Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

VMCA2022 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

VMCA2022 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Veeam Certified Architect 2022
  • Last Update: Sep 12, 2025
  • Questions and Answers: 108
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

VMCA2022 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

VMCA2022 Practice Exam Questions with Answers Veeam Certified Architect 2022 Certification

Question # 6

During planning, Veeam Financial Services decides to change their backup window from 12 hours to 14 hours. What can be changed in the design based on this?

A.

Proxies will require more resources.

B.

Mount servers will require fewer resources.

C.

Proxies will require fewer resources.

D.

Repositories will require more storage space.

Full Access
Question # 7

Veeam Financial Services received notification from their legal team that retention of backups should be five years on-site instead of four. What component sizing should be adjusted?

A.

The amount of object storage purchased in a public cloud for archival purposes.

B.

Physical storage in the repositories.

C.

The CPU and memory of the Veeam Backup & Replication database.

D.

CPU and memory requirements for the Veeam repositories.

Full Access
Question # 8

Which tier(s) of Veeam Financial Services’ backups will require SureBackup jobs?

A.

Gold tier.

B.

Silver and gold tiers.

C.

Gold, silver and bronze tiers.

D.

All virtual machine and laptop backups.

Full Access
Question # 9

Veeam Financial Services has expressed concern about ensuring backups are free of malware before data is restored. How would you accomplish this?

A.

Ensure a compatible antivirus solution is available in a virtual lab for a staged restore.

B.

Ensure the Veeam Data Integration API is accessible from a virtual lab for a secure restore.

C.

Ensure the Veeam Data Integration API is accessible on mount servers for staged restores.

D.

Ensure a compatible antivirus solution is available on mount servers for secure restores.

Full Access
Question # 10

What information related to the virtual infrastructure is missing and must be collected during the discovery phase) (Choose 2)

A.

Number of vSphere clusters

B.

Backup window

C.

Recovery time objective

D.

Total of virtual machines

E.

Number of scale-out Backup Repository extents currently used

Full Access
Question # 11

What additional information is necessary for sizing the backup solution and must be gathered

during further discovery? (Choose 2)

A.

The available bandwidth per site

B.

The amount of virtual machines to be protected

C.

The total amount of production storage provisioned space

D.

Repository storage file system

E.

The replication schedule

Full Access
Question # 12

The decision has been made to separate out proxies for gold tier and silver/bronze tier. Which reason below justifies the decision?

A.

Gold tier virtual machines are in their own VMware cluster

B.

Gold tier virtual machines run frequently and should not share resources with lower priority virtual machines

C.

Gold tier virtual machines are on their own VMware Datastores.

D.

Gold tier virtual machines require their own backup server

Full Access
Question # 13

Considering the security, throughput, and retention requirements, what would be part of an acceptable backup repository design? (Choose 2)

A.

Use a backup job directly to an object storage appliance

B.

Use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data.

C.

Use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site.

D.

Use Backup copy jobs to Hardened Windows ReFS-based repositories at the secondary site.

E.

Use a backup job directly to a deduplication appliance.

Full Access
Question # 14

What can be done to validate that the design meets target SLAs and does not exceed repository growthprotections?

A.

Ensure job throughput matches extensions. Cross-compare with available network throughput, disk speed and initial sizing calculations.

B.

Recommend standalone backup copy jobs are created for gold tier virtual machines that do not successfully backup within one hour.

C.

Export job history for review. Ensure the bottleneck statistics point to source. Turn off indexing for jobs that do not meet SLA requirements.

D.

Use backup file growth report form Veeam ONE to find outliers. Ask business and application teams to delete excess data

Full Access
Question # 15

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?

A.

Veeam backup copy with immediate mode

B.

Veeam Continuous Data Protection.

C.

Veeam Image-based replication

D.

Custom PowerShell scripting.

Full Access
Question # 16

Which of the following could cause failures to meet the requirement to test gold tier backups?

A.

Backup jobs run every hour.

B.

You cannot firewall traffic between vLANs in the SureBackup job configuration.

C.

The LAN bandwidth is not sufficient for vPower NFS datastores.

D.

There may be too many networks.

Full Access
Question # 17

The customer states that Veeam Backup & Replication is on the production domain. What direct risks does this present?

A.

Unable to use two-factor authentication.

B.

Compromised Domain Admin could gain access.

C.

Cannot access the REST interface.

D.

Compromised Domain User could gain access.

Full Access
Question # 18

You are examining the requirement: “If possible, the data written must be unchangeable to prevent ransomware attacks.” Which types of jobs do not support using immutability from S3 Object Lock or hardened repositories? (Choose two)

A.

NAS backups

B.

Linux Agent backup copy jobs

C.

VMware backup jobs

D.

Agent for Mac backups

Full Access
Question # 19

Based on the customer’s hardening requirements, what steps should be taken to correct the storage configuration?

A.

Send backup copy jobs directly to object storage

B.

Create new Scale-out Backup Repositories with ReFS and redirect backups to new Scale-out Backup Repositories.

C.

Add hardened repositories to each Scale-out Backup Repository and evacuate the data from the CIFS extents.

D.

