Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

D-ISM-FN-23 Questions and Answers

Question # 6

What is a benefit of implementing a big data ecosystem?

A.

Applies new processing and management methods to derive better business value from unstructured data

B.

Implements new technical and analytical methods to derive business value from large object data

C.

Applies new processing and management methods to improve large relational database response performance

D.

Implements new technical and analytical methods to derive business value from large datasets

Full Access
Question # 7

Match the functionality of a security goal with its description.

Full Access
Question # 8

What is true about scale-out NAS storage architecture?

A.

Grows file system dynamically as nodes are added to the system

B.

Restricts scalability to the limits of the storage controllers

C.

Provides fixed storage capacity that limits scalability

D.

Scales the capacity within a single NAS storage system

Full Access
Question # 9

What is a purpose of the policy engine in a data archiving environment?

A.

Facilitates manual searching for archived data in archive storage

B.

Moves the appropriate data into archive storage automatically

C.

Automates the process of identifying the data to move from archive to primary storage

D.

Enables manual migration of older archived data between archive storage devices

Full Access
Question # 10

What set of factors are used to calculate the disk service time of a hard disk drive?

A.

Seek time

Rotational latency

Data transfer rate

B.

Seek time

Rotational latency

I/O operations per second

C.

Seek time

Rotational latency

RAID level

D.

Seek time

Rotational latency

Bandwidth

Full Access
Question # 11

Which option shows the correct sequence of steps to perform a data recovery operation?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 12

Refer to the exhibit.

What type of Fibre Channel port does the “X” represent?

A.

N_port

B.

F_port

C.

E_port

D.

NL_port

Full Access
Question # 13

Which standard provides FCoE with a lossless Ethernet network?

A.

SCSI Remote Direct Memory Access

B.

Data Center Bridging

C.

Data Center Bridging Exchange Protocol

D.

InfiniBand

Full Access
Question # 14

What is determined by the amount of space configured for the journal in continuous data protection (CDP) replication?

A.

Length of time required to recover the data

B.

Length of time the recovery points can go back

C.

Amount of data that can be restored to a specific point

D.

Amount of space the source and replica volumes require

Full Access
Question # 15

An organization plans to deploy a deduplication solution in their data center environment They are concerned about the application servers' performance and a long backup window during backups. However, they want to retain their existing backup application.

Which deduplication solution(s) should be recommended?

A.

Target-based deduplication

B.

Source-based with variable-length deduplication

C.

Source-based with fixed-length block deduplication

D.

Source-based global deduplication

Full Access
Question # 16

What is the purpose of data archiving?

A.

Transfers fixed content that is actively accessed to archive storage

B.

Transfers dynamic content that is no longer actively accessed to archive storage

C.

Transfers dynamic content that is actively accessed to archive storage

D.

Transfers fixed content that is no longer actively accessed to archive storage

Full Access
Question # 17

Based on the exhibit, which type of storage does the “X” represent?

A.

File-based

B.

Block-based

C.

Object-based

D.

Unified-based

Full Access
Question # 18

What does the “variability” characteristic of big data signify?

A.

Importance in obtaining the right information from data at all possible contexts

B.

Cost-effectiveness and business value obtained from massive volumes of data

C.

Diversity in the formats and types of data generated from various sources

D.

Importance in the quality of data gathered from a number of sources

Full Access
Question # 19

What type of network connectivity is illustrated in the image below?

A.

Compute to storage connectivity

B.

Data center to data center connectivity

C.

Storage to hybrid cloud connectivity

D.

Compute to hybrid cloud connectivity

Full Access
Question # 20

Cloud tiering is the part of which tier?

A.

Policy

B.

Secondary Storage

C.

Primary Storage

D.

Application

Full Access
Question # 21

In a data center environment, what is an advantage of using parity-based RAID protection over mirroring?

A.

Eliminates the write penalty for improving the performance

B.

Improves the efficiency of logical disk drives in the RAID set

C.

Increases the performance of small write I/O operation

D.

Reduces the storage capacity required to protect the data

Full Access
Question # 22

Refer to the Exhibit:

What type of FC port connects each FCIP gateway to each FC SAN?

A.

VE_Port

B.

TE_Port

C.

E_Port

D.

