Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Veeam VMCA2022 - Veeam Certified Architect 2022

Page: 2 / 4
Total 108 questions

Immutability of the offsite backups is a constraint on this project. Which of the following is

presumed to be an additional condition of your offsite backup?

A.

All data must be retained for you years.

B.

All gold and silver machine backups must be verified and scanned for malware before restoring.

C.

Backups must be stored in a Windows-based logical scalable storage system.

D.

A copy of backup data must reside in a public cloud local to each region.

During Veeam deployment, Veeam Life and Indemnity has determined that the latency encountered during backup of the virtualized MSSQL Server database running on vSAN is too high. What is the recommended step Veeam Life and Indemnity can take to improve this?

A.

Turn off application-aware processing for the virtualized MSSQL Server database servers.

B.

Use backup from storage snapshot for the virtualized MSSQL Server database servers.

C.

Implement Veeam Agent for Microsoft Windows on the virtualized MSSQL Server database servers.

D.

Use Veeam Replication to create replicas of the virtualized MSSQL Server database servers at the remote site, then backup the replicas.

Which of the following areas would benefit from additional analysis on areas mentioned in the case study? (Choose 3)

A.

VMware

B.

MSSQL

C.

NAS

D.

On-premises Exchange

E.

PostgreSQL

F.

Hyper-V

What can be done to validate that the design meets target SLAs and does not exceed repository growthprotections?

A.

Ensure job throughput matches extensions. Cross-compare with available network throughput, disk speed and initial sizing calculations.

B.

Recommend standalone backup copy jobs are created for gold tier virtual machines that do not successfully backup within one hour.

C.

Export job history for review. Ensure the bottleneck statistics point to source. Turn off indexing for jobs that do not meet SLA requirements.

D.

Use backup file growth report form Veeam ONE to find outliers. Ask business and application teams to delete excess data

What information is missing form discovery?

A.

What the current LAN bandwidth is at Fresno.

B.

What backup transport mode is currently used.

C.

What type of backup storage is currently used.

D.

What the available bandwidth is between Fresno and Carson City.

While going through the discovery data for the NAS environment, you determine several key metrics are missing for later deign and sizing. Which of the following should you collect from the customer about the data stored on the on the NAS per site? (Choose 3)

A.

Retention requirements

B.

Total number of files (in millions) to be backed up

C.

Amount of source data before dedupe and compression

D.

Number of shares and compressed source data

E.

Large file size

The customer states that Veeam Backup & Replication is on the production domain. What direct risks does this present?

A.

Unable to use two-factor authentication.

B.

Compromised Domain Admin could gain access.

C.

Cannot access the REST interface.

D.

Compromised Domain User could gain access.

You are trying to determine which feature would work the reliably for excluding the H: drive on MSSQL server virtual machines. The MSSQL servers are built on demand, not from virtual machine templates. Which is the preferred method to achieve this requirement?

A.

Set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine.

B.

Use the Exclusion tab under Guest Processing > Applications for VM backups to exclude the H: volume in MSSQL jobs.

C.

Use Veeam Agent Backups and set up Volume Backups and include everything but H:

D.

Use Veeam Agent Backups and use the Exclusions tab under Gest Processing > Application for MSSQL jobs.

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?

A.

Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.

B.

Create secure restore to ensure malware-free backups.

C.

Create a virtual lab environment and periodically perform staged restores with custom scripts.

D.

Scan backups with Veeam ONE to remove personally identifiable information.

Based on customer recovery requirements, which component will help them meet their stated objectives?

A.

Add a Windows server and enable encryption of backups to ensure alternative decryption capabilities.

B.

Deploy and configure Enterprise Manager with RBAC policies.

C.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role

D.

Add a Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policies.