Free D-ISM-FN-23 Exam Braindumps (page: 14)

Page 13 of 49

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?

  1. Intrusion-based
  2. Policy-based
  3. Anomaly- Based
  4. Signature-based

Answer(s): D

Explanation:

Signature-based IDPS uses a database that contains known attack patterns or signatures. Each signature is associated with a particular type of attack and the IDPS will look for those patterns in order to identify malicious activity. For example, if the signature in the database is associated with a buffer overflow attack, the IDPS will look for that particular pattern of attack in order to detect the attack.



Cloud tiering is the part of which tier?

  1. Policy
  2. Secondary Storage
  3. Primary Storage
  4. Application

Answer(s): B

Explanation:

Cloud tiering is a technology that automatically moves inactive or infrequently accessed data from high-performance primary storage to lower-cost secondary storage, such as cloud-based object storage. This process is based on policies that are defined by the IT administrator. Cloud tiering is a part of the secondary storage tier, which is typically used for storing inactive or infrequently accessed data that does not require the high performance or low latency of primary storage. The primary storage tier is used for storing active or frequently accessed data that requires high performance and low latency. The application tier is used for hosting applications and services, while the policy tier is used for defining and enforcing data management policies.


Reference:

Section 4.4 Secondary Storage Tier, page 239.



What type of network connectivity is illustrated in the image below?

  1. Compute to storage connectivity
  2. Data center to data center connectivity
  3. Storage to hybrid cloud connectivity
  4. Compute to hybrid cloud connectivity

Answer(s): D



What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP) control?

  1. Enables initiators and targets to authenticate each other by using a shared secret code
  2. Provides strong authentication for client-server applications by using secret-key cryptography
  3. Allows a client to access protected resources from a resource server on behalf of a resource owner
  4. Enables an organization to use authentication services from an identity provider

Answer(s): A






Post your Comments and Discuss Dell D-ISM-FN-23 exam with other Community members:

D-ISM-FN-23 Exam Discussions & Posts