EX Port

Full Access
Question # 23

In a software-defined networking architecture, which layer is responsible for handling data packet forwarding or dropping?

A.

Infrastructure

B.

Application

C.

Control

D.

Interface

Full Access
Question # 24

Which product enables employees to enroll their mobile devices in an enterprise environment and ensures secure access from the devices to the enterprise resources?

A.

Dell PowerEdge

B.

Dell InTrust

C.

VMware AirWatch

D.

VMware AppDefense

Full Access
Question # 25

In a modern data center environment, which mechanism secures internal assets while allowing Internet-based access to selected resources?

A.

Virtual private network

B.

Demilitarized zone

C.

WWN zoning

D.

Virtual local area network

Full Access
Question # 26

How is NVMe used to connect a host to M.2 storage devices?

A.

through an embedded PCIe controller

B.

through a PCIe bus FC HBA card

C.

through a PCIe bus card

D.

through an embedded FC HBA controller

Full Access
Question # 27

What is the maximum number of VLANs that can be supported with one VLAN tag field?

A.

4096

B.

8192

C.

1024

D.

2048

Full Access
Question # 28

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

A.

Transport

B.

Presentation

C.

Session

D.

Data Link

Full Access
Question # 29

Which Dell EMC product is a software-defined storage platform that abstracts, pools, and automates a data center’s physical storage infrastructure?

A.

XtremIO

B.

ViPR Controller

C.

VxFlex OS

D.

PowerMax

Full Access
Question # 30

What is a benefit of using the FCoE storage protocol?

A.

Fewer physical storage systems are required when using FC SAN and iSCSI enabled storage systems.

B.

Fewer physical storage systems are required when using FC SAN and FCoE enabled storage systems.

C.

Fewer physical Fibre Channel and Gigabit Ethernet switches are required

D.

Fewer physical host Ethernet network adapters are required when using CNA adapters.

Full Access
Question # 31

What is an accurate statement about scale-out NAS?

A.

Creates a different file system for each node in the cluster

B.

Stripes data across nodes with mirror or parity protection

C.

Supports only data replication for protecting data

D.

Pools node resources in a cluster to work as multiple NAS devices

Full Access
Question # 32

What Smart City municipal function is optimized by IoT?

A.

Commercial and residential land use and zoning

B.

Tax revenue budgeting and expense accounting

C.

City transportation infrastructure maintenance

D.

Development of municipal staff skillset

Full Access
Question # 33

In a data archiving environment, which component scans primary storage to find the files that are required to archive?

A.

Archive stub file

B.

Archive agent

C.

Archive storage

D.

Archive database server

Full Access
Question # 34

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called'?

A.

Agent-based

B.

Backup as a service

C.

Local replication

D.

Image-based

Full Access
Question # 35

Which storage management function ensures that the services and service levels are delivered per SLAs?

A.

Infrastructure discovery management

B.

Portfolio management

C.

Financial management

D.

Operation management

Full Access
Question # 36

Which three parameters define information availability in a modern data center environment?

A.

Reliability -

Accessibility -

Timeliness

B.

Capacity -

Availability -

Security

C.

Confidentiality -

Integrity -

Availability

D.

Reliability -

Integrity -

Performance

Full Access
Question # 37

What is true about the FCIP?

A.

connects local iSCSI SANs to remote FC SANs

B.

connects local FC SANs to remote FC SANs

C.

connects local iSCSI SANs to remote iSCSI SANs

D.

connects local FC or iSCSI SANs to remote FC or iSCSI SANs

Full Access
Question # 38

Refer to the Exhibit:

What is the name of the selected backup architecture component?

A.

Backup Device

B.

Storage Node

C.

Backup Client

D.

Backup Server

Full Access
Question # 39

What is true about a software defined data center?

A.

IT resource components are virtualized except commodity hardware used to create resource pools

B.

Management operations are dependent of underlying hardware configuration

C.

Services listed in the service portal are updated automatically using orchestration tool

D.

Management functions are moved to an external software controller

Full Access
Question # 40

in a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?

A.

Common Internet File System (CIFS)

B.

New Technology File System (NTFS)

C.

Network File System (NFS)

D.

