Pass the EMC DCA-ISM D-ISM-FN-23 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which VM file is used to keep a record of the VM's activity and is often used for troubleshooting?

Options:

A.

Configuration file


B.

Virtual disk file


C.

Log file


D.

Memory state file


Expert Solution
Questions # 22:

In a RAID 6 array with four disks, what is the total usable data storage capacity on the array if the disk size is 200 GB?

Options:

A.

200 GB


B.

400 GB


C.

600 GB


D.

800 GB


Expert Solution
Questions # 23:

Match the Fibre Channel (FC) layers with their respective features.

Question # 23


Expert Solution
Questions # 24:

What statement describes machine learning?

Options:

A.

Applies an algorithm to large amounts of data for pattern discovery


B.

Organizes data efficiently so that compute systems can learn


C.

Developing a program to compute every possible outcome


D.

Replicating a detailed process and then implementing it in software


Expert Solution
Questions # 25:

Match the functionality of a security goal with its description.

Question # 25


Expert Solution
Questions # 26:

Which Dell EMC product is a disk-based backup and recovery solution that provides inherent source-based deduplication?

Options:

A.

Data Domain


B.

SRDF


C.

TimeFinder


D.

Avamar


Expert Solution
Questions # 27:

What is true about storage system-based replication?

Options:

A.

The source volume is not required to be healthy to restore the data from the snapshot


B.

All the snapshots created from a source volume should be different sizes


C.

Taking multiple snapshots improve the performance of the source volume


D.

Snapshots are immediately accessible after the replication session activation


Expert Solution
Questions # 28:

What is a benefit of including a Defense-in-depth strategy as part of the data center security strategy?

Options:

A.

Optimize application and data storage security controls


B.

Optimize application and network security controls


C.

Reduce the overall cost of deploying security controls


D.

Reduce the scope of an information security risk


Expert Solution
Questions # 29:

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called'?

Options:

A.

Agent-based


B.

Backup as a service


C.

Local replication


D.

Image-based


Expert Solution
Questions # 30:

Which network file sharing protocol provides cloud-based file sharing through a REST API interface?

Options:

A.

S3


B.

HDFS


C.

ZFS


D.

FTP


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions