Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free EMC D-CIS-FN-01 Practice Exam with Questions & Answers

Questions 1

Identify the bare-metal hypervisors?

Options:
A.

Solaris Zones and VMware Workstation

B.

ESXI and Hyper-V

C.

ESXI and VMware Fusion

D.

Oracle Virtual Box and Hyper-V

EMC D-CIS-FN-01 Premium Access
Questions 2

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

Options:
A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Questions 3

Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down?

Options:
A.

Checkpointing

B.

Monitoring Application Availability

C.

Graceful Degradation

D.

Retry Logic

Questions 4

Why do organizations take advantage of virtual infrastructure?

Options:
A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Questions 5

What is used to update information in a configuration management database?

Options:
A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Questions 6

What is a key responsibility of a security governance board?

Options:
A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Questions 7

What activity is performed during the service creation phase of the cloud service lifecycle?

Options:
A.

Defining Service Template

B.

Developing Service Enablement Roadmap

C.

Assessing Service Requirements

D.

Establishing Billing Policy

Questions 8

What is a benefit of data archiving?

Options:
A.

Increases deduplication ratio and reduces storage costs

B.

Avoids performing data backups frequently

C.

Preserves data for future reference and adherence to regulatory compliance

D.

Moves frequently accessed data to lower-cost archive storage

Questions 9

What is the objective of Confidentiality in information security?

Options:
A.

Prevents an unauthorized user from changing data

B.

Non-repudiation and authenticity of information

C.

Ensures that identify credentials are used to verify cloud assets

D.

Restricts user access to data held within the cloud

Questions 10

What condition can result in the development of a "shadow IT" organization?

Options:
A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology