DELL EMC D-ISM-FN-23 Übungsprüfungen
Zuletzt aktualisiert am 11.05.2025- Prüfungscode: D-ISM-FN-23
- Prüfungsname: Dell Information Storage and Management Foundations 2023
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 11.05.2025
What accurately describes an NDMP-based backup in a NAS environment?
- A . Backup data is sent directly from the application server to the NAS backup device
- B . Requires less bandwidth to transfer data from the application server to the NAS device
- C . Backup data is sent directly from a NAS device to the backup device
- D . Requires a direct connection between the NAS device and the application servers
An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday.
However, a failure of Port 5 occurs as follows:
– Tuesday = 6 AM to 7 AM
– Thursday = 5 PM to 9 PM
– Friday = 8 AM to 9 AM
What is the MTBF of Port 5?
- A . 30 hours
- B . 32 hours
- C . 40 hours
- D . 38 hours
What is an accurate statement about variable prefetching?
- A . Many blocks that have recently been written to storage by the compute system are retrieved and placed in cache.
- B . Many non-contiguous blocks that are not currently required can be retrieved from cache in advance.
- C . Storage system prefetches data in multiples of the original I/O request size from the compute system.
- D . Storage system prefetches many non-contiguous blocks of data, with varied sizes, from cache.
Which of the following protocols encapsulates SCSI commands inside IP packets?
- A . FCIP
- B . iSCSI
- C . FCoE
- D . NVMe over Fabrics
Which VMware product has pre-defined workflows that helps to automate and coordinate the service delivery and operational functions in a storage infrastructure?
- A . NSX
- B . vSphere ESXi
- C . vRealize Orchestrator
- D . Horizon
If the erasure coding technique used divides data into 12 data segments and 5 coding segments, what is the maximum number of disk drive failures against which data is protected by the configuration?
- A . 5
- B . 7
- C . 3
- D . 17
Which type of data protection is used to move primary data to lower cost storage and helps to enforce compliance requirement?
- A . Archive
- B . Deduplication
- C . Backup
- D . Replication
A system has three components and all three components need to be operational for 24 hours; Monday through Friday.
During a particular week, failure of component 1 occurred as follows:
– Tuesday = 8 AM to 11 AM
– Thursday = 8 PM to 10 PM
– Friday = 5 AM to 9 AM
What is the mean time between failures on component 1 for that week?
- A . 3 hours
- B . 37 hours
- C . 40 hours
- D . 53 hours
What is the function of a control plane in the SDDC?
- A . Performs administrative operations and for communicating messages
- B . Performs resource provisioning and provides the programming logic and policies
- C . Performs processing and input output operations
- D . Performs financial operations used to calculate CAPEX
Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning events against known attack patterns?
- A . Behavior-based
- B . Device-based
- C . Anomaly-based
- D . Signature-based