Week End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

EMC D-CIS-FN-01 Dell Cloud Infrastructure and Services Foundations v2 Exam Exam Practice Test

Demo: 36 questions
Total 122 questions

Dell Cloud Infrastructure and Services Foundations v2 Exam Questions and Answers

Question 1

What is a characteristic of an object-based storage system?

Options:

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Question 2

What is a benefit of data archiving?

Options:

A.

Increases deduplication ratio and reduces storage costs

B.

Avoids performing data backups frequently

C.

Preserves data for future reference and adherence to regulatory compliance

D.

Moves frequently accessed data to lower-cost archive storage

Question 3

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

Options:

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Question 4

What is a characteristic of reporting?

Options:

A.

Provides tabular or graphical views of monitored information

B.

Provides information about events or impending threats or issues

C.

Displays a personalized functional interface

D.

Presents service instances to consumers in real time

Question 5

Which tool should be recommended to customers for Infrastructure automation?

Options:

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Question 6

What is a benefit of synchronous remote replication?

Options:

A.

Saves network bandwidth by replicating only deduplicated data

B.

Replicates data across any geographic location without impacting response time

C.

Ensures that source and replica always have identical data

D.

Supports repeated write I/O to the same location to improve replication performance

Question 7

Which concept ensures accountability for security breaches or misuse of resources?

Options:

A.

Compliance

B.

Governance

C.

Risk management

Question 8

Which activity is associated with Process Transformation?

Options:

A.

Adoption of Agile methodologies

B.

Shift in the IT staff skill set

C.

Adoption of modern IT infrastructure

D.

Creating new roles

Question 9

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?

Options:

A.

VMware vCenter Manager

B.

VMware vRealize Operations Management Suite

C.

VMware vRealize Automation Suite

D.

VMware vSphere with Operations Management

Question 10

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

Options:

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Question 11

An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being periodically unavailable.

What type of unavailability are they experiencing?

Options:

A.

Ephemeral

B.

Permanent

C.

Intermittent

Question 12

Which risk management process is in the correct order

Options:

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Question 13

What is true about the Infrastructure as a code function?

Options:

A.

Develops and deploys applications using CI/CD tools

B.

Develops and deploys applications using script files

C.

Manually manages and provisions IT resources

D.

Manages and provisions IT resources using script files

Question 14

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

Options:

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

Question 15

Identify the bare-metal hypervisors?

Options:

A.

Solaris Zones and VMware Workstation

B.

ESXI and Hyper-V

C.

ESXI and VMware Fusion

D.

Oracle Virtual Box and Hyper-V

Question 16

Which platform provides a converged infrastructure solution?

Options:

A.

VxRail

B.

PowerStore

C.

VxBlock

D.

PowerFlex

Question 17

What term describes the ability of a system to continue functioning, even when a few of its components fail?

Options:

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

Question 18

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Question 19

Which is true about a type 2 hypervisor?

Options:

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Question 20

What is a benefit of link aggregation?

Options:

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Question 21

What enables resource pooling and multi-tenancy in a cloud environment?

Options:

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Question 22

Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?

Options:

A.

Cloud Operating System

B.

Orchestor

C.

Cloud Portal

D.

Service automation

Question 23

How is application functionality segmented when using a microservices approach in an application development environment?

Options:

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

Question 24

What is the goal of lean practices in a software development methodology?

Options:

A.

Develop software using 12-Factor modern application practices

B.

Create quality software with the minimum number of team members

C.

Develop and deploy software using third platform technologies

D.

Create quality software in the shortest time period at the lowest cost

Question 25

Which cloud role has the responsibility to perform independent cloud service assessments?

Options:

A.

Architect

B.

Broker

C.

Consumer

D.

Auditor

Question 26

What are the key focus areas for IT transformation?

Options:

A.

Technology, Infrastructure, and Automation

B.

People, Process, and Technology

C.

Process, Infrastructure, and Technology

D.

People, Technology, and infrastructure

Question 27

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

Options:

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Question 28

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

Options:

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Question 29

What is a benefit of cloud automation?

Options:

A.

Reduced service provisioning time

B.

Improved physical infrastructure deployment time

C.

Decreased capital expense

Question 30

Why do organizations take advantage of virtual infrastructure?

Options:

A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Question 31

Which compute system component contains boot firmware?

Options:

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Question 32

What is the correct order of the business continuity plan principles?

Options:

Question 33

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

Options:

A.

Service negotiation

B.

Service level objective

C.

Service valuation

D.

Service level agreement

Question 34

What is an advantage of asynchronous remote replication?

Options:

A.

Ensures source LUN and replica have identical data at all times

B.

Supports replication across any geographic location without impacting response time

C.

Provides a near zero recovery point objective without impacting response time

D.

Requires less storage space for the replica than the source LUN

Question 35

An administrator must design a fault-tolerant IT environment for applications.

Which techniques meet this requirement?

Options:

A.

Active/Passive for Compute -

NIC Teaming for Network -

Dual disks for storage

B.

Active/Active for Compute -

Link Aggregation for Network -

Erasure Coding for storage

C.

Active/Passive for Compute -

Spanning for Network -

Dynamic Disk Sparing for storage

D.

Active/Standby for Compute -

Multipathing for Network -

RAID for storage

Question 36

When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered for automation?

Options:

A.

Business relationship management

B.

Information security management

C.

Knowledge management

D.

Problem Management

Demo: 36 questions
Total 122 questions