Text Material Preview
D-CI-DS-23 Dell Cloud Infrastructure Design 2023 exam dumps questions are the best material for you to test all the related DELL EMC exam topics. By using the D-CI-DS-23 exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the D-CI-DS-23 exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. Dell Cloud Infrastructure Design 2023 D-CI-DS-23 exam free dumps questions are available below for you to study. Full version: D-CI-DS-23 Exam Dumps Questions 1.An organization wants to deploy a CMP solution for their private cloud environment. What is required for the CMP to work effectively? A. Programmable infrastructure B. Virtual firewall C. Commodity hardware D. Virtual router Answer: A 2.You are analyzing the performance data to avoid oversizing of a CI solution. What date and time frame should you use? A. Average production time over multiple days B. Peak production times over multiple days 1 / 12 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/d-ci-ds-23 C. Average production time over a single day D. Peak production times over a single day Answer: B 3.An architect is designing a cloud. The architect wants to provide static and dedicated resources to the management applications without affecting the efficiency of consumer resource sharing. How can this be accomplished in the cloud design? A. Add additional CPU and memory to the consumer resource infrastructure B. Place the cloud management platform components on infrequently used consumer resource infrastructures C. Place the cloud management platform components on separate infrastructures D. Add additional load balancers for cloud management platform components Answer: C 4.Which of the following components are typically integrated in a converged infrastructure solution? (Select all that apply) A. Compute B. Storage C. Networking D. Software development tools Answer: ABC 5.An organization plans to deploy a spine/leaf network topology to support a cloud design. Leaf switches will use layer-3 protocols to communicate with the spine switches. Hosts will each connect to two leaf switches using layer-2 protocols. Which technology must be enabled between the host and leaf switches to provide the maximum throughput for a single data stream? A. Generic Network Virtualization Encapsulation B. Spanning Tree Protocol C. Equal-Cost Multi-Path Routing D. Multi-Chassis Link Aggregation Answer: D 6.During an assessment, you determine that an organization wants to view available services, billing information, performance information, and usage information all from one portal. Which component may be required in the cloud management platform to enable this capability and have minimal impact on the user experience? A. SSL B. AD C. LDAP D. SSO Answer: D 7.Which EMC NetWorker settings control the amount of multiplexing? A. Group parallelism and max sessions B. Server parallelism and device target sessions C. Client parallelism and target sessions 2 / 12 https://www.dumpsinfo.com/ D. Pool parallelism and max sessions Answer: B 8.Which cloud service model provides customers with the highest level of control over the underlying infrastructure? A. Software as a Service (SaaS) B. Infrastructure as a Service (IaaS) C. Platform as a Service (PaaS) D. Function as a Service (FaaS) Answer: B 9.Refer to the exhibit. Your company recently negotiated several contracts with new customers to use its proprietary eCommerce system. As a result, the scalability of the eCommerce system data is a concern for the Marketing and Sales departments. Business requirements: - Application resources must be able to scale up and down quickly - External customers have protected access to the eCommerce application - Metrics and reporting to track the use of resources and data Other considerations: - Applications are provided through the public cloud - Address security vulnerabilities for customer data in the cloud Refer to Case 3. You must design the compute scalability functions for your administrator in a DIY private cloud. You want to use extra pools that have known performance and capacity characteristics along with orchestration tools to automate most of the deployment process. 3 / 12 https://www.dumpsinfo.com/ Which method provides this function? A. Add more servers to the existing pool B. Add VMs to the existing servers in the compute pool C. Define storage limits in a consumption pool D. Define a compute pool as a known unit of consumption Answer: D 10.A cloud architect is expected to present a final cloud infrastructure design to an organization. Before the deliverables are submitted, the architect will meet with the organization's executives to present the design. Which type of design should the architect present? A. Abstract B. Theoretical C. Logical D. Physical Answer: C 11.What is a primary driver for organizations to adopt cloud solutions in the context of digital business imperatives? A. Reducing