Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

EMC D-ISM-FN-01 - Dell Information Storage and Management Foundations v2 Exam

Page: 2 / 2
Total 61 questions

Question:

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

A.

Session

B.

Data Link

C.

Transport

D.

Presentation

Question:

What information is available in a capacity planning report for storage infrastructure?

A.

Current and historical information about the utilization of storage, file systems, and ports

B.

Number of units of storage available, used, and the cost

C.

Current and historical performance information about IT components and operations

D.

Equipment purchase dates, licenses, lease status, and maintenance records

Question:

What method does FCIP use to transport Fibre Channel SAN data?

A.

FCIP encapsulates and tunnels FC SAN data over IP networks.

B.

FCIP encapsulates and tunnels FC SAN data over Ethernet networks.

C.

FCIP splits LAN and FC SAN data and tunnels FC SAN data over Ethernet networks.

D.

FCIP separates LAN and FC SAN data and tunnels FC SAN data over IP networks.

Question:

What is the first step in a machine learning process?

A.

Analyzing the data

B.

Training the model

C.

Selecting the type of learning

D.

Collecting the datasets

Question:

A company is concerned about the risk of data loss due to accidental deletion and hardware failures. What is theprimaryreason for implementing a data backup solution?

A.

To reduce storage costs

B.

To maintain business continuity

C.

To improve application performance

D.

To reduce the usage of archive storage

Question:

A company needs to rebuild a failed disk in its RAID 5 array. Which two factors would significantly impact the rebuild time?

A.

Network bandwidth between the server and the storage array

B.

Write performance of the remaining disks

C.

Capacity of the failed disk

D.

Capacity of the cache memory

Question:

A company wants to implement a security strategy that uses firewall, VPN, malware protection, and encryption. Which approach is most suitable for achieving this goal?

A.

Zero trust security

B.

Defense-in-depth

C.

DMZ

D.

Perimeter security

Question:

An IT department needs to execute automated tasks to perform a business operation. They require workflows for arranging, coordinating, and managing these tasks. Which layer of the Modern Data Center Architecture provides this functionality?

A.

Physical infrastructure

B.

Virtual infrastructure

C.

Orchestration

D.

Services