Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

VMCA2022 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

VMCA2022 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Veeam Certified Architect 2022
  • Last Update: May 2, 2024
  • Questions and Answers: 108
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

VMCA2022 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

VMCA2022 Practice Exam Questions with Answers Veeam Certified Architect 2022 Certification

Question # 6

Veeam University Hospital has been testing the potential to keep their existing NFS storage at each site: however, they have encountered poor backup throughput performance between sites. What would be an effective way to improve the performance?

A.

Have a mount server at each location.

B.

Ensure the Gateway Server is located close to the NFS backup storage.

C.

Place the backup proxy and Gateway Server together at the source site.

D.

Ensure you use location tags at the target location.

Full Access
Question # 7

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?

A.

Veeam Continuous Data Protection.

B.

Veeam image-based replication.

C.

Custom PowerShell scripting.

D.

Veeam Backup Copy with immediate mode.

Full Access
Question # 8

Which of the following is risk for this project?

A.

The backup solution must support VMware encrypted datastores.

B.

End-user laptop backups must have a recovery time objective of 30 minutes.

C.

Data must be replicate with one-hour recovery point objective.

D.

Linux and Windows files server backups must be searchable during a self-service restore.

Full Access
Question # 9

When talking to someone who works for the hospital, they mention they are working on a projectwith a major cloud provider that does not currently support immutability. After further conversations, the customer has decided that they would like daily immutable backups to be sent off-site. Which of the following is the best option to still satisfy the requirements for off-site immutable backups?

A.

Backup copy to a hardened repository.

B.

Backup copy to repository on a Cloud-based Windows Instance that scheduled to power off outside the backup window.

C.

Set up capacity tier with object that supports immutability at the primary site.

D.

Back up to tape and leverage a service to rotate tapes off-site weekly.

Full Access
Question # 10

Veeam University Hospital is considering using Veeam ONE to collect alarms from the virtual and backup infrastructure. What option is available for integrating the solution with ticketing systems?

A.

Configure Veeam ONE to send SNMP traps to the ticketing system.

B.

Veeam Backup & Replication integrates directly with Service Now and Remedy ticketing software natively.

C.

Integrate Veeam ONE with the ticketing software using plug-in in the supplemental folder on the Veeam ISO.

D.

Configure Veeam Backup & Replication to send email notification to the helpdesk email account and have someone generate the ticket manually.

Full Access
Question # 11

The customer has stated that synthetic operations and backups copy jobs must be completed in the desired window. Which components should be sized correctly to ensure that this will be successful?

A.

Proxy and repository servers.

B.

Repository and gateway servers.

C.

Proxy and gateway servers.

D.

Veeam Backup & Replication and gateway servers.

Full Access
Question # 12

During planning, Veeam Financial Services decides to change their backup window from 12 hours to 14 hours. What can be changed in the design based on this?

A.

Proxies will require more resources.

B.

Mount servers will require fewer resources.

C.

Proxies will require fewer resources.

D.

Repositories will require more storage space.

Full Access
Question # 13

What is the retention requirement for this project?

A.

12 weekly backups, six monthly backups and seven yearly backups.

B.

Have on-premises backups on hardened backup repositories.

C.

Have at least one copy of protected data on-premises.

D.

On-premises retention consists of 14 daily backups.

Full Access
Question # 14

Veeam Financial Services has expressed concern about ensuring backups are free of malware before data is restored. How would you accomplish this?

A.

Ensure a compatible antivirus solution is available in a virtual lab for a staged restore.

B.

Ensure the Veeam Data Integration API is accessible from a virtual lab for a secure restore.

C.

Ensure the Veeam Data Integration API is accessible on mount servers for staged restores.

D.

Ensure a compatible antivirus solution is available on mount servers for secure restores.

Full Access
Question # 15

One of Veeam Financial Services’ mission critical applications needs to be backed up daily. This Linux virtual machine is susceptible to snapshot stun. Based on business requirements, how should this be accomplished?

A.

Perform the backup using a Veeam agent.

B.

Perform a normal virtual machine backup on the workload without application aware processing.

C.

Run pre-freeze and post-thaw scripts before backing up the workload.

D.

Perform the backup using application aware processing.

Full Access
Question # 16

Based on customer recovery requirements, which component will help them meet their stated objectives?

A.

Add a Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC polices.

B.

Deploy the Backup & Replication console and set RBAC policies to Administrator Role.

C.

Allow Oracle administrators to do restores with RMAN.

D.

Leverage Backup Enterprise Manager to allow end-users to restore files within their scope

Full Access
Question # 17

What information related to the virtual infrastructure is missing and must be collected during the

discovery? (Choose 2)

A.

Recovery time objective

B.

Total number of virtual machines

C.

Speed of Fibre Channel fabric

D.

Backup window

E.

Size of the source data set

Full Access
Question # 18

Based on documented requirements, which information is still needed for a complete architectural design?

A.

Daily backup retention.

B.

How often backups are required for silver machines.

C.

Amount of time required for a successful restore for gold machine.

D.

RMAN configuration guidelines.

Full Access
Question # 19

What additional information is necessary for sizing the backup solution and must be gathered

during further discovery? (Choose 2)

A.

The available bandwidth per site

B.

The amount of virtual machines to be protected

C.