compliance requirements B. Simplifying on-premises infrastructure C. Accelerating innovation and agility D. Increasing hardware procurement costs Answer: C 12.An organization wants to design a remote, synchronous replication solution for disaster recovery in their private cloud. They must meet near zero RPO and avoid increased response time. What are the factors impacting response time in this solution that should be considered? A. Number of writes to source Locality of reference Type of the network B. Distance between sites Number of replication channels Network bandwidth C. Buffer size at source site Network bandwidth Number of replication channels D. Buffer size at source site Number of writes to source Distance between sites Answer: B 13.What are examples of hybrid cloud requirements? A. Connectivity, service mobility, hardware compatibility, and monitoring B. Security, connectivity, service mobility, and hardware compatibility C. Service mobility, hardware compatibility, monitoring, and security D. Monitoring, security, connectivity, and service mobility Answer: D 4 / 12 https://www.dumpsinfo.com/ 14. Uses hypervisor to create a VM snapshot A) Agent-based backup B) Image-based backup C) Changed Block Tracking D) Continuous Data Protection A. 1-B, 2-A, 3-C, 4-D B. 1-B, 2-C, 3-D, 4-A C. 1-A, 2-D, 3-C, 4-B D. 1-C, 2-A, 3-D, 4-B Answer: D 15.An organization uses Microsoft Active Directory (AD) for service authentication in their private cloud. They want to use the same authentication source for services in the public cloud. External employees access services in both clouds and need to authenticate with AD. The organization wants to minimize and secure network traffic. Which solution will address these requirements? A. Connect the two clouds through IPsec VPN. Place AD controllers in the private cloud only. B. Connect the two clouds through IPsec VPN. Place AD controllers in the private and public clouds. C. Configure perimeter firewalls to allow AD traffic. Place AD controllers in the private and public clouds. D. External users connect with IPsec VPN. Place AD controllers in the private cloud only. Answer: B 16.A cloud architect is expected to present a final cloud infrastructure design to an organization. The architect will meet with an organization’s executives and discuss the physical design. Why might this to be the wrong time to present this design? A. Physical designs are too high level for executives B. Physical designs are too general for executives C. Physical designs are too detailed for executives D. Physical designs are too theoretical for executives Answer: C 17.What are examples of hybrid cloud use cases? A. Service globalization, service demand fluctuation, and disasterrecovery B. Base load capacity, data recovery, and service globalization C. Infrastructure elasticity, data recovery, and base load capacity D. Service demand fluctuation, base load capacity, and data recovery Answer: A 18.Which cloud deployment model is most likely to require application monitoring for every application instance? A. PaaS B. HAaaS 5 / 12 https://www.dumpsinfo.com/ C. IIaaS D. SaaS Answer: D 19.An organization wants to build a pilot cloud for developers to learn and practice cloud-native application design. The organization expects that the cloud will host many tiny instances that will use few resources. What accurately describes the optimal CPU and memory configuration? A. High CPU core count and high memory capacity B. High CPU core count and moderate memory capacity C. Moderate CPU core count and moderate memory capacity D. Moderate CPU core count and high memory capacity Answer: C 20.What is a fundamental requirement for a cloud-based application development environment? A. Avoiding automation and DevOps practices B. Manual code deployments C. Scalability and elasticity of resources D. Limited support for multiple programming languages Answer: C 21.You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organization’s IT staff wants secure access to the underlying host OS. What should be included in the design to support this requirement? A. Host IDS configuration Secure key infrastructure Bridged management network B. Perimeter firewall configuration VPN encryption Separate management network C. Host OS firewall configuration Central logging Physically isolated management network D. Host OS firewall configuration Secure key infrastructure Separate management network Answer: B 22.An architect is designing a cloud. They decide to place the CMP components on a separate set of compute, network, and storage infrastructure from the consumer resources. Why would the architect make this decision? A. Provide static and dedicated resources to the management applications without affecting the availability and responsiveness to user requests B. Provide dedicated, low cost IT resources for the management application to reduce TCO C. Provide