Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

D-CIS-FN-23 Dell Cloud Infrastructure and Services Foundations 2023 exam
dumps questions are the best material for you to test all the related DELL EMC
exam topics. By using the D-CIS-FN-23 exam dumps questions and practicing
your skills, you can increase your confidence and chances of passing the D-CIS-
FN-23 exam.
Features of Dumpsinfo’s products
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
Dell Cloud Infrastructure and Services Foundations 2023 D-CIS-FN-23 exam
free dumps questions are available below for you to study. 
Full version: D-CIS-FN-23 Exam Dumps Questions
1.Which product enables IT organizations to ensure optimum resource usage and configuration
compliance in virtualized and cloud environments?
A. VMware vCenter Manager
B. VMware vRealize Operations Management Suite
C. VMware vRealize Automation Suite
D. VMware vSphere with Operations Management
Answer: B
2.What is a benefit of the discovery operation in a cloud?
A. Provides visibility into service assets
B. Organizes the service portfolio in an inventory
 1 / 14
https://www.dumpsinfo.com/unlimited-access/
https://www.dumpsinfo.com/exam/d-cis-fn-23
C. Detects and corrects security attacks
D. Identifies existing vulnerabilities in a cloud
Answer: A
3.An administrator plans to perform scheduled maintenance of a computer system in a cluster. There
are multiple virtual machines (VMs) running a cloud service on the computer system.
Which solution enables the administrator to perform maintenance without service interruption?
A. VM live migration
B. VM backup
C. VM hardening
D. VM template
Answer: A
4.What is the correct sequence of the steps of risk management that a cloud service provider must
perform before offering cloud services?
A. Step 1: Risk identification
Step 2: Monitoring
Step 3: Risk assessment
Step 4: Risk mitigation
B. Step 1: Monitoring
Step 2: Risk identification
Step 3: Risk assessment
Step 4: Risk mitigation
C. Step 1: Risk identification
Step 2: Risk assessment
Step 3: Risk mitigation
Step 4: Monitoring
D. Step 1: Risk assessment
Step 2: Risk identification
Step 3: Monitoring
Step 4: Risk mitigation
Answer: C
5.Which method optimizes network performance by distributing network traffic across the shared
bandwidth of all the ISLs?
A. Link aggregation
B. Network zoning
C. Network segmentation
D. Link failover
Answer: A
6.What is provided by an uplink NIC used in a virtual machine network on a physical compute system
running a hypervisor?
A. Connectivity between a virtual switch and a physical Ethernet switch
B. Connectivity between a virtual switch and physical NICs
C. Inter-switch links (ISLs) between virtual switches
D. Connectivity between a virtual switch and virtual NICs
Answer: A
 2 / 14
https://www.dumpsinfo.com/
7.What refers to an agreement between provider and consumer that states the terms of service
usage?
A. Service contract
B. Service template
C. Chargeback
D. Showback
Answer: A
8.Which statement describes Disaster Recovery as a Service (DRaaS)?
A. The cloud service provider assumes responsibility for providing resources to enable consumers to
continue running their IT services in the event of a disaster
B. It enables consumers to assume the role of a cloud service provider and to continue running their
IT services in the event of a disaster
C. When a disaster strikes at a consumer’s location, the data from the cloud service provider is used
to run the IT services from the consumer’s data center
D. When a disaster strikes at the cloud service provider’s location, the data from the consumer’s
location is used to run the IT services at the provider’s data center
Answer: A
9.What is used to update information in a configuration management database?
A. Performance management tool
B. Capacity management tool
C. Configuration manager
D. Discovery tool
Answer: D
10.Two departments of an organization have their own volumes created on the same storage system.
What can the organization implement to prevent unauthorized access to the volumes owned by the
other department?
A. Thin LUN
B. Thick LUN
C. LUN shredding
D. LUN masking
Answer: D
11.Which image represents the correct sequence of steps in an OAuth mechanism?
A)
 3 / 14
https://www.dumpsinfo.com/
B)
C)
 4 / 14
https://www.dumpsinfo.com/
D)
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
Answer: A
 5 / 14
https://www.dumpsinfo.com/
12.Which statement characterizes the software-defined approach for managing resources?
A. Abstracts the underlying infrastructure components and separates the management functions from
the infrastructure components
B. Provides a framework to list services, attributes of services, service-level commitments, terms and
conditions for service provisioning, and prices of services
C. Provides the automated arrangement, coordination, and management of various system functions
in a cloud infrastructure to manage cloud services
D. Specifies a set of component functions that can be called from a software component to interact
with other software components
Answer: A
13.Which tool should be recommended to customers for Infrastructure automation?
A. GitHub
B. Docker
C. Chef
D. JARVIS
Answer: C
14.Which host-based security attribute supports audit, multifactor authentication, and IP address
filtering?
A. Virtual machine hardening
B. Hypervisor hardening
C. Application hardening
D. Operating system hardening
Answer: B
15.An organization plans to deploy remote replication between two sites for disaster recovery without
affecting the application response time. The two sites are 1000 miles (1600 km) apart.
Which solution would you recommend to the organization?
A. Snapshot replication
B. Image-based replication
C. Synchronous replication
D. Asynchronous replication
Answer: C
16.What is the function of a monitoring and alerting tool?
A. Focus on examining the usage of resources by customers and service providers and provide
notification to optimize and manage workloads
B. Control charges for cloud usage by optimizing cloud resource utilization
C. Automate tasks and IT processes and manage the IT environment
D. Enable people to work closely together on a common project, in real time, by making
communication among them easier
Answer: A
17.What term describes the ability of a system to continue functioning, even when a few of its
components fail?
 6 / 14
https://www.dumpsinfo.com/
A. Replication
B. Fault tolerance
C. Checkpointing
D. Disaster recovery
Answer: B
18.Which entities are involved in the OAuth mechanism?
A. Resource owner, resource server, client, authorization server
B. Resource owner, resource server, client, application server
C. Resource client, resource server, owner, authentication server
D. Resource client, resource server, owner, application server
Answer: A
19.The incident management team is unable to determine the root cause of an incident.
To which team should the error-correction activity be transferred?
A. Performance Management
B. Change Management
C. Availability Management
D. Problem Management
Answer: D
20.What is the function of a software-defined network controller?
A. Provides instructions for the control plane to handle network traffic based on policies
B. Provides instructions for the data plane to handle network traffic based on policies
C. Provides instructions for the data plane to handle network traffic based on external management
interactions
D. Provides instructions for the control plane to handle network traffic based on external management
interactions
Answer: B
21.What is a function of the control layer of a cloud infrastructure?
A. Configuring resource pools
B. Pooling resources
C. Communicating across computer systems
D. Providing workflowsfor executing tasks
Answer: A
22.Which cloud service management option defines the suite of service offerings and aligns it to the
service provider’s strategic business goals?
A. Demand
B. Capacity
C. Operation
D. Portfolio
Answer: D
23.To implement a new service desk management tool, the capacity of the servers has to be
 7 / 14
https://www.dumpsinfo.com/
extended. Who is responsible for managing the request for additional capacity?
A. Change Manager
B. Financial Manager
C. Capacity Manager
D. Service Level Manager
Answer: A
24.Match each service management phase with its process.
Answer:
25.Which two are key requirements for fault tolerance?
A. Document SPOF and Fault Elimination
B. Fault Isolation and Eliminate SPOF
C. Network Isolation and Eliminate SPOF
 8 / 14
https://www.dumpsinfo.com/
D. RAID Storage and Fault Isolation
Answer: B
26.Which cloud role has the responsibility to perform independent cloud service assessments?
A. Architect
B. Broker
C. Consumer
D. Auditor
Answer: D
27.What enables a cloud service provider to determine if a requirement to keep the data of
consumers segregated from each other is being met?
