Exam4Training

DELL EMC D-ISM-FN-23 Dell Information Storage and Management Foundations 2023 Online Training

Question #1

What restricts a tenant’s access to a specific group of object buckets in a software-defined storage environment?

  • A . Availability zone
  • B . Retention quotas
  • C . Namespace
  • D . Erasure coding

Reveal Solution Hide Solution

Correct Answer: C
Question #2

Which data archiving component scans primary storage to find the files that meet the archiving policy?

  • A . Archive storage
  • B . Archive database server
  • C . Archive agent
  • D . Archive stub file

Reveal Solution Hide Solution

Correct Answer: C
Question #3

A company plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 4500 IOPS with a typical I/O size of 4 KB. The capacity of each available disk drive is 250 GB. In addition, the maximum number of IOPS a drive can perform at with a 70% utilization is 90 IOPS.

What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements for a RAID 0 configuration?

  • A . 8
  • B . 40
  • C . 50
  • D . 70

Reveal Solution Hide Solution

Correct Answer: C
Question #4

What accurately describes the seek time of a disk drive?

  • A . Time taken to position the read/write head over the correct track
  • B . Time taken by the platter to position the data under the read/write head
  • C . Time taken to read a block of data from the platter
  • D . Time taken by the controller to service an I/O from the application

Reveal Solution Hide Solution

Correct Answer: A
Question #5

What is an accurate statement about a virtual tape library?

  • A . Legacy backup software can be used without additional modules or changes
  • B . Portability of physical tapes tooffsite locations is supported
  • C . Only sequential data access for both backup and recovery is supported
  • D . Regular maintenance tasks associated with a physical tape drive are required

Reveal Solution Hide Solution

Correct Answer: A
Question #6

If a company has experienced a passive attack on its IT infrastructure, how is the company’s security impacted?

  • A . Access to services is denied.
  • B . Availability of data is affected.
  • C . Information privacy is compromised.
  • D . Data is altered by an unauthorized user.

Reveal Solution Hide Solution

Correct Answer: C
Question #7

A Fibre Channel switch has eight ports and all ports must be operational 24 hours 7 days.

However, a failure of Port 5 occurs on a particular week as follows:

– Monday = 11 AM to 3 PM

– Thursday = 6 AM to 11 AM

– Saturday = 11 AM to 4 PM

What is the availability of Port 5 in that week?

  • A . 91.6%
  • B . 94.6%
  • C . 95%
  • D . 90%

Reveal Solution Hide Solution

Correct Answer: A
Question #8

What does the "variability" characteristic of big data signify?

  • A . Importance in obtaining the right information from data at all possible contexts
  • B . Cost-effectiveness and business value obtained from massive volumes of data
  • C . Diversity in the formats and types of data generated from various sources
  • D . mportance in the quality of data gathered from a number of sources

Reveal Solution Hide Solution

Correct Answer: A
Question #9

What is an accurate statement regarding virtual LANs?

  • A . Supports Fibre Channel network transport data security
  • B . Supports one or more logical L ANS operating over a single physical LAN
  • C . Provides hardware level connectivity and maintains physical L AN transport paths
  • D . Provides software level connectivity and maintains physical LAN transport paths

Reveal Solution Hide Solution

Correct Answer: B
Question #10

In a __________ cloud deployment model, cloud resources are owned, operated, and maintained by a business.

  • A . Public
  • B . Private
  • C . Hybrid
  • D . Community

Reveal Solution Hide Solution

Correct Answer: B

Question #11

In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link.

Which security mechanism should the administrator use?

  • A . Port type locking
  • B . Port binding
  • C . Persistent port disable
  • D . Fabric binding

Reveal Solution Hide Solution

Correct Answer: A
Question #12

What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?

  • A . FCoE switches provide MAC addresses to VN_Ports during node login
  • B . FC switches provide MAC addresses to VE_Ports dynamically during discovery
  • C . Compute systems provide MAC addresses to the VF_Ports on FCoE switches
  • D . Both VF_Ports and VE_Ports obtain MAC addresses from FC switches

Reveal Solution Hide Solution

Correct Answer: A
Question #13

Which technology decouples the OS, applications, and user state from a physical compute system?

