Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium EMC D-CIS-FN-01 Dumps Questions Answers

Page: 1 / 9
Total 122 questions

Dell Cloud Infrastructure and Services Foundations v2 Exam Questions and Answers

Question 1

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

Options:

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Buy Now
Question 2

What is a benefit of source-based data deduplication?

Options:

A.

Reduces recovery times

B.

Increase the frequency of backups

C.

Reduces network bandwidth requirements

D.

Reduces compute CPU cycles

Question 3

Which data storage type uses a non-hierarchical address space to store data?

Options:

A.

Block

B.

Object

C.

File

Question 4

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

Options:

A.

Self-service portal

B.

Application Programming Interface

C.

Orchestrator

D.

Service Catalog

Question 5

What is a characteristic of a converged infrastructure?

Options:

A.

Eliminates CAPEX

B.

Eliminates OPEX

C.

Does not require a separate storage array

D.

Enables rapid scalability

Question 6

Which type of cloud tool controls resources such as compute, storage, and network?

Options:

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

Question 7

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Question 8

Why do organizations take advantage of virtual infrastructure?

Options:

A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Question 9

Which archiving method is most suitable and cost effective for a large organization having both sensitive data and non-sensitive data?

Options:

A.

Public Cloud-Only archiving

B.

Hybrid archiving

C.

IaaS archiving

D.

In-House archiving

Question 10

What activity is performed during the service creation phase of the cloud service lifecycle?

Options:

A.

Defining Service Template

B.

Developing Service Enablement Roadmap

C.

Assessing Service Requirements

D.

Establishing Billing Policy

Question 11

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

Options:

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

Question 12

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?

Options:

A.

VMware vCenter Manager

B.

VMware vRealize Operations Management Suite

C.

VMware vRealize Automation Suite

D.

VMware vSphere with Operations Management

Question 13

What is a benefit of application virtualization?

Options:

A.

Allows inclusion of standard applications into an end-point image

B.

Eliminates the need for OS modifications

C.

Enables online data migrations between storage systems

Question 14

Which service operation management activity expedites and restores cloud services to normal operations when unplanned events cause an interruption to services?

Options:

A.

Change Management

B.

Capacity Management

C.

Configuration Management

D.

Incident Management

Question 15

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

Options:

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Question 16

What is the primary goal of a business continuity solution?

Options:

A.

Reduce the amount of investment in protecting an organization’s business-related data

B.

Decreases likelihood of a disaster in a data protection environment to control the loss of data

C.

Ensure data availability that is required to conduct vital business operations

D.

Eliminate security threats in a data protection environment for continuous access to data

Question 17

Which activity is associated with Process Transformation?

Options:

A.

Adoption of Agile methodologies

B.

Shift in the IT staff skill set

C.

Adoption of modern IT infrastructure

D.

Creating new roles

Question 18

What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center?

Options:

A.

IT resources are configured for peak usage

B.

IT resources are provisioned on demand

C.

IT resources are rented as services

D.

IT resources are provisioned as self-service

Question 19

What is a benefit of link aggregation?

Options:

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Question 20

What provides workflows for performing automated tasks to accomplish a desired outcome?

Options:

A.

Cloud services

B.

Orchestration

C.

Software defined infrastructure

D.

Virtual infrastructure

Question 21

A development group is using an iterative and incremental software development method.

Which standard is being utilized?

Options:

A.

Agile

B.

ITIL

C.

DevOps

D.

Orchestration

Question 22

Which tool should be recommended to customers for Infrastructure automation?

Options:

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Question 23

How is application functionality segmented when using a microservices approach in an application development environment?

Options:

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

Question 24

What is a characteristic of a best-of-breed infrastructure?

Options:

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Question 25

What describes network-attached storage (NAS)?

Options:

A.

File storage that stores data in the form of objects based on the content and other attributes of the data

B.

Dedicated file server that maintains the mapping between the object IDs and the file system namespace

C.

Storage system used for creation and assignment of block storage volumes to compute systems

D.

High-performance file server that either has integrated storage or is connected to external storage

Question 26

What are the key focus areas for IT transformation?

Options:

A.

Technology, Infrastructure, and Automation

B.

People, Process, and Technology

C.

Process, Infrastructure, and Technology

D.

People, Technology, and infrastructure

Question 27

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

Options:

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Question 28

What are the benefits of modern applications compared to traditional applications?

Options:

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Question 29

Which are core attributes to a modern infrastructure?

Options:

A.

Adaptable, software-defined, and scale-out

B.

Resilient, scale-out, and cloud-enabled

C.

Flash, software-defined, and cloud-enabled

D.

Consolidation, flash, and scale-out

Question 30

Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?

Options:

A.

Abstraction and Polling

B.

Unified Management

C.

Self-Service Portal

D.

Metering

Question 31

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.

Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?

Options:

A.

Resource pooling

B.

On-demand self-service

C.

Rapid elasticity

Question 32

What is a key responsibility of a security governance board?

Options:

A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Question 33

What condition can result in the development of a "shadow IT" organization?

Options:

A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology

Question 34

What is the correct order of the business continuity plan principles?

Options:

Question 35

Which Dell Technologies product can automate and centralize the collection and analysis of data across physical and virtual environments?

Options:

A.

NetWorker

B.

Data Protection Advisor

C.

SourceOne

D.

Avamar

Question 36

A consumer is interested in a service that provides multiple operating systems and programming frameworks for application development and deployment.

Which cloud service model meets these requirements?

Options:

A.

Storage as a Service

B.

Platform as a Service

C.

Software as a Service

D.

Data as a Service

Page: 1 / 9
Total 122 questions