This PDF contains a set of carefully selected practice questions for the
D-CIS-FN-23 exam. These questions are designed to reflect the
structure, difficulty, and topics covered in the actual exam, helping you
reinforce your understanding and identify areas for improvement.
What's Inside:
1. Topic-focused questions based on the latest exam objectives
2. Accurate answer keys to support self-review
3. Designed to simulate the real test environment
4. Ideal for final review or daily practice
Important Note:
This material is for personal study purposes only. Please do not
redistribute or use for commercial purposes without permission.
For full access to the complete question bank and topic-wise explanations, visit:
CertQuestionsBank.com
Our YouTube: https://www.youtube.com/@CertQuestionsBank
FB page: https://www.facebook.com/certquestionsbank
Share some D-CIS-FN-23 exam online questions below.
1.Which cloud security objective provides the required secrecy of information to ensure that only
authorized users have access to data held within the cloud?
A. Integrity
B. Authorization
C. Authentication
D. Confidentiality
Answer: D
2.What is a characteristic of thin LUNs?
A. When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool.
B. When a thin LUN is created, physical storage is fully allocated for it
C. Once a thin LUN is created it cannot be destroyed until all data is deleted from it
D. When a thin LUN is destroyed, its allocated capacity is reserved until an administrator reclaims it
Answer: A
3.What activity is included in a compliance checklist when moving data to the cloud?
A. Review and evaluate the usage of encryption to protect consumers’ data
B. Ensure adherence to the security demands that are expressed in contracts
C. Determine if appropriate governance processes are available to meet consumers’ requirements
D. Review the financial stability of the provider to ensure its longevity
Answer: B
4.What characterizes an uplink NIC used in a virtual machine network on a physical compute system
running a hypervisor?
A. It does not have assigned IP addresses
B. It is used as a link between virtual machines
C. It offloads iSCSI processing from the hypervisor
D. It encapsulates SCSI data into Ethernet frames
Answer: A
5.An organization needs to deploy remote replication between two sites that are 100 km (62 miles)
apart. The organization requires a near zero recovery point objective.
Which solution would you recommend?
A. Hypervisor-based asynchronous replication
B. Synchronous replication
C. Snapshot replication
D. Asynchronous replication
Answer: B
6.Which VMware product automates performance, capacity, and configuration management?
A. vCenter Operations Management Suite
B. vCloud Hybrid Service
C. vCenter Site Recovery Manager
D. IT Business Management Suite
Answer: A
7.Which activity is carried out during the service operation phase of the cloud service lifecycle?
A. Discovering the service assets
B. Establishing the billing policy
C. De-provisioning the service instance
D. Assessing service requirements
Answer: A
8.Which RAID type uses parity to protect against data loss?
A. RAID 3
B. RAID 0
C. RAID 1
D. Nested
Answer: A
9.Which task describes adherence to compliance?
A. Ensure security policies are being enforced
B. Define access rights to users
C. Assess the cloud provider's capability to provide logs
D. Assess assets with realistic valuations
Answer: A
10.What provides workflows for performing automated tasks to accomplish a desired outcome?
A. Cloud services
B. Orchestration
C. Software defined infrastructure
D. Virtual infrastructure
Answer: B
11.What is true about change management?
A. Defines SLA compliance
B. Triggers alerts
C. Monitors compliance
Answer: C
12.How is a node added to a virtual storage area network (VSAN) created on a Fibre Channel SAN?
A. Assign the VSAN ID to an F_Port on a FC switch
Connect the N_Port on the node to the F_Port
B. Assign the VSAN ID to the N_Port on the node
Connect the N_Port to an E_Port on a FC switch
C. Assign the VSAN ID to an E_Port on a FC switch
Connect the N_Port on the node to the E_Port
D. Assign the VSAN ID to the N_Port on the node
Connect the N_Port to an F_Port on a FC switch
Answer: A
13.What principle is supported by Representational State Transfer (REST)?
A. Resource manipulation using resource representation
B. Stateful interaction between service requestor and service provider
C. Resource identification using XML
D. Encapsulation of XML files in the HTTP header
Answer: A
14.What is the purpose of a configuration management tool?
A. Enable the construction of the individual components of a service or infrastructure based on
predefined scripts
B. Enable testing of individual components of the service and infrastructure
C. Enable automatic provisioning of infrastructure or services
D. Enable automation and coordination of building multiple components and collectively tested as a
system
Answer: C
15.What is a function of the management interface of cloud services?
A. Enables consumers to control their use of rented services
B. Presents functional content of a service for computing
C. Provides a standard to develop a service enablement roadmap
D. Sequences system functions programmatically
Answer: A
16.What is a benefit of hyper-threading?
A. Improved processor utilization
B. Reduced processor cost
C. Concurrent execution of multiple threads
D. Pool processors across compute systems
Answer: A
17.An organization plans to deploy automated storage tiering to manage the storage resources
efficiently.