Hadoop Distributed File System (HDFS)

Full Access
Question # 41

An organization is planning to adopt pre integrated systems to deploy compute, network, storage, and management functions as a single engineered solution.

Which approach should the organization adopt?

A.

Service based approach

B.

DIY approach

C.

Vendor ready solutions

D.

DCaaS solution

Full Access
Question # 42

What triggers an appropriate workflow upon receiving a service provisioning or management request?

A.

Alerts

B.

Orchestrated operations

C.

Recovery time objective

D.

Infrastructure discovery

Full Access
Question # 43

Which set of factors govern the overall performance of a hard disk drive?

A.

Seek time

Rotational latency Data transfer rate

B.

Seek time

Rotational latency Bandwidth

C.

Seek time

Rotational latency RAID level

D.

Seek time

Rotational latency

I/O operations per second

Full Access
Question # 44

Refer to the Exhibit:

What type of FC port does the "X" represent?

A.

F_port

B.

NI_port

C.

N_port

D.

E_port

Full Access
Question # 45

In a RAID 6 array with four disks, what is the total usable data storage capacity on the array if the disk size is 200 GB?

A.

200 GB

B.

400 GB

C.

600 GB

D.

800 GB

Full Access
Question # 46

What is a function of VM hardening?

A.

Isolate VM storage media to ensure data validity

B.

Isolate VM storage media to prevent data leaks

C.

Change the default configuration of the VM to enhance security

D.

Implement access control list across the VMs to enhance security

Full Access
Question # 47

Which VMware product has pre-defined workflows that helps to automate and coordinate the service delivery and operational functions in a storage infrastructure?

A.

NSX

B.

vSphere ESXi

C.

vRealize Orchestrator

D.

Horizon

Full Access
Question # 48

What is a benefit of unified storage systems?

A.

Provides the capability to separately plan the capacity consumption of object-based data

B.

Eliminates the need to use SATA disk drives to store less valued data

C.

Enables rapid development of modern applications by using a common storage pool

D.

Increases the overall storage capacity utilization with no stranded capacity

Full Access
Question # 49

Under the PaaS model, which elements are managed by the consumer?

A.

Applications and Data

B.

OS and Runtime

C.

Middleware and Networking

D.

OS and Virtualization

Full Access
Question # 50

What is true about storage system-based replication?

A.

The source volume is not required to be healthy to restore the data from the snapshot

B.

All the snapshots created from a source volume should be different sizes

C.

Taking multiple snapshots improve the performance of the source volume

D.

Snapshots are immediately accessible after the replication session activation

Full Access
Question # 51

Refer to the Exhibit:

What type of data protection is represented?

A.

Deduplication

B.

Migration

C.

Archiving

D.

Backup

Full Access
Question # 52

A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday. However, a failure of Port 2 occurs on a particular week as follows:

Monday = 10 AM to 12 PM Wednesday = 4 PM to 9 PM Thursday = 4 PM to 7 PM

Friday = 3 PM to 6 PM Saturday = 9 AM to 1 PM

What is the availability of Port 2 in that week?

A.

70%

B.

71.6%

C.

78.3%

D.

80%

Full Access
Question # 53

What is an accurate statement about data shredding?

A.

A process to encrypt data

B.

A process to decrypt data

C.

A process to delete data

D.

A process to reorganize data

Full Access
Question # 54

What is a goal of cyber recovery?

A.

Evaluate systems, networks, and applications to find vulnerabilities

B.

Determine persistence access of system, networks, and applications

C.

Abstract the physical compute hardware from the operating system and applications

D.

lsolate copies of critical data to ensure that an uncompromised copy always exists

Full Access
Question # 55

What is a benefit of migrating to a modern data center?

A.

Reduce public cloud application development complexity

B.

Reduce management complexity by deploying only unified and converged IT resources

C.

Reduce the cost of managing data center components by using a self-service catalog

D.

Reduce administration complexity and application downtime to consistently meet SLAs

Full Access
Question # 56

Why is it important for organizations to implement a multi-site remote replication solution?

A.

Ensure data protection is always available if there are any single site failures

B.

Provide consistent near-zero RPO in the event of source and remote site failures

C.

Perform synchronous replication with low network bandwidth

D.

Recover data to any point-in-time in the event of a remote site failure

Full Access