Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Veeam VMCA2022 Veeam Certified Architect 2022 Exam Practice Test

Page: 1 / 11
Total 108 questions

Veeam Certified Architect 2022 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

During architectural planning meetings, Veeam Financial Services inquires about reducing the recovery point objective for silver tier workloads from 24 hours to 12 hours while keeping the retention at 14 days. Which Veeam component(s) will change their sizing requirements as a result?

Options:

A.

Veeam repository and proxy roles.

B.

Veeam Backup & Replication server role.

C.

Veeam gateway servers.

D.

The Veeam mount server.

Question 2

Veeam Financial Services has expressed concern about ensuring backups are free of malware before data is restored. How would you accomplish this?

Options:

A.

Ensure a compatible antivirus solution is available in a virtual lab for a staged restore.

B.

Ensure the Veeam Data Integration API is accessible from a virtual lab for a secure restore.

C.

Ensure the Veeam Data Integration API is accessible on mount servers for staged restores.

D.

Ensure a compatible antivirus solution is available on mount servers for secure restores.

Question 3

A remote office has an eight-node vSphere cluster with VSAN storage. After performing the sizing

calculations, it is determined that the proxy role will require 64 CPUs and 128 GB of RAM to meet the stated backup SLAs. How should these proxies be deployed?

Options:

A.

Deploy a single physical server with 64 CPUs and 128 GB of RAM.

B.

Deploy two physical proxies with 32 CPUs and 64 GB of RAM.

C.

Deploy four virtual proxies with 16 CPUs and 32 GB of RAM.

D.

Deploy eight virtual proxies with eight CPUs and 16 GB of RAM.

Question 4

After further discussion, it was determined that the customer has taken sufficient steps to secure the NFS network so that in-flight encryption is no longer required. You have decided to deploy VMware backup proxies as virtual machines per cluster to satisfy the scale out-requirement for proxies. Which processing modes are preferred for the NFS datastores? (Choose 2)

Options:

A.

Backup from Storage Snapshots

B.

Network (NBD) mode

C.

Virtual Appliance (HotAdd) mode

D.

Network mode with Encryption (NBDSSL)

E.

Direct NFS

Question 5

Veeam Financial Services performed a proof of concept of the design outlined in the architecture. Backups completed successfully, but it was determined that the offloading of data to public cloud storage is consuming all available bandwidth on several branch sites and business applications are lacking performance as a result. What adjustments within the Veeam Infrastructure would best address this issue?

Options:

A.

Configure Network Traffic Rules.

B.

Increase the compute resources on the repository servers at each site.

C.

Increase the proxy compute resources at each site.

D.

Add WAN accelerators to each site

Question 6

One of Veeam Financial Services’ mission critical applications needs to be backed up daily. This Linux virtual machine is susceptible to snapshot stun. Based on business requirements, how should this be accomplished?

Options:

A.

Perform the backup using a Veeam agent.

B.

Perform a normal virtual machine backup on the workload without application aware processing.

C.

Run pre-freeze and post-thaw scripts before backing up the workload.

D.

Perform the backup using application aware processing.

Question 7

In order to satisfy the customer´s data scrubbing requirement, what Veeam components will be required?

Options:

A.

SureReplica job and application group.

B.

SureBackup job, virtual lab and application group.

C.

Virtual lab, proxy appliance and SureBackup job.

D.

Virtual lab, application group and script.

Question 8

Immutability of the offsite backups is a constraint on this project. Which of the following is

presumed to be an additional condition of your offsite backup?

Options:

A.

All data must be retained for you years.

B.

All gold and silver machine backups must be verified and scanned for malware before restoring.

C.

Backups must be stored in a Windows-based logical scalable storage system.

D.

A copy of backup data must reside in a public cloud local to each region.

Question 9

Veeam Financial Services has expressed concern that the backups for their virtualized stock tradingapplication meet all stated technical and business requirements. Which Veeam backup method should be

used?

Options:

A.

Backup the virtual machines using a Veeam agent.

B.

Separate the virtual machine into its own job and enable application aware processing.

C.

Run pre-freeze and post-thaw scripts on the virtual machines running the trading application.

D.

Create a replication job at each site with the corresponding remote site as the target.

Question 10

Veeam Financial Services received notification from their legal team that retention of backups should be five years on-site instead of four. What component sizing should be adjusted?

