distribution and Patch settings
D) User interaction cannot be suppressed

61.
Encryption can be enabled on a USB storage device using Device Control in LANDESK Endpoint Security.
If the end user cannot remember the password of the encrypted archive, how can the data in the encrypted
area be accessed?
A) The LANDESK Administrator can send an overriding file to the end user who can then reset the password

B) The Administrator must bypass the password by disabling the Endpoint Security Service
C) The user must obtain the password from an Administrator
D) The Administrator can inject a one-time use password to access the encrypted area

62.
You have just configured the Core Server to work with a Cloud Services Appliance (CSA). The Core Server
cannot communicate with the CSA. Which of the following is most likely the reason that communication has
failed?
A) The Cloud Services Appliance was not rebooted after it was configured.
B) The client certificate was not posted to the Cloud Services Appliance.
C) The LANDESK Agent must be re-deployed to the Core Server.
D) The Federal Information Processing Standard (FIPS) 140-2 was improperly configured.
E) The Encryption standard selected on the Cloud Services Appliance does not match the Core
Server setting.

63.
What parameter would you use to install an agent on a device that already has an agent?
A) wscfg32.exe /F
B) wscfg32.exe /P
C) wscfg32.exe /O=”c:\output.txt”
D) wscfg32.exe /C=”configuration.ini”

64.
When exporting reports from LDMS 9.6, what is the format and file extension of the exported file?
A) XML (.XML)
B) XML (.LDMS)
C) Text File (.CSV)
D) PDF (.PDF)

65.
What can be used to reduce bandwidth when distributing a software distribution package across a multi-site
network?
A) MSI packages
B) Preferred Servers
C) LDAP Groups
D) Additional Core Server

66.
What is the recommended method to deploy the LANDESK Agent over slow and unreliable networks?
A) Login Script
B) Advance Agent
C) Manual Install
D) Self-Contained Executable

67.
What 2 Database Management Systems does LANDESK Management Suite currently support? (Choose 2.)
A) Microsoft® SQL Server

B) Sybase

C) IBM® DB2

D) Oracle™

E) Microsoft® SQL Server Express

68.
You have created a custom data form and sent it to a number of test users. Although you know these test
users have completed the form, you are not seeing any custom data in the database. What could be the
cause for the custom data not appearing in the database?
A) The agent has not been updated to include the custom data form
B) The questions did not include a description
C) The Inventory has not scanned since the form was filled out
D) The questions did not use the correct "Control type option"

69.
When using the console, where does a user go to create a column set?
A) Tools | Administration | Column Set Configuration
B) Tools | Administration | Preferences Column Set Configuration
C) Tools | Preferences | Column Set Configuration

70.
Which two menu options are available within the LANDESK portal manager? (Choose 2.)
A) AV Scan
B) Power Management
C) Launchpad
D) Task History
E) Inventory Scan

71.
What is the correct URL to access the LANDESK Web Console?
A) http://Core_Name/console

B) http://Core_Name/remote
C) http://Core_Name/helpdesk
D) http://Core_Name/webconsole

72.
When running Download Updates, how do you include "Good Reputation" files in the update?
A) Select the "applications developed by trusted vendors" check box.
B) Select the "files developed by trusted vendors" check box.
C) Select the "LANDESK File Reputation Updates" check box.
D) Select the "Vendor Trusted Digitally Signed Code" check box.

73.
What should the LANDESK Administrator do prior to running any Software License Monitoring report?
A) Recalculate Usage, License and Compliance
B) Publish product detection information for client scanning
C) Run Data Analytics
D) Run Reclamation

74.
Which Operating System supports installation of the Management Suite console?
A) Mac OS X
B) Windows 7
C) Ubuntu Linux
D) Windows 98 SE

75.
How can you consistently produce an inventory scan on every managed device?
A) Set the local scheduler to periodically run inventory scans in the Agent Configuration
B) Schedule a LANDESK custom script to launch a full scan and schedule it to all managed nodes
C) Create a batch file that deletes the invdelta.dat file and schedule it to all managed nodes
D) Set the DoDelta value to 1 in the LANDESK Inventory Server service

76.
How do you initiate an HTML 5 Remote Control session from an internet browser?
A) enter http://<device name or ip address>:4343 into the url field

B) enter https://<device name or ip address>:9535 into the url field

C) enter http://<device name or ip address>:9535 into the url field

D) enter https://<device name or ip address>:4343 into the url field

When configuring a Replicator in Content Replication, which two items must be installed on the
replication device? (Choose 2.)
5. A)LANDESK agent
B) SNMP and SMTP
C) Microsoft® Windows™ Operating System
D)Web Services and Distributed File System (DFS)

In Software Distribution, what protocol is used to determine link speed?


A)SNMP
B) POP3
C) PDS
D)ICMP

In Role-Based Administration, which rights are assigned to ‘Report Designer’ to access the designer through
the console?
A)View
B) Edit
C) Deploy
D)Create

Which two statements describe Whitelisting in LANDESK Application Control (formerly Host Intrusion
Prevention or HIPS) in Endpoint Security? (Choose 2.)
A)All files not listed in the Trusted File List are prohibited from executing
B) All files listed in the Trusted File List are prohibited from executing
C) All files not listed in the Trusted File List are allowed to execute
D)All files listed in the Trusted File List are allowed to execute

When Bill logs in to the LANDESK Console he cannot see or use the Software Distribution Tasks of his
colleague Fred. Only Fred and Bill should share Software Distribution Tasks with each other. What must
happen for Bill to see Fred’s tasks?
A LANDESK Administrator must create a team, then add Bill and Fred as members, and then Fred
A)
must move his tasks to the new team’s task folder.
A LANDESK Administrator must create a role, then add Bill and Fred to that role, and then all of
B)
Fred’s tasks should be accessible by Bill.
A LANDESK Administrator must create a scope, then add Bill and Fred as members, and then
C)
permissions must be set on the Software Distribution Tasks folder to allow access to the new scope.
A LANDESK Administrator must create a team, then add Bill and Fred as members, and then Fred
D)
must copy all of his tasks to Bill’s tasks folder.

You are attempting to update the vulnerability information on the core server when you notice that there is
an error when the core server attempts to download a particular vulnerability. Where should you look to
obtain more information to resolve this issue?
A)\\CoreServer\LDLog\vaminer.details.log
B) \\CoreServer\LDlogon\vaminer.details.log
C) \\CoreServer\Scheduler\vaminer.details.log
D)\\CoreServer\LANDESK\vaminer.details.log

You are the LANDESK Administrator and you notice that some LANDESK Scan files are appearing in the
ErrorScan folder. Where would you obtain information as to why the scans go there?
A)The LANDesk Event Log
B) The Core Server Event Log
C) The Scan File Event Log
D)Application Event Log

Into which group would you place a user to give specific console rights that do not include ALL administrative rights?
A)LANDESK Users
B) LANDESK Broker Config Users
C) LANDESK Console Users
D)LANDESK Management Suite

What can be used to reduce bandwidth when distributing a software distribution package across a multi-site
network?
A)MSI packages
B) Preferred Servers
C) LDAP Groups
D)Additional Core Server

Which two types of Port Protocol can be configured in the LANDESK Firewall? (Choose 2.)
A)IPX
B) TCP
C) UDP
D)NAT-PMP

On the Core Server the Federal Information Processing Standard (FIPS) 140-2 was just enabled. What two
things must be done so that existing client systems can work with the Core Server? (Choose 2)

A)Copy the new security certificate from the cloud services appliance to the core server.
B) Re-deploy a new agent which includes a new Core Certificate to the existing clients.
C) Re-deploy a new remote control setting which has been configured to use FIPS 140-2 mode.

Reconfigure the Cloud Services Appliance to use the FIPS 140-2 mode.

In the LANDESK database, what information is used to maintain device uniqueness?


A)Device MAC address
B) Device Hostname
C) Device IP Address
D)Device ID

In the Software License Monitoring tool, how are Manufacturers normalized?


