Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free EMC D-ISM-FN-01 Practice Exam with Questions & Answers

Questions 1

Question:

In continuous data protection, what does the amount of journal space determine?

Options:
A.

How far back the data can be recovered

B.

Amount of space the source and replica volumes require

C.

Length of time required to recover the data

D.

Amount of data that can be restored to a specific point

EMC D-ISM-FN-01 Premium Access
Questions 2

Question:

Refer to the Exhibit:

D-ISM-FN-01 Question 2

Identify the following FC Frame fields:

Options:
A.

1: Frame header, 2: CRC, 3: Data field

B.

1: CRC, 2: Data field, 3: Frame header

C.

1: Frame header, 2: Data field, 3: CRC

D.

1: CRC, 2: Frame header, 3: Data field

Questions 3

Question:

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

Options:
A.

Session

B.

Data Link

C.

Transport

D.

Presentation

Questions 4

Question:

A company needs to ensure high availability for its applications and minimize downtime in case of a disk failure. The current storage configuration is a RAID 0 array with SSDs. Which RAID level is most cost effective and would provide the necessary data protection without significant performance degradation?

Options:
A.

Migrate to a RAID 5 array with SSDs for parity-based protection

B.

Implement a RAID 1 array with SSDs for disk mirroring

C.

Maintain the existing RAID 0 configuration with SSDs

D.

Upgrade to a RAID 6 array with SSDs for dual parity protection

Questions 5

Question:

Which RAID level consists of two disk drives and every write is written to both disks?

Options:
A.

RAID 5

B.

RAID 1

C.

RAID 1+0

D.

RAID 6

Questions 6

Question:

Which information is contained in a stub file?

Options:
A.

Address of the archived file

B.

Address of the source file

C.

Name and size of the archived file

D.

Hard drive address storing the archived file

Questions 7

Question:

A company is concerned about unauthorized access to its sensitive data. They want to implement security measures to ensure that only authorized users can access the data. Which goal of information security are they primarily addressing?

Options:
A.

Availability

B.

Accountability

C.

Confidentiality

D.

Integrity

Questions 8

Question:

What is the maximum number of VLANs that can be supported with one VLAN tag field?

Options:
A.

1024

B.

2048

C.

4096

D.

8192

Questions 9

Match each OSD (Object Storage Device) feature with its description:

D-ISM-FN-01 Question 9

Options:
Questions 10

Question:

A company needs to rebuild a failed disk in its RAID 5 array. Which two factors would significantly impact the rebuild time?

Options:
A.

Network bandwidth between the server and the storage array

B.

Write performance of the remaining disks

C.

Capacity of the failed disk

D.

Capacity of the cache memory