ExamGecko

VEEAM VMCA2022 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Question 1

Report
Export
Collapse

It has been determined that the onsite repositories need to be immutable. How should the repositories be configured to easily allow for additional capacity to be added?

A.

Stand-alone repositories using NTFS.

A.

Stand-alone repositories using NTFS.

Answers
B.

Scale-out Backup Repositories consisting of hardened ReFS repositories.

B.

Scale-out Backup Repositories consisting of hardened ReFS repositories.

Answers
C.

Stand-alone repositories using the XFS file system.

C.

Stand-alone repositories using the XFS file system.

Answers
D.

Scale-out Backup Repositories consisting of hardened repositories.

D.

Scale-out Backup Repositories consisting of hardened repositories.

Answers
Suggested answer: D

Explanation:

The repositories should be configured as Scale-out Backup Repositories consisting of hardened repositories to easily allow for additional capacity to be added and to meet the immutability requirement.Scale-out Backup Repository is a logical entity that groups several backup repositories into a single pool of storage, and allows to add or remove backup repositories as needed1.Hardened repository is a Linux-based backup repository with immutability enabled, which prevents backup files from being modified or deleted until the specified retention period expires2.The other options are either not immutable (option A and C, as NTFS and XFS do not support immutability) or not scalable (option B, as ReFS does not support adding or removing extents in a Scale-out Backup Repository3).Reference:Scale-out Backup Repository,Hardened Repository,ReFS Limitations.

asked 27/11/2024
Joseph Washington
42 questions

Question 2

Report
Export
Collapse

It has been determined that the onsite repositories need to be immutable. Which configuration would ensure SLA compliance and provide protection against ransomware?

A.

Provide a Veeam Backup & Replication server with Veeam replication and enable XFS with immutability on NFS targets.

A.

Provide a Veeam Backup & Replication server with Veeam replication and enable XFS with immutability on NFS targets.

Answers
B.

Leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

B.

Leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

Answers
C.

Leverage ReFS repositories as a primary target with a backup copy to a second site and offload to object storage in a public cloud with immutability enabled.

C.

Leverage ReFS repositories as a primary target with a backup copy to a second site and offload to object storage in a public cloud with immutability enabled.

Answers
D.

Provide Veeam Backup & Replication servers at two locations and leverage object storage.

D.

Provide Veeam Backup & Replication servers at two locations and leverage object storage.

Answers
Suggested answer: B

Explanation:

Immutable repositories are backup storage locations that prevent unauthorized modifications or deletions of backup data, ensuring its integrity and recoverability.Immutable repositories are essential for protecting backups against ransomware attacks, accidental deletions, or malicious insiders1.

Veeam Backup & Replication supports several types of immutable repositories, such as hardened repositories, immutable object storage repositories, and immutable deduplicating storage appliances2. Among these options, the best configuration for ensuring SLA compliance and providing protection against ransomware is to leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

Hardened repositories are Linux-based repositories that use XFS file system with immutability flag to protect backup files from changes or removals.Hardened repositories can be used as primary or secondary backup targets, and can be combined with Veeam Scale-out Backup Repository to simplify backup management and optimize storage utilization3.

Object storage repositories are cloud-based repositories that use object storage services, such as Amazon S3, Microsoft Azure Blob Storage, or Google Cloud Storage, to store backup data. Object storage repositories can be used as secondary backup targets, and can leverage the immutability feature of the cloud provider to prevent backup data from being overwritten or deleted.

By using hardened repositories at both primary and secondary sites, you can achieve high availability and redundancy for your backup data, as well as fast and reliable restores. By offloading to object storage in a public cloud with immutability enabled, you can achieve long-term retention and compliance, as well as cost savings and scalability. This configuration also follows the 3-2-1-1 backup rule, which recommends having three copies of data, on two different types of media, with one copy off-site and one copy immutable.

You can find more information about immutable repositories and how to configure them in the following resources:

Immutable Backup Solutions: Linux Hardened Repository

Unstructured Data Backups in Immutable Repositories

Hardened Repository

[Immutability for Object Storage Repositories]

[3-2-1-1 Backup Rule]

asked 27/11/2024
Vanildo Pedro
38 questions

Question 3

Report
Export
Collapse

examining the list of requirements, you notice that it is necessary to have backups encrypted. If you use Veeam's native encryption, which repository type will be the most impacted?

A.

Dedupe repositories

A.

Dedupe repositories

Answers
B.

Immutable Linux Repository with XFS reflink cloning

B.

Immutable Linux Repository with XFS reflink cloning

Answers
C.

NFS share repository

C.

NFS share repository

Answers
D.

Windows ReFS with block cloning

D.

Windows ReFS with block cloning

Answers
Suggested answer: A

Explanation:

The repository type that will be most impacted by using Veeam's native encryption is dedupe repositories. Dedupe repositories are backup repositories that use deduplication appliances or software to reduce backup size and optimize storage utilization. However, if you use Veeam's native encryption for backup jobs that target dedupe repositories, you will lose most of the deduplication benefits, as encrypted data blocks cannot be deduplicated effectively. Therefore, it is recommended to use either the encryption feature of the deduplication device or software, or avoid encryption altogether for dedupe repositories.

asked 27/11/2024
CHARLES ADAMA
34 questions

Question 4

Report
Export
Collapse

Which type of backup job will you need more informacion on to properly plan backup copy job settings later to make sure you are creating the required number of restore point per day offsite?

A.

Bronze tier backup jobs

A.

Bronze tier backup jobs

Answers
B.

Silver tier backup jobs

B.

Silver tier backup jobs

Answers
C.

Gold tier backup jobs

C.

Gold tier backup jobs

Answers
D.

Laptop backup jobs

D.

Laptop backup jobs

Answers
Suggested answer: C

Explanation:

The gold tier backup jobs have the most stringent recovery point objective (RPO) of one hour for image backup and 15 minutes for transaction log backup. This means that they need to run more frequently than the other backup jobs and create more restore points per day. Therefore, to properly plan the backup copy job settings, you will need more information on the gold tier backup jobs, such as the number of VMs, the size of backups, the change rate, the retention policy, and the bandwidth available for copying backups to the offsite location.

asked 27/11/2024
Chuck Crouse
49 questions

Question 5

Report
Export
Collapse

What information related to the virtual infrastructure is missing and must be collected during the discovery phase) (Choose 2)

A.

Number of vSphere clusters

A.

Number of vSphere clusters

Answers
B.

Backup window

B.

Backup window

Answers
C.

Recovery time objective

C.

Recovery time objective

Answers
D.

Total of virtual machines

D.

Total of virtual machines

Answers
E.

Number of scale-out Backup Repository extents currently used

E.

Number of scale-out Backup Repository extents currently used

Answers
Suggested answer: A, D

Explanation:

The number of vSphere clusters and the total of virtual machines are important information related to the virtual infrastructure that are missing and must be collected during the discovery phase. These information can help you estimate the backup performance, scalability, and resource requirements for the Veeam backup infrastructure. For example, you can use the number of vSphere clusters to determine how many Veeam backup servers and proxies you need to deploy and how to distribute the backup load among them. You can also use the total of virtual machines to calculate the total amount of data to be backed up, the storage space required, and the network bandwidth needed.

asked 27/11/2024
khalid Hassan
33 questions

Question 6

Report
Export
Collapse

While going through the discovery data for the NAS environment, you determine several key metrics are missing for later deign and sizing. Which of the following should you collect from the customer about the data stored on the on the NAS per site? (Choose 3)

A.

Retention requirements

A.

Retention requirements

Answers
B.

Total number of files (in millions) to be backed up

B.

Total number of files (in millions) to be backed up

Answers
C.

Amount of source data before dedupe and compression

C.

Amount of source data before dedupe and compression

Answers
D.

Number of shares and compressed source data

D.

Number of shares and compressed source data

Answers
E.

Large file size

E.

Large file size

Answers
Suggested answer: A, B, C
asked 27/11/2024
Paul Macinic
30 questions

Question 7

Report
Export
Collapse

The company has committed to providing the numbers for source in-use data for gold tier virtual machines. In order to attempt to collect metrics for hourly gold tier backups, which of the following additional metrics are need for proxy sizing?

A.

Yearly growth rate

A.

Yearly growth rate

Answers
B.

Change rate

B.

Change rate

Answers
C.

Datastore type

C.

Datastore type

Answers
D.

Operating system type

D.

Operating system type

Answers
Suggested answer: B
asked 27/11/2024
Koh Renbin
35 questions

Question 8

Report
Export
Collapse

You are examining the requirement: ''If possible, the data written must be unchangeable to prevent ransomware attacks.'' Which types of jobs do not support using immutability from S3 Object Lock or hardened repositories? (Choose two)

A.

NAS backups

A.

NAS backups

Answers
B.

Linux Agent backup copy jobs

B.

Linux Agent backup copy jobs

Answers
C.

VMware backup jobs

C.

VMware backup jobs

Answers
D.

Agent for Mac backups

D.

Agent for Mac backups

Answers
Suggested answer: A, D

Explanation:

The types of jobs that do not support using immutability from S3 Object Lock or hardened repositories are NAS backups and Agent for Mac backups. These types of jobs do not have the option to enable immutability in their settings, unlike VMware, Hyper-V, Linux Agent, or Windows Agent backup jobs. Therefore, they cannot leverage the immutability feature of S3 Object Lock or hardened repositories to protect their backups from ransomware or malicious deletion.

asked 27/11/2024
Arun Samuel
41 questions

Question 9

Report
Export
Collapse

The customer has stated that they plan on purchasing new physical server component and repository storage. What additional information is needed to define the implementation process later?

A.

Will the customer need to unencrypt the backups before being copied to new storage?

A.

Will the customer need to unencrypt the backups before being copied to new storage?

Answers
B.

How much backup data is stored on the old hardware?

B.

How much backup data is stored on the old hardware?

Answers
C.

Will the customer be able to retain the original storage until the existing restore points expire?

C.

Will the customer be able to retain the original storage until the existing restore points expire?

Answers
D.

Is the customer repurposing old hardware?

D.

Is the customer repurposing old hardware?

Answers
Suggested answer: B

Explanation:

The additional information that is needed to define the implementation process later is how much backup data is stored on the old hardware. This information is important for designing and sizing the migration strategy and timeline for moving the backups from the old hardware to the new hardware. For example, you can use the amount of backup data to estimate how long it will take to copy or move the backups to the new storage devices. You can also use the amount of backup data to determine whether you need to use compression, deduplication, or WAN acceleration to optimize the migration traffic.

asked 27/11/2024
Dustin Sickle
31 questions

Question 10

Report
Export
Collapse

What components can help meet the following requirement: ''Alternative decryption capabilities on encrypted backups must be possible in the event of lost passwords''?

A.

Veeam Backup & Replication's Configuration Backups

A.

Veeam Backup & Replication's Configuration Backups

Answers
B.

Veeam Backup Enterprise Manager

B.

Veeam Backup Enterprise Manager

Answers
C.

Veeam Backup & Replication's Extraction Explorer

C.

Veeam Backup & Replication's Extraction Explorer

Answers
D.

Veeam Backup & Replication's Extract Utility

D.

Veeam Backup & Replication's Extract Utility

Answers
Suggested answer: B

Explanation:

The component that can help meet the requirement of alternative decryption capabilities on encrypted backups in the event of lost passwords is Veeam Backup Enterprise Manager. Veeam Backup Enterprise Manager is a web-based interface that allows centralized management of multiple Veeam backup servers. It also provides a password loss protection feature that enables authorized users to restore encrypted backups without entering passwords if they forget or lose them. This feature requires enabling password loss protection in Veeam Backup Enterprise Manager settings and assigning a security officer role to a user who can approve password recovery requests.

asked 27/11/2024
Bright Ngobeni
40 questions
Total 108 questions
Go to page: of 11