Text Material Preview
D-CIS-FN-23 Dell Cloud Infrastructure and Services Foundations 2023 exam dumps questions are the best material for you to test all the related DELL EMC exam topics. By using the D-CIS-FN-23 exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the D-CIS- FN-23 exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. Dell Cloud Infrastructure and Services Foundations 2023 D-CIS-FN-23 exam free dumps questions are available below for you to study. Full version: D-CIS-FN-23 Exam Dumps Questions 1.Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments? A. VMware vCenter Manager B. VMware vRealize Operations Management Suite C. VMware vRealize Automation Suite D. VMware vSphere with Operations Management Answer: B 2.What is a benefit of the discovery operation in a cloud? A. Provides visibility into service assets B. Organizes the service portfolio in an inventory 1 / 14 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/d-cis-fn-23 C. Detects and corrects security attacks D. Identifies existing vulnerabilities in a cloud Answer: A 3.An administrator plans to perform scheduled maintenance of a computer system in a cluster. There are multiple virtual machines (VMs) running a cloud service on the computer system. Which solution enables the administrator to perform maintenance without service interruption? A. VM live migration B. VM backup C. VM hardening D. VM template Answer: A 4.What is the correct sequence of the steps of risk management that a cloud service provider must perform before offering cloud services? A. Step 1: Risk identification Step 2: Monitoring Step 3: Risk assessment Step 4: Risk mitigation B. Step 1: Monitoring Step 2: Risk identification Step 3: Risk assessment Step 4: Risk mitigation C. Step 1: Risk identification Step 2: Risk assessment Step 3: Risk mitigation Step 4: Monitoring D. Step 1: Risk assessment Step 2: Risk identification Step 3: Monitoring Step 4: Risk mitigation Answer: C 5.Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs? A. Link aggregation B. Network zoning C. Network segmentation D. Link failover Answer: A 6.What is provided by an uplink NIC used in a virtual machine network on a physical compute system running a hypervisor? A. Connectivity between a virtual switch and a physical Ethernet switch B. Connectivity between a virtual switch and physical NICs C. Inter-switch links (ISLs) between virtual switches D. Connectivity between a virtual switch and virtual NICs Answer: A 2 / 14 https://www.dumpsinfo.com/ 7.What refers to an agreement between provider and consumer that states the terms of service usage? A. Service contract B. Service template C. Chargeback D. Showback Answer: A 8.Which statement describes Disaster Recovery as a Service (DRaaS)? A. The cloud service provider assumes responsibility for providing resources to enable consumers to continue running their IT services in the event of a disaster B. It enables consumers to assume the role of a cloud service provider and to continue running their IT services in the event of a disaster C. When a disaster strikes at a consumer’s location, the data from the cloud service provider is used to run the IT services from the consumer’s data center D. When a disaster strikes at the cloud service provider’s location, the data from the consumer’s location is used to run the IT services at the provider’s data center Answer: A 9.What is used to update information in a configuration management database? A. Performance management tool B. Capacity management tool C. Configuration manager D. Discovery tool Answer: D 10.Two departments of an organization have their own volumes created on the same storage system. What can the organization implement to prevent unauthorized access to the volumes owned by the other department? A. Thin LUN B. Thick LUN C. LUN shredding D. LUN masking Answer: D 11.Which image represents the correct sequence of steps in an OAuth mechanism? A) 3 / 14 https://www.dumpsinfo.com/ B) C) 4 / 14 https://www.dumpsinfo.com/ D) A. Exhibit A B. Exhibit B C. Exhibit C D. Exhibit D Answer: A 5 / 14 https://www.dumpsinfo.com/ 12.Which statement characterizes the software-defined approach for managing resources? A. Abstracts the underlying infrastructure components and separates the management functions from the infrastructure components B. Provides a framework to list services, attributes of services, service-level commitments, terms and conditions for service provisioning, and prices of services C. Provides the automated arrangement, coordination, and management of various system functions in a cloud infrastructure to manage cloud services D. Specifies a set of component functions that can be called from a software component to interact with other software components Answer: A 13.Which tool should be recommended to customers for Infrastructure automation? A. GitHub B. Docker C. Chef D. JARVIS Answer: C 14.Which host-based security attribute supports audit, multifactor authentication, and IP address filtering? A. Virtual machine hardening B. Hypervisor hardening C. Application hardening D. Operating system hardening Answer: B 15.An organization plans to deploy remote replication between two sites for disaster recovery without affecting the application response time. The two sites are 1000 miles (1600 km) apart. Which solution would you recommend to the organization? A. Snapshot replication B. Image-based replication C. Synchronous replication D. Asynchronous replication Answer: C 16.What is the function of a monitoring and alerting tool? A. Focus on examining the usage of resources by customers and service providers and provide notification to optimize and manage workloads B. Control charges for cloud usage by optimizing cloud resource utilization C. Automate tasks and IT processes and manage the IT environment