DELL EMC D-ISM-FN-23 Übungsprüfungen
Zuletzt aktualisiert am 09.05.2025- Prüfungscode: D-ISM-FN-23
- Prüfungsname: Dell Information Storage and Management Foundations 2023
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 09.05.2025
What is an accurate description about Dell EMC VxBlock system?
- A . CI solution that combines compute, virtualization, network, software defined storage into an engineered solution.
- B . HCI solution that combines compute, virtualization, network, software-defined storage into an engineered solution.
- C . CI solution that combines compute, virtualization, network, storage into an engineered solution.
- D . HCI solution that combines compute, virtualization, network, and storage optimized for VMware VSAN
What is an example of a capacity management task in a storage infrastructure?
- A . Selecting a suitable RAID type for a storage pool
- B . Making configuration changes to address issues
- C . Assessing potential risk of all changes to a configuration item
- D . Trend analysis of storage space consumption
Which type of machine learning algorithm produces results using a reward and feedback mechanism?
- A . Reinforcement learning
- B . Unsupervised learning
- C . Traditional learning
- D . Supervised learning
What accurately describes the flow control mechanism in an FC SAN?
- A . Both transmitting and receiving ports agree on the number of buffers available during port login
- B . Negotiation occurs between an E_Port and an F_Port, and between two N_Ports
- C . Credit value is incremented when a frame is transmitted and decremented upon receiving a response
- D . Receiver Ready (R_RDY) is sent from the receiving port if available credits reach zero
What maps the logical path of a file system to its physical path in a file-level virtualization implementation?
- A . Global namespace
- B . Remote procedure call
- C . Distributed file system
- D . Cache coherency
What accurately describes a shared pool in virtual provisioning?
- A . Should contain only homogeneous disk drive types.
- B . Supports a single RAID protection level.
- C . Consists of only a virtual storage volume.
- D . Should contain only physical drives with different sizes.
Which of the following are common topologies used in FC SAN? (Choose two)
- A . Point-to-Point
- B . Mesh
- C . Ring
- D . Arbitrated Loop
What accurately describes an Incident in a storage infrastructure?
- A . Unknown root cause of one or more disruptions to service.
- B . Any event that may lead to the disruption of a service.
- C . Support request to help access an IT resource.
- D . Any event that may create a change in correcting a known error.
What is the functionality of the lock in a cyber recovery process?
- A . Isolates network and prevent network from establishing an external connection
- B . Restricts overwriting of data to meet both corporate governance and compliance standards
- C . Determines if a replication copy contains malware or other anomalies
- D . Synchronizes the latest data and creates restore points
An organization plans to deploy a new application in their environment. The new application requires 3 TB of storage space. During peak workloads, the application is expected to generate 2450 IOPS with a typical I/O size of 2 KB.
The capacity of each available disk drive is 500 GB. The maximum number of IOPS a drive can perform at with 70 percent utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements given a RAID 0 configuration?
- A . 6
- B . 16
- C . 25
- D . 28