  • A . Application virtualization
  • B . Storage virtualization
  • C . Thin client virtualization
  • D . Desktop virtualization

Reveal Solution Hide Solution

Correct Answer: D
Question #14

What is an accurate statement about a virtual desktop infrastructure?

  • A . Each user is provided a dedicated desktop VM with its own operating system and applications
  • B . Operating system and applications hosted on a client system are shared by multiple users
  • C . Each user has an individual desktop session on the remote compute system in which applications execute
  • D . Operating system and applications on the remote desktop are downloaded on the client for local execution

Reveal Solution Hide Solution

Correct Answer: A
Question #15

What is an advantage of performing capacity monitoring in a storage infrastructure environment?

  • A . Automatically identifying configuration changes to the storage infrastructure elements
  • B . Rapidly identifying component failures that may lead to storage unavailability
  • C . Efficiently tracking unauthorized access to the storage infrastructure elements
  • D . Proactively preventing service outages due to the lack of storage space

Reveal Solution Hide Solution

Correct Answer: D
Question #16

What is an accurate statement about the function of an archiving server?

  • A . Enables the ability to configure policies for archiving data
  • B . Installs agentson the archiving storage device
  • C . Scans the data that can bearchived on application servers
  • D . Creates stub files on an archiving storage device

Reveal Solution Hide Solution

Correct Answer: A
Question #17

What information is available in a capacity planning report for storage infrastructure?

  • A . number of units of storage available, used and the cost
  • B . current and historic information about the utilization of storage, file systems, and ports
  • C . equipment purchase dates, licenses, lease status, and maintenance records
  • D . current and historical performance information about IT components and operations

Reveal Solution Hide Solution

Correct Answer: B
Question #18

What accurately describes hypervisor-based continuous data protection?

  • A . Virtual appliance is running on a hypervisor.
  • B . Journal is stored in a virtual machine.
  • C . Virtual appliance runs on a storage system.
  • D . Replica volumes are created in the hypervisor.

Reveal Solution Hide Solution

Correct Answer: A
Question #19

An organization is planning to secure the connection between the data center and cloud while performing data backup and replication.

Which security control mechanism will help organization to achieve the desired security?

  • A . ldentity and Access management
  • B . Intrusion Detection and Prevention
  • C . Firewall
  • D . Virtual Private Network

Reveal Solution Hide Solution

Correct Answer: D
Question #20

An organization plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 9800 IOPS with a typical I/O size of 4 KB.

The capacity of each available disk drive is 250 GB. The maximum number of IOPS a drive can perform at with 70 percent utilization is 90 IOPS.

What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements given a RAID 0 configuration?

  • A . 8
  • B . 70
  • C . 110
  • D . 140

Reveal Solution Hide Solution

Correct Answer: C

Question #21

Which type of storage device does the “X” represent in the exhibit?

  • A . Object-based
  • B . Block-based
  • C . File-based
  • D . Unified-based

Reveal Solution Hide Solution

Correct Answer: A
Question #22

What are the essential components of an object in an object-based storage system?

  • A . File path, object ID, data, and filename
  • B . Object ID, metadata, file path, and LUN ID
  • C . Data, user-defined attributes, metadata, and object ID
  • D . LUN ID, data, object ID, and user-defined attributes

Reveal Solution Hide Solution

Correct Answer: C
Question #23

Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?

  • A . Fabric controller
  • B . Fabric login server
  • C . Name server
  • D . Fabric management server

Reveal Solution Hide Solution

Correct Answer: A
Question #24

What accurately describes an attack surface in an IT infrastructure?

  • A . Various entry points that can be used to launch an attack
  • B . Series of steps that must be followed in order to complete an attack
  • C . Amount of effort required to exploit a vulnerability in the infrastructure
  • D . Process of identifying the system components under attack

Reveal Solution Hide Solution

Correct Answer: A
Question #25

Which compute system component enables dynamic extension of file system capacity and efficient storage management?

  • A . Logical Unit Number
  • B . Logical Unit Number Masking
  • C . Logical Volume Manager
  • D . Virtual Memory Manager

Reveal Solution Hide Solution

Correct Answer: C
Question #26

What is an advantage of performing incremental backups compared to cumulative backups for the same data?

  • A . Requires more time to perform data backup
  • B . Storage capacity needed for backups is significantly reduced
  • C . Requires more storage capacity for backup
  • D . Reduces restore time but requires a maximum of two copies

Reveal Solution Hide Solution

Correct Answer: B
Question #27

Which capability is provided by software-defined networking?

  • A . Ability to combine both data plane and control plane functions on a single physical network component
  • B . A single control point to the entire network infrastructure enabling policy-based network management
  • C . Ability to automatically create application programming interfaces for centralized management
  • D . A single self-contained package with integrated hardware and software components

Reveal Solution Hide Solution

Correct Answer: B
Question #28

Which data center characteristic ensures that data is stored and retrieved exactly as it was received?

  • A . Data integrity
  • B . Security
  • C . Scalability
  • D . Manageability

Reveal Solution Hide Solution

Correct Answer: A
Question #29

What specialized replication technique enables moving data between storage systems within a data center, between data centers, and between the data center and the cloud?

  • A . Data deduplication
  • B . Data migration
  • C . Data backup
  • D . Data archiving

Reveal Solution Hide Solution

Correct Answer: B
Question #30

Which Dell EMC product provides a software-defined platform that supports both block and file storage services?

  • A . XtremIO
  • B . PowerMax
  • C . FAST VP
  • D . VPLEX

Reveal Solution Hide Solution

Correct Answer: B

Question #31

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?

  • A . Role-based
  • B . Profile-based
  • C . Signature-based
  • D . Anomaly-based

Reveal Solution Hide Solution

Correct Answer: C
Question #32

Which data protection solution provides the ability to select a backup technology based on demand?

  • A . Agent-Based backup
  • B . Cloud-Based backup
  • C . File-Based backup
  • D . Image-Based backup

Reveal Solution Hide Solution

Correct Answer: B
Question #33

Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?

  • A . Data link
  • B . Presentation
  • C . Session
  • D . Application

Reveal Solution Hide Solution

Correct Answer: A
Question #34

Which cloud service model provides the highest level of control over operating systems, applications, and storage?

  • A . Platform as a Service (PaaS)
  • B . Software as a Service (SaaS)
  • C . Infrastructure as a Service (IaaS)
  • D . Function as a Service (FaaS)

Reveal Solution Hide Solution

Correct Answer: C
Question #35

What is a characteristic of an FC-AL implementation?

  • A . Devices can be added and removed dynamically without any impact
  • B . Supports connectivity up to 15 million nodes
  • C . Requires at least one connectivity device
  • D . Reserves one address for connecting an FC-SW port

Reveal Solution Hide Solution

Correct Answer: D
Question #36

In a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?

  • A . Hadoop Distributed File System (HDFS)
  • B . New Technology File System (NTFS)
  • C . Common Internet File System (CIFS)
  • D . Network File System (NFS)

Reveal Solution Hide Solution

Correct Answer: C
Question #37

What is the purpose of monitoring capacity in a storage infrastructure?

  • A . Tracking the amount of storage infrastructure resources used and available
  • B . Evaluating utilization of components and identifying bottlenecks
  • C . Tracking configuration changes to the storage infrastructure elements
  • D . Identifying component failures that may lead to service unavailability

Reveal Solution Hide Solution

Correct Answer: A
Question #38

What is used to implement a fully functional SAN?

  • A . IPFC
  • B . iSCSI
  • C . VXLAN
  • D . FCIP

Reveal Solution Hide Solution

Correct Answer: B
Question #39

Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?

