Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

VMCA2022 Exam Dumps - Veeam Certified Architect 2022

Go to page:
Question # 17

What information related to the virtual infrastructure is missing and must be collected during the discovery phase? (Choose 2)

A.

Local area network speed.

B.

Recovery point objective.

C.

Backup window.

D.

Size of the source data set.

E.

number of Microsoft Exchange mailboxes.

Full Access
Question # 18

Which of the following is risk for this project?

A.

The backup solution must support VMware encrypted datastores.

B.

End-user laptop backups must have a recovery time objective of 30 minutes.

C.

Data must be replicate with one-hour recovery point objective.

D.

Linux and Windows files server backups must be searchable during a self-service restore.

Full Access
Question # 19

What information is necessary to design the disaster recovery solution and must be identified during discovery? (Choose 3)

A.

The number of virtual machines to be replicated.

B.

The available bandwidth between locations.

C.

The required amount of backups to be storage off site.

D.

The number of vLANs per site.

E.

Which sites will be the source of replication and which sites will be the targets for recovery.

Full Access
Question # 20

while going through the discovery data for the NAS environment, you determine several key metrics are missing for later design and sizing. Which of the following should you collect from the customer about the data stored on the NAS per site? (Choose 2)

A.

Which version of SMB protocol the NAS supports.

B.

Amount of source data after dedupe and compression.

C.

Total number of files (in millions) to be backed up.

D.

Amount of source data before dedupe and compression.

E.

Largest file size.

Full Access
Question # 21

How would you configure replication with seeding, considering this deployment will have a Veeam Backup Server in both the primary and secondary site?

A.

On the Veeam Backup & Replication server at the primary site, create a backup job of the source machine from the primary site. At the secondary site import seeding data from this backup job. Create a replica job pointing to this backup job using re-mapping.

B.

On the Veeam Backup & Replication server at the primary site, create a backup job and backup copy job sending data to the secondary site. At the secondary site, create a replica job pointing to therepository with the backup copy data.

C.

On the Veeam Backup & Replication server at the primary site, create a backup job of the source virtual machine from the primary site. At the secondary site, create a replica job pointing to the repository with the backup job data.

D.

On the Veeam Backup & Replication server at the secondary site, create a backup job of the source virtual machine from the primary site. At the secondary site, create a backup copy job pulling the data from the primary and create a replica job pointing to the repository with the backup copy data.

Full Access
Question # 22

Immutability of the offsite backups is a constraint on this project. Which of the following requirements does this impact?

A.

Backups must be verified and scanned for malware before restoring.

B.

All data must be retained for three years.

C.

Backup must be storage in logical, scalable storage systems on site.

D.

Backup must take advantage of public cloud storage for long-term retention.

Full Access
Question # 23

While looking through the requirements regarding database servers, you see that Veeam should manage the database backups and logs. Which configurations should you check for that are unsupported base on the technical requirements?

A.

Physical windows server with Oracle.

B.

Oracle cluster configurations.

C.

Virtual machines with physical raw device mapping.

D.

Virtual machines with Oracle Automatic Storage Management storage.

Full Access
Question # 24

A remote office has an eight-node vSphere cluster with VSAN storage. After performing the sizing

calculations, it is determined that the proxy role will require 64 CPUs and 128 GB of RAM to meet the stated backup SLAs. How should these proxies be deployed?

A.

Deploy a single physical server with 64 CPUs and 128 GB of RAM.

B.

Deploy two physical proxies with 32 CPUs and 64 GB of RAM.

C.

Deploy four virtual proxies with 16 CPUs and 32 GB of RAM.

D.

Deploy eight virtual proxies with eight CPUs and 16 GB of RAM.

Full Access
Go to page: