DELL EMC D-ISM-FN-23 Dell Information Storage and Management Foundations 2023 Online Training
DELL EMC D-ISM-FN-23 Online Training
The questions for D-ISM-FN-23 were last updated at Jan 30,2025.
- Exam Code: D-ISM-FN-23
- Exam Name: Dell Information Storage and Management Foundations 2023
- Certification Provider: DELL EMC
- Latest update: Jan 30,2025
In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link.
Which security mechanism should the administrator use?
- A . Port type locking
- B . Port binding
- C . Persistent port disable
- D . Fabric binding
What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?
- A . FCoE switches provide MAC addresses to VN_Ports during node login
- B . FC switches provide MAC addresses to VE_Ports dynamically during discovery
- C . Compute systems provide MAC addresses to the VF_Ports on FCoE switches
- D . Both VF_Ports and VE_Ports obtain MAC addresses from FC switches
Which technology decouples the OS, applications, and user state from a physical compute system?
- A . Application virtualization
- B . Storage virtualization
- C . Thin client virtualization
- D . Desktop virtualization
What is an accurate statement about a virtual desktop infrastructure?
- A . Each user is provided a dedicated desktop VM with its own operating system and applications
- B . Operating system and applications hosted on a client system are shared by multiple users
- C . Each user has an individual desktop session on the remote compute system in which applications execute
- D . Operating system and applications on the remote desktop are downloaded on the client for local execution
What is an advantage of performing capacity monitoring in a storage infrastructure environment?
- A . Automatically identifying configuration changes to the storage infrastructure elements
- B . Rapidly identifying component failures that may lead to storage unavailability
- C . Efficiently tracking unauthorized access to the storage infrastructure elements
- D . Proactively preventing service outages due to the lack of storage space
What is an accurate statement about the function of an archiving server?
- A . Enables the ability to configure policies for archiving data
- B . Installs agentson the archiving storage device
- C . Scans the data that can bearchived on application servers
- D . Creates stub files on an archiving storage device
What information is available in a capacity planning report for storage infrastructure?
- A . number of units of storage available, used and the cost
- B . current and historic information about the utilization of storage, file systems, and ports
- C . equipment purchase dates, licenses, lease status, and maintenance records
- D . current and historical performance information about IT components and operations
What accurately describes hypervisor-based continuous data protection?
- A . Virtual appliance is running on a hypervisor.
- B . Journal is stored in a virtual machine.
- C . Virtual appliance runs on a storage system.
- D . Replica volumes are created in the hypervisor.
An organization is planning to secure the connection between the data center and cloud while performing data backup and replication.
Which security control mechanism will help organization to achieve the desired security?
- A . ldentity and Access management
- B . Intrusion Detection and Prevention
- C . Firewall
- D . Virtual Private Network
An organization plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 9800 IOPS with a typical I/O size of 4 KB.
The capacity of each available disk drive is 250 GB. The maximum number of IOPS a drive can perform at with 70 percent utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements given a RAID 0 configuration?
- A . 8
- B . 70
- C . 110
- D . 140