The total amount of production storage provisioned space

D.

Repository storage file system

E.

The replication schedule

Full Access
Question # 20

It has been determined that the onsite repositories need to be immutable. Which configuration would ensure SLA compliance and provide protection against ransomware?

A.

Provide a Veeam Backup & Replication server with Veeam replication and enable XFS with immutability on NFS targets.

B.

Leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

C.

Leverage ReFS repositories as a primary target with a backup copy to a second site and offload to object storage in a public cloud with immutability enabled.

D.

Provide Veeam Backup & Replication servers at two locations and leverage object storage.

Full Access
Question # 21

While examining the details for the remote sites each with a single server, you are trying to determine if a local repository will be needed or if backups can be transferred back to the central corporate site in the region. Which of the following requirements will act as a constraint on your decision?

A.

The backup solution must not require proprietary hardware or storage.

B.

All backups must complete between 8 p.m. and 6 a.m. local time.

C.

Data locality and privacy laws local to each branch office must be followed.

D.

A copy of backup data must reside in a public cloud local to each region.

Full Access
Question # 22

After further discussion, it was determined that the customer has taken sufficient steps to secure the NFS network so that in-flight encryption is no longer required. You have decided to deploy VMware backup proxies as virtual machines per cluster to satisfy the scale out-requirement for proxies. Which processing modes are preferred for the NFS datastores? (Choose 2)

A.

Backup from Storage Snapshots

B.

Network (NBD) mode

C.

Virtual Appliance (HotAdd) mode

D.

Network mode with Encryption (NBDSSL)

E.

Direct NFS

Full Access
Question # 23

What assumption can be made for the conceptual design?

A.

All new backup storage should utilize Windows ReFS block cloning.

B.

Tape backups of all servers will be used for ransomware protection.

C.

Veeam Agent backups of sale staff laptops should be managed by the backup server.

D.

VMware tagging will be used to enable dynamic scoping of backups.

Full Access
Question # 24

The customer has expressed concerns based on their technical requirements regarding the gold tier virtual machines and the recoverability of backup files. How can the recoverability testing be accomplished to meet the customer’s requirements?

A.

User the storage level corruption guard to do a health check

B.

Select the backup file in the Veeam backup & Replication console and click “verify backup”

C.

Create a virtual lab in the customer’s environment, and then Surebackup jobs to verify backups.

D.

Perform a test of replica and ensure the failover completes successfully

Full Access
Question # 25

Veeam Life and Indemnity informs you that they have experienced issues with the time to back up file data from the existing legacy NAS backup. The NAS is being backed up at file level with a low change rate. The source capacity to back up is 12 TB connected to a 10 GbE switch over eight hours. What assumptions about the current environment could you draw from this?

A.

The file path is over 256 characters long.

B.

AD permissions are set at file level.

C.

The files on the NAS are large

D.

The files on the NAS are small.

Full Access
Question # 26

Based on the customer’s hardening requirements, what steps should be taken to correct the storage configuration?

A.

Send backup copy jobs directly to object storage

B.

Create new Scale-out Backup Repositories with ReFS and redirect backups to new Scale-out Backup Repositories.

C.

Add hardened repositories to each Scale-out Backup Repository and evacuate the data from the CIFS extents.

D.

Enable the object lock on the CIFS extents

Full Access
Question # 27

What is the retention requirement for gold tier virtual machines?

A.

Must have on-premises backup on hardened backup repositories.

B.

Gold tier virtual machines have a recovery point objective of one hour for imagen backup and 15 minutes for transaction lob backup.

C.

Eight weekly backups, three monthly backups and seven yearly backups.

D.

Gold tier virtual machine retention must be 14 daily, eight weekly, three monthly and seven yearly backups.

Full Access
Question # 28

In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam Life and Indemnity do?

A.

Implement a strong password security policy on shared administrative accounts

B.

Remove all remote access from Veeam administrators.

C.

Ensure that none of then Veeam components are on the production Active Directory domain

D.

Protect the Veeam components on the production Active Directory Forest with multi-factor authentication

Full Access
Question # 29

During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?

A.

Deploy Veeam agents configured for failover clustering.

B.

Perform a regular virtual machine backup without application aware processing.

C.

Enable application aware processing on the virtual machine backup job.

D.

Deploy Veeam agents in server mode.

Full Access
Question # 30

Based on the requirements, what is the recommended storage option for the backups kept on-premises?

A.

Repurposing existing backup storage

B.

Immutable public cloud object storage

C.

Deduplicating storage appliance

D.

Physical server with Veeam Hardened Repository

Full Access
Question # 31

The customer has stated that they plan on purchasing new physical server component and repository storage. What additional information is needed to define the implementation process later?

A.

Will the customer need to unencrypt the backups before being copied to new storage?

B.

How much backup data is stored on the old hardware?

C.

Will the customer be able to retain the original storage until the existing restore points expire?

D.

Is the customer repurposing old hardware?

Full Access
Question # 32

Looking at the existing error, you suspect that most of the issues could be resolved with different repositories. Assuming the repositories will be able to accomplish much higher throughput, what new issue might come up?

A.

The bandwidth between sites might not be sufficient.

B.

The repository space consumption could decrease

C.

The production firewall could become a bottleneck

D.

The increased backup speed could completely bring down production storage.

Full Access