  • A . Dell InTrust
  • B . Dell Change Auditor
  • C . VMware AppDefense
  • D . VMware AirWatch

Reveal Solution Hide Solution

Correct Answer: A
Question #40

Based on the exhibit, which type of storage does the “X” represent?

  • A . File-based
  • B . Block-based
  • C . Object-based
  • D . Unified-based

Reveal Solution Hide Solution

Correct Answer: C

Question #41

Which three parameters define information availability in a modern data center environment?

  • A . Reliability – Accessibility – Timeliness
  • B . Capacity – Availability – Security
  • C . Confidentiality – Integrity – Availability
  • D . Reliability – Integrity – Performance

Reveal Solution Hide Solution

Correct Answer: A
Question #42

Which type of Fibre Channel (FC) ports do “X” and “Y” represent in the graphic?

  • A . X is an E_Port and Y is an N_Port
  • B . X is an F_Port and Y is an F_Port
  • C . X is an N_Port and Y is an E_Port
  • D . X is an N_Port and Y is an N_Port

Reveal Solution Hide Solution

Correct Answer: B
Question #43

Which operation is performed by a scale-out NAS cluster when clients send data to the cluster?

  • A . Data is divided and stored on multiple nodes in parallel
  • B . Data is consolidated into a block and then stored on the NAS head
  • C . Data is evenly distributed to every file system in the cluster
  • D . NAS file system and cluster grow dynamically to store the data

Reveal Solution Hide Solution

Correct Answer: A
Question #44

What is an advantage of deploying a purpose-built, disk-based backup appliance in a data center environment?

  • A . Eliminate the need for performing source-based deduplication.
  • B . Convert the capital expenditure to an operational expenditure.
  • C . Lower the recovery time objective of an organization.
  • D . Retain the fixed content for longer periods in the data center.

Reveal Solution Hide Solution

Correct Answer: C
Question #45

An institution has made the decision to exit a client relationship due to anti-money laundering concerns. Prior to starting the close out process, the institution receives a written request from a law enforcement agency to keep the account open. The client is the subject of an ongoing investigation and law enforcement wants the institution to continue to monitor the account and report any suspicious activity.

What is primary consideration the institution should keep in mind when deciding whether to agree to this request?

  • A . The anticipated cost of complying with the law enforcement request
  • B . The number of suspicious transaction reports previously filed on the client
  • C . The fact that the institution has a solid record in complying with law enforcement requests
  • D . Whether the institution can continue to meet its regulatory obligations with the accounts open

Reveal Solution Hide Solution

Correct Answer: D
Question #46

Which functionality is provided by a process login in a Fibre Channel (FC) SAN environment?

  • A . Exchanges service relevant parameters between an N_port and an N_port
  • B . Establishes a connection to the fabric between an N_port and an F_port
  • C . Exchange ULP-related parameters between two N_ports
  • D . Establishes a session that occurs between two E_ports

Reveal Solution Hide Solution

Correct Answer: C
Question #47

Which logical components are required in compute systems?

  • A . Operating system
    Deduplicating file system
    RAID LUN manager
    Device drivers
  • B . Operating system
    File system
    RAID LUN manager
    Device drivers
  • C . Operating system
    File system
    Logical volume manager
    Device drivers
  • D . Operating system
    Deduplicating File system
    Logical volume manager
    Device drivers

Reveal Solution Hide Solution

Correct Answer: C
Question #48

A company’s Finance department needs 200 GB of storage for their business applications. A LUN is created with 200 GB and RAID 1 is configured to support the applications.

If the cost of storage per GB is $2, what is the chargeback cost to the department for application storage?

  • A . $ 200
  • B . $ 400
  • C . $ 800
  • D . $ 1500

Reveal Solution Hide Solution

Correct Answer: C
Question #49

What happens when a write request to a valid page is received in a solid-state drive?

  • A . Requested page is electrically erased and the write continues with the erased page
  • B . Requested page is overwritten by the new page
  • C . Requested page is marked invalid and the write continues with an available empty page
  • D . Write request is queued until the requested page is erased

Reveal Solution Hide Solution

Correct Answer: C
Question #50

An organization wants to use an application for their business communication. However, they do not have the skills or the time to deploy and manage an application in-house.

Which recommended cloud service model will meet their requirement?

  • A . Infrastructure as a Service
  • B . Database as a Service
  • C . Software as a Service
  • D . Platform as a Service

Reveal Solution Hide Solution

Correct Answer: C

Question #51

Which type of fabric topology does the exhibit represent?

  • A . Full mesh
  • B . Partial mesh
  • C . Single core-edge
  • D . Dual core-edge

Reveal Solution Hide Solution

Correct Answer: A
Question #52

What are the components of an intelligent storage system? (Choose two)

  • A . RAID Controllers
  • B . HTTP Protocols
  • C . Cache Memory
  • D . Wireless Adapters

Reveal Solution Hide Solution

Correct Answer: AC
Question #53

What is an accurate statement about three-way NDMP backup in a NAS environment?

  • A . Backup device can be shared among multiple NAS heads
  • B . Each NAS head should have a dedicated backup device
  • C . Backup data traverses at least three NAS heads before reaching the backup device
  • D . Backup is performed only when three or more NAS heads are present

Reveal Solution Hide Solution

Correct Answer: A
Question #54

Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?

  • A . Fabric binding
  • B . Zoning
  • C . Concatenating metaLUNs
  • D . LUN masking

Reveal Solution Hide Solution

Correct Answer: D
Question #55

Which lossless Ethernet functionality helps Converged Enhanced Ethernet (CEE) devices to convey and configure their features with the other CEE devices in the network?

  • A . Data center bridging exchange protocol
  • B . Enhanced transmission selection
  • C . Priority-based flow control
  • D . Congestion notification

Reveal Solution Hide Solution

Correct Answer: A
Question #56

To improve performance, which EMC product allows a PCIe flash card to be deployed in a compute system?

  • A . XtremSF
  • B . XtremCache
  • C . ScaleIO
  • D . XtremIO

Reveal Solution Hide Solution

Correct Answer: A
Question #57

In which scenarios is FCIP most beneficial? (Choose two)

  • A . Connecting isolated SANs over long distances
  • B . High-performance, low-latency environments
  • C . Local data center connectivity
  • D . Connecting SANs over an IP network

Reveal Solution Hide Solution

Correct Answer: AD
Question #58

A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday.

However, a failure of Port 2 occurs on a particular week as follows:

– Monday = 10 AM to 12 PM

– Wednesday = 4 PM to 9 PM

– Thursday = 4 PM to 7 PM

– Friday = 3 PM to 6 PM

– Saturday = 9 AM to 1 PM

What is the availability of Port 2 in that week?

  • A . 70%
  • B . 71.6%
  • C . 78.3%
  • D . 80%

Reveal Solution Hide Solution

Correct Answer: D
Question #59

What is the effect of implementing link aggregation in an FC SAN environment?

  • A . Distributes network traffic over ISLs that ensures even ISL utilization
  • B . Yields higher throughput by combing two parallel ISLs into a single physical ISL
  • C . Saves bandwidth by restricting traffic to a specific potentially congested ISL
  • D . Improves ISL utilization by increasing network traffic on a specific ISL

Reveal Solution Hide Solution

Correct Answer: A
Question #60

What accurately describes an object-based storage device (OSD)?

  • A . One object can be placed inside another object
  • B . Objects are created based on the name and location of the file
  • C . Objects exist at the same level in the address space
  • D . Numerous objects can be stored in a single namespace

Reveal Solution Hide Solution

Correct Answer: C

Question #61

Under the IaaS model, which elements are managed by the provider?

  • A . Applications
    Data
    OS
  • B . Applications
    Middleware
    Runtime
  • C . Data
    Servers
    Networking
  • D . Virtualization
    Servers
    Networking

Reveal Solution Hide Solution

Correct Answer: D
Question #62

Which storage management function ensures that the services and service levels are delivered per SLAs?

