Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

EMC D-ISM-FN-01 - Dell Information Storage and Management Foundations v2 Exam

Page: 1 / 2
Total 61 questions

Question:

Which two interfaces does an OSD (Object Storage Device) gateway typically present to applications?

A.

REST and SOAP APIs

B.

SSH and SMB

C.

HTTP and HTTPS

D.

File-based interfaces like NFS and CIFS

Question:

A company wants to perform a full backup of its critical data. What is the main advantage of this approach?

A.

It provides the fastest data recovery.

B.

It minimizes the impact on production systems.

C.

It requires minimal storage space.

D.

It is the fastest backup method.

Question:

What is a key benefit for deploying a remote data protection and recovery solution in a data center environment?

A.

Maximizes application and information availability

B.

Reduces required maintenance time for IT resources

C.

Reduces the cost of protecting data

D.

Avoids security risks that expose business data

Question:

What is a key challenge in managing the variety aspects of Big Data?

A.

Generating real-time data

B.

Storing transaction-based data over the years

C.

Combining data from various sources and formats cost-effectively

D.

Reducing data volume to manageable sizes

Question:

Which RAID level consists of two disk drives and every write is written to both disks?

A.

RAID 5

B.

RAID 1

C.

RAID 1+0

D.

RAID 6

Question:

An Ethernet switch has eight ports, and all ports must be operational for 24 hours from Monday through Friday. However, failures of Port 6 occur within the week as follows:

    Tuesday: 6 AM to 8 AM

    Thursday: 5 PM to 10 PM

    Friday: 7 AM to 9 AMWhat is the MTBF (Mean Time Between Failures) of Port 6?

A.

37 hours

B.

32 hours

C.

30 hours

D.

40 hours

Question:

Which activity is performed in the fifth stage of penetration testing?

A.

Determining the risk levels by exploited vulnerabilities

B.

Determining if persistence access can be maintained

C.

Checking the compromised system or network

D.

Collecting the evidence of the exploited vulnerabilities

Question:

In traditional provisioning, which two factors determine the availability, capacity, and performance of the RAID set?

A.

The RAID level

B.

Make of drives

C.

The number of drives in the RAID set

D.

Capacity of drives

Question:

A storage administrator needs to track the performance and availability of storage components and services. Which storage management function would provide this information?

A.

Reporting

B.

Monitoring

C.

Alerting

D.

Infrastructure discovery

Question:

When troubleshooting a virtual machine, which file is most likely to provide a detailed history of the VM's behavior?

A.

Configuration file

B.

Log file

C.

Memory state file

D.

Virtual disk file