A)By moving the products of the manufacturer into a normalized group
26. B) By right clicking on the manufacturer and selecting Normalize
C) By moving them into a normalized manufacturer group
D)By selecting Normalize Manufacturers from the Administration section of SLM

our company wishes to install the LANDESK Agent on 2500 Windows 7 devices using the Scheduled Task Push deployment
methodology. How must you configure the Scheduler Service to ensure this works properly? Choose 2
On the core server, configure the Scheduler Service to include credentials to an account with
A)
Administrator rights on the Windows 7 devices.
On the core server, configure the Scheduler Service 'LDAP Property credentials’ to include
B)
credentials to an account with Administrator rights on the Windows 7 devices.
On the core server, configure the Scheduler Service ‘Global Property credentials’ to include
C)
credentials to an account with Administrator rights on the Windows 7 devices.
On the core server, configure the Scheduler Service ‘Alternate credentials’ to include credentials to an
D)account with Administrator rights on the Windows 7 devices.

What three sections are under Dashboard in the Software License Monitoring tool? (Choose 3)
A)License Optimization
B) Reports
C) Audits
D)Usage
E) Compliance

Which attribute does the LANDESK Inventory Server service check to verify the database entry is
synchronized with the managed device?
A)Device ID attribute
B) Last Software Scan Date
C) Last Hardware Scan Date
D)Last Updated by Inventory Server

In which two locations on the core server can the <hash>.0 file be located? (Choose 2.)
A)C:\Program Files\LANDesk\Shared Files\Keys
B) \\CORE_NAME\LDMain
C) \\CORE_NAME\LDLogon
D)\\CORE_NAME\LDLog

42.What is made possible by deploying a PXE Representative package to a managed device?


A)Devices on that subnet are able to utilize a PXE boot to run scheduled OS Provisioning tasks
B) Software distribution packages are able to deploy to selected managed devices
C) PXE servers are now able to deploy an Advance Agent
D)OS Provisioning tasks can now be executed on Macintosh devices

When entering public variables into a Provisioning Template what must you remember?
A)There are no Public variables, only Private variables in Provisioning Templates
B) All variables are case sensitive
C) Variables must never contain sensitive data such as passwords
D)Variables can only be used in the Post-OS Installation phase of the Template

Your environment has a Proxy Server for security reasons. In order to download Patch content to your Core
Server the Proxy Server settings must be configured to allow what type of traffic?
A)HTTP
B) SSH
C) SMTP
D)UNC

In Operating System Provisioning, which imaging tool is associated with the image extension .TBI?
A)LANDESK ImageW V2
B) Powerquest
C) Symantec Ghost
D)Microsoft ImageX.exe

Where is the Software License Monitoring data stored on the client?


A)In the log file located in the SLM directory
. B) In the log file located in the LDClient directory
C) In the log file located in the LANDesk directory
D)In the registry
Which two statements are correct regarding Agent certificates? (Choose 2.)
A)At least one certificate must be deployed with each Agent Configuration
B) Deploying a certificate with an Agent is optional
C) A third party Certificate Authority (CA) is required
D)The LANDESK Core Server installation creates a self-signed certificate automatically
E) Certificates are only required in High Security environments

When modifying an agent configuration that has an existing self-contained client installation package, what
impact does the modification have on the existing client installation package?
A)The modification changes the existing client installation package. No further action is required.
. B) The modification does not change the existing client installation package. A new package will automatically be created.
The modification does not change the existing client installation package. You must delete the
C)
existing package and create a new one.
D)The modification deletes the existing self-contained client installation package and creates a new one automatically.

Your organization supports three regions: EMEA, APAC, and US. Each region has its own Active Directory Forest and all three
regions are managed separately. You have decided to install one Core Server in each region. What is the easiest way to configure
these three servers?
A)Install and configure one Core Server, create a backup, and then restore the backup to the other two servers, renaming
them with the new host names and IP-Addresses.
B) Install all three Core Servers separately, configure the first Core Server, and then use Core Synchronization to synchronize
all settings to the other two servers.
Install all three Core Servers separately, configure the first Core Server, and then configure carry-over and pass-through
C) services to synchronize all settings to the other two servers.
D)Install and configure one Core Server, create a mirror and replicate package, enable Content Replication on the other two
servers.

