Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

D-CIS-FN-01 Questions and Answers

Question # 6

What enables resource pooling and multi-tenancy in a cloud environment?

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Full Access
Question # 7

Which network feature enables dynamic distribution of applications I/O traffic across VMs?

A.

NIC Teaming

B.

Erasure Coding

C.

Link Aggregation

D.

Load Balancing

Full Access
Question # 8

How is application functionality segmented when using a microservices approach in an application development environment?

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

Full Access
Question # 9

What is a benefit of data archiving?

A.

Increases deduplication ratio and reduces storage costs

B.

Avoids performing data backups frequently

C.

Preserves data for future reference and adherence to regulatory compliance

D.

Moves frequently accessed data to lower-cost archive storage

Full Access
Question # 10

What involves the automated arrangement, coordination, and management of various systems components that enable a user to make a service request using the self-service portal?

A.

Orchestrated service catalog updates

B.

Automated service catalog management

C.

Automated portfolio management

D.

Orchestrated service delivery

Full Access
Question # 11

What is a function of a cloud portal?

A.

Updates IT resources database

B.

Replicates container resources in a web portal

C.

Interacts with the orchestration layer

D.

Creates workflows for automated scheduling

Full Access
Question # 12

What is a characteristic of a best-of-breed infrastructure?

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Full Access
Question # 13

What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center?

A.

IT resources are configured for peak usage

B.

IT resources are provisioned on demand

C.

IT resources are rented as services

D.

IT resources are provisioned as self-service

Full Access
Question # 14

What is a benefit of the active-active cluster implementation?

A.

Enhances performance and availability of a service

B.

Lower total cost of ownership for providing services

C.

Improves security of application running on the cluster

D.

Ability to run multiple services on one physical compute system

Full Access
Question # 15

What is true of a cloud service design best practice?

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Full Access
Question # 16

What are the benefits of modern applications compared to traditional applications?

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Full Access
Question # 17

Which two are key requirements for fault tolerance?

A.

Document SPOF and Fault Elimination

B.

Fault Isolation and Eliminate SPOF

C.

Network Isolation and Eliminate SPOF

D.

RAID Storage and Fault Isolation

Full Access
Question # 18

Which solution can be used for automation of a customer environment?

A.

Ansible

B.

CloudWatch

C.

GitHub

D.

OpenStack

Full Access
Question # 19

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Full Access
Question # 20

What does the management interface in a cloud portal enable consumers to do?

A.

Interact with the business application using a graphical user interface.

B.

Code, compile, and run their applications on the cloud platform.

C.

Modify, start, and stop rented service instances without manual interaction with the service provider.

D.

Perform computing activities by presenting the functional content of a service instance.

Full Access
Question # 21

Refer to the exhibit.

Which associates labels A, B, C, and D with planes within the software-defined infrastructure.

What set of labels is correct?

A.

A = Data plane B = Service plane C = Management plane D = Control plane

B.

A = Control plane B = Management plane C = Service plane D = Data plane

C.

A = Management plane B = Service plane C = Data plane D = Control plane

D.

A = Data plane B = Control plane C = Management plane D= Service plane

Full Access
Question # 22

An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.

What is the maximum number of drive failures supported in the storage system?

A.

6

B.

3

C.

12

D.

9

Full Access
Question # 23

Which data storage type uses a non-hierarchical address space to store data?

A.

Block

B.

Object

C.

File

Full Access
Question # 24

What term refers to the entry points from which an attack can be launched?

A.

Attack surface

B.

Attack factor

C.

Attack vector

Full Access
Question # 25

Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?

A.

Portfolio

B.

Capacity

C.

Demand

D.

Operation

Full Access
Question # 26

What steps appear in the service enablement roadmap?

A.

Define, Create, Plan, Enable, Terminate

B.

Understand, Plan, Build, Enable, Optimize

C.

Define, Observe, Understand, Enable, Act

D.

Plan, Action, Condition, Enable, End

Full Access
Question # 27

What is a benefit of secure multitenancy?

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Full Access
Question # 28

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.

Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?

A.

Resource pooling

B.

On-demand self-service

C.

Rapid elasticity

Full Access
Question # 29

What term describes the ability of a system to continue functioning, even when a few of its components fail?

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

Full Access
Question # 30

What term refers to businesses that cautiously and gradually embrace digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Leaders

D.

Digital Adopters

Full Access
Question # 31

What is the effect of a denial-of-service attack?

A.

Privileges are misused to compromise data security.

B.

User credentials are captured and sent to the attacker

C.

Unauthorized access is gained to user accounts and data.

D.

Legitimate users are prevented from accessing services.

Full Access
Question # 32

What activity is performed during the service planning phase of the cloud service lifecycle?

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Full Access
Question # 33

What is a characteristic of an object-based storage system?

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Full Access
Question # 34

Two departments of an organization have their own volumes created on the same storage system. What can the organization implement to prevent unauthorized access to the volumes owned by the otherdepartment?

A.

Thick LUN

B.

LUN shredding

C.

LUN masking

D.

Thin LUN

Full Access
Question # 35

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Full Access
Question # 36

What happens when a link in a link aggregation group is lost?

A.

All the network traffic is held in the queue until the link is repaired.

B.

All network traffic on that link is redistributed to another link aggregation group.

C.

All the network traffic is resent by the sender after the link is repaired.

D.

All network traffic on that link is redistributed across the remaining links in that group.

Full Access