Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > EMC > Cloud Infrastructure > D-CIS-FN-01

D-CIS-FN-01 Dell Cloud Infrastructure and Services Foundations v2 Exam Question and Answers

Question # 4

What is a benefit of cloud automation?

A.

Reduced service provisioning time

B.

Improved physical infrastructure deployment time

C.

Decreased capital expense

Full Access
Question # 5

Which risk management step deploys various security mechanisms that minimize risks impacts?

A.

Identification

B.

Mitigation

C.

Assessment

D.

Monitoring

Full Access
Question # 6

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

A.

Service Planning

B.

Service Creation

C.

Service Operation

D.

Service Termination

Full Access
Question # 7

What type of cloud security control is log auditing?

A.

Detective control

B.

Corrective control

C.

Preventive control

D.

Technical control

Full Access
Question # 8

What is a characteristic of reporting?

A.

Provides tabular or graphical views of monitored information

B.

Provides information about events or impending threats or issues

C.

Displays a personalized functional interface

D.

Presents service instances to consumers in real time

Full Access
Question # 9

A development group is using an iterative and incremental software development method.

Which standard is being utilized?

A.

Agile

B.

ITIL

C.

DevOps

D.

Orchestration

Full Access
Question # 10

What is a function of a cloud portal?

A.

Updates IT resources database

B.

Replicates container resources in a web portal

C.

Interacts with the orchestration layer

D.

Creates workflows for automated scheduling

Full Access
Question # 11

Which two are key requirements for fault tolerance?

A.

Document SPOF and Fault Elimination

B.

Fault Isolation and Eliminate SPOF

C.

Network Isolation and Eliminate SPOF

D.

RAID Storage and Fault Isolation

Full Access
Question # 12

What term refers to the entry points from which an attack can be launched?

A.

Attack surface

B.

Attack factor

C.

Attack vector

Full Access
Question # 13

What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center?

A.

IT resources are configured for peak usage

B.

IT resources are provisioned on demand

C.

IT resources are rented as services

D.

IT resources are provisioned as self-service

Full Access
Question # 14

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Full Access
Question # 15

What is true about change management?

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Full Access
Question # 16

Which cloud service lifecycle phase involves discovering services assets

A.

Service Planning

B.

Service Termination

C.

Service Operation

D.

Service Creation

Full Access
Question # 17

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Full Access
Question # 18

Which is true about a type 2 hypervisor?

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Full Access
Question # 19

What enables resource pooling and multi-tenancy in a cloud environment?

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Full Access
Question # 20

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Full Access
Question # 21

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

Full Access
Question # 22

Which type of cloud tool controls resources such as compute, storage, and network?

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

Full Access
Question # 23

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

Full Access
Question # 24

Which risk management process is in the correct order

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Full Access
Question # 25

Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down?

A.

Checkpointing

B.

Monitoring Application Availability

C.

Graceful Degradation

D.

Retry Logic

Full Access
Question # 26

Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?

A.

Portfolio

B.

Capacity

C.

Demand

D.

Operation

Full Access
Question # 27

Which APEX custom solution allows customers to choose their hardware, software, services, capacity, and offers usage-based payments?

A.

Flex on Demand

B.

Data Center Utility

C.

Backup Services

D.

Private and Hybrid Cloud

Full Access
Question # 28

Which is a lightweight, stand-alone, executable package that consists of whole runtime environment to execute the application?

A.

Container

B.

Orchestrator

C.

Hypervisor

D.

Microservice

Full Access
Question # 29

What type of infrastructure is defined as, "All the sources are bundled together and virtualized?

A.

Software-Defined

B.

Hyper-Converged

C.

Converged

Full Access
Question # 30

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

A.

Administrative control

B.

Technical control

C.

Corrective control

D.

Physical control

Full Access
Question # 31

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Full Access
Question # 32

Which is a benefit of implementing target-based deduplication?

A.

Offloads the backup client from the deduplication process

B.

Reduces storage capacity and network bandwidth requirements

C.

Backup client sends only new and unique segments across the network

D.

Optimizes ROBO environments for centralized backup

Full Access
Question # 33

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Full Access
Question # 34

What refers to an agreement between provider and consumer that states the terms of service usage?

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

Full Access
Question # 35

What is used to update information in a configuration management database?

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Full Access
Question # 36

What term describes the ability of a system to continue functioning, even when a few of its components fail?

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

Full Access