What key parameters should they consider while deploying automated storage tiering?
A. Security, cost
B. Security, availability
C. Cost, performance
D. Performance, security
Answer: C
18.Which Dell Technologies product can automate and centralize the collection and analysis of data
across physical and virtual environments?
A. NetWorker
B. Avamar
C. SourceOne
D. Data Protection Advisor
Answer: D
19.What benefit is provided by the business continuity process in a cloud?
A. Helps to reduce the IT budget
B. Helps to meet the required service availability
C. Enables meeting the required service performance
D. Enables the transformation from CAPEX to OPEX
Answer: B
20.An organization is looking for a cloud solution for application development, testing, and
deployment. They do not want to invest in application development tools.
Which cloud service model will address the requirements?
A. Platform as a Service
B. Infrastructure as a Service
C. Software as a Service
D. Storage as a Service
Answer: A
21.Which EMC product provides a solution for software-defined storage?
A. ViPR
B. Vblock
C. VMAX
D. VSPEX
Answer: A
22.An organization wants to deploy performance sensitive applications to meet their business
requirements.
Which type of storage device is suitable?
A. SATA drive
B. Solid-state drive
C. SAS drive
D. Optical disk drive
Answer: B
23.What type of cloud security control is log auditing?
A. Detective control
B. Corrective control
C. Preventive control
D. Technical control
Answer: A
24.Which cloud standard provides organizations with the required structure, detail, and clarity related
to information security, personalized to the cloud industry?
A. HIPAA
B. CCM CSA
C. HITRUST
D. PCI DSS
Answer: B
25.What ensures that the cloud services and service creation processes adhere to relevant policies
and legal requirements?
A. Problem management
B. Risk management
C. Audit management
D. Compliance management
Answer: D
26.Which statement describes the OAuth mechanism?
A. An open authorization mechanism that allows a client to access protected resources from a
resource server on behalf of a resource owner
B. A network authentication protocol that provides strong authentication for client/server applications
by using secret-key cryptography
C. An open authentication standard in which a service provider uses authentication services from an
OpenID provider
D. A mechanism designed to examine data packets traversing a network and compare them to a set
of filtering rules
Answer: A
27.What is the objective of integrity in information security?
A. Ensure timely and reliable access to resources
B. Ensure secrecy of stored information
C. Ensure data protection against unauthorized alterations
D. Ensure users are responsible for actions executed
Answer: C
28.A service is offered to consumers from 8 A.M. to 5 P.M., Monday through Friday. The service
experiences downtime from 5 P.M. to 7 P.M. on Monday of a given week.
What is the service availability for that week?
A. 84.44%
B. 88.88%
C. 95.55%
D. 100.00%
Answer: D
29.What is a benefit of the software-defined approach for managing resources?
A. Provides a set of component functions that can be called from a software component to interact
with other software components
B. Enables automated arrangement and coordination of system functions to manage cloud services
C. Provides a framework to list services, attributes of services, service-level commitments, terms and
conditions for service provisioning
D. Enables centralized control of IT infrastructure without regard to physical location
Answer: D
30.Which layer of a cloud infrastructure includes tools that optimize resource utilization?
A. Virtual layer
B. Physical layer
C. Orchestration layer
D. Service layer
Answer: A
31.What is a characteristic of reporting?
A. Provides tabular or graphical views of monitored information
B. Presents service instances to consumers in real time
C. Provides information about events or impending threats or issues
D. Displays a personalized functional interface
Answer: A
32.Which compute system component runs software programs?
A. CPU
B. RAM
C. OS
D. GPU
Answer: A
33.What are the key functions of a control plane?
A. User and role access -
Configuration baselines -
Services execution
B. Configuration messaging -
Statistics -
Status
C. Asset discovery -
Resource abstraction and pooling
Resource provisioning
D. Data processing -
Asset discovery -
Resource abstraction and pooling
Answer: C
34.Which mechanism in a Fibre Channel SAN prevents illegitimate host connections by rejecting
WWPN logins?
A. Port binding
B. Fabric binding
C. Persistent port locking
D. Port-type locking
Answer: A
35.What is an accurate statement about an active/active service availability zone configuration?
A. It provides a lower recovery time objective (RTO).
B. The zones must be connected over a FC network.
C. The zones must be located more than 200 km apart.
D. It has reduced bandwidth requirements for replication across zones.
Answer: A
36.What is a benefit of synchronous remote replication?
A. Replicates data across any geographic location without impacting response time
B. Ensures source and replica have identical data at all times
C. Supports locality of reference to improve replication performance
D. Saves network bandwidth by replicating only deduplicated data
Answer: B
37.What is a service template?
A. Collection of interrelated hardware and software components that constitute a service
B. Source-code-based specification used by services as an interface to communicate with each other
C. Entry in the service catalog that describes constraints, policies, rules, price, and SLA
D. Specification related to the terms of service usage, configuration options, and termination of a
service
Answer: A
38.Refer to the exhibit.
