Practice Free D-ISM-FN-23 Exam Online Questions
Why do organizations prefer to adopt Disaster Recovery as a Service (DRaaS)?
- A . Increase the effective utilization of hardware resources in their data centers
- B . Eliminate both CAPEX and OPEX in managing disaster recovery at remote sites
- C . Understand and learn DRaaS best practices from service providers
- D . Avoid maintaining a complete set of IT resources in a remote data center for disaster recovery
What accurately describes an attack vector in an IT infrastructure?
- A . Series of steps that must be followed in order to complete an attack
- B . Various entry points that can be used to launch an attack
- C . Amount of effort required to exploit vulnerabilities in the infrastructure
- D . Process of identifying the system components under attack
What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?
- A . FCoE switches provide MAC addresses to VN_Ports during node login
- B . FC switches provide MAC addresses to VE_Ports dynamically during discovery
- C . Compute systems provide MAC addresses to the VF_Ports on FCoE switches
- D . Both VF_Ports and VE_Ports obtain MAC addresses from FC switches
Which EMC product provides a software-defined platform that supports both block and file storage services?
- A . ViPR Controller
- B . ScaleIO
- C . Elastic Cloud Storage
- D . XtremIO
Which file system provides a streaming interface using the MapReduce framework?
- A . CIFS
- B . HDFS
- C . NFS
- D . NTFS
What accurately describes an attack surface in an IT infrastructure?
- A . Various entry points that can be used to launch an attack
- B . Series of steps that must be followed in order to complete an attack
- C . Amount of effort required to exploit a vulnerability in the infrastructure
- D . Process of identifying the system components under attack
What is a benefit of using an existing IP-based network infrastructure for storage connectivity?
- A . Provide a dedicated network for storage
- B . Provide the ability to extend the network over long distances
- C . Ensure lossless transmission of FC traffic over Ethernet
- D . Ensure security by allowing only localized data movement
Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?
- A . Fabric controller
- B . Fabric login server
- C . Name server
- D . Fabric management server
What is an accurate statement about the EMC RecoverPoint product?
- A . Provides the capability to store point-in-time data in an object form
- B . Provides source-based deduplication
- C . Provides target-based deduplication
- D . Provides the capability to restore data to any previous point-in-time
How does an iSCSI initiator discover its targets?
- A . Initiator sends a query to an iSNS server for a list of available targets
- B . Initiator receives the iSCSI names of its targets from the primary DNS server
- C . Initiator uses the data center bridging exchange protocol for the discovery
- D . Initiator sends SCSI commands and the target responds by sending its name