Options:

A.

The amount of object storage purchased in a public cloud for archival purposes.

B.

Physical storage in the repositories.

C.

The CPU and memory of the Veeam Backup & Replication database.

D.

CPU and memory requirements for the Veeam repositories.

Question 11

While looking through the requirements regarding database servers, you see that Veeam should manage the database backups and logs. Which configurations should you check for that are unsupported base on the technical requirements?

Options:

A.

Physical windows server with Oracle.

B.

Oracle cluster configurations.

C.

Virtual machines with physical raw device mapping.

D.

Virtual machines with Oracle Automatic Storage Management storage.

Question 12

Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?

Options:

A.

Implement Wan accelerator.

B.

Use a dedicated Veeam Backup & Replication server just for replication.

C.

Recommend migrating some of the VMDKs to alternative datastore.

D.

Replicate to a single VMware datastore used just for replicas.

Question 13

Consider the requirements regarding immutable or air gapped and different types of workloads. Which types of jobs do not support using immutability from S3 Object Lock or Hardened Repository and will need a different solution?

Options:

A.

Backup copy jobs with GFS enable.

B.

NAS backups.

C.

Backup Jobs.

D.

Scale-out Backup Repository offloads to Archive Tier to Amazon Glacier.

Question 14

Which strategy will satisfy the customer’s requirements for protection against ransomware?

Options:

A.

Deploy a Scale-out Backup Repository with Linux repositories and configure capacity tier to offload to immutable cloud storage.

B.

Deploy ReFS Scale-out Backup Repositories, and perform a backup copy to a different repository at the same time.

C.

Configure Linux Scale-out Backup Repositories in different physical locations and configure backup copy jobs in immediate mode.

D.

Deploy a ReFS Scale-Out Backup Repository and configure for immutability.

Question 15

Veeam University Hospital perform a proof of concept of the design outline in the architecture. Backups completed successfully, but it is determined that backup copy jobs between sites are not completing in the required timeframe. During the result analysis, it was discovered that the bandwidth between sites was heavily saturated. What adjustments within the Veeam infrastructure would best address this issue?

Options:

A.

Increase the proxy computer resources at each site.

B.

Increase the computer resources on the repository servers at each site.

C.

Add WAN accelerators to each site.

D.

Have the customer implement Quality of Service on their WAN connections.

Question 16

In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam University Hospital do?

Options:

A.

Remove all remote access from Veeam administrators.

B.

Implement a strong password security policy on shared administrative accounts.

C.

Ensure that none of the Veeam components are on the production Active Directory domain.

D.

Protect the Veeam components on the production Active Directory Forest with multi-factor authentication.

Question 17

During the deployment, Veeam University Hospital management has asked that the backup window be shortened to eight hours. What is a possible ramification of this change?

Options:

A.

The size of the Veeam Backup & Replication database will increase.

B.

The CPU and memory requirements of the proxies will be increased.

C.

The amount of storage required in the repositories will be increased.

D.

The CPU and memory requirements of the mount server(s) will be increased.

Question 18

Which environmental parameter is affected a possible SureBackup job design? (Choose 2)

Options:

A.

Veeam University Hospital has VMware clusters in all locations. For security purposes, each cluster is dedicated to the department that it serves.

B.

Virtual machines are stored on VMware encrypted datastores.

C.

Each site as a 10 GbE link to the public internet, and all traffic between sites routed through these connections via VPN.

D.

The current backups write to NFS storage.

E.

Each site has 20 vLANs in use, with 16 being used for VMware workloads.

Question 19

The customer confirms that their database are Windows based. What assumption does using the script for the in-house database present?

Options:

A.

The script requires environmental variable.

B.

The script requires special privilege escalation on the target application.

C.

The script already exists and is solely managed by the customer.

D.

The script modifies the target virtual machine’s registry.

Question 20

Based on the customer Windows and Linux file server backup requirements, which component will help them meet their stated objectives?

Options:

A.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role.

B.

Add Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policy.

C.

Add a Windows Server, enable indexing of backups and ensure authenticated users are configured to appropriate AD Groups policies.

D.

Use Backup Enterprise Manager with indexing enabled on virtual machine and Agent backups with RBAC policies.

Question 21

Which of the following is risk for this project?

Options:

A.

The backup solution must support VMware encrypted datastores.

B.

End-user laptop backups must have a recovery time objective of 30 minutes.

C.

Data must be replicate with one-hour recovery point objective.

D.

Linux and Windows files server backups must be searchable during a self-service restore.

Question 22

During a proof of concept deployment at Veeam University Hospital, it is noted that only some of the backup files in a specific Scale-out Backup Repository are immutable. What can cause this behavior?

Options:

A.

The ReFS extents do not have immutable enabled.

B.

Not all XFS extents in the Scale-out Backup Repository performance tier have the required flag enable.

C.

All extents in the Scale-out Backup Repository performance tier are ReFS.

D.

Not all EXT in the Scale-out Backup Repository performance archive tier have the required flag enabled.

Question 23

Based on customer recovery requirements, which component will help them meet their stated objectives?

Options:

A.

Add a Windows server and enable encryption of backups to ensure alternative decryption capabilities.

B.

Deploy and configure Enterprise Manager with RBAC policies.

C.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role

D.

Add a Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policies.

Question 24

You are trying to determine which feature would work the reliably for excluding the H: drive on MSSQL server virtual machines. The MSSQL servers are built on demand, not from virtual machine templates. Which is the preferred method to achieve this requirement?

Options:

A.

Set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine.

B.

Use the Exclusion tab under Guest Processing > Applications for VM backups to exclude the H: volume in MSSQL jobs.

C.

Use Veeam Agent Backups and set up Volume Backups and include everything but H:

D.

Use Veeam Agent Backups and use the Exclusions tab under Gest Processing > Application for MSSQL jobs.

Question 25

What is the retention requirement for gold tier virtual machines?

Options:

A.

Must have on-premises backup on hardened backup repositories.

B.

Gold tier virtual machines have a recovery point objective of one hour for imagen backup and 15 minutes for transaction lob backup.

C.

Eight weekly backups, three monthly backups and seven yearly backups.

D.

Gold tier virtual machine retention must be 14 daily, eight weekly, three monthly and seven yearly backups.

Question 26

What assumption can be made for the conceptual design?

Options:

A.

All new backup storage should utilize Windows ReFS block cloning.

B.

Tape backups of all servers will be used for ransomware protection.

C.

Veeam Agent backups of sale staff laptops should be managed by the backup server.

D.

VMware tagging will be used to enable dynamic scoping of backups.

Question 27

You are examining the requirement: “If possible, the data written must be unchangeable to prevent ransomware attacks.” Which types of jobs do not support using immutability from S3 Object Lock or hardened repositories? (Choose two)

Options:

A.

NAS backups

B.

Linux Agent backup copy jobs

C.

VMware backup jobs

D.

Agent for Mac backups

Question 28

Which of the following areas would benefit from additional analysis on areas mentioned in the case study? (Choose 3)

Options:

A.

VMware

B.

MSSQL

C.

NAS

D.

On-premises Exchange

E.

PostgreSQL

F.

Hyper-V

Question 29

During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?

Options:

A.

Deploy Veeam agents configured for failover clustering.

B.

Perform a regular virtual machine backup without application aware processing.

C.

Enable application aware processing on the virtual machine backup job.

D.

Deploy Veeam agents in server mode.

Question 30

While reviewing the technical requirements for gold tier backups requiring periodic backups every hour, you determine this goes against one of the other requirements and you need to get clarification on which on has priority. Which of the following does the recovery point objective requirement directly conflict with?

Options:

A.

All backups must complete within the hours of 5 p.m. to 8 a.m. local time.

B.

Silver tier backups must be tested to verify recoverability.

C.

Eight weekly backups, three monthly backups and seven yearly backups should be retained for regulatory requirements.

D.

All backups must be copied across site of the current backup window to avoid any backup performance issues.

Question 31

What components can help meet the following requirement: “Alternative decryption capabilities on encrypted backups must be possible in the event of lost passwords”?

Options:

A.

Veeam Backup & Replication’s Configuration Backups

B.

Veeam Backup Enterprise Manager

C.

Veeam Backup & Replication’s Extraction Explorer

D.

Veeam Backup & Replication’s Extract Utility

Question 32

What information is missing form discovery?

Options:

A.

What the current LAN bandwidth is at Fresno.

B.

What backup transport mode is currently used.

C.

What type of backup storage is currently used.

D.

What the available bandwidth is between Fresno and Carson City.

Page: 1 / 11
Total 108 questions