  • A . Infrastructure discovery management
  • B . Portfolio management
  • C . Financial management
  • D . Operation management

Reveal Solution Hide Solution

Correct Answer: D
Question #63

What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?

Reveal Solution Hide Solution

Correct Answer:


Question #64

What is a benefit of using a purpose-build NAS solution vs. general purpose file servers?

  • A . provides more efficient object sharing across Windows and Linux users
  • B . provides more efficient file sharing across Windows and Linux users
  • C . provides higher compute security and efficient file sharing across Windows and Linux users
  • D . provides higher network security and efficient object sharing across Windows and Linux users

Reveal Solution Hide Solution

Correct Answer: C
Question #65

A customer has a requirement to perform a backup each night. However, the customer has a limited amount of time for backups to run on week nights, Monday through Friday evenings.

Which backup granularity type is recommended to meet the backup window for those nights?

  • A . Incremental
  • B . Cumulative
  • C . Full
  • D . Differential

Reveal Solution Hide Solution

Correct Answer: A
Question #66

To authenticate a user using OpenID authentication control, what are the correct sequence of steps?

Reveal Solution Hide Solution

Correct Answer:


Question #67

What accurately describes the flow control mechanism in an FC SAN?

  • A . Both transmitting and receiving ports agree on the number of buffers available during port login
  • B . Negotiation occurs between an E_Port and an F_Port, and between two N_Ports
  • C . Credit value is incremented when a frame is transmitted and decremented upon receiving a response
  • D . Receiver Ready (R_RDY) is sent from the receiving port if available credits reach zero

Reveal Solution Hide Solution

Correct Answer: A
Question #68

Which of the following are key characteristics of Big Data? (Choose two)

  • A . Variety
  • B . Velocity
  • C . Veracity
  • D . Vulnerability

Reveal Solution Hide Solution

Correct Answer: AB
Question #69

Which iSCSI host connectivity option is recommended in a CPU-intensive application environment?

  • A . NIC with software-based iSCSI initiator
  • B . TCP offload engine
  • C . iSCSI HBA
  • D . Converged Network Adapter

Reveal Solution Hide Solution

Correct Answer: C
Question #70

What is an accurate statement about the Network File System (NFS) protocol?

  • A . Provides a set of remote procedure calls to access a remote file system
  • B . Uses the server message block protocol to provide file locking capability
  • C . Translates block I/O requests from a file system into object-level requests
  • D . Automatically scales the file systems on clients as the workload increases

Reveal Solution Hide Solution

Correct Answer: A

Question #71

In an object-based storage system, which elements are associated with an object?

  • A . Metadata, object ID, attributes, and file path
  • B . Metadata, LUN ID, data, and object ID
  • C . Object ID, attributes, LUN ID, and file path
  • D . Metadata, object ID, data, and attributes

Reveal Solution Hide Solution

Correct Answer: AD
Question #72

Based on the exhibit, what does the "X" represent in the FCIP tunnel configuration?

  • A . E_port
  • B . EX_port
  • C . F_port
  • D . VE_port

Reveal Solution Hide Solution

Correct Answer: A
Question #73

A service provider is offering cloud services to Enterprise P and Enterprise Q.

Which cloud deployment model does the exhibit represent?

  • A . Externally-hosted private cloud
  • B . On-premise community cloud
  • C . Public cloud
  • D . Externally-hosted community cloud

Reveal Solution Hide Solution

Correct Answer: A
Question #74

Which process is represented in the graphic?

  • A . Concatenation
  • B . Partitioning
  • C . Striping
  • D . Shredding

Reveal Solution Hide Solution

Correct Answer: B
Question #75

What is a key advantage of cloning a virtual machine (VM)?

  • A . Ability to run new VMs simultaneously with the same IP address.
  • B . Reduces the time required to create multiple copies of a VM.
  • C . Improves the performance of an existing VM and new VMs.
  • D . Eliminates the need to create multiple snapshots for a VM.

Reveal Solution Hide Solution

Correct Answer: B
Question #76

In a Fibre Channel SAN environment, what does the term "N_Port" refer to?

