Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

VMCA2022 Exam Dumps - VMCA 2022

Question # 4

The customer has stated that they plan on purchasing new physical server component and repository storage. What additional information is needed to define the implementation process later?

A.

Will the customer need to unencrypt the backups before being copied to new storage?

B.

How much backup data is stored on the old hardware?

C.

Will the customer be able to retain the original storage until the existing restore points expire?

D.

Is the customer repurposing old hardware?

Full Access
Question # 5

What information is missing form discovery?

A.

What the current LAN bandwidth is at Fresno.

B.

What backup transport mode is currently used.

C.

What type of backup storage is currently used.

D.

What the available bandwidth is between Fresno and Carson City.

Full Access
Question # 6

What components can help meet the following requirement: “Alternative decryption capabilities on encrypted backups must be possible in the event of lost passwords”?

A.

Veeam Backup & Replication’s Configuration Backups

B.

Veeam Backup Enterprise Manager

C.

Veeam Backup & Replication’s Extraction Explorer

D.

Veeam Backup & Replication’s Extract Utility

Full Access
Question # 7

The customer has expressed concerns based on their technical requirements regarding the gold tier virtual machines and the recoverability of backup files. How can the recoverability testing be accomplished to meet the customer’s requirements?

A.

User the storage level corruption guard to do a health check

B.

Select the backup file in the Veeam backup & Replication console and click “verify backup”

C.

Create a virtual lab in the customer’s environment, and then Surebackup jobs to verify backups.

D.

Perform a test of replica and ensure the failover completes successfully

Full Access
Question # 8

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?

A.

Veeam backup copy with immediate mode

B.

Veeam Continuous Data Protection.

C.

Veeam Image-based replication

D.

Custom PowerShell scripting.

Full Access
Question # 9

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?

A.

Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.

B.

Create secure restore to ensure malware-free backups.

C.

Create a virtual lab environment and periodically perform staged restores with custom scripts.

D.

Scan backups with Veeam ONE to remove personally identifiable information.

Full Access
Question # 10

In addition to scanning all backup for malware before restoring, what additional Veeam capabilities must be included in the conceptual design for gold level systems? (Choose 2)

A.

File indexing

B.

SureBackup

C.

Stage Restore

D.

SureReplica

E.

Secure Restore

Full Access
Question # 11

Which of the following areas would benefit from additional analysis on areas mentioned in the case study? (Choose 3)

A.

VMware

B.

MSSQL

C.

NAS

D.

On-premises Exchange

E.

PostgreSQL

F.

Hyper-V

Full Access
Question # 12

Based on the customer Windows and Linux file server backup requirements, which component will help them meet their stated objectives?

A.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role.

B.

Add Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policy.

C.

Add a Windows Server, enable indexing of backups and ensure authenticated users are configured to appropriate AD Groups policies.

D.

Use Backup Enterprise Manager with indexing enabled on virtual machine and Agent backups with RBAC policies.

Full Access
Question # 13

Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?

A.

Implement Wan accelerator.

B.

Use a dedicated Veeam Backup & Replication server just for replication.

C.

Recommend migrating some of the VMDKs to alternative datastore.

D.

Replicate to a single VMware datastore used just for replicas.

Full Access
Question # 14

During a proof of concept deployment at Veeam University Hospital, it is noted that only some of the backup files in a specific Scale-out Backup Repository are immutable. What can cause this behavior?

A.

The ReFS extents do not have immutable enabled.

B.

Not all XFS extents in the Scale-out Backup Repository performance tier have the required flag enable.

C.

All extents in the Scale-out Backup Repository performance tier are ReFS.

D.

Not all EXT in the Scale-out Backup Repository performance archive tier have the required flag enabled.

Full Access
Question # 15

During further discussions, the 3-2-1 rule was recommended. What is the most efficient way to protect primary and secondary sites following the 3-2-1 rule?

A.

From existing backups at the primary site, create a backup copy to the secondary site. Offload backup data to object storage using Scale-out Backup Repository capacity tier.

B.

Send replicas directly from the primary to the secondary site. Backup replicas on the secondary site and tier this to object storage using Scale-out Backup Repository capacity tier.

C.

