Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the EMC Cloud Infrastructure D-CIS-FN-01 Questions and answers with Dumpstech

Exam D-CIS-FN-01 Premium Access

View all detail and faqs for the D-CIS-FN-01 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

An administrator must design a fault-tolerant IT environment for applications.

Which techniques meet this requirement?

Options:

A.

Active/Passive for Compute -

NIC Teaming for Network -

Dual disks for storage

B.

Active/Active for Compute -

Link Aggregation for Network -

Erasure Coding for storage

C.

Active/Passive for Compute -

Spanning for Network -

Dynamic Disk Sparing for storage

D.

Active/Standby for Compute -

Multipathing for Network -

RAID for storage

Questions # 12:

What is a key responsibility of a security governance board?

Options:

A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Questions # 13:

What is true about change management?

Options:

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Questions # 14:

What is a characteristic of a converged infrastructure?

Options:

A.

Eliminates CAPEX

B.

Eliminates OPEX

C.

Does not require a separate storage array

D.

Enables rapid scalability

Questions # 15:

What is a responsibility of the Service Manager role?

Options:

A.

Understanding consumers’ needs and industry trends to drive an effective product strategy

B.

Coordinating with the architecture team to define technology road maps

C.

Provide architectural oversight over individual domains

D.

Designing, planning, managing, maintaining, and supporting the cloud infrastructure

Questions # 16:

What is a benefit of source-based data deduplication?

Options:

A.

Reduces recovery times

B.

Increase the frequency of backups

C.

Reduces network bandwidth requirements

D.

Reduces compute CPU cycles

Questions # 17:

What is the primary driver of application transformation?

Options:

A.

Drive adoption of a DevOps culture

B.

Integrate legacy applications

C.

Retire legacy applications

D.

Develop innovative IT solutions

Questions # 18:

Two departments of an organization have their own volumes created on the same storage system. What can the organization implement to prevent unauthorized access to the volumes owned by the otherdepartment?

Options:

A.

Thick LUN

B.

LUN shredding

C.

LUN masking

D.

Thin LUN

Questions # 19:

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

Options:

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Questions # 20:

What is an example of OS hardening?

Options:

A.

Deleting unused programs and installing current updates

B.

Changing OS frequently to run applications

C.

Encrypting application data at rest

D.

Disallowing unauthorized modifications to application settings

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions