New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

D-CIS-FN-01 Dell Cloud Infrastructure and Services Foundations v2 Exam Questions and Answers

Questions 4

What does a service attribute specify?

Options:

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Buy Now
Questions 5

What are the benefits of modern applications compared to traditional applications?

Options:

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Buy Now
Questions 6

Which data storage type uses a non-hierarchical address space to store data?

Options:

A.

Block

B.

Object

C.

File

Buy Now
Questions 7

What is true about application virtualization?

Options:

A.

Resolves application conflicts and compatibility issues

B.

Allows for OS modifications on host machines

C.

Prevents the use of conflicting applications on the same end-point device

D.

Increases the complexity of application deployment

Buy Now
Questions 8

Which compute system component contains boot firmware?

Options:

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Buy Now
Questions 9

A cloud service provider must improve the utilization of resources by sharing them with multiple customers.

What mechanism should the cloud provider deploy to prevent one consumer from accessing the virtual machines of another consumer?

Options:

A.

Distributed switching

B.

Secure multitenancy

C.

Pooling of resources

D.

Raw disk mapping

Buy Now
Questions 10

Which cloud service lifecycle phase involves discovering services assets

Options:

A.

Service Planning

B.

Service Termination

C.

Service Operation

D.

Service Creation

Buy Now
Questions 11

An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being periodically unavailable.

What type of unavailability are they experiencing?

Options:

A.

Ephemeral

B.

Permanent

C.

Intermittent

Buy Now
Questions 12

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

Options:

A.

Service negotiation

B.

Service level objective

C.

Service valuation

D.

Service level agreement

Buy Now
Questions 13

Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?

Options:

A.

Cloud Operating System

B.

Orchestor

C.

Cloud Portal

D.

Service automation

Buy Now
Questions 14

What is a function of a cloud portal?

Options:

A.

Updates IT resources database

B.

Replicates container resources in a web portal

C.

Interacts with the orchestration layer

D.

Creates workflows for automated scheduling

Buy Now
Questions 15

Which is true about a type 2 hypervisor?

Options:

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Buy Now
Questions 16

What is used to update information in a configuration management database?

Options:

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Buy Now
Questions 17

What is a benefit of link aggregation?

Options:

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Buy Now
Questions 18

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

Options:

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Buy Now
Questions 19

Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?

Options:

A.

Abstraction and Polling

B.

Unified Management

C.

Self-Service Portal

D.

Metering

Buy Now
Questions 20

What activity is performed during the service planning phase of the cloud service lifecycle?

Options:

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Buy Now
Questions 21

Which are core attributes to a modern infrastructure?

Options:

A.

Adaptable, software-defined, and scale-out

B.

Resilient, scale-out, and cloud-enabled

C.

Flash, software-defined, and cloud-enabled

D.

Consolidation, flash, and scale-out

Buy Now
Questions 22

Two departments of an organization have their own volumes created on the same storage system. What can the organization implement to prevent unauthorized access to the volumes owned by the otherdepartment?

Options:

A.

Thick LUN

B.

LUN shredding

C.

LUN masking

D.

Thin LUN

Buy Now
Questions 23

Which cloud security design principle prevents an individual from improper access or system misuse?

Options:

A.

Least privilege

B.

Data privacy and ownership

C.

Separation of duties

D.

Secure multitenancy

Buy Now
Questions 24

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

Options:

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Buy Now
Questions 25

Which risk management process is in the correct order

Options:

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Buy Now
Questions 26

Which risk management step deploys various security mechanisms that minimize risks impacts?

Options:

A.

Identification

B.

Mitigation

C.

Assessment

D.

Monitoring

Buy Now
Questions 27

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

Options:

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Buy Now
Questions 28

Which is a characteristic of the chargeback model?

Options:

A.

Financial systems require agent plug-in.

B.

Service costs reporting to the business.

C.

Customers are billed for services that are consumed.

Buy Now
Questions 29

A development group is using an iterative and incremental software development method.

Which standard is being utilized?

Options:

A.

Agile

B.

ITIL

C.

DevOps

D.

Orchestration

Buy Now
Questions 30

What happens when a link in a link aggregation group is lost?

Options:

A.

All the network traffic is held in the queue until the link is repaired.

B.

All network traffic on that link is redistributed to another link aggregation group.

C.

All the network traffic is resent by the sender after the link is repaired.

D.

All network traffic on that link is redistributed across the remaining links in that group.

Buy Now
Questions 31

What refers to an agreement between provider and consumer that states the terms of service usage?

Options:

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

Buy Now
Questions 32

Which is a benefit of implementing target-based deduplication?

Options:

A.

Offloads the backup client from the deduplication process

B.

Reduces storage capacity and network bandwidth requirements

C.

Backup client sends only new and unique segments across the network

D.

Optimizes ROBO environments for centralized backup

Buy Now
Questions 33

Which tool should be recommended to customers for Infrastructure automation?

Options:

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Buy Now
Questions 34

What is true of a cloud service design best practice?

Options:

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Buy Now
Questions 35

What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center?

Options:

A.

IT resources are configured for peak usage

B.

IT resources are provisioned on demand

C.

IT resources are rented as services

D.

IT resources are provisioned as self-service

Buy Now
Questions 36

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

Options:

A.

Self-service portal

B.

Application Programming Interface

C.

Orchestrator

D.

Service Catalog

Buy Now
Exam Code: D-CIS-FN-01
Exam Name: Dell Cloud Infrastructure and Services Foundations v2 Exam
Last Update: Jan 8, 2026
Questions: 122

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99