Which type of hypervisor is installed in this environment?
A. Hosted Hypervisor-Type 1
B. Bare Metal Hypervisor-Type 1
C. Hosted Hypervisor-Type 2
D. Bare Metal Hypervisor-Type 2
Answer: C
39.Which protocol is most commonly used for compute-to-computer communication?
A. TCP/IP
B. FC
C. FCIP
D. iSCSI
Answer: D
40.What is a function of service portfolio management?
A. Ensure compliance to industry standards
B. Enable capacity and availability management
C. Perform market research and collect information about competitors
D. Collect information about cloud services and their constituent elements
Answer: B
41.Which risk management step deploys various security mechanisms that minimize risks impacts?
A. Identification
B. Mitigation
C. Assessment
D. Monitoring
Answer: B
42.What is a function of financial management?
A. Provide necessary business cases for investment
B. Evaluate quality and cost of supplied products against the SLA
C. Procure capacity in the most cost-effective manner
D. Meet availability needs with a justifiable return on investment
Answer: A
43.What refers to an agreement between provider and consumer that states the terms of service
usage?
A. Service contract
B. Service template
C. Chargeback
D. Showback
Answer: A
44.What is an advantage of adopting a microservices strategy in an application development
environment?
A. All microservices of an application are always updated at the same time for maintaining
consistency in the application
B. Every microservice can be deployed, upgraded, scaled, and restarted independent of other
services in the application
C. Microservices are tightly coupled so it is easy to scale all the services at once to meet business
demands
D. Microservices provide the application platform to implement DevOps in the organization easily and
at low cost
Answer: B
45.What is a function of the discovery operation during the service operation phase of the cloud
service lifecycle?
A. Collects information about people involved in the service operations
B. Collects information about services available in the catalog
C. Provides visibility into each Cloud service asset employed
D. Restores service levels while continuously optimizing operations
Answer: A
46.Which phase of the cloud service lifecycle involves ongoing management activities to maintain
cloud infrastructure and deployed services?
A. Service Creation
B. Service Operation
C. Service Planning
D. Service Termination
Answer: B
47.What does CHAP use to enable initiators and targets to authenticate each other?
A. A secret code
B. OpenID
C. OAuth
D. Permissions
Answer: A
48.Which activity is carried out during the service creation phase of the cloud service lifecycle?
A. Managing service operations
B. Defining the service offering
C. Establishing the billing policy
D. De-provisioning the service instance
Answer: B
49.Which product enables IT organizations to ensure optimum resource usage and configuration
compliance in virtualized and cloud environments?
A. VMware vCenter Manager
B. VMware vRealize Operations Management Suite
C. VMware vRealize Automation Suite
D. VMware vSphere with Operations Management
Answer: B
50.What steps appear in the service enablement roadmap?
A. Plan, Action, Condition, Enable, End
B. Understand, Plan, Build, Enable, Optimize
C. Define, Create, Plan, Enable, Terminate
D. Define, Observe, Understand, Enable, Act
Answer: B
51.Which software-defined storage controller function gathers data about the components and brings
them under its control and management?
A. Storage provisioning
B. Storage discovery
C. Resource abstraction and pooling
D. Storage component management
Answer: C
52.What term refers to businesses that do not have a digital plan, and have limited initiatives or
investments related to digital transformation?
A. Digital Leaders
B. Digital Laggards
C. Digital Adopters
D. Digital Evaluators
Answer: B
53.What is included in the service offering from a cloud service provider?
A. Physical device-to-service mapping
B. Service orchestration guidelines
C. Service enablement roadmap
D. Service scaling guidelines
Answer: D
54.What are two components of an FCoE network?
A. E_Port, port zone
B. FCoE Bridge, FC Host Bus Adapter
C. TCP/IP, Fibre Channel
D. Converged Network Adapter, FC Forwarder
Answer: D
55.A cloud service provider identified that a consumer is misusing the cloud for distributing pirated
software.
What should the cloud service provider do to prevent consumers from abusing cloud resources?
A. Establish agreements with consumers for acceptable use of cloud resources
B. Employ multi-factor authentication to reduce the misuse of cloud resources
C. Configure policies in the orchestration tool to send alerts to the cloud provider
D. Deploy tools to ensure consumers use resources legitimately
Answer: A
56.Which statement describes the service operation management function?
A. Deciding to deliver those services that provide value to the provider and reduce operating costs
B. Managing the provider's operational expenditure, budget, and billing requirements
C. Maintaining deployed services, which ensures that service levels are delivered as committed
D. Defining a suite of service offerings that aligns to the provider’s strategic business goals
Answer: C
Get D-CIS-FN-23 exam dumps full version.
Powered by TCPDF (www.tcpdf.org)