A. Security audit
B. Authentication
C. Authorization
D. Privacy control
Answer: A
28.What is a function of the service layer of a cloud infrastructure?
A. Presents cloud interfaces
B. Creates resource pools
C. Detects service-related problems
D. Discovers cloud services
Answer: A
29.What is a benefit of synchronous remote replication?
A. Replicates data across any geographic location without impacting response time
B. Ensures source and replica have identical data at all times
C. Supports locality of reference to improve replication performance
D. Saves network bandwidth by replicating only deduplicated data
Answer: B
30.What type of cloud security control is log auditing?
A. Detective control
B. Corrective control
C. Preventive control
D. Technical control
Answer: A
31.What can an IT department do to better meet IT challenges and support digital businesses?
A. Become more technology centric
B. Focus on delivery and management of digital assets
C. Become more service centric within cost constraints
D. Focus on providing services without being distracted by costs
Answer: A
 9 / 14
https://www.dumpsinfo.com/
32.Match the 12-Factor App rule names with the corresponding practice definitions.
A. Disposability - Maximize robustness with fast startup and graceful shutdown
Config - Access services through well-defined URLs
Port binding - Externalize the values use by the application by connecting to things that might change
Codebase - Put all the code in a single repository that belongs to a version control system
B. Disposability - Access services through well-defined URLs
Config - Externalize the values use by the application by connecting to things that might change
Port binding - Maximize robustness with fast startup and graceful shutdown
Codebase - Put all the code in a single repository that belongs to a version control system
C. Disposability - Put all the code in a single repository that belongs to a version control system
Config - Maximize robustness with fast startup and graceful shutdown
Port binding - Externalize the values use by the application by connecting to things that might change
Codebase - Access services through well-defined URLs
D. Disposability - Externalize the values use by the application by connecting to things that might
change
Config - Maximize robustness with fast startup and graceful shutdown
Port binding - Put all the code in a single repository that belongs to a version control system
Codebase - Access services through well-defined URLs
Answer: A
33.A provider offers a 24x7 online service to consumers. The service experiences three hours of
downtime during one week.
What is the availability of the service for that week?
A. 90.5%
B. 92.5%
C. 95.2%
D. 98.2%
Answer: D
34.Dynamic virtual machine (VM) load balancing across storage volumes is enabled.
Which parameter is used to intelligently place newly created VMs on a storage volume?
A. I/O load on the storage volume
B. Type of the storage volume
C. Location of the storage volume
D. Size of the storage volume
Answer: A
35.When configuring an authentication mechanism using Challenge-Handshake Authentication
Protocol (CHAP), where should the CHAP secret be configured?
A. Initiator and target
B. Initiator only
C. Target only
D. Application server
Answer: A
36.What is a benefit of secure multitenancy?
A. Reduces unauthorized access to resources
 10 / 14
https://www.dumpsinfo.com/
B. Blocks unauthorized access to resources
C. Eliminates data breach risks
D. Protects cloud infrastructure
Answer: A
37.Which malware detection technique involves examining suspicious behavior of files?
A. Heuristics-based
B. Sandbox-based
C. Resource-based
D. Signature-based
Answer: A
38.What term refers to businesses that cautiously and gradually embrace digital transformation?
A. Digital Laggards
B. Digital Evaluators
C. Digital Leaders
D. Digital Adopters
Answer: B
39.What needs to be considered before performing the discovery activity in a cloud?
A. Frequency of information collection
B. Terms of service contract
C. Impact on service catalog
D. Impact on workflow structure
Answer: A
40.A development group is using an iterative and incremental software development method.
Which standard is being utilized?
A. Agile
B. ITIL
C. DevOps
D. Orchestration
Answer: A
41.What is a function of service portfolio management?
A. Ensure compliance to industry standards
B. Enable capacity and availability management
C. Perform market research and collect information about competitors
D. Collect information about cloud services and their constituent elements
Answer: B
42.Which RSA product enables multi-factor authentication?
A. SecurID
B. Archer eGRC
C. Envision
D. BSAFE
 11 / 14
https://www.dumpsinfo.com/
Answer: C
43.Which compliance standard provides policies and procedures to optimize the security of credit
card transactions?
A. HIPAA
B. ENISA
C. CSA CCM
D. PCI DSS
Answer: D
44.Which mechanism in a Fibre Channel SAN ensures that unauthorized switches connected to a
fabric remain segmented?
A. Port binding
B. Port-type locking
C. Persistent port locking
D. Fabric binding
Answer: D
45.A compute system is configured to access data from a block-based storage system over a
network.
What must be true about the file system?
A. It is managed by the computer system.
B. It is managed by the storage system.
C. It is part of the storage area network.
D. It is managed by the object-based storage device node.
Answer: A
46.Which type of zoning prevents unauthorized access, even when node ports are re-cabled to a
different fabric port on a Fibre Channel switch?
A. eui-based
B. WWPN-based
C. Port-based
D. Mixed
Answer: B
47.Which statement describes the service operation management function?
A. Deciding to deliver those services that provide value to the provider and reduce operating costs
B. Managing the provider's operational expenditure, budget, and billing requirements
C. Maintaining deployed services, which ensures that service levels are delivered as committed
D. Defining a suite of service offerings that aligns to the provider’s strategic business goals
Answer: C
48.Which statement describes an image-based backup solution?
A. The capability to perform recovery only at the file level is provided
B. Data is transferred directly from the guest OS to the backup device
C. Backup processing is offloaded from virtual machines to a proxy server
 12 / 14
https://www.dumpsinfo.com/
D. The backup agent is required inside the virtual machine to back up
Answer: C
49.Which activity is carried out during the service operation phase of the cloud service lifecycle?
A. Discovering the service assets
B. Establishing the billing policy
C. De-provisioning theservice instance
D. Assessing service requirements
Answer: A
50.How is the fulfillment process of a service request implemented in a cloud environment?
A. Cloud Administrator manually handles service requests
B. Element manager collects service requests directly from the catalog
C. Workflows defined in the orchestrator direct the process
D. Orchestrator allocates the same amount of resources to all service requests
Answer: C
51.What activity is performed during the service planning phase of the cloud service lifecycle?
A. Discovering Service Assets
B. Defining Service Offering
C. Developing Service Enablement Roadmap
D. Defining Orchestration Workflow
Answer: C
52.What term refers to businesses that do not have a digital plan, and have limited initiatives or
investments related to digital transformation?
A. Digital Leaders
B. Digital Laggards
C. Digital Adopters
D. Digital Evaluators
Answer: B
53.What is performed by orchestration software?
A. Portable deployment of workflows, independent of any cloud service provider
B. Integration and sequencing of system functions into automated workflows
C. Automated arrangement and coordination of governance policies in a cloud
D. Organization and display of service information and management functions to users
Answer: B
54.What could be a possible cause for the degradation in the performance of virtual machines (VMs)
during a guest-level backup operation?
A. Backup agent running inside VMs consumes additional resources.
B. VM snapshot created for the backup consumes additional resources.
C. VMs move into read only mode during backup operations.
D. VMs move into sleep mode during backup operations.
Answer: A
 13 / 14
https://www.dumpsinfo.com/
55.Which platform provides a converged infrastructure solution?
A. VxRail
B. PowerStore
C. VxBlock
D. PowerFlex
Answer: C
56.An organization is using a shared file system to manage virtual machine (VM) files.
Which statement is true about the file system?
A. It enables VM files to be stored on remote file servers.
B. It is installed on the local storage of the computer system.
C. It enables multiple hypervisors to write to a VM file concurrently.
D. It is installed on the guest operating system of each VM.
Answer: A
Powered by TCPDF (www.tcpdf.org)
 14 / 14
https://www.dumpsinfo.com/
http://www.tcpdf.org