Enable the object lock on the CIFS extents

Full Access
Question # 20

During architecture planning, Veeam Life and Indemnity decides that recovery point objective of gold tier machines should change from one hour to three hours with daily retention set to seven days. What will be impact on the Veeam design?

A.

Proxies will require fewer resources

B.

More proxy servers will be required

C.

Repositories will require more resources.

D.

The Veeam database size will increase.

Full Access
Question # 21

Looking at the existing error, you suspect that most of the issues could be resolved with different repositories. Assuming the repositories will be able to accomplish much higher throughput, what new issue might come up?

A.

The bandwidth between sites might not be sufficient.

B.

The repository space consumption could decrease

C.

The production firewall could become a bottleneck

D.

The increased backup speed could completely bring down production storage.

Full Access
Question # 22

For any replicated virtual workloads, the data must not be more than one hour old. What could be a potential risk to the SLA for the offsite disaster recovery aspect of this requirement?

A.

The quantity of network hops.

B.

Data change rate.

C.

Average virtual machine size

D.

Local area network bandwidth.

Full Access
Question # 23

During further discussions, the 3-2-1 rule was recommended. What is the most efficient way to protect primary and secondary sites following the 3-2-1 rule?

A.

From existing backups at the primary site, create a backup copy to the secondary site. Offload backup data to object storage using Scale-out Backup Repository capacity tier.

B.

Send replicas directly from the primary to the secondary site. Backup replicas on the secondary site and tier this to object storage using Scale-out Backup Repository capacity tier.

C.

Send backups directly from the primary to the secondary site, avoiding duplicate data storage. Tier backup data to object storage using Scale-out Backup Repository capacity tier.

D.

Use storage snapshot support to backup a virtual machine using the secondary array. Backup snapshots on the secondary site and tier this to object storage using Scale-out Backup Repository capacity tier.

Full Access
Question # 24

During a proof of concept deployment at Veeam University Hospital, it is noted that only some of the backup files in a specific Scale-out Backup Repository are immutable. What can cause this behavior?

A.

The ReFS extents do not have immutable enabled.

B.

Not all XFS extents in the Scale-out Backup Repository performance tier have the required flag enable.

C.

All extents in the Scale-out Backup Repository performance tier are ReFS.

D.

Not all EXT in the Scale-out Backup Repository performance archive tier have the required flag enabled.

Full Access
Question # 25

While deciding which transport mode to use for the proxies, you notice that one of the requirements is support the encrypted datastore in VMware. Which processing modes can you leverage for the backup proxies? (Choose 3)

A.

Network mode with Encryption (NBDSSL).

B.

Virtual Appliance (HotAdd) mode.

C.

Network (NBD) mode.

D.

Direct SAN.

E.

Direct SMB.

F.

Direct NFS.

Full Access
Question # 26

What information related to the virtual infrastructure is missing and must be collected during the discovery phase? (Choose 2)

A.

Local area network speed.

B.

Recovery point objective.

C.

Backup window.

D.

Size of the source data set.

E.

number of Microsoft Exchange mailboxes.

Full Access
Question # 27

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?

A.

Veeam Continuous Data Protection.

B.

Veeam image-based replication.

C.

Custom PowerShell scripting.

D.

Veeam Backup Copy with immediate mode.

Full Access
Question # 28

Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?

A.

Implement Wan accelerator.

B.

Use a dedicated Veeam Backup & Replication server just for replication.

C.

Recommend migrating some of the VMDKs to alternative datastore.

D.

Replicate to a single VMware datastore used just for replicas.

Full Access
Question # 29

Based on the requirements, what should be factored into the physical design when implementing the virtual machine replication between sites?

A.

Use virtual servers on separate ESXi hosts for the Veeam backup proxies.

B.

Use physical servers for Veeam backup proxies at each site.

C.

Ensure the proper firewall ports are open between the proxies at each site.

D.

Configure Veeam Backup Enterprise Manager on the same virtual machine as your Veeam Backup & Replication server.

Full Access
Question # 30

The customer decides to add extra proxy in anticipation of an acquisition that is planned for 12 months out, rather than wait until the acquisition is completed to expand the Veeam Infrastructure. What will be the immediate result of adding the extra proxy server?

A.

The time for backup to complete could be reduced.

B.

Repository capacity will decrease.

C.

The size of the Veeam Backup & Replication database will double.

D.

Extra repository servers will be needed.

Full Access
Question # 31

Consider the requirements regarding immutable or air gapped and different types of workloads. Which types of jobs do not support using immutability from S3 Object Lock or Hardened Repository and will need a different solution?

A.

Backup copy jobs with GFS enable.

B.

NAS backups.

C.

Backup Jobs.

D.

Scale-out Backup Repository offloads to Archive Tier to Amazon Glacier.

Full Access
Question # 32

Based on the requirements, and the assumption that Veeam University Hospital will keep their existing backup storage, which answer describes which components are needed for the on-premises design?

A.

Backup server, backup proxy, Backup Enterprise Manager, log shipping servers.

B.

Backup server, backup proxy, Backup Enterprise Manager, mount server, backup repository.

C.

Backup server, backup proxy, backup repository, Veeam vPower NFS service.

D.

Backup server, backup proxy, backup repository, mount server, guest interaction proxy, gateway server.

Full Access