Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

D-ISM-FN-01 Questions and Answers

Question # 6

Question:

Which statement defines the limitation of Native NVMe?

A.

It cannot connect to NVM storage devices outside of the server.

B.

It requires 10 Gigabit or greater Ethernet LANs with TCP.

C.

It requires a 32 Gb/s Fibre Channel to work.

D.

It can only deliver high shared storage performance through Fibre Channel.

Full Access
Question # 7

Question:

A Fibre Channel switch has eight ports, and all ports must be operational from 6 AM to 6 PM, Monday through Friday. However, a failure of Port 4 occurs within the week as follows:

    Monday: 11 AM to 1 PM

    Wednesday: 5 PM to 10 PM

    Thursday: 7 AM to 10 AM

    Saturday: 11 AM to 1 PMWhat is the availability of Port 4 in that week?

A.

90%

B.

80%

C.

86.7%

D.

81.6%

Full Access
Question # 8

Question:

An IT team needs to connect a compute system to a switch in their SAN. What is the port type?

A.

E_Port

B.

N_port

C.

F_port

D.

G_port

Full Access
Question # 9

Question:

An IT department needs to execute automated tasks to perform a business operation. They require workflows for arranging, coordinating, and managing these tasks. Which layer of the Modern Data Center Architecture provides this functionality?

A.

Physical infrastructure

B.

Virtual infrastructure

C.

Orchestration

D.

Services

Full Access
Question # 10

Question:

What is the most common technique used by malware protection software to detect malware?

A.

Reputation-based analysis

B.

Behavioral analysis

C.

Signature-based detection

D.

Heuristic analysis

Full Access
Question # 11

Question:

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

A.

Session

B.

Data Link

C.

Transport

D.

Presentation

Full Access
Question # 12

Question:

An Ethernet switch has eight ports, and all ports must be operational for 24 hours from Monday through Friday. However, failures of Port 6 occur within the week as follows:

    Tuesday: 6 AM to 8 AM

    Thursday: 5 PM to 10 PM

    Friday: 7 AM to 9 AMWhat is the MTBF (Mean Time Between Failures) of Port 6?

A.

37 hours

B.

32 hours

C.

30 hours

D.

40 hours

Full Access
Question # 13

Question:

In continuous data protection, what does the amount of journal space determine?

A.

How far back the data can be recovered

B.

Amount of space the source and replica volumes require

C.

Length of time required to recover the data

D.

Amount of data that can be restored to a specific point

Full Access
Question # 14

Question:

What is the function of a continuous data protection (CDP) appliance?

A.

Migrates deduplicated data from the source volume to the target volume during replication

B.

Runs data protection software and manages replications within and across data centers

C.

Stores all data that has changed from the time the replication session started

D.

Intercepts writes to the production volume and splits each write into two copies

Full Access
Question # 15

Question:

Which two interfaces does an OSD (Object Storage Device) gateway typically present to applications?

A.

REST and SOAP APIs

B.

SSH and SMB

C.

HTTP and HTTPS

D.

File-based interfaces like NFS and CIFS

Full Access
Question # 16

Question:

A company is concerned about the risk of data loss due to accidental deletion and hardware failures. What is theprimaryreason for implementing a data backup solution?

A.

To reduce storage costs

B.

To maintain business continuity

C.

To improve application performance

D.

To reduce the usage of archive storage

Full Access
Question # 17

Question:

What information is available in a capacity planning report for storage infrastructure?

A.

Current and historical information about the utilization of storage, file systems, and ports

B.

Number of units of storage available, used, and the cost

C.

Current and historical performance information about IT components and operations

D.

Equipment purchase dates, licenses, lease status, and maintenance records

Full Access
Question # 18

Question:

Which layer of the OSI model does a router primarily operate at?

A.

Layer 4

B.

Layer 2

C.

Layer 3

D.

Layer 7

Full Access