Dell Technologies Information Storage and Management Foundations 2023 - Full PDF (EDUSUM)

Summary

This document is a set of exam questions and answers on Dell Technologies Information Storage and Management Foundations from 2023, intended for professional-level training or certification. The questions cover a range of topics including backup solutions, virtual tape libraries, infrastructure discovery, and more.

Full Transcript

D-ISM-FN-23: Dell Technologies Information Storage and Management Foundations 2023 - Full You got 1 of 60 possible points. Your score: 2 % Question Results Question: Score 1 of 1 What is an advantage of implement...

D-ISM-FN-23: Dell Technologies Information Storage and Management Foundations 2023 - Full You got 1 of 60 possible points. Your score: 2 % Question Results Question: Score 1 of 1 What is an advantage of implementing an image-based backup solution in a virtualized environment? Response: Backup performance is improved through agents running on virtual machines Eliminates the need for a proxy server Eliminates the need for deduplication Backup process is offloaded from the production virtual machine Question: Score 0 of 1 (skipped) What is an accurate statement about a virtual tape library? Response: Regular maintenance tasks associated with a physical tape drive are required Legacy backup software can be used without additional modules or changes Only sequential data access for both backup and recovery is supported Portability of physical tapes tooffsite locations is supported Question: Score 0 of 1 (skipped) A system has three components and all three components need to be operational for 24 hours; Monday through Friday. During a particular week, failure of component 1 occurred as follows: - Tuesday = 8 AM to 11 AM - Thursday = 8 PM to 10 PM - Friday = 5 AM to 9 AM What is the mean time between failures on component 1 for that week? Response: 3 hours 37 hours 40 hours 53 hours Question: Score 0 of 1 (skipped) What is an accurate statement about infrastructure discovery? Response: Creates an inventory of infrastructure components and provides information about the components Standardizes on-going infrastructure management activities andassesses potential risks of the activities Classifies, organizes, and analyzes all infrastructure management bestpractices stored in data lakes Detects potential security attacks on a storage infrastructure and deploys specialized tools to eliminate the attacks Question: Score 0 of 1 (skipped) What is an accurate statement about an FCoE environment? Response: FC Forwarder must split an FC frame into two or more FCoE frames based on the Ethertype FCoE controller sends RSCNs to all nodes to provide access control FCoE ASIC encapsulates FCoE frames into FC frames based on FC-to-FCoE mapping FCoE network must be configured to support jumbo frames for optimal performance Question: Score 0 of 1 (skipped) What is the purpose of monitoring availability in a storage infrastructure? Response: Evaluate utilization of components and identify bottlenecks Identify component failures that may lead to service unavailability Track unauthorized access that may lead to information unavailability Ensure availability of adequate resources to prevent service unavailability Question: Score 0 of 1 (skipped) Which Dell EMC product enables continuous protection for any PIT recovery and offers multi- site support? Response: RecoverPoint Avamar SourceOne SRDF Question: Score 0 of 1 (skipped) What is an accurate statement about hypervisor-based continuous data protection (CDP)? Response: Write splitter is embedded in the hypervisor Journal is stored in a virtual machine Journal and replica use the same storage volume Virtual appliance runs on a storage system Question: Score 0 of 1 (skipped) What determines how far back the recovery points can go in a continuous data protection (CDP) solution? Response: Amount of space that is configured for the journal Size of the CDP appliance used for replication Size of the source and replica volumes Type of write splitter used for replication Question: Score 0 of 1 (skipped) Which cloud computing characteristic enables multi-tenancy and abstracts the location of provided resources? Response: Resource pooling Measured service Rapid elasticity Broad network access Question: Score 0 of 1 (skipped) What is an accurate statement about a Converged Network Adapter (CNA)? Response: Physical adapter that provides the functionality of both a standard NIC and an FC HBA in a single device Physical adapter that provides the functionality of both a standard NIC and an iSCSI HBA in a single device Physical adapter that provides the functionality of only a standard HBA in a single device Physical adapter that provides the functionality of only a standard NIC in a single device Question: Score 0 of 1 (skipped) In an object-based