Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

VMCA2022 Questions and Answers

Question # 6

Which Veeam feature can be used to help achieve compliance with privacy regulations?

A.

Preferred networks.

B.

Location tags on Veeam Backup & Replication servers.

C.

Location tags on the subnets.

D.

Location tags on repositories.

Full Access
Question # 7

Veeam Financial Services has expressed concern about ensuring backups are free of malware before data is restored. How would you accomplish this?

A.

Ensure a compatible antivirus solution is available in a virtual lab for a staged restore.

B.

Ensure the Veeam Data Integration API is accessible from a virtual lab for a secure restore.

C.

Ensure the Veeam Data Integration API is accessible on mount servers for staged restores.

D.

Ensure a compatible antivirus solution is available on mount servers for secure restores.

Full Access
Question # 8

Veeam Financial Services performed a proof of concept of the design outlined in the architecture. Backups completed successfully, but it was determined that the offloading of data to public cloud storage is consuming all available bandwidth on several branch sites and business applications are lacking performance as a result. What adjustments within the Veeam Infrastructure would best address this issue?

A.

Configure Network Traffic Rules.

B.

Increase the compute resources on the repository servers at each site.

C.

Increase the proxy compute resources at each site.

D.

Add WAN accelerators to each site

Full Access
Question # 9

After further discussion, it was determined that the customer has taken sufficient steps to secure the NFS network so that in-flight encryption is no longer required. You have decided to deploy VMware backup proxies as virtual machines per cluster to satisfy the scale out-requirement for proxies. Which processing modes are preferred for the NFS datastores? (Choose 2)

A.

Backup from Storage Snapshots

B.

Network (NBD) mode

C.

Virtual Appliance (HotAdd) mode

D.

Network mode with Encryption (NBDSSL)

E.

Direct NFS

Full Access
Question # 10

Based on documented requirements, which information is still needed for a complete architectural design?

A.

Daily backup retention.

B.

How often backups are required for silver machines.

C.

Amount of time required for a successful restore for gold machine.

D.

RMAN configuration guidelines.

Full Access
Question # 11

During Veeam deployment, Veeam Financial Services has determined that the latency encountered during backup of the virtualized stock trading application servers running on VSAN is too high. What is the

recommended step Veeam Financial Services can take to improve this?

A.

Use backup from storage snapshot for the virtualized stock trading application servers.

B.

Implement Veeam Agent on the virtualized stock trading application servers.

C.

Use Veeam Replication to create replicas of the virtualized stock trading application servers at the remote site, then back up the replicas.

D.

Turn off application-aware processing for the virtualized stock trading application servers.

Full Access
Question # 12

What can be done to validate that the design meets target SLAs and does not exceed repository growthprotections?

A.

Ensure job throughput matches extensions. Cross-compare with available network throughput, disk speed and initial sizing calculations.

B.

Recommend standalone backup copy jobs are created for gold tier virtual machines that do not successfully backup within one hour.

C.

Export job history for review. Ensure the bottleneck statistics point to source. Turn off indexing for jobs that do not meet SLA requirements.

D.

Use backup file growth report form Veeam ONE to find outliers. Ask business and application teams to delete excess data

Full Access
Question # 13

Which of the following areas would benefit from additional analysis on areas mentioned in the case study? (Choose 3)

A.

VMware

B.

MSSQL

C.

NAS

D.

On-premises Exchange

E.

PostgreSQL

F.

Hyper-V

Full Access
Question # 14

Veeam Life and Indemnity informs you that they have experienced issues with the time to back up file data from the existing legacy NAS backup. The NAS is being backed up at file level with a low change rate. The source capacity to back up is 12 TB connected to a 10 GbE switch over eight hours. What assumptions about the current environment could you draw from this?

A.

The file path is over 256 characters long.

B.

AD permissions are set at file level.

C.

The files on the NAS are large

D.

The files on the NAS are small.

Full Access
Question # 15

Based on the customer’s security requirements around restore capabilities, which components should be deployed?

A.

Veeam Business view with RBAC policies defined

B.

The Veeam Backup & Replication console with RABC policies defined

C.

Veeam Oracle integrations

D.

Enterprise Manager with granular RABC policies defined

Full Access
Question # 16

What assumption can be made for the conceptual design?

A.

All new backup storage should utilize Windows ReFS block cloning.

B.

Tape backups of all servers will be used for ransomware protection.

C.

Veeam Agent backups of sale staff laptops should be managed by the backup server.

D.

VMware tagging will be used to enable dynamic scoping of backups.

Full Access
Question # 17

Which type of backup job will you need more informacion on to properly plan backup copy job settings later to make sure you are creating the required number of restore point per day offsite?

A.

Bronze tier backup jobs

B.

Silver tier backup jobs

C.

Gold tier backup jobs

D.

Laptop backup jobs

Full Access
Question # 18

The customer has expressed concerns based on their technical requirements regarding the gold tier virtual machines and the recoverability of backup files. How can the recoverability testing be accomplished to meet the customer’s requirements?

A.

User the storage level corruption guard to do a health check

B.

Select the backup file in the Veeam backup & Replication console and click “verify backup”

C.

Create a virtual lab in the customer’s environment, and then Surebackup jobs to verify backups.

D.

Perform a test of replica and ensure the failover completes successfully

Full Access
Question # 19

Based on Customer requirements, how should virtual machine backups be scoped? (Choose 2)

A.

Create backups based on tags.

B.