additional security to the management infrastructure by eliminating exposure to public- facing networks D. Provide static and dedicated resources to the consumer applications without affecting the efficiency of the management applications 6 / 12 https://www.dumpsinfo.com/ Answer: A 23.An organization is implementing a backup solution for their private cloud. They are concerned that having the backup data stored onsite will expose them to lose in the event of a site-wide disaster. They are considering replicating the backup storage to an external site. What are the design considerations involved with this replication solution? A. Ensuring proper hypervisor support and the availability of a federated single sign-on solution B. Ensuring network traffic encryption is considered and ensuring proper hypervisor support C. Ensuring sufficient network bandwidth is available and network traffic encryption is considered D. Ensuring proper hypervisor support and sufficient network bandwidth is available Answer: C 24.Why is it important for a cloud architect to use minimal up-front sizing when planning capacity for nodes in a HCI deployment? A. Accommodate the workload of a node that has failed or is under maintenance B. Minimal up-front sizing is correlated to lower licensing costs of the HCI deployment C. Reduce CAPEX costs of the HCI deployment by sizing for only the capacity required D. Optimize storage resources by designing only for what is required to run mission critical workloads Answer: A 25.A cloud architect is evaluating an organization’s need for encryption. Which type of encryption eliminates the requirement for key management? A. Embedded B. File-based C. File system-based D. Virtual disk Answer: D 26.A cloud architect is evaluating an organization's need for encryption. Which type of encryption allows the deletion of data on disk by simply deleting the encryption key? A. Embedded B. Application C. File D. File system Answer: A 27.What affects networking decisions when planning for monitoring a cloud? A. Security requirements, directory service replication, and monitoring tools placement B. Directory service replication, monitoring tools placement, and data point quantity C. Data point quantity, security requirements, and directory service replication D. Monitoring tools placement, data point quantity, and security requirements Answer: D 28.A cloud architect is sizing servers for the consumer compute resource pools. The pools will consist of hosts running a hypervisor. The architect has determined the amount of compute resources that will be used by planned services. 7 / 12 https://www.dumpsinfo.com/ What other factors should be considered into the sizing calculations? A. Over-commitment ratios and hypervisor compatibility B. CMP message queue size and hypervisor overhead C. Over-commitment ratios and hypervisor overhead D. Tenant size and encapsulation method Answer: C 29.What is a challenge that is unique to hybrid cloud deployments for authentication and authorization systems? A. Maintaining administrative user credential security B. Additional requirements for single sign-on capabilities C. Additional costs of scaling authentication server management D. Maintaining authentication availability during an inter-cloud link outage Answer: B 30.Refer to the exhibit. Your company is currently using a traditional SAN storage network. The server infrastructure is partially virtualized. There is a public cloud in place that is used to test development and application migration to cloud. Business requirements: - Consolidate the network, storage, and compute resources - Simplify network management and storage provisioning 8 / 12 https://www.dumpsinfo.com/ - Maintain application performance - A disaster recovery plan to meet RTO / RPO targets Other considerations: - All data must be secured at rest and in-flight - Include an app development platform Refer to Case 6. You are sizing the compute capacity in a hyper-converged infrastructure solution. Each node has 55 TB of storage capacity. You have calculated the total cloud storage requirement to be 700 TB. What is the minimum number of nodes required? A. 8 B. 9 C. 15 D. 18 Answer: B 31.In a cloud design, an architect has defined a separate trust zone for host management. The hosts will be running open source hypervisors. What should be included in the design deliverables to support this separate trust zone? A. Isolated management network and a common super-user account B. Separate PKI and encrypted CMI portal access C. Separate authentication source and a preferred zone set D. Isolated management network and a separate authentication source Answer: D 32.1.An organization wants to deploy cloud applications using block storage. The architect has included a HCI solution in the cloud design. Which requirements must have led to including this solution in the design? A. Acquire additional storage