Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

EMC D-ISM-FN-23 - Dell Information Storage and Management Foundations 2023 Exam

Page: 4 / 6
Total 189 questions

What is an accurate description about Dell EMC VxBlock system?

A.

CI solution that combines compute, virtualization, network, software defined storage into an engineered solution.

B.

HCI solution that combines compute, virtualization, network, software-defined storage into an engineered solution.

C.

CI solution that combines compute, virtualization, network, storage into an engineered solution.

D.

HCI solution that combines compute, virtualization, network, and storage optimized for VMware VSAN

Match the Fibre Channel (FC) layers with their respective features.

What is a purpose of the policy engine in a data archiving environment?

A.

Facilitates manual searching for archived data in archive storage

B.

Moves the appropriate data into archive storage automatically

C.

Automates the process of identifying the data to move from archive to primary storage

D.

Enables manual migration of older archived data between archive storage devices

What is the result of increasing the number of FC switches in a full mesh topology?

A.

Reduces available node ports for ISL connectivity

B.

Reduces number of storage and compute ports for node connectivity

C.

Reduces switch ports available for node connectivity

D.

Reduces switch ports available bandwidth for node connectivity

A company's assets are continuously under attack.

To deploy a security control mechanism to protect these assets, what should be considered?

A.

Minimize the work factor

B.

Easy access to assets by authorized users

C.

Limited access to assets by unauthorized users

D.

Maximize the attack surface

What occurs during a Shared Technology Vulnerability threat?

A.

An attacker gains access to an administrator's, user's or system account.

B.

An attacker avoids applications that are already approved by an IT organization.

C.

An attacker exploits the weaknesses of tools used to enable multi-tenancy.

D.

An attacker exhausts network bandwidth or CPU cycles.

Which data deduplication method would a cloud service provider use when storing back up data at their location?

A.

Source-based

B.

Target-based

C.

Application-based

D.

Agent-based

Which management monitoring parameter involves examining the amount of infrastructure resources used?

A.

Configuration

B.

Capacity

C.

Performance

D.

Availability

The Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port 4 occurs as follows:

Monday = 8 PM to 11 PM -

Wednesday = 7 PM to 10 PM -

Thursday = 6 AM to 12 PM -

What is the MTTR of Port 4?

A.

28 hours

B.

2 hours

C.

38 hours

D.

4 hours

A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday. However, a failure of Port 2 occurs on a particular week as follows:

Monday = 10 AM to 12 PM Wednesday = 4 PM to 9 PM Thursday = 4 PM to 7 PM

Friday = 3 PM to 6 PM Saturday = 9 AM to 1 PM

What is the availability of Port 2 in that week?

A.

70%

B.

71.6%

C.

78.3%

D.

80%