storage system, which elements are associated with an object? Response: Metadata, object ID, attributes, and file path Metadata, LUN ID, data, and object ID Object ID, attributes, LUN ID, and file path Metadata, object ID, data, and attributes Question: Score 0 of 1 (skipped) Which management function involves configuring LUN masking to restrict hosts from accessing a specific LUN in a data center environment? Response: Performance Management Change Management Security Management Configuration Management Question: Score 0 of 1 (skipped) In which stage of the business continuity planning lifecycle does an organization identify critical business processes and assign recovery priorities? Response: Analyzing Establishing objectives Designing and developing Implementing Question: Score 0 of 1 (skipped) What is a benefit of including a Defense-in-depth strategy as part of the data center security strategy? Response: Optimize application and data storage security controls Optimize application and network security controls Reduce the overall cost of deploying security controls Reduce the scope of an information security risk Question: Score 0 of 1 (skipped) What is a benefit of source-based deduplication over target-based deduplication? Response: Backup data can be retained longer Only unique data is sent over the network to be backed up Backup processing is offloaded from the backup client Less backup data is stored on the backup server Question: Score 0 of 1 (skipped) What is the effect of implementing link aggregation in an FC SAN environment? Response: Distributes network traffic over ISLs that ensures even ISL utilization Yields higher throughput by combing two parallel ISLs into a single physical ISL Saves bandwidth by restricting traffic to a specific potentially congested ISL Improves ISL utilization by increasing network traffic on a specific ISL Question: Score 0 of 1 (skipped) Which type of data protection is used to move primary data to lower cost storage and helps to enforce compliance requirement? Response: Archive Deduplication Backup Replication Question: Score 0 of 1 (skipped) Which is a characteristic of RAID 6? Response: All parity stored on a single disk Double parity Single parity Parity not used Question: Score 0 of 1 (skipped) Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false website? Response: Phishing Man-in-the-middle Denial-of-service Repudiation Question: Score 0 of 1 (skipped) What is the stripe size of a 5-disk RAID 5 group with a strip size of 32 KB? Response: 96 KB 120 KB 128 KB 160 KB Question: Score 0 of 1 (skipped) Which features are essential for ensuring data integrity in storage systems? (Choose two) Response: Deduplication Checksums Storage tiering Write once, read many (WORM) Question: Score 0 of 1 (skipped) A Fibre Channel switch has eights ports and all ports must be operational 24 x 7. However, a failure of Port 8 occurs on a particular week as follows: - Monday = 11 AM to 12 PM - Thursday = 8 AM to 11 AM - Saturday = 11 AM to 4 PM - Sunday = 10 PM to 1 AM What is the availability of Port 8 in that week? Response: 85.6% 88% 90% 92.8% Question: Score 0 of 1 (skipped) What is an impact of a Denial-of-Service attack? Response: Privileges are intentionally misused to compromise data security User’s credentials are eavesdropped by the attacker Computing resources are exhausted and made unavailable to users User’s accounts and data are compromised by malicious insiders Question: Score 0 of 1 (skipped) In a virtualized environment, which method enables a virtual machine to be rolled back in case of a logical corruption to the virtual machine? Response: Virtual volume replication VM snapshot Storage array volume replication VM clone Question: Score 0 of 1 (skipped) An organization plans to deploy a new backup device in their data center. The organization wants the new backup device to support their legacy backup software without requiring any changes to the software. In addition, the organization wants the backup device to provide random data access for better performance. Which backup device should be recommended? Response: Virtual tape library Tape-based backup appliance Tape library Optical juke box Question: Score 0 of 1 (skipped) What keeps the name server up-to-date on all switches in a fabric? Response: SW-RSCN Management server Zoning FLOGI Question: Score 0 of 1 (skipped) What is an accurate statement about full volume replication? Response: Target device is at least as large as the source device Target device requires only a fraction of the space used by the source device Target device is accessible only after the replication session starts Target and source devices should be on different storage arrays Question: Score 0 of 1 (skipped) In a NAS environment, which file system enables file sharing with Windows clients and uses the TCP/IP