DELL EMC D-CIS-FN-23 Übungsprüfungen
Zuletzt aktualisiert am 12.07.2025- Prüfungscode: D-CIS-FN-23
- Prüfungsname: Dell Cloud Infrastructure and Services Foundations 2023
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 12.07.2025
What steps appear in the service enablement roadmap?
- A . Plan, Action, Condition, Enable, End
- B . Understand, Plan, Build, Enable, Optimize
- C . Define, Create, Plan, Enable, Terminate
- D . Define, Observe, Understand, Enable, Act
What is a characteristic of reporting?
- A . Provides tabular or graphical views of monitored information
- B . Presents service instances to consumers in real time
- C . Provides information about events or impending threats or issues
- D . Displays a personalized functional interface
An administrator must design a fault-tolerant IT environment for applications.
Which techniques meet this requirement?
- A . Active/Passive for Compute –
NIC Teaming for Network –
Dual disks for storage - B . Active/Active for Compute –
Link Aggregation for Network –
Erasure Coding for storage - C . Active/Passive for Compute –
Spanning for Network –
Dynamic Disk Sparing for storage - D . Active/Standby for Compute –
Multipathing for Network –
RAID for storage
What is an advantage of synchronous remote replication?
- A . Provides near zero recovery point objective
- B . Replicates data across any geographic location without impacting response time
- C . Supports locality of reference to improve replication performance
- D . Saves network bandwidth by replicating only deduplicated data
What is a benefit of secure multitenancy?
- A . Reduces unauthorized access to resources
- B . Blocks unauthorized access to resources
- C . Eliminates data breach risks
- D . Protects cloud infrastructure
A cloud service provider has standalone mechanisms such as intrusion detection and prevention systems and firewalls in a cloud infrastructure.
Which security mechanism integrates with these mechanisms and uses heuristics to learn user behavior and detect fraudulent activity?
- A . iSNS discovery domain
- B . Hardening
- C . Adaptive security
- D . Kerberos
What enables LUNs to be assigned to the world-wide name of a specific host bus adapter?
- A . LUN rebalancing
- B . LUN hardening
- C . LUN-based zoning
- D . LUN masking
What does a service attribute specify?
- A . Relationships between services
- B . Configurations of service components
- C . Structure of a service
What is a characteristic of a best-of-breed infrastructure?
- A . Prevents vendor lock-in
- B . Provides limited flexibility to choose components
- C . Provides single management software to control multi-vendor components
- D . Requires less time to integrate all the components to build as an appliance
What capability is provided by the “Open and extensible” attribute of software-defined infrastructure (SDI)?
- A . Uses APIs to integrate multivendor resources into the SDI environment
- B . Optimizes resource usage and generates value reports about the SDI environment
- C . Provides a control point for the entire SDI environment
- D . Provides multitenancy that enables consumers to share resources in the SDI environment