Send backups directly from the primary to the secondary site, avoiding duplicate data storage. Tier backup data to object storage using Scale-out Backup Repository capacity tier.

D.

Use storage snapshot support to backup a virtual machine using the secondary array. Backup snapshots on the secondary site and tier this to object storage using Scale-out Backup Repository capacity tier.

Full Access
Question # 16

Based on the requirements, and the assumption that Veeam University Hospital will keep their existing backup storage, which answer describes which components are needed for the on-premises design?

A.

Backup server, backup proxy, Backup Enterprise Manager, log shipping servers.

B.

Backup server, backup proxy, Backup Enterprise Manager, mount server, backup repository.

C.

Backup server, backup proxy, backup repository, Veeam vPower NFS service.

D.

Backup server, backup proxy, backup repository, mount server, guest interaction proxy, gateway server.

Full Access
Question # 17

What information related to the virtual infrastructure is missing and must be collected during the discovery phase? (Choose 2)

A.

Local area network speed.

B.

Recovery point objective.

C.

Backup window.

D.

Size of the source data set.

E.

number of Microsoft Exchange mailboxes.

Full Access
Question # 18

Which of the following is risk for this project?

A.

The backup solution must support VMware encrypted datastores.

B.

End-user laptop backups must have a recovery time objective of 30 minutes.

C.

Data must be replicate with one-hour recovery point objective.

D.

Linux and Windows files server backups must be searchable during a self-service restore.

Full Access
Question # 19

What information is necessary to design the disaster recovery solution and must be identified during discovery? (Choose 3)

A.

The number of virtual machines to be replicated.

B.

The available bandwidth between locations.

C.

The required amount of backups to be storage off site.

D.

The number of vLANs per site.

E.

Which sites will be the source of replication and which sites will be the targets for recovery.

Full Access
Question # 20

while going through the discovery data for the NAS environment, you determine several key metrics are missing for later design and sizing. Which of the following should you collect from the customer about the data stored on the NAS per site? (Choose 2)

A.

Which version of SMB protocol the NAS supports.

B.

Amount of source data after dedupe and compression.

C.

Total number of files (in millions) to be backed up.

D.

Amount of source data before dedupe and compression.

E.

Largest file size.

Full Access
Question # 21

How would you configure replication with seeding, considering this deployment will have a Veeam Backup Server in both the primary and secondary site?

A.

On the Veeam Backup & Replication server at the primary site, create a backup job of the source machine from the primary site. At the secondary site import seeding data from this backup job. Create a replica job pointing to this backup job using re-mapping.

B.

On the Veeam Backup & Replication server at the primary site, create a backup job and backup copy job sending data to the secondary site. At the secondary site, create a replica job pointing to therepository with the backup copy data.

C.

On the Veeam Backup & Replication server at the primary site, create a backup job of the source virtual machine from the primary site. At the secondary site, create a replica job pointing to the repository with the backup job data.

D.

On the Veeam Backup & Replication server at the secondary site, create a backup job of the source virtual machine from the primary site. At the secondary site, create a backup copy job pulling the data from the primary and create a replica job pointing to the repository with the backup copy data.

Full Access
Question # 22

Immutability of the offsite backups is a constraint on this project. Which of the following requirements does this impact?

A.

Backups must be verified and scanned for malware before restoring.

B.

All data must be retained for three years.

C.

Backup must be storage in logical, scalable storage systems on site.

D.

Backup must take advantage of public cloud storage for long-term retention.

Full Access
Question # 23

While looking through the requirements regarding database servers, you see that Veeam should manage the database backups and logs. Which configurations should you check for that are unsupported base on the technical requirements?

A.

Physical windows server with Oracle.

B.

Oracle cluster configurations.

C.

Virtual machines with physical raw device mapping.

D.

Virtual machines with Oracle Automatic Storage Management storage.

Full Access
Question # 24

A remote office has an eight-node vSphere cluster with VSAN storage. After performing the sizing

calculations, it is determined that the proxy role will require 64 CPUs and 128 GB of RAM to meet the stated backup SLAs. How should these proxies be deployed?

A.

Deploy a single physical server with 64 CPUs and 128 GB of RAM.

B.

Deploy two physical proxies with 32 CPUs and 64 GB of RAM.

C.

Deploy four virtual proxies with 16 CPUs and 32 GB of RAM.

D.

Deploy eight virtual proxies with eight CPUs and 16 GB of RAM.

Full Access
Question # 25

Veeam Financial Services performed a proof of concept of the design outlined in the architecture. Backups completed successfully, but it was determined that the offloading of data to public cloud storage is consuming all available bandwidth on several branch sites and business applications are lacking performance as a result. What adjustments within the Veeam Infrastructure would best address this issue?

A.

Configure Network Traffic Rules.

B.

Increase the compute resources on the repository servers at each site.

C.

Increase the proxy compute resources at each site.

D.

Add WAN accelerators to each site

Full Access
Question # 26

Based on documented requirements, which information is still needed for a complete architectural design?

A.

Daily backup retention.

B.

How often backups are required for silver machines.

C.

Amount of time required for a successful restore for gold machine.

D.

RMAN configuration guidelines.

Full Access
Question # 27

What things can you do to validate that the design meets target SLAs and reduces the headcount required to manage the solution? (Choose 3)

A.

Export the configuration with scripts, schedule a recurring review to discuss status and configuration drift.

Document restore operations to streamline service desk engagement.

B.

Use tagging and scripts to auto-generate backup jobs, set the start time and windows, letting the backup server manage resource allocation.

C.

Use inventory information to group jobs, use backup chaining and fine tune to fit within the backup window.

D.

Explain how to detect configuration changes, reporting and using backup job templates to maintain consistency. Document self-service restore the streamline service desk engagement.

E.

Review the design so that there is no bottleneck going forward.

F.

Review the design so that the slowest part of the infrastructure is fast enough to meet backup window requirements.

Full Access
Question # 28

While examining the requirements for archived backups, you notice that a copy should go to a cloud

provider. Which of the stated requirements needs additional information to help clarify the

customer expectation?

A.

12 weekly backups, six monthly backups and seven yearly backups must be stored for archival purposes.

B.

There must be the copies of data, on two different kinds of media, with one off site copy that is either air gapped or immutable.

C.

A copy of backup data must reside in a public cloud local to each region.

D.

All backup repositories must be hardened.

Full Access
Question # 29

Veeam Financial Services received notification from their legal team that retention of backups should be five years on-site instead of four. What component sizing should be adjusted?

A.

The amount of object storage purchased in a public cloud for archival purposes.

B.

Physical storage in the repositories.

C.

The CPU and memory of the Veeam Backup & Replication database.

D.

CPU and memory requirements for the Veeam repositories.

Full Access
Question # 30

When talking to someone who works for the customer, they mention they are working on a different project with a major cloud provider that does not currently support immutability. Which of the following is the best option to still satisfy the requirement for offsite, immutable or air gapped backups if that cloud provider is selected for archive storage?

A.

Backup copy to a hardened repository at a different site.

B.

Set up Scale-out Backup Repository capacity tier to a different cloud provider than the archive tier.

C.

Backup copy to a Windows repository in the cloud that is scheduled to turn off outside the backup window.

D.

Set up capacity tier to local on-premises object storage that supports immutability.

Full Access
Question # 31

While examining the details for the remote sites each with a single server, you are trying to determine if a local repository will be needed or if backups can be transferred back to the central corporate site in the region. Which of the following requirements will act as a constraint on your decision?

A.

The backup solution must not require proprietary hardware or storage.

B.

All backups must complete between 8 p.m. and 6 a.m. local time.

C.

Data locality and privacy laws local to each branch office must be followed.

D.

A copy of backup data must reside in a public cloud local to each region.

Full Access
Question # 32

It has been determined that the onsite repositories need to be immutable. Which configuration would ensure SLA compliance and provide protection against ransomware?

A.

Provide a Veeam Backup & Replication server with Veeam replication and enable XFS with immutability on NFS targets.

B.

Leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

C.

Leverage ReFS repositories as a primary target with a backup copy to a second site and offload to object storage in a public cloud with immutability enabled.

D.

Provide Veeam Backup & Replication servers at two locations and leverage object storage.

Full Access