D. Enable people to work closely together on a common project, in real time, by making communication among them easier Answer: A 17.What term describes the ability of a system to continue functioning, even when a few of its components fail? 6 / 14 https://www.dumpsinfo.com/ A. Replication B. Fault tolerance C. Checkpointing D. Disaster recovery Answer: B 18.Which entities are involved in the OAuth mechanism? A. Resource owner, resource server, client, authorization server B. Resource owner, resource server, client, application server C. Resource client, resource server, owner, authentication server D. Resource client, resource server, owner, application server Answer: A 19.The incident management team is unable to determine the root cause of an incident. To which team should the error-correction activity be transferred? A. Performance Management B. Change Management C. Availability Management D. Problem Management Answer: D 20.What is the function of a software-defined network controller? A. Provides instructions for the control plane to handle network traffic based on policies B. Provides instructions for the data plane to handle network traffic based on policies C. Provides instructions for the data plane to handle network traffic based on external management interactions D. Provides instructions for the control plane to handle network traffic based on external management interactions Answer: B 21.What is a function of the control layer of a cloud infrastructure? A. Configuring resource pools B. Pooling resources C. Communicating across computer systems D. Providing workflowsfor executing tasks Answer: A 22.Which cloud service management option defines the suite of service offerings and aligns it to the service provider’s strategic business goals? A. Demand B. Capacity C. Operation D. Portfolio Answer: D 23.To implement a new service desk management tool, the capacity of the servers has to be 7 / 14 https://www.dumpsinfo.com/ extended. Who is responsible for managing the request for additional capacity? A. Change Manager B. Financial Manager C. Capacity Manager D. Service Level Manager Answer: A 24.Match each service management phase with its process. Answer: 25.Which two are key requirements for fault tolerance? A. Document SPOF and Fault Elimination B. Fault Isolation and Eliminate SPOF C. Network Isolation and Eliminate SPOF 8 / 14 https://www.dumpsinfo.com/ D. RAID Storage and Fault Isolation Answer: B 26.Which cloud role has the responsibility to perform independent cloud service assessments? A. Architect B. Broker C. Consumer D. Auditor Answer: D 27.What enables a cloud service provider to determine if a requirement to keep the data of consumers segregated from each other is being met? A. Security audit B. Authentication C. Authorization D. Privacy control Answer: A 28.What is a function of the service layer of a cloud infrastructure? A. Presents cloud interfaces B. Creates resource pools C. Detects service-related problems D. Discovers cloud services Answer: A 29.What is a benefit of synchronous remote replication? A. Replicates data across any geographic location without impacting response time B. Ensures source and replica have identical data at all times C. Supports locality of reference to improve replication performance D. Saves network bandwidth by replicating only deduplicated data Answer: B 30.What type of cloud security control is log auditing? A. Detective control B. Corrective control C. Preventive control D. Technical control Answer: A 31.What can an IT department do to better meet IT challenges and support digital businesses? A. Become more technology centric B. Focus on delivery and management of digital assets C. Become more service centric within cost constraints D. Focus on providing services without being distracted by costs Answer: A 9 / 14 https://www.dumpsinfo.com/ 32.Match the 12-Factor App rule names with the corresponding practice definitions. A. Disposability - Maximize robustness with fast startup and graceful shutdown Config - Access services through well-defined URLs Port binding - Externalize the values use by the application by connecting to things that might change Codebase - Put all the code in a single repository that belongs to a version control system B. Disposability - Access services through well-defined URLs Config - Externalize the values use by the application by connecting to things that might change Port binding - Maximize robustness with fast startup and graceful shutdown Codebase - Put all the code in a single repository that belongs to a version control system C. Disposability - Put all the code in a single repository that belongs to a version control system Config - Maximize robustness with fast startup and graceful shutdown Port binding - Externalize the values use by the application by connecting to things that might change Codebase - Access services through well-defined URLs D. Disposability - Externalize the values use by the application by connecting to things that might change Config - Maximize robustness with fast startup and graceful shutdown Port binding - Put all the code in a single repository that belongs to a version control system Codebase - Access services through well-defined URLs Answer: A 33.A provider offers a 24x7 online service to consumers. The service experiences three hours of downtime during one week. What is the availability of the service for that week? A. 90.5% B. 92.5% C. 95.2% D. 98.2% Answer: D 34.Dynamic virtual machine (VM) load balancing across storage volumes is enabled. Which parameter is used to intelligently place newly created VMs on a storage volume? A. I/O load on the storage volume B. Type of the storage volume C. Location of the storage volume D. Size of the storage volume Answer: A 35.When configuring an authentication mechanism