protocol? Response: New Technology File System (NTFS) Hadoop Distributed File System (HDFS) Common Internet File System (CIFS) Network File System (NFS) Question: Score 0 of 1 (skipped) Which factors affect the recovery point objective (RPO) in a storage system-based asynchronous remote replication? Response: Type of replica volume and size of the buffer Size of the buffer and available network bandwidth Size of the replica volume and available network bandwidth Size of the source volume and distance between sites Question: Score 0 of 1 (skipped) What is an example of an availability management task in storage infrastructure management? Response: Designing a new replication solution for data redundancy Performing trend analysis of storage space consumption Tracking configuration changes to storage components Specifying storage space quotas for users Question: Score 0 of 1 (skipped) What is provided by performing an infrastructure discovery? Response: Creating a list of infrastructure components and their related information Classifying, organizing, and analyzing all infrastructure management best practices stored in data lakes Standardizing on-going infrastructure management activities to maintain the storage infrastructure using automation Gathering issues and tracking movement of data and services across the infrastructure Question: Score 0 of 1 (skipped) What does using a service-focused approach provide to managing the storage infrastructure? Response: Determines the optimal amount of storage space needed in a backup storage system Provides hardware-specific management tasks that are automated Determines the appropriate workflow upon receiving a service provisioning request Provides detailed information on configuration, connectivity, and component interrelationships Question: Score 0 of 1 (skipped) What triggers an appropriate workflow upon receiving a service provisioning or management request? Response: Alerts Orchestrated operations Recovery time objective Infrastructure discovery Question: Score 0 of 1 (skipped) An application uses ten, 15 GB devices. A pointer-based full volume replica of the application is required. The replica will be kept for 24 hours and the data changes by 10% every 24 hours. How much storage should be allocated for the replication? Response: 15 GB 30 GB 150 GB 300 GB Question: Score 0 of 1 (skipped) Which EMC product provides a remote replication solution for EMC VMAX3 storage systems? Response: SRDF Snap Sure Mirror View Protect Point Question: Score 0 of 1 (skipped) What is an accurate statement about Zoning? Response: FC switch ports, FC HBA ports, and storage ports should not be members of multiple zones Nodes that are distributed across multiple switches in a switched fabric may also be grouped into the same zone Increases the amount of fabric-management traffic within a zone by sending RSCNs to all nodes in a fabric Multiple zone sets may be defined in a fabric and all zone sets must be active at a time Question: Score 0 of 1 (skipped) What is a key advantage of cloning a virtual machine (VM)? Response: Ability to run new VMs simultaneously with the same IP address. Reduces the time required to create multiple copies of a VM. Improves the performance of an existing VM and new VMs. Eliminates the need to create multiple snapshots for a VM. Question: Score 0 of 1 (skipped) In a compute-based storage area network (SAN), what is a function of the metadata manager? Response: Holds cluster-wide mapping information and load balancing in a compute-based SAN. Performs the I/O operations on the local storage of a compute system as requested by a client. Provides an interface to the software-defined storage controller. Controls all data read and write operations in a compute-based SAN. Question: Score 0 of 1 (skipped) How does an iSCSI initiator discover its targets? Response: Initiator sends a query to an iSNS server for a list of available targets Initiator receives the iSCSI names of its targets from the primary DNS server Initiator uses the data center bridging exchange protocol for the discovery Initiator sends SCSI commands and the target responds by sending its name Question: Score 0 of 1 (skipped) What accurately describes the function of the policy engine in a file-level storage tiering environment? Response: Facilitates moving data from primary storage to secondary storage based on pre-defined policies Creates a stub file in secondary storage pointing to data on the primary storage Ensures that primary and secondary storage have identical data for compliance Runs the backup agent and determines the files to be copied to the secondary storage Question: Score 0 of 1 (skipped) What is a characteristic of software-defined networking? Response: Abstracts and separates the control plane from the data plane Data plane sends instructions to the controlplane