Practice Free D-ISM-FN-01 Exam Online Questions
In continuous data protection (CDP) remote replication, where are the two split write I/Os of an incoming write I/O directed?
- A . One I/O goes to the local CDP appliance and the other I/O goes to the production volume
- B . One I/O goes to the compute system and the other I/O goes to the production volume
- C . One I/O goes to the remote CDP appliance and the other I/O goes to the replica
- D . One I/O goes to the journal volume and the other I/O goes to the replica
What is a benefit of link aggregation in a SAN?
- A . Provides a higher throughput than a single interswitch link can provide
- B . Distributes the network traffic across all virtual SANs, ensuring even virtual SAN utilization
- C . Optimizes performance by consolidating all interswitch links into a single physical link
- D . Provides the flexibility to deploy the same interswitch links for both FC and iSCSI traffic
What is compromised by a passive attack on an IT infrastructure?
- A . Confidentiality
- B . Integrity
- C . Availability
- D . Repudiation
Why is it important for organizations to accelerate their digital transformation efforts?
- A . Avoid virtualizing the IT resources across data centers to minimize the utilization
- B . Develop and deploy modern applications using only public cloud resources
- C . Maintain a competitive advantage in a digital environment
- D . Adopt modern digital products to significantly reduce CAPEX and OPEX
What is a benefit of unified storage systems?
- A . Provides the capability to separately plan the capacity consumption of object-based data
- B . Eliminates the need to use SATA disk drives to store less valued data
- C . Enables rapid development of modern applications by using a common storage pool
- D . Increases the overall storage capacity utilization with no stranded capacity
What is an accurate statement about Infrastructure as a Service?
- A . Consumer has control over the operating systems and the deployed applications
- B . Consumer only has control over user-specific application configuration settings
- C . Consumer has control over network devices, compute systems, and storage systems
- D . Consumer only has control over the configuration settings of the application-hosting environment
In a bridged iSCSI network, which type of network enables the iSCSI gateway to connect servers to storage systems?
- A . Server N_Ports ports and storage system Ethernet Ports
- B . Server EX_Ports ports and storage system Ethernet Ports
- C . Server Ethernet ports and storage system N_Ports
- D . Server Ethernet ports and storage system EX_Ports
What functionality does the control layer provide in a software-defined networking architecture?
- A . Forwards data packets based on application layer requirements
- B . Defines network behavior through physical network device policies
- C . Establishes communication between the infrastructure and interface layers
- D . Extracts network information from the data plane and sends it to the application layer
What is an accurate statement about full volume replication?
- A . Target device is at least as large as the source device
- B . Target device requires only a fraction of the space used by the source device
- C . Target device is accessible only after the replication session starts
- D . Target and source devices should be on different storage arrays
You need to recommend a solution to meet the security requirements of the junior database administrators.
What should you include in the recommendation?
- A . A server role
- B . A database role
- C . A credential
- D . A shared login