Create backups based on protection groups create with a CSV file.

C.

Create backups based on resource pools

D.

Create backups jobs with same retention requirements.

E.

Scope each backup based the software running in each workload

Full Access
Question # 20

You are examining the requirement: “If possible, the data written must be unchangeable to prevent ransomware attacks.” Which types of jobs do not support using immutability from S3 Object Lock or hardened repositories? (Choose two)

A.

NAS backups

B.

Linux Agent backup copy jobs

C.

VMware backup jobs

D.

Agent for Mac backups

Full Access
Question # 21

What components can help meet the following requirement: “Alternative decryption capabilities on encrypted backups must be possible in the event of lost passwords”?

A.

Veeam Backup & Replication’s Configuration Backups

B.

Veeam Backup Enterprise Manager

C.

Veeam Backup & Replication’s Extraction Explorer

D.

Veeam Backup & Replication’s Extract Utility

Full Access
Question # 22

Gold tier virtual machines have a recovery point objective of one hour for image backup. Which transport mode could you use during the redesign? (Choose 2)

A.

Virtual Appliance (HotAdd)

B.

Direct SAN Access

C.

Network mode (NBDSSL)

D.

Direct NFS Access

E.

Backup from Storage Snapshots

Full Access
Question # 23

Consider the requirements regarding immutable or air gapped and different types of workloads. Which types of jobs do not support using immutability from S3 Object Lock or Hardened Repository and will need a different solution?

A.

Backup copy jobs with GFS enable.

B.

NAS backups.

C.

Backup Jobs.

D.

Scale-out Backup Repository offloads to Archive Tier to Amazon Glacier.

Full Access
Question # 24

while going through the discovery data for the NAS environment, you determine several key metrics are missing for later design and sizing. Which of the following should you collect from the customer about the data stored on the NAS per site? (Choose 2)

A.

Which version of SMB protocol the NAS supports.

B.

Amount of source data after dedupe and compression.

C.

Total number of files (in millions) to be backed up.

D.

Amount of source data before dedupe and compression.

E.

Largest file size.

Full Access
Question # 25

Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?

A.

Implement Wan accelerator.

B.

Use a dedicated Veeam Backup & Replication server just for replication.

C.

Recommend migrating some of the VMDKs to alternative datastore.

D.

Replicate to a single VMware datastore used just for replicas.

Full Access
Question # 26

During deeper technical discovery it was uncovered that that the customer also has a Fibre Channel SAN that needs protection. Veeam University Hospital asks about the option of performing backup from storage snapshots. What component(s) will this require?

A.

Veeam backup proxies and repositories running on the servers.

B.

Veeam backup proxies running on physical servers.

C.

Veeam backup proxies running the Windows servers.

D.

Veeam backup proxies running on Linux serves.

Full Access
Question # 27

The customer has asked you to review their existing backup storage. Jobs show the target is the bottleneck. What steps should you take to improve performance?

A.

Make sure the gateway has enough CPU, RAM and enough task slots assigned.

B.

Put a repository component on its own physical server, ensuring it has enough CPU, RAM and task slots assigned.

C.

Look at the transport modes used.

D.

No action is needed. It is an optimal design already, there is always something that is bottleneck.

Full Access
Question # 28

Why is it recommended to have a Veeam backup server at each of the three sites?

A.

VMware cluster isolation.

B.

Replication requires a backup server at each site.

C.

VPN connections sites.

D.

Each site has production data.

Full Access
Question # 29

The customer has stated that synthetic operations and backups copy jobs must be completed in the desired window. Which components should be sized correctly to ensure that this will be successful?

A.

Proxy and repository servers.

B.

Repository and gateway servers.

C.

Proxy and gateway servers.

D.

Veeam Backup & Replication and gateway servers.

Full Access
Question # 30

During a proof of concept deployment at Veeam University Hospital, it is noted that only some of the backup files in a specific Scale-out Backup Repository are immutable. What can cause this behavior?

A.

The ReFS extents do not have immutable enabled.

B.

Not all XFS extents in the Scale-out Backup Repository performance tier have the required flag enable.

C.

All extents in the Scale-out Backup Repository performance tier are ReFS.

D.

Not all EXT in the Scale-out Backup Repository performance archive tier have the required flag enabled.

Full Access
Question # 31

What is the minimum requirement for on-premises backup retention for this project?

A.

Must have least one copy of protected data on-premises.

B.

On-premises retention must be 14 daily, and two weekly backups.

C.

A GFS schedule of seven daily, six weekly and three monthly.

D.

Must have on-premises backups on immutable or air gapped media.

Full Access
Question # 32

How would you configure replication with seeding, considering this deployment will have a Veeam Backup Server in both the primary and secondary site?

A.

On the Veeam Backup & Replication server at the primary site, create a backup job of the source machine from the primary site. At the secondary site import seeding data from this backup job. Create a replica job pointing to this backup job using re-mapping.

B.

On the Veeam Backup & Replication server at the primary site, create a backup job and backup copy job sending data to the secondary site. At the secondary site, create a replica job pointing to therepository with the backup copy data.

C.

On the Veeam Backup & Replication server at the primary site, create a backup job of the source virtual machine from the primary site. At the secondary site, create a replica job pointing to the repository with the backup job data.

D.

On the Veeam Backup & Replication server at the secondary site, create a backup job of the source virtual machine from the primary site. At the secondary site, create a backup copy job pulling the data from the primary and create a replica job pointing to the repository with the backup copy data.

Full Access