ExamGecko
Home Home / DELL / D-ISM-FN-23

DELL D-ISM-FN-23 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Refer to the exhibit.

What type of Fibre Channel port does the ''X'' represent?

A.
N_port
A.
N_port
Answers
B.
F_port
B.
F_port
Answers
C.
E_port
C.
E_port
Answers
D.
NL_port
D.
NL_port
Answers
Suggested answer: B

Which Dell EMC product is designed to host both file and object data?

A.
PowerEdge
A.
PowerEdge
Answers
B.
PowerScale
B.
PowerScale
Answers
C.
PowerVault
C.
PowerVault
Answers
D.
Cloud Tiering Appliance
D.
Cloud Tiering Appliance
Answers
Suggested answer: B

What is true about the FCIP?

A.
connects local iSCSI SANs to remote FC SANs
A.
connects local iSCSI SANs to remote FC SANs
Answers
B.
connects local FC SANs to remote FC SANs
B.
connects local FC SANs to remote FC SANs
Answers
C.
connects local iSCSI SANs to remote iSCSI SANs
C.
connects local iSCSI SANs to remote iSCSI SANs
Answers
D.
connects local FC or iSCSI SANs to remote FC or iSCSI SANs
D.
connects local FC or iSCSI SANs to remote FC or iSCSI SANs
Answers
Suggested answer: D

Explanation:

ISCI is already use IP, do require tunneling protocol for transport

What is true about Storage Class Memory (SCM)?

A.
SCM is slower than DRAM but read and write speeds are faster than flash.
A.
SCM is slower than DRAM but read and write speeds are faster than flash.
Answers
B.
SCM adds a new tier of SAS performance at memory-like cost.
B.
SCM adds a new tier of SAS performance at memory-like cost.
Answers
C.
SCM read and write speeds are slower than hard disk drives.
C.
SCM read and write speeds are slower than hard disk drives.
Answers
D.
SCM is faster than cache memory but slower than solid state drives.
D.
SCM is faster than cache memory but slower than solid state drives.
Answers
Suggested answer: B

A Fibre Channel switch has eight ports and all ports must be operational 24 hours 7 days. However, a failure of Port 5 occurs on a particular week as follows:

Monday = 11 AM to 3 PM -

Thursday = 6 AM to 11 AM -

Saturday = 11 AM to 4 PM -

What is the availability of Port 5 in that week?

A.
91.6%
A.
91.6%
Answers
B.
94.6%
B.
94.6%
Answers
C.
95%
C.
95%
Answers
D.
90%
D.
90%
Answers
Suggested answer: A

What is a function of the metadata service in an object-based storage device (OSD)?

A.
Generates the file system namespace from the file contents.
A.
Generates the file system namespace from the file contents.
Answers
B.
Manages both physical and logical disks on which the user data is stored.
B.
Manages both physical and logical disks on which the user data is stored.
Answers
C.
Manages the storage space for all remote clients.
C.
Manages the storage space for all remote clients.
Answers
D.
Maintains the object IDs and file system namespace mappings.
D.
Maintains the object IDs and file system namespace mappings.
Answers
Suggested answer: D

An organization is planning to secure the connection between the data center and cloud while performing data backup and replication.

Which security control mechanism will help organization to achieve the desired security?

A.
ldentity and Access management
A.
ldentity and Access management
Answers
B.
Intrusion Detection and Prevention
B.
Intrusion Detection and Prevention
Answers
C.
Firewall
C.
Firewall
Answers
D.
Virtual Private Network
D.
Virtual Private Network
Answers
Suggested answer: D

Explanation:

A virtual private network (VPN) is a security control mechanism that creates a secure and encrypted connection between two networks over a public network such as the internet1. A VPN can help an organization to achieve the desired security for data backup and replication between the data center and cloud by:

Protecting data in transit from unauthorized access, interception, or modification2.

Ensuring data confidentiality, integrity, and authenticity by using encryption algorithms and authentication protocols2.

Providing network access control by verifying the identity of users and devices before granting access to resources2.

Enabling remote access to cloud resources from any location without compromising security3

Which Connectrix FC switch model supports NVMe in a 32Gb/s SAN fabric exclusively?

A.
DS-6600B
A.
DS-6600B
Answers
B.
MDS 9148S
B.
MDS 9148S
Answers
C.
DS-6505B
C.
DS-6505B
Answers
D.
MDS-9132T
D.
MDS-9132T
Answers
Suggested answer: A

Explanation:

https://www.delltechnologies.com/asset/en-in/products/storage/technical-support/h16567-connectrix-ds-6600b-switches-ss.pdf

A company's assets are continuously under attack.

To deploy a security control mechanism to protect these assets, what should be considered?

A.
Minimize the work factor
A.
Minimize the work factor
Answers
B.
Easy access to assets by authorized users
B.
Easy access to assets by authorized users
Answers
C.
Limited access to assets by unauthorized users
C.
Limited access to assets by unauthorized users
Answers
D.
Maximize the attack surface
D.
Maximize the attack surface
Answers
Suggested answer: B

What is a goal of cyber recovery?

A.
Evaluate systems, networks, and applications to find vulnerabilities
A.
Evaluate systems, networks, and applications to find vulnerabilities
Answers
B.
Determine persistence access of system, networks, and applications
B.
Determine persistence access of system, networks, and applications
Answers
C.
Abstract the physical compute hardware from the operating system and applications
C.
Abstract the physical compute hardware from the operating system and applications
Answers
D.
lsolate copies of critical data to ensure that an uncompromised copy always exists
D.
lsolate copies of critical data to ensure that an uncompromised copy always exists
Answers
Suggested answer: D

Explanation:

Cyber recovery is a process of restoring critical data and systems in the event of a cyber attack. This goal of this process is to ensure that a copy of the data is always available, even if the original data has been corrupted or compromised. This can be done by isolating a copy of the data and keeping it separate from the original. This ensures that the data is always available should a cyber attack occur, allowing the business to quickly restore the original data and continue operations.

Total 189 questions
Go to page: of 19