array; Combine storage and application processing using a spine/leaf topology B. No additional storage arrays to be acquired; Separate storage processing from application processing C. No additional storage arrays to be acquired; Combine storage and application processing on each node D. Acquire additional storage array; Combine storage and application processing using a full mesh topology Answer: A 33.You are a cloud architect responsible for designing a multiple availability zone configuration for the organization's geographically dispersed clouds. You must provide the ability for services to survive a failure at the data center or site level. The primary requirement is to provide for automated site recovery. Whatis a key consideration when satisfying this requirement? A. The storage volumes in the DR site should match the number and size in the primary site. B. Automated site recovery should orchestrate the site failover processes only. C. The DR site should have a large number of small volumes to decrease the mount time. D. The DR solution should support heterogeneous hardware across both sites. Answer: D 9 / 12 https://www.dumpsinfo.com/ 34.An organization wants to enable consumers to deploy IaaS and PaaS instances from a service catalog. These instances will all be deployed on a specific hypervisor. The organization has informed you that they want to use a preferred server vendor when building their new private cloud. What must be confirmed about the design? A. Server hardware is compatible with PaaS solution B. Server hardware is on the hypervisor vendor’s compatibility list C. Server hardware is supported by the service catalog solution D. IaaS instances have the compatible drivers for the physical server hardware Answer: D 35.You are designing the CMP structure. Where should you define the pods? A. Fault domain B. Private cloud VM C. Availability zone D. Public cloud VM Answer: C 36. Provides a smooth path to production 37.When considering multicloud design, what is a potential benefit of using multiple cloud providers? A. Reduced complexity in management B. Vendor lock-in avoidance C. Limited geographic coverage D. Decreased data redundancy Answer: B 38.When considering a packaged PaaS solution, what is a potential advantage? A. Greater control over infrastructure management B. Lower cost of ownership C. Longer time to market for applications D. Reduced reliance on third-party vendors Answer: B 39.Which type of storage is typically designed to span multiple sets of hardware and has a flat repository? A. Object B. File C. Ephemeral D. Block Answer: A 40.An organization wants to deploy SaaS applications in their cloud. The SaaS applications will be using application HA to maintain up-time levels of 99.9%. What should the cloud architect include in the design to support this up-time requirement? A. Sufficient host capacity B. Quorum disks 10 / 12 https://www.dumpsinfo.com/ C. Replication licenses for hypervisors D. HA licenses for hypervisors Answer: D 41.An organization wants to offer backups for consumer service data in their private cloud. They currently have an existing backup infrastructure. What should be included in the cloud infrastructure design to enable this capability? A. Orchestration workflows to create snapshots of the service catalog and execute backups B. Chargeback policies that define cost information for the amount of network bandwidth used by the backup servers C. Chargeback policies that define cost information for the amount of CPU used by the backup servers D. Orchestration workflows to create backup schedules, add backup targets, and execute backups Answer: D 42.Refer to the exhibit. Your company is currently using a traditional SAN storage network. The server infrastructure is partially virtualized. There is a public cloud in place that is used to test development and application migration to cloud. Business requirements: - Consolidate the network, storage, and compute resources - Simplify network management and storage provisioning 11 / 12 https://www.dumpsinfo.com/ - Maintain application performance - A disaster recovery plan to meet RTO / RPO targets Other considerations: - All data must be secured at rest and in-flight - Include an app development platform Refer to Case 6. You are designing a private cloud to use VLANs to support compute to compute connectivity. The cloud services and security requirements will result in 5,120 separate VLANs being created. What is a concern related to VLANs when reviewing this requirement? A. VLANs limit the number of NICs that can participate in the network to 2,048 B. Configuration times out when attempting changes to more than 1,024 VLANs C. Each VLAN requires separate infrastructure and management traffic D. VLANs can only support up to 4,094 virtual networks Answer: D Powered by TCPDF (www.tcpdf.org) 12 / 12 https://www.dumpsinfo.com/ http://www.tcpdf.org