Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

VMCA2022 Exam Dumps - Veeam Certified Architect 2022

Go to page:
Question # 9

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?

A.

Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.

B.

Create secure restore to ensure malware-free backups.

C.

Create a virtual lab environment and periodically perform staged restores with custom scripts.

D.

Scan backups with Veeam ONE to remove personally identifiable information.

Full Access
Question # 10

In addition to scanning all backup for malware before restoring, what additional Veeam capabilities must be included in the conceptual design for gold level systems? (Choose 2)

A.

File indexing

B.

SureBackup

C.

Stage Restore

D.

SureReplica

E.

Secure Restore

Full Access
Question # 11

Which of the following areas would benefit from additional analysis on areas mentioned in the case study? (Choose 3)

A.

VMware

B.

MSSQL

C.

NAS

D.

On-premises Exchange

E.

PostgreSQL

F.

Hyper-V

Full Access
Question # 12

Based on the customer Windows and Linux file server backup requirements, which component will help them meet their stated objectives?

A.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role.

B.

Add Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policy.

C.

Add a Windows Server, enable indexing of backups and ensure authenticated users are configured to appropriate AD Groups policies.

D.

Use Backup Enterprise Manager with indexing enabled on virtual machine and Agent backups with RBAC policies.

Full Access
Question # 13

Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?

A.

Implement Wan accelerator.

B.

Use a dedicated Veeam Backup & Replication server just for replication.

C.

Recommend migrating some of the VMDKs to alternative datastore.

D.

Replicate to a single VMware datastore used just for replicas.

Full Access
Question # 14

During a proof of concept deployment at Veeam University Hospital, it is noted that only some of the backup files in a specific Scale-out Backup Repository are immutable. What can cause this behavior?

A.

The ReFS extents do not have immutable enabled.

B.

Not all XFS extents in the Scale-out Backup Repository performance tier have the required flag enable.

C.

All extents in the Scale-out Backup Repository performance tier are ReFS.

D.

Not all EXT in the Scale-out Backup Repository performance archive tier have the required flag enabled.

Full Access
Question # 15

During further discussions, the 3-2-1 rule was recommended. What is the most efficient way to protect primary and secondary sites following the 3-2-1 rule?

A.

From existing backups at the primary site, create a backup copy to the secondary site. Offload backup data to object storage using Scale-out Backup Repository capacity tier.

B.

Send replicas directly from the primary to the secondary site. Backup replicas on the secondary site and tier this to object storage using Scale-out Backup Repository capacity tier.

C.

Send backups directly from the primary to the secondary site, avoiding duplicate data storage. Tier backup data to object storage using Scale-out Backup Repository capacity tier.

D.

Use storage snapshot support to backup a virtual machine using the secondary array. Backup snapshots on the secondary site and tier this to object storage using Scale-out Backup Repository capacity tier.

Full Access
Question # 16

Based on the requirements, and the assumption that Veeam University Hospital will keep their existing backup storage, which answer describes which components are needed for the on-premises design?

A.

Backup server, backup proxy, Backup Enterprise Manager, log shipping servers.

B.

Backup server, backup proxy, Backup Enterprise Manager, mount server, backup repository.

C.

Backup server, backup proxy, backup repository, Veeam vPower NFS service.

D.

Backup server, backup proxy, backup repository, mount server, guest interaction proxy, gateway server.

Full Access
Go to page: