ExamGecko
Home / VEEAM / VMCA2022 / List of questions
Ask Question

VEEAM VMCA2022 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

You are trying to determine which feature would work the reliably for excluding the H: drive on MSSQL server virtual machines. The MSSQL servers are built on demand, not from virtual machine templates. Which is the preferred method to achieve this requirement?

Set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine.

Set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine.

Use the Exclusion tab under Guest Processing > Applications for VM backups to exclude the H: volume in MSSQL jobs.

Use the Exclusion tab under Guest Processing > Applications for VM backups to exclude the H: volume in MSSQL jobs.

Use Veeam Agent Backups and set up Volume Backups and include everything but H:

Use Veeam Agent Backups and set up Volume Backups and include everything but H:

Use Veeam Agent Backups and use the Exclusions tab under Gest Processing > Application for MSSQL jobs.

Use Veeam Agent Backups and use the Exclusions tab under Gest Processing > Application for MSSQL jobs.

Suggested answer: A
Explanation:

The preferred method to achieve the requirement of excluding the H: drive on MSSQL server virtual machines is to set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine. This method allows you to exclude specific virtual disks from being processed by backup jobs based on their SCSI IDs or disk labels. This can save backup time and storage space by skipping unnecessary data. This method also works reliably regardless of whether the MSSQL servers are built on demand or from virtual machine templates.

asked 27/11/2024
SERGIO FREITAS
41 questions

Question 22

Report Export Collapse

During architecture planning, Veeam Life and Indemnity decides that recovery point objective of gold tier machines should change from one hour to three hours with daily retention set to seven days. What will be impact on the Veeam design?

Proxies will require fewer resources

Proxies will require fewer resources

More proxy servers will be required

More proxy servers will be required

Repositories will require more resources.

Repositories will require more resources.

The Veeam database size will increase.

The Veeam database size will increase.

Suggested answer: A
Explanation:

If the recovery point objective (RPO) of gold tier machines changes from one hour to three hours with daily retention set to seven days, the impact on the Veeam design is that proxies will require fewer resources. This is because the backup frequency and the number of restore points for gold tier machines will decrease, which means that less data will need to be processed and transferred by the proxies. Therefore, the proxies will have lower CPU, memory, disk, and network utilization and can handle more backup tasks with the same resources.

asked 27/11/2024
Alvaro Peralta
33 questions

Question 23

Report Export Collapse

The decision has been made to separate out proxies for gold tier and silver/bronze tier. Which reason below justifies the decision?

Gold tier virtual machines are in their own VMware cluster

Gold tier virtual machines are in their own VMware cluster

Gold tier virtual machines run frequently and should not share resources with lower priority virtual machines

Gold tier virtual machines run frequently and should not share resources with lower priority virtual machines

Gold tier virtual machines are on their own VMware Datastores.

Gold tier virtual machines are on their own VMware Datastores.

Gold tier virtual machines require their own backup server

Gold tier virtual machines require their own backup server

Suggested answer: B
Explanation:

The reason that justifies the decision to separate out proxies for gold tier and silver/bronze tier is that gold tier virtual machines run frequently and should not share resources with lower priority virtual machines. This is because gold tier virtual machines have a high RPO of one hour or less, which means that they need to run backup jobs more often than silver/bronze tier virtual machines. Therefore, they should have dedicated proxies that can process their data without competing with other backup jobs for proxy resources. This can improve backup performance, reliability, and scalability for gold tier virtual machines.

asked 27/11/2024
Julian Mohabir
43 questions

Question 24

Report Export Collapse

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?

Veeam backup copy with immediate mode

Veeam backup copy with immediate mode

Veeam Continuous Data Protection.

Veeam Continuous Data Protection.

Veeam Image-based replication

Veeam Image-based replication

Custom PowerShell scripting.

Custom PowerShell scripting.

Suggested answer: B
Explanation:

The recommended method to replicate VMware virtual machines with a less than five-minute RPO is Veeam Continuous Data Protection (CDP). CDP is a feature that allows near-continuous replication of VMware virtual machines to a secondary site or cluster with minimal data loss and downtime. CDP uses VMware vSphere APIs for I/O Filtering (VAIO) to capture every write operation from the source VMs and send them to the target VMs in near real-time. CDP can achieve RPOs as low as seconds and enable fast failover and failback in case of a disaster.

asked 27/11/2024
Ali S Zahedi
44 questions

Question 25

Report Export Collapse

Based on Customer requirements, how should virtual machine backups be scoped? (Choose 2)

Create backups based on tags.

Create backups based on tags.

Create backups based on protection groups create with a CSV file.

Create backups based on protection groups create with a CSV file.

Create backups based on resource pools

Create backups based on resource pools

Create backups jobs with same retention requirements.

Create backups jobs with same retention requirements.

Scope each backup based the software running in each workload

Scope each backup based the software running in each workload

Suggested answer: A, D
Explanation:

The methods that should be used to scope virtual machine backups based on customer requirements are to create backups based on tags and to create backup jobs with same retention requirements. Creating backups based on tags allows dynamic scoping of backups based on VMware tags assigned to virtual machines. This can simplify backup management, as new or modified virtual machines will be automatically included or excluded from backup jobs based on their tags. Creating backup jobs with same retention requirements allows consistent application of backup policies based on the backup tiers defined by the customer. This can ensure compliance with regulatory and business needs, as different tiers of virtual machines will have different retention periods and restore points.

asked 27/11/2024
Balazs Jarmy
56 questions

Question 26

Report Export Collapse

Based on the customer's security requirements around restore capabilities, which components should be deployed?