  • A . A node port that connects an end device to a switch
  • B . A switch port that connects to another switch
  • C . A port on a storage device
  • D . A port on a host bus adapter

Reveal Solution Hide Solution

Correct Answer: A
Question #77

An organization wants to protect data from accidental deletion, application crashes, data corruption, and disaster.

Which solution should the organization adopt?

  • A . Storage tiering
  • B . Thin provisioning
  • C . Data archiving
  • D . Data backup

Reveal Solution Hide Solution

Correct Answer: D
Question #78

An organization has several virtual machines (VMs) deployed in their data center. The VM files are stored on a block-based storage system. The applications on the VMs are impacted during VM backup because the backup agents on the VMs are consuming a large amount of resources.

Which alternate backup solution is recommended to address this issue?

  • A . Image-based backup
  • B . Three-way NDMP backup
  • C . Two-way NDMP backup
  • D . Target-based deduplication backup

Reveal Solution Hide Solution

Correct Answer: A
Question #79

An organization performs a full back up of its data every week. However, they are experiencing long backup windows and high network bandwidth consumption during the backup process.

Which type of deduplication should be deployed to reduce the backup window and network bandwidth consumption?

  • A . Source-based
  • B . Target-based
  • C . Inline
  • D . File-based target

Reveal Solution Hide Solution

Correct Answer: A
Question #80

What is an accurate statement about three-way NDMP backup in a NAS environment?

  • A . Backup data is sent directly from NAS to the backup device
  • B . Backup data is sent to the backup device through the application servers
  • C . A dedicated backup device is required for each NAS
  • D . All NAS systems should have the same operating environment

Reveal Solution Hide Solution

Correct Answer: A

Question #81

Which of the following are key fault tolerance techniques? (Choose two)

  • A . RAID
  • B . Data deduplication
  • C . Load balancing
  • D . Data archiving

Reveal Solution Hide Solution

Correct Answer: AC
Question #82

What is an accurate statement about an FCoE environment?

  • A . FC Forwarder must split an FC frame into two or more FCoE frames based on the Ethertype
  • B . FCoE controller sends RSCNs to all nodes to provide access control
  • C . FCoE ASIC encapsulates FCoE frames into FC frames based on FC-to-FCoE mapping
  • D . FCoE network must be configured to support jumbo frames for optimal performance

Reveal Solution Hide Solution

Correct Answer: D
Question #83

What is the time taken by the platter of a hard disk drive to position data under the read/write head?

  • A . Data transfer rate
  • B . Rotational latency
  • C . Disk service time
  • D . Seek time

Reveal Solution Hide Solution

Correct Answer: B
Question #84

What is an accurate statement about the application streaming technique of application virtualization?

  • A . Application is downloaded in portions on the client for local execution
  • B . Application executes remotely and its user interface is transmitted to the client
  • C . Application executes on the client without the use of a locally-installed agent
  • D . Application is converted into a standalone package that directly executes on the client

Reveal Solution Hide Solution

Correct Answer: A
Question #85

Refer to the exhibit.

What type of Fibre Channel port does the “X” represent?

  • A . N_port
  • B . F_port
  • C . E_port
  • D . NL_port

Reveal Solution Hide Solution

Correct Answer: B
Question #86

Which technology combines NAND flash memory into a hard disk drive and is a single, integrated device incorporating both types of storage?

  • A . Solid-state drive
  • B . Dual drive
  • C . Fibre Channel drive
  • D . Solid-state hybrid drive

Reveal Solution Hide Solution

Correct Answer: D
Question #87

What triggers an appropriate workflow upon receiving a service provisioning or management request?

  • A . Alerts
  • B . Orchestrated operations
  • C . Recovery time objective
  • D . Infrastructure discovery

Reveal Solution Hide Solution

Correct Answer: B
Question #88

Why is it important for organizations to implement a backup solution in a data center environment?