What is the correct syntax needed to uninstall the LANDESK Agent from a Microsoft Windows device
without rebooting the system?
A)\\CoreServerName\LDLogon\wscfg32.exe /u /noreboot
B) \\CoreServerName\LDLogon\LDAgentUninstall /silent
C) \\CoreServerName\LDMain\uninstallwinclient.exe /noreboot
D)\\CoreServerName\LDMain\uninstallwinclient.exe /ui /nodelcba

hen creating a query in the LANDESK console what is the "Filters..." button used for?
to filter the results to
A)include a Stored
Procedure
to filter the results of a Query
B) with another query
to filter the results of the
C) Query with a Device
Group
to filter the results of the
D)
Query with a Scope

Where are the remote control time restrictions set?


A)In the Remote Control Agent Setting
B) In the Remote Control Agent Configuration
C) In the User Management Tool
D)On the managed device

You want to Patch a group of Windows Servers within a specific maintenance


window. Where do you configure maintenance window settings in LANDESK
Management Suite 9.6?
A)In the Repair task of the Patch and Compliance tool.
B) In the Repair task of the Scheduled Tasks tool.
C) In the Distribution and Patch agent setting.
There is no way to configure the patches to occur only during the
D)
maintenance window.

You are editing a report in My Reports and you open the Report Designer
tool. You want to see and/or edit the structured query language of the report.
Where is this done?
A)In the edit option of Data Sources
B) In the edit option of Parameters
C) In the edit option of Embedded Images
D)In the edit option of Common Values

What is the purpose of the AdminStudio Tuner?


A) Converts a legacy based .EXE file to an .MSI file
B) Transfer files to a Package Server for distribution
C) Assists in creating a transform file (.MST) for an .MSI
D) Creates Distribution Methods compatible to LANDesk Management Suite
Rollout projects in LANDESK Management Suite 2016 can be created for which tools? (Choose 2)
A) Software License Monitoring
B) Software distribution
C) OS Provisioning
D) Patch management

6.
What is the port used to send inventory to the Core Server via the Web Service?
A) 80
B) 443
C) 5007
D) 9535
E) 4343

Which two parameters are used with the LANDESK Inventory Scanner to force a Software Scan?
(Choose 2.)
A) /Sync
B) /Soft
C) /F
D) /Delta
E) /Software

What transports the Software License Monitoring data from the managed device to the core
server?
A) LDISCN32.exe
B) VULSCAN.exe
C) LDINV32.EXE
D) SLMUpdate.exe
Which agent setting governs the Software Distribution settings on a managed device?
A) Policy Sync
B) Software Distribution
C) Distribution
D) Distribution and Patch
E) Delivery

2.
To which group must standard reports be copied so that reports can be modified?
A) Reports can be modified regardless of location
B) Standard Reports
C) My Reports
D) Customizable Reports

When a report is run using “View As Report”, there are many ways to export the data. Which of the
following is NOT an option for export format?
A) PDF
B) Image
C) XML
D) Word
E) Excel
F) CSV

9.
You want to Patch a group of Windows Servers within a specific maintenance window. Where
do you configure maintenance window settings in LANDESK Management Suite 2016?
A) In the Repair task of the Patch and Compliance tool.
B) In the Repair task of the Scheduled Tasks tool.
C) In the Distribution and Patch agent setting.
D) There is no way to configure the patches to occur only during the maintenance window.
26.
Which Operating System supports a new installation of LANDESK Management Suite 2016 on a core
server?
A) Microsoft Windows 2012 R2 Server 64-bit
B) Microsoft Windows 2008 R2 Server 64-bit
C) Macintosh 10 Server
D) Ubuntu 64-bit
E) Unix 64-bit

45.
What is the default timeout for the Multicast Domain Representative when using Self-
Organizing Multicast?
A) 1 minute
B) 30 Seconds
C) 5 Minutes
D) 10 minutes

Operating System detection in Unmanaged Device Discovery uses which technology?


A) SNMP
B) NETBIOS
C) NMAP
D) Ping

Potrebbero piacerti anche