to handle network traffic Controller in network switchestakes over data plane functions External software combines both data plane and control plane functions Question: Score 0 of 1 (skipped) What is an advantage of the changed block tracking backup technique? Response: Reduces the backup window Enables restoration to any point-in-time Eliminates the need for data deduplication Increases backup device performance Question: Score 0 of 1 (skipped) Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities? Response: Data link Presentation Session Application Question: Score 0 of 1 (skipped) Which organizational requirement is achieved through the deployment of a backup and recovery solution? Response: Comply with regulatory requirements Eliminate the need for archive Reduce the budget for the IT environment Meet application performance requirements Question: Score 0 of 1 (skipped) An administrator has defined a backup policy. Full backups will be performed at 8 PM every Monday and incremental backups performed at 8 PM the remaining days. How many backup copies are required to restore the files if they were accidentally deleted on Friday morning? Response: 1 2 3 4 Question: Score 0 of 1 (skipped) If a configuration management database (CMDB) system contains different configuration items (CIs), what is considered a CI? Response: Governance procedure Username Security guideline Customer feedback Question: Score 0 of 1 (skipped) When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration? Response: 3 4 8 12 Question: Score 0 of 1 (skipped) Which items are found in an iSCSI address? Response: MAC address, FC port number, and iSCSI location IP address, FC port number, and iSCSI location MAC address, TCP port number, and iSCSI name IP address, TCP port number, and iSCSI name Question: Score 0 of 1 (skipped) A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns? Response: Role-based Profile-based Signature-based Anomaly-based Question: Score 0 of 1 (skipped) What is a key advantage of performing incremental backups compared to cumulative backups for the same data? Response: Reduces the backup window to near zero Eliminates the need for deduplication Eliminates the need for full backups Facilitates faster backups Question: Score 0 of 1 (skipped) What happens when a write request to a valid page is received in a solid-state drive? Response: Requested page is electrically erased and the write continues with the erased page Requested page is overwritten by the new page Requested page is marked invalid and the write continues with an available empty page Write request is queued until the requested page is erased Question: Score 0 of 1 (skipped) What is an accurate statement about the EMC RecoverPoint product? Response: Provides the capability to store point-in-time data in an object form Provides source-based deduplication Provides target-based deduplication Provides the capability to restore data to any previous point-in-time Question: Score 0 of 1 (skipped) Which Dell EMC product is a software-defined storage platform that abstracts, pools, and automates a data center’s physical storage infrastructure? Response: XtremIO ViPR Controller VxFlex OS PowerMax Question: Score 0 of 1 (skipped) An IP SAN uses the Internet Protocol to transport which I/O block type? Response: storage block I/O data over a LAN network block I/O data over a LAN storage block I/O data over a VSAN network block I/O data over a VSAN Question: Score 0 of 1 (skipped) Which cloud service does VMware vCloud Air provide? Response: Infrastructure as a Service Platform as a Service Database as a Service Software as a Service Question: Score 0 of 1 (skipped) What is an advantage of a software-based object storage implementation? Response: Provides the flexibility to reuse the existing infrastructure Requires less storage capacity tostore a large number of objects Provides the flexibility to create more than one object ID for an object Requires less hardware to support scalable architecture Question: Score 0 of 1 (skipped) Which process uses a file-level storage tiering technique to perform policy-based data movement? Response: Archiving Deduplication Replication Backup Question: Score 0 of 1 (skipped) Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning and analyzing events to detect if they are statistically different from normal events? Response: Anomaly-based Signature-based Profile-based Device-based Question: Score 0 of 1 (skipped) An organization wants to consume compute, network, and storage resources through self- service portal. Which cloud service model provides this capability? Response: Software as a Service Infrastructure as a Service Platform as a Service Data as a Service Money Back Guarantee Testimonial FAQs Privacy Policy Terms and Conditions About Us Join Us Contact Us

Use Quizgecko on...
Browser
Browser