Practice Free D-CIS-FN-23 Exam Online Questions
What is a service template?
- A . Collection of interrelated hardware and software components that constitute a service
- B . Source-code-based specification used by services as an interface to communicate with each other
- C . Entry in the service catalog that describes constraints, policies, rules, price, and SLA
- D . Specification related to the terms of service usage, configuration options, and termination of a service
What does CHAP use to enable initiators and targets to authenticate each other?
- A . A secret code
- B . OpenID
- C . OAuth
- D . Permissions
An organization is implementing a backup solution for their private cloud. They are concerned that having the backup data stored onsite will expose them to lose in the event of a site-wide disaster.
They are considering replicating the backup storage to an external site.
What are the design considerations involved with this replication solution?
- A . Ensuring proper hypervisor support and the availability of a federated single sign-on solution
- B . Ensuring network traffic encryption is considered and ensuring proper hypervisor support
- C . Ensuring sufficient network bandwidth is available and network traffic encryption is considered
- D . Ensuring proper hypervisor support and sufficient network bandwidth is available
What is a characteristic of cloud service management?
- A . Adopting automation and workflow orchestration
- B . Enabling IT asset-specific management
- C . Separating management processes from service design
- D . Abstracting cloud service requirements and SLA
What workflow software enables automation of complex IT tasks?
- A . VMware vRealize Orchestrator
- B . Dell EMC XtremIO
- C . VMware HA
- D . Dell EMC ScaleIO
An organization is looking for a cloud solution for application development, testing, and deployment. They do not want to invest in application development tools.
Which cloud service model will address the requirements?
- A . Platform as a Service
- B . Infrastructure as a Service
- C . Software as a Service
- D . Storage as a Service
What is the correct sequence of steps in synchronous remote replication?
- A . Step 1: Compute system writes data to source.
Step 2: Data from source is replicated to replica (target).
Step 3: Target acknowledges back to source.
Step 4: Source acknowledges write complete to the compute system. - B . Step 1: Compute system writes data to source.
Step 2: Write is immediately acknowledged to compute system.
Step 3: Target acknowledges back to source.
Step 4: Data is transmitted to the replica (target). - C . Step 1: Compute system writes data to source.
Step 2: Data is transmitted to the replica (target).
Step 3: Source acknowledges write complete to the compute system.
Step 4: Target acknowledges back to source. - D . Step 1: Compute system writes data to source.
Step 2: Write is immediately acknowledged to compute system.
Step 3: Data is transmitted to the replica (target).
Step 4: Target acknowledges back to source.
Which EMC product discovers infrastructure components and detects changes in component status?
- A . Smarts
- B . VSPEX
- C . RecoverPoint
- D . Mozy
Which are core attributes to a modern infrastructure?
- A . Adaptable, software-defined, and scale-out
- B . Resilient, scale-out, and cloud-enabled
- C . Flash, software-defined, and cloud-enabled
- D . Consolidation, flash, and scale-out
What is a key element of a cloud portal?
- A . Unified manager
- B . Element manager
- C . Orchestrator
- D . Management interface