using Challenge-Handshake Authentication Protocol (CHAP), where should the CHAP secret be configured? A. Initiator and target B. Initiator only C. Target only D. Application server Answer: A 36.What is a benefit of secure multitenancy? A. Reduces unauthorized access to resources 10 / 14 https://www.dumpsinfo.com/ B. Blocks unauthorized access to resources C. Eliminates data breach risks D. Protects cloud infrastructure Answer: A 37.Which malware detection technique involves examining suspicious behavior of files? A. Heuristics-based B. Sandbox-based C. Resource-based D. Signature-based Answer: A 38.What term refers to businesses that cautiously and gradually embrace digital transformation? A. Digital Laggards B. Digital Evaluators C. Digital Leaders D. Digital Adopters Answer: B 39.What needs to be considered before performing the discovery activity in a cloud? A. Frequency of information collection B. Terms of service contract C. Impact on service catalog D. Impact on workflow structure Answer: A 40.A development group is using an iterative and incremental software development method. Which standard is being utilized? A. Agile B. ITIL C. DevOps D. Orchestration Answer: A 41.What is a function of service portfolio management? A. Ensure compliance to industry standards B. Enable capacity and availability management C. Perform market research and collect information about competitors D. Collect information about cloud services and their constituent elements Answer: B 42.Which RSA product enables multi-factor authentication? A. SecurID B. Archer eGRC C. Envision D. BSAFE 11 / 14 https://www.dumpsinfo.com/ Answer: C 43.Which compliance standard provides policies and procedures to optimize the security of credit card transactions? A. HIPAA B. ENISA C. CSA CCM D. PCI DSS Answer: D 44.Which mechanism in a Fibre Channel SAN ensures that unauthorized switches connected to a fabric remain segmented? A. Port binding B. Port-type locking C. Persistent port locking D. Fabric binding Answer: D 45.A compute system is configured to access data from a block-based storage system over a network. What must be true about the file system? A. It is managed by the computer system. B. It is managed by the storage system. C. It is part of the storage area network. D. It is managed by the object-based storage device node. Answer: A 46.Which type of zoning prevents unauthorized access, even when node ports are re-cabled to a different fabric port on a Fibre Channel switch? A. eui-based B. WWPN-based C. Port-based D. Mixed Answer: B 47.Which statement describes the service operation management function? A. Deciding to deliver those services that provide value to the provider and reduce operating costs B. Managing the provider's operational expenditure, budget, and billing requirements C. Maintaining deployed services, which ensures that service levels are delivered as committed D. Defining a suite of service offerings that aligns to the provider’s strategic business goals Answer: C 48.Which statement describes an image-based backup solution? A. The capability to perform recovery only at the file level is provided B. Data is transferred directly from the guest OS to the backup device C. Backup processing is offloaded from virtual machines to a proxy server 12 / 14 https://www.dumpsinfo.com/ D. The backup agent is required inside the virtual machine to back up Answer: C 49.Which activity is carried out during the service operation phase of the cloud service lifecycle? A. Discovering the service assets B. Establishing the billing policy C. De-provisioning theservice instance D. Assessing service requirements Answer: A 50.How is the fulfillment process of a service request implemented in a cloud environment? A. Cloud Administrator manually handles service requests B. Element manager collects service requests directly from the catalog C. Workflows defined in the orchestrator direct the process D. Orchestrator allocates the same amount of resources to all service requests Answer: C 51.What activity is performed during the service planning phase of the cloud service lifecycle? A. Discovering Service Assets B. Defining Service Offering C. Developing Service Enablement Roadmap D. Defining Orchestration Workflow Answer: C 52.What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation? A. Digital Leaders B. Digital Laggards C. Digital Adopters D. Digital Evaluators Answer: B 53.What is performed by orchestration software? A. Portable deployment of workflows, independent of any cloud service provider B. Integration and sequencing of system functions into automated workflows C. Automated arrangement and coordination of governance policies in a cloud D. Organization and display of service information and management functions to users Answer: B 54.What could be a possible cause for the degradation in the performance of virtual machines (VMs) during a guest-level backup operation? A. Backup agent running inside VMs consumes additional resources. B. VM snapshot created for the backup consumes additional resources. C. VMs move into read only mode during backup operations. D. VMs move into sleep mode during backup operations. Answer: A 13 / 14 https://www.dumpsinfo.com/ 55.Which platform provides a converged infrastructure solution? A. VxRail B. PowerStore C. VxBlock D. PowerFlex Answer: C 56.An organization is using a shared file system to manage virtual machine (VM) files. Which statement is true about the file system? A. It enables VM files to be stored on remote file servers. B. It is installed on the local storage of the computer system. C. It enables multiple hypervisors to write to a VM file concurrently. D. It is installed on the guest operating system of each VM. Answer: A Powered by TCPDF (www.tcpdf.org) 14 / 14 https://www.dumpsinfo.com/ http://www.tcpdf.org