VEEAM VMCA2022 Practice Test - Questions Answers, Page 3

List of questions
Question 21

You are trying to determine which feature would work the reliably for excluding the H: drive on MSSQL server virtual machines. The MSSQL servers are built on demand, not from virtual machine templates. Which is the preferred method to achieve this requirement?
Set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine.
Use the Exclusion tab under Guest Processing > Applications for VM backups to exclude the H: volume in MSSQL jobs.
Use Veeam Agent Backups and set up Volume Backups and include everything but H:
Use Veeam Agent Backups and use the Exclusions tab under Gest Processing > Application for MSSQL jobs.
The preferred method to achieve the requirement of excluding the H: drive on MSSQL server virtual machines is to set up VMDK exclusion for the disk on which the H: resides in the Virtual Machines > Exclusions page for each virtual machine. This method allows you to exclude specific virtual disks from being processed by backup jobs based on their SCSI IDs or disk labels. This can save backup time and storage space by skipping unnecessary data. This method also works reliably regardless of whether the MSSQL servers are built on demand or from virtual machine templates.
Question 22

During architecture planning, Veeam Life and Indemnity decides that recovery point objective of gold tier machines should change from one hour to three hours with daily retention set to seven days. What will be impact on the Veeam design?
Proxies will require fewer resources
More proxy servers will be required
Repositories will require more resources.
The Veeam database size will increase.
If the recovery point objective (RPO) of gold tier machines changes from one hour to three hours with daily retention set to seven days, the impact on the Veeam design is that proxies will require fewer resources. This is because the backup frequency and the number of restore points for gold tier machines will decrease, which means that less data will need to be processed and transferred by the proxies. Therefore, the proxies will have lower CPU, memory, disk, and network utilization and can handle more backup tasks with the same resources.
Question 23

The decision has been made to separate out proxies for gold tier and silver/bronze tier. Which reason below justifies the decision?
Gold tier virtual machines are in their own VMware cluster
Gold tier virtual machines run frequently and should not share resources with lower priority virtual machines
Gold tier virtual machines are on their own VMware Datastores.
Gold tier virtual machines require their own backup server
The reason that justifies the decision to separate out proxies for gold tier and silver/bronze tier is that gold tier virtual machines run frequently and should not share resources with lower priority virtual machines. This is because gold tier virtual machines have a high RPO of one hour or less, which means that they need to run backup jobs more often than silver/bronze tier virtual machines. Therefore, they should have dedicated proxies that can process their data without competing with other backup jobs for proxy resources. This can improve backup performance, reliability, and scalability for gold tier virtual machines.
Question 24

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?
Veeam backup copy with immediate mode
Veeam Continuous Data Protection.
Veeam Image-based replication
Custom PowerShell scripting.
The recommended method to replicate VMware virtual machines with a less than five-minute RPO is Veeam Continuous Data Protection (CDP). CDP is a feature that allows near-continuous replication of VMware virtual machines to a secondary site or cluster with minimal data loss and downtime. CDP uses VMware vSphere APIs for I/O Filtering (VAIO) to capture every write operation from the source VMs and send them to the target VMs in near real-time. CDP can achieve RPOs as low as seconds and enable fast failover and failback in case of a disaster.
Question 25

Based on Customer requirements, how should virtual machine backups be scoped? (Choose 2)
Create backups based on tags.
Create backups based on protection groups create with a CSV file.
Create backups based on resource pools
Create backups jobs with same retention requirements.
Scope each backup based the software running in each workload
The methods that should be used to scope virtual machine backups based on customer requirements are to create backups based on tags and to create backup jobs with same retention requirements. Creating backups based on tags allows dynamic scoping of backups based on VMware tags assigned to virtual machines. This can simplify backup management, as new or modified virtual machines will be automatically included or excluded from backup jobs based on their tags. Creating backup jobs with same retention requirements allows consistent application of backup policies based on the backup tiers defined by the customer. This can ensure compliance with regulatory and business needs, as different tiers of virtual machines will have different retention periods and restore points.
Question 26

Based on the customer's security requirements around restore capabilities, which components should be deployed?
Veeam Business view with RBAC policies defined
The Veeam Backup & Replication console with RABC policies defined
Veeam Oracle integrations
Enterprise Manager with granular RABC policies defined
The component that should be deployed based on the customer's security requirements around restore capabilities is Enterprise Manager with granular RBAC policies defined. Enterprise Manager is a web-based interface that allows centralized management of multiple Veeam backup servers. It also provides granular RBAC policies that enable control over user permissions and access to restore data. For example, you can assign different roles to different users or groups based on their responsibilities and needs, such as backup administrator, restore operator, security officer, etc. You can also define custom scopes and rules for each role to limit their access to specific objects, jobs, or actions.
Question 27

During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?
Deploy Veeam agents configured for failover clustering.
Perform a regular virtual machine backup without application aware processing.
Enable application aware processing on the virtual machine backup job.
Deploy Veeam agents in server mode.
The best way to configure backups for a group of MSSQL systems running in an Always-On cluster and sensitive to virtual machine stun is to deploy Veeam agents configured for failover clustering. Veeam agents can provide application-aware processing and transaction log backup for MSSQL servers, as well as support for failover clustering and cluster shared volumes. Veeam agents can also reduce the impact of virtual machine stun by performing backups at the guest OS level, without using VMware snapshots.
Question 28

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?
Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.
Create secure restore to ensure malware-free backups.
Create a virtual lab environment and periodically perform staged restores with custom scripts.
Scan backups with Veeam ONE to remove personally identifiable information.
The configuration that would verify the SLA compliance during audits and protection against exposure to personally identifiable information in the event of exposure is to create a virtual lab environment and periodically perform staged restores with custom scripts. A virtual lab is an isolated environment where you can run your backups or replicas without affecting the production environment. A staged restore is a process that allows you to run custom scripts on the restored data before publishing it to the production environment. By using these features, you can demonstrate that your backups are recoverable and compliant with legal regulations, as well as remove or mask any sensitive data before restoring it.
Question 29

Considering the security, throughput, and retention requirements, what would be part of an acceptable backup repository design? (Choose 2)
Use a backup job directly to an object storage appliance
Use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data.
Use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site.
Use Backup copy jobs to Hardened Windows ReFS-based repositories at the secondary site.
Use a backup job directly to a deduplication appliance.
The backup repository design that would meet the security, throughput, and retention requirements is to use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data and use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site. A Hardened Linux repository is a type of backup repository that provides immutability and ransomware protection for backup files by using XFS file system features and Linux access control mechanisms. A Backup copy job is a type of backup job that copies backups from one repository to another, either on-site or off-site, with different retention settings. By using these features, you can ensure that your backups are secure, efficient, and compliant with regulatory and business needs.
Question 30

What information related to sizing the NAS infrastructure is missing and must be collected during the discovery? (Choose 2)
Total number of network shares
Size of the source data set
Backup windows
Recovery point objective
Number of Scale-out Backup Repository extents currently used
The information related to sizing the NAS infrastructure that is missing and must be collected during the discovery are the size of the source data set and the recovery point objective (RPO). These information are important for designing and sizing the NAS backup jobs and repositories. For example, you can use the size of the source data set to estimate how much storage space and network bandwidth are required for backing up NAS devices. You can also use the RPO to determine how frequently you need to run NAS backup jobs and how many restore points you need to keep on the backup repositories.
Question