  • A . Improve the integrity of critical data
  • B . Ensure the availability of production data
  • C . Minimize the cost of data protection
  • D . Reduce redundant data in a production environment

Reveal Solution Hide Solution

Correct Answer: B
Question #89

Which process groups multiple physical drives and presents them to a compute system as a single logical volume?

  • A . Concatenation
  • B . Partitioning
  • C . Striping
  • D . Orchestration

Reveal Solution Hide Solution

Correct Answer: A
Question #90

What is a benefit of source-based deduplication over target-based deduplication?

  • A . Backup data can be retained longer
  • B . Only unique data is sent over the network to be backed up
  • C . Backup processing is offloaded from the backup client
  • D . Less backup data is stored on the backup server

Reveal Solution Hide Solution

Correct Answer: B

Question #91

A Fibre Channel switch has eight ports and all ports must be operational 24×7.

However, a failure of Port 5 occurs on a particular week as follows:

– Monday = 11 AM to 12 PM

– Thursday = 7 AM to 11 AM

– Saturday = 11 AM to 1 PM

What is the availability of Port 5 in that week?

  • A . 93%
  • B . 94.1%
  • C . 95.8%
  • D . 97%

Reveal Solution Hide Solution

Correct Answer: C
Question #92

What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?

  • A . Utilizes preconfigured preinstalled and prepackaged vendor ready solutions
  • B . Combines the datacenter components into a single standalone computing platform managed by software
  • C . Utilizes products and services from the vendors that provide specific functions with more configuration options
  • D . Combines datacenter components into a distributed infrastructure platform managed by software

Reveal Solution Hide Solution

Correct Answer: C
Question #93

What does the "X" represent in the graphic?

  • A . E_port
  • B . F_port
  • C . G_port
  • D . N_port

Reveal Solution Hide Solution

Correct Answer: D
Question #94

Which of the following are characteristics of block storage? (Choose two)

  • A . Accessible via SMB and NFS
  • B . Treated as an independent disk drive
  • C . Accessed as raw storage volumes
  • D . Best suited for unstructured data

Reveal Solution Hide Solution

Correct Answer: BC
Question #95

What is an accurate statement about Zoning?

  • A . FC switch ports, FC HBA ports, and storage ports should not be members of multiple zones
  • B . Nodes that are distributed across multiple switches in a switched fabric may also be grouped into the same zone
  • C . Increases the amount of fabric-management traffic within a zone by sending RSCNs to all nodes in a fabric
  • D . Multiple zone sets may be defined in a fabric and all zone sets must be active at a time

Reveal Solution Hide Solution

Correct Answer: B
Question #96

What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?

  • A . A dedicated VLAN must be configured for each VSAN
  • B . VLANs configured for VSANs must carry regular LAN traffic
  • C . Default VLAN must map to all VSANs defined in the FCoE switch
  • D . A minimum of four VLANs must be created to isolate VSAN traffic

Reveal Solution Hide Solution

Correct Answer: A
Question #97

What is determined based on the recovery point objective in an asynchronous remote replication?

  • A . Size of the buffer
  • B . Size of the replica
  • C . Response time
  • D . Location of the source

Reveal Solution Hide Solution

Correct Answer: A
Question #98

What is an accurate statement about full volume replication?

  • A . Target device is at least as large as the source device
  • B . Target device requires only a fraction of the space used by the source device
  • C . Target device is accessible only after the replication session starts
  • D . Target and source devices should be on different storage arrays

Reveal Solution Hide Solution

Correct Answer: A
Question #99

What is a benefit of link aggregation?

  • A . Optimizes fabric performance by distributing network traffic across ISLs.
  • B . Improves ISL utilization by increasing the network traffic on a specific ISL.
  • C . Yields a higher throughput by combining two parallel ISLs into a single physical ISL.
  • D . Saves bandwidth by restricting traffic to a specific potentially congested ISL.

Reveal Solution Hide Solution

Correct Answer: A
Question #100

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called?

  • A . Image-based
  • B . Backup as a service
  • C . Agent-based
  • D . Local replication

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version