Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

EMC D-CIS-FN-01 Dell Cloud Infrastructure and Services Foundations v2 Exam Exam Practice Test

Page: 1 / 12
Total 122 questions

Dell Cloud Infrastructure and Services Foundations v2 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which platform provides a converged infrastructure solution?

Options:

A.

VxRail

B.

PowerStore

C.

VxBlock

D.

PowerFlex

Question 2

Identify the bare-metal hypervisors?

Options:

A.

Solaris Zones and VMware Workstation

B.

ESXI and Hyper-V

C.

ESXI and VMware Fusion

D.

Oracle Virtual Box and Hyper-V

Question 3

What is true of a cloud service design best practice?

Options:

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Question 4

What does a service attribute specify?

Options:

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Question 5

Which is a lightweight, stand-alone, executable package that consists of whole runtime environment to execute the application?

Options:

A.

Container

B.

Orchestrator

C.

Hypervisor

D.

Microservice

Question 6

What is a characteristic of an object-based storage system?

Options:

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Question 7

What is the effect of a denial-of-service attack?

Options:

A.

Privileges are misused to compromise data security.

B.

User credentials are captured and sent to the attacker

C.

Unauthorized access is gained to user accounts and data.

D.

Legitimate users are prevented from accessing services.

Question 8

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

Options:

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Question 9

Identify a threat caused, when an attacker sends massive quantities of data to the target with the intention of consuming bandwidth.

Options:

A.

Advanced persistent threat

B.

Denial-of-service

C.

Malicious insider

D.

Account hijacking

Question 10

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Question 11

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

Options:

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Question 12

Which activity is associated with Process Transformation?

Options:

A.

Adoption of Agile methodologies

B.

Shift in the IT staff skill set

C.

Adoption of modern IT infrastructure

D.

Creating new roles

Question 13

What workflow software enables automation of complex IT tasks?

Options:

A.

DELL ScalelO

B.

VMware vRealize Orchestrator

C.

VMware HA

D.

DELL XtremlO

Question 14

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

Options:

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

Question 15

Which network feature enables dynamic distribution of applications I/O traffic across VMs?

Options:

A.

NIC Teaming

B.

Erasure Coding

C.

Link Aggregation

D.

Load Balancing

Question 16

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

Options:

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Question 17

Which is a characteristic of the chargeback model?

Options:

A.

Financial systems require agent plug-in.

B.

Service costs reporting to the business.

C.

Customers are billed for services that are consumed.

Question 18

Which cloud role has the responsibility to perform independent cloud service assessments?

Options:

A.

Architect

B.

Broker

C.

Consumer

D.

Auditor

Question 19

What is true about change management?

Options:

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Question 20

A cloud service provider must improve the utilization of resources by sharing them with multiple customers.

What mechanism should the cloud provider deploy to prevent one consumer from accessing the virtual machines of another consumer?

Options:

A.

Distributed switching

B.

Secure multitenancy

C.

Pooling of resources

D.

Raw disk mapping

Question 21

Which data storage type uses a non-hierarchical address space to store data?

Options:

A.

Block

B.

Object

C.

File

Question 22

Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?

Options:

A.

Portfolio

B.

Capacity

C.

Demand

D.

Operation

Question 23

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

Options:

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Question 24

What does the management interface in a cloud portal enable consumers to do?

Options:

A.

Interact with the business application using a graphical user interface.

B.

Code, compile, and run their applications on the cloud platform.

C.

Modify, start, and stop rented service instances without manual interaction with the service provider.

D.

Perform computing activities by presenting the functional content of a service instance.

Question 25

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

Options:

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

Question 26

An administrator must design a fault-tolerant IT environment for applications.

Which techniques meet this requirement?

Options:

A.

Active/Passive for Compute -

NIC Teaming for Network -

Dual disks for storage

B.

Active/Active for Compute -

Link Aggregation for Network -

Erasure Coding for storage

C.

Active/Passive for Compute -

Spanning for Network -

Dynamic Disk Sparing for storage

D.

Active/Standby for Compute -

Multipathing for Network -

RAID for storage

Question 27

Which condition triggers a warning level alert?

Options:

A.

Service has failed.

B.

Service has been created.

C.

Service instance is ready to use.

D.

Service is approaching resource usage limit.

Question 28

What is used to update information in a configuration management database?

Options:

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Question 29

Which concept ensures accountability for security breaches or misuse of resources?

Options:

A.

Compliance

B.

Governance

C.

Risk management

Question 30

An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.

What is the maximum number of drive failures supported in the storage system?

Options:

A.

6

B.

3

C.

12

D.

9

Question 31

What refers to an agreement between provider and consumer that states the terms of service usage?

Options:

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

Question 32

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

Options:

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Question 33

When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered for automation?

Options:

A.

Business relationship management

B.

Information security management

C.

Knowledge management

D.

Problem Management

Question 34

What are the key focus areas for IT transformation?

Options:

A.

Technology, Infrastructure, and Automation

B.

People, Process, and Technology

C.

Process, Infrastructure, and Technology

D.

People, Technology, and infrastructure

Question 35

What is the correct sequence of steps in the service catalog design and implementation process?

Options:

Question 36

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

Options:

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Page: 1 / 12
Total 122 questions