D-CIS-FN-01 Free Sample Questions

D Cis Fn 01 Practice Test
10/174 questions ยท Unlock full access
Q1

A financial services firm is migrating its on-premises data warehouse to a hybrid cloud model. To comply with industry regulations, the firm must ensure that data encryption keys are never accessible to the cloud provider. The security team has mandated a solution where key generation, storage, and management remain entirely within the firm's on-premises hardware security module (HSM). Which security control mechanism meets this stringent requirement?

Q2Multiple answers

An organization is implementing the 3-2-1 backup rule for its critical data. The primary data resides on a Dell EMC VxRail cluster. Which actions align with the principles of this rule? (Select THREE)

Q3

A retail company runs a monolithic e-commerce application on-premises. The application is difficult to scale during peak shopping seasons, and deploying new features takes months. The company wants to improve agility and scalability. The application's core business logic is sound, but its components are tightly coupled. They want to move to the cloud without a complete rewrite, while enabling individual services (like payment processing and inventory) to be scaled and updated independently. Which application modernization approach is most suitable?

Q4

A startup is leveraging a public cloud provider to rapidly deploy its new application. The development team can provision virtual machines and storage resources through a web portal without needing to interact with the cloud provider's staff or submit support tickets. This capability is an example of which essential characteristic of cloud computing?

Q5

A cloud service provider guarantees 99.95% uptime for its compute service in the Service Level Agreement (SLA). Over the past month, an operations team has been tracking the service's performance and noticed that the actual uptime was 99.91%. Which operational management process is responsible for identifying this discrepancy and initiating corrective action?

Q6

An architect is designing a high-availability solution for a critical database. The requirement is to withstand the failure of a single server without any service interruption. The budget is constrained, so the most cost-effective solution that meets the requirement is preferred. The following diagram illustrates a potential configuration. Which fault tolerance mechanism does this configuration represent? ```mermaid graph TD subgraph Cluster DB1[DB Server 1] DB2[DB Server 2] DB3[DB Server 3] end LB(Load Balancer) --> DB1 LB --> DB2 LB --> DB3 ```

Q7

A rapidly growing company is deploying a new private cloud environment. They need a solution that simplifies management by integrating compute, storage, and networking into a single, software-defined platform. Their primary goal is operational simplicity and rapid, scalable deployment of virtualized workloads. For a secondary project, they also need a highly scalable, block-based storage solution that can be deployed on commodity hardware, independent of the compute nodes. Which Dell products are best suited for these two distinct requirements?

Q8

True or False: Multi-factor authentication (MFA) protects against account hijacking solely by requiring a user to provide a complex password that meets specific length and character requirements.

Q9

**Case Study** Global Bank Inc. is a multinational financial institution subject to stringent regulatory requirements, including GDPR and local financial data sovereignty laws. Their primary data center is in Frankfurt, Germany. The bank's core transaction processing system runs on-premises and is critical to their daily operations. The board has mandated a robust business continuity plan to ensure operations can resume quickly after a regional disaster, such as a prolonged power outage affecting the entire Frankfurt metropolitan area. The Chief Technology Officer (CTO) has defined the following business continuity objectives: In the event of a disaster, the transaction system must be operational within 1 hour (RTO = 1 hour), and no more than 15 minutes of transaction data can be lost (RPO = 15 minutes). The disaster recovery (DR) solution must also comply with data sovereignty laws, meaning all data, including backups and replicated data, must remain within Germany. The IT team is evaluating different DR strategies. The proposed DR site is in a separate availability zone in Munich, Germany, hundreds of kilometers away. The network link between Frankfurt and Munich is high-speed and reliable. The team needs to choose a DR site type and a data replication method that meets the RTO, RPO, and compliance requirements. Given the requirements, what is the most appropriate DR solution for Global Bank Inc.?

Q10

A software development company is choosing a cloud service model for its new application. The company wants to manage the application and its data, but wants to avoid managing the underlying operating system, patching, and server hardware. They need a platform that provides the runtime environment, database, and web server, allowing their developers to focus solely on writing and deploying code. Which cloud service model fits these requirements?