Veeam Business view with RBAC policies defined

Veeam Business view with RBAC policies defined

The Veeam Backup & Replication console with RABC policies defined

The Veeam Backup & Replication console with RABC policies defined

Veeam Oracle integrations

Veeam Oracle integrations

Enterprise Manager with granular RABC policies defined

Enterprise Manager with granular RABC policies defined

Suggested answer: D
Explanation:

The component that should be deployed based on the customer's security requirements around restore capabilities is Enterprise Manager with granular RBAC policies defined. Enterprise Manager is a web-based interface that allows centralized management of multiple Veeam backup servers. It also provides granular RBAC policies that enable control over user permissions and access to restore data. For example, you can assign different roles to different users or groups based on their responsibilities and needs, such as backup administrator, restore operator, security officer, etc. You can also define custom scopes and rules for each role to limit their access to specific objects, jobs, or actions.

asked 27/11/2024
Vishal Sahare
53 questions

Question 27

Report Export Collapse

During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?

Deploy Veeam agents configured for failover clustering.

Deploy Veeam agents configured for failover clustering.

Perform a regular virtual machine backup without application aware processing.

Perform a regular virtual machine backup without application aware processing.

Enable application aware processing on the virtual machine backup job.

Enable application aware processing on the virtual machine backup job.

Deploy Veeam agents in server mode.

Deploy Veeam agents in server mode.

Suggested answer: A
Explanation:

The best way to configure backups for a group of MSSQL systems running in an Always-On cluster and sensitive to virtual machine stun is to deploy Veeam agents configured for failover clustering. Veeam agents can provide application-aware processing and transaction log backup for MSSQL servers, as well as support for failover clustering and cluster shared volumes. Veeam agents can also reduce the impact of virtual machine stun by performing backups at the guest OS level, without using VMware snapshots.

asked 27/11/2024
Adam Beke
42 questions

Question 28

Report Export Collapse

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?

Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.

Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.

Create secure restore to ensure malware-free backups.

Create secure restore to ensure malware-free backups.

Create a virtual lab environment and periodically perform staged restores with custom scripts.

Create a virtual lab environment and periodically perform staged restores with custom scripts.

Scan backups with Veeam ONE to remove personally identifiable information.

Scan backups with Veeam ONE to remove personally identifiable information.

Suggested answer: C
Explanation:

The configuration that would verify the SLA compliance during audits and protection against exposure to personally identifiable information in the event of exposure is to create a virtual lab environment and periodically perform staged restores with custom scripts. A virtual lab is an isolated environment where you can run your backups or replicas without affecting the production environment. A staged restore is a process that allows you to run custom scripts on the restored data before publishing it to the production environment. By using these features, you can demonstrate that your backups are recoverable and compliant with legal regulations, as well as remove or mask any sensitive data before restoring it.

asked 27/11/2024
Rafal Wozniak
42 questions

Question 29

Report Export Collapse

Considering the security, throughput, and retention requirements, what would be part of an acceptable backup repository design? (Choose 2)

Use a backup job directly to an object storage appliance

Use a backup job directly to an object storage appliance

Use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data.

Use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data.

Use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site.

Use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site.

Use Backup copy jobs to Hardened Windows ReFS-based repositories at the secondary site.

Use Backup copy jobs to Hardened Windows ReFS-based repositories at the secondary site.

Use a backup job directly to a deduplication appliance.

Use a backup job directly to a deduplication appliance.

Suggested answer: B, C
Explanation:

The backup repository design that would meet the security, throughput, and retention requirements is to use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data and use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site. A Hardened Linux repository is a type of backup repository that provides immutability and ransomware protection for backup files by using XFS file system features and Linux access control mechanisms. A Backup copy job is a type of backup job that copies backups from one repository to another, either on-site or off-site, with different retention settings. By using these features, you can ensure that your backups are secure, efficient, and compliant with regulatory and business needs.

asked 27/11/2024
Fabio Valenti
41 questions

Question 30

Report Export Collapse

What information related to sizing the NAS infrastructure is missing and must be collected during the discovery? (Choose 2)

Total number of network shares

Total number of network shares

Size of the source data set

Size of the source data set

Backup windows

Backup windows

Recovery point objective

Recovery point objective

Number of Scale-out Backup Repository extents currently used

Number of Scale-out Backup Repository extents currently used

Suggested answer: B, D
Explanation:

The information related to sizing the NAS infrastructure that is missing and must be collected during the discovery are the size of the source data set and the recovery point objective (RPO). These information are important for designing and sizing the NAS backup jobs and repositories. For example, you can use the size of the source data set to estimate how much storage space and network bandwidth are required for backing up NAS devices. You can also use the RPO to determine how frequently you need to run NAS backup jobs and how many restore points you need to keep on the backup repositories.

asked 27/11/2024
Borja Arranz Palenzuela
47 questions
Total 